Network(Security(Protocols(
|
|
|
- Piers Cooper
- 10 years ago
- Views:
Transcription
1 Network(Security(Protocols( Mike(Freedman( COS(461:(Computer(Networks( Lectures:((MW(10A10:50am(in(Architecture(N101( hep:// Network(Security( ApplicaJon(layer( EAmail:(PGP,(using(a(webAofAtrust( Web:(HTTPAS,(using(a(cerJficate(hierarchy( Transport(layer( Transport(Layer(Security/(Secure(Socket(Layer( Network(layer( IP(Sec( Network(infrastructure( DNSASec(and(BGPASec( 2! EncrypJon(and(MAC/Signatures( ConfidenJality((EncrypJon)( Sender:(( ((Compute(C(=(Enc K (M)( ((Send(C( Receiver:( ((Recover(M(=(Dec K (C)( Auth/Integrity((MAC(/(Signature)( Sender:(( ((Compute(s(=(Sig K (Hash((M))( ((Send(<M,(s>( Receiver:( ((Compute(s (=(Ver K (Hash((M))(( ((Check(s (==(s( These(are(simplified(forms(of(the(actual(algorithms( 5! (Security:( PreEy(Good(Privacy((PGP)( 6! Basic(Security(ProperJes( 3! Basic(Security(ProperJes( 4! EAMail(Security( 7! Sender(and(Receiver(Keys( 8! Confiden'ality:(( Authen'city:(( Integrity:5 Confiden'ality:(Concealment(of(informaJon(or(resources( Authen'city:(IdenJficaJon(and(assurance(of(origin(of(info( Integrity:(Trustworthiness(of(data(or(resources(in(terms(of( prevenjng(improper(and(unauthorized(changes( Security(goals( ConfidenJality:(only(intended(recipient(sees(data( Integrity:(data(cannot(be(modified(en(route( AuthenJcity:(sender(and(recipient(are(who(they(say( If(the(sender(knows(the( receiver s(public(key( ConfidenJality( Receiver(authenJcaJon( If(the(receiver(knows( the(sender s(public(key( Sender(authenJcaJon( Sender(nonArepudiaJon( Availability:5( Non9repudia'on:5 Access5control:( Availability:5Ability(to(use(desired(informaJon(or(resource( Non9repudia'on:(Offer(of(evidence(that(a(party(indeed(is( sender(or(a(receiver(of(certain(informajon( Access5control:(FaciliJes(to(determine(and(enforce(who(is( allowed(access(to(what(resources((host,(sozware,(network,( )( Security(nonAgoals( Timely(or(successful(message(delivery( Avoiding(duplicate((replayed)(message( (Since(eAmail(doesn t(provide(this(anyway!)( 1 2
2 Sending(an(EAMail(Securely( 9! Public(Key(CerJficate( 10! HTTP(Threat(Model( 13! HTTPAS:(Securing(HTTP( 14! Sender(digitally(signs(the(message( Using(the(sender s(private(key( Sender(encrypts(the(data( Using(a(oneAJme(session(key( Sending(the(session(key,(encrypted(with(the( receiver s(public(key( Sender(converts(to(an(ASCII(format( ConverJng(the(message(to(base64(encoding( ( (messages(must(be(sent(in(ASCII)( Binding(between(idenJty(and(a(public(key( IdenJty (is,(for(example,(an(eamail(address( Binding (ensured(using(a(digital(signature( Contents(of(a(cerJficate( IdenJty(of(the(enJty(being(cerJfied( Public(key(of(the(enJty(being(cerJfied( IdenJty(of(the(signer( Digital(signature( Digital(signature(algorithm(id( Eavesdropper(( Listening(on(conversaJon((confidenJality)( ManAinAtheAmiddle(( Modifying(content((integrity)( ImpersonaJon( Bogus(website((authenJcaJon,(confidenJality)( HTTP(sits(on(top(of(secure( channel((ssl/tls)( heps://(vs.(hep://( TCP(port(443(vs.(80( All((HTTP)(bytes(encrypted( and(authenjcated( No(change(to(HTTP(itself!( Where(to(get(the(key???( HTTP5 Secure5Transport5 Layer5 TCP5 IP5 Link5layer5 Web(of(Trust(for(PGP( 11! 12! Learning(a(Valid(Public(Key( 15! Hierarchical(Public(Key(Infrastructure( 16! Decentralized(soluJon( ProtecJon(against(government(intrusion( No(central(cerJficate(authoriJes( Customized(soluJon( Individual(decides(whom(to(trust,(and(how(much( MulJple(cerJficates(with(different(confidence(levels( KeyAsigning(parJes!( Collect(and(provide(public(keys(in(person( Sign(other s(keys,(and(get(your(key(signed(by(others( HTTP(Security( What(is(that(lock?( Securely(binds(domain(name(to(public(key((PK)( If(PK(is(authenJcated,(then(any(message(signed(by(that( PK(cannot(be(forged(by(nonAauthorized(party( Believable(only(if(you(trust(the(aEesJng(body( Bootstrapping(problem:((Who(to(trust,(and(how(to(tell(if( this(message(is(actually(from(them?( Public(key(cerJficate(( Binding(between(idenJty(and(a(public(key( IdenJty (is,(for(example,(a(domain(name( Digital(signature(to(ensure(integrity( CerJficate(authority( Issues(public(key(cerJficates(and(verifies(idenJJes( Trusted(parJes((e.g.,(VeriSign,(GoDaddy,(Comodo)( Preconfigured(cerJficates(in(Web(browsers( 3 4
3 Public(Key(CerJficate( 17! 18! Comments(on(HTTPS( 21! 22! Transport(Layer(Security((TLS)( Based(on(the(earlier(Secure(Socket(Layer( (SSL)(originally(developed(by(Netscape( HTTPS(authenJcates(server,(not(content( If(CDN((Akamai)(serves(content(over(HTTPS,( customer(must(trust(akamai(not(to(change(content( SymmetricAkey(crypto(aZer(publicAkey(ops( Handshake(protocol(using(public(key(crypto( SymmetricAkey(crypto(much(faster((100A1000x)( HTTPS(on(top(of(TCP,(so(reliable(byte(stream( Can(leverage(fact(that(transmission(is(reliable(to( ensure:(each(data(segment(received(exactly(once( Adversary(can t(successfully(drop(or(replay(packets( IP(Security( TLS(Handshake(Protocol( 19! TLS(Record(Protocol( 20! IP(Security( 23! IPSec( 24! Send(new(random(value,(( list(of(supported(ciphers( Send(preAsecret,(encrypted( under(pk( Create(shared(secret(key( from(preasecret(and(random( Switch(to(new(symmetricA key(cipher(using(shared(key( Send(new(random(value,((((( digital(cerjficate(with(pk( Create(shared(secret(key( from(preasecret(and(random( Switch(to(new(symmetricA key(cipher(using(shared(key( Messages(from(applicaJon(layer(are:( Fragmented(or(coalesced(into(blocks( OpJonally(compressed( IntegrityAprotected(using(an(HMAC( Encrypted(using(symmetricAkey(cipher( Passed(to(the(transport(layer((usually(TCP)( Sequence(#s(on(recordAprotocol(messages( Prevents(replays(and(reorderings(of(messages( There(are(range(of(appAspecific(security(mechanisms( eg.(tls/https,(s/mime,(pgp,(kerberos,( ( But(security(concerns(that(cut(across(protocol(layers( Implement(by(the(network(for(all(applicaJons?( ((( ( ( (((Enter(IPSec!( General(IP(Security(framework( Allows(one(to(provide( Access(control,(integrity,(authenJcaJon,(originality,( and(confidenjality(( Applicable(to(different(semngs( Narrow(streams:(Specific(TCP(connecJons( Wide(streams:((All(packets(between(two(gateways( 5 6
4 IPSec(Uses( 25! Benefits(of(IPSec( 26! Replay(ProtecJon(is(Hard( 29! 30! If(in(a(firewall/router:( Strong(security(to(all(traffic(crossing(perimeter( Resistant(to(bypass( Below(transport(layer( Transparent(to(applicaJons( Can(be(transparent(to(end(users( Can(provide(security(for(individual(users( Goal:(Eavesdropper(can t(capture(encrypted(packet( and(duplicate(later( Easy(with(TLS/HTTP(on(TCP:((Reliable(byte(stream( But(IP(Sec(at(packet(layer;(transport(may(not(be(reliable( IP(Sec(soluJon:((Sliding(window(on(sequence(# s( All(IPSec(packets(have(a(64Abit(monotonic(sequence(number( Receiver(keeps(track(of(which(seqno s(seen(before( [lastest( (windowsize(+(1(,((latest](;((((windowsize(typically(64(packets( Accept(packet(if(( seqno(>(latest((((and(update(latest)( Within(window(but(has(not(been(seen(before( If(reliable,(could(just(remember(last,(and(accept(iff(last(+(1( DNS(Security( IP(Security(Architecture( 27! EncapsulaJng(Security(Payload((ESP)( 28! Hierarchical(Naming(in(DNS( DNS(Root(Servers( SpecificaJon(quite(complex( Mandatory(in(IPv6,(opJonal(in(IPv4( Two(security(header(extensions:( AuthenJcaJon(Header((AH)( ConnecJonless(integrity,(origin(authenJcaJon( MAC(over(most(header(fields(and(packet(body( AnJAreplay(protecJon( EncapsulaJng(Security(Payload((ESP)( These(properJes,(plus(confidenJality( Transport(mode:(Data(encrypted,(but(not(header( AZer(all,(network(headers(needed(for(rouJng!( Can(sJll(do(traffic(analysis,(but(is(efficient( Good(for(hostAtoAhost(traffic( Tunnel(mode:(Encrypts(enJre(IP(packet( Add(new(header(for(next(hop( Good(for(VPNs,(gatewayAtoAgateway(security( unnamed root com edu org ac uk zw arpa west foo bar generic domains east my my.east.bar.edu country domains ac cam usr usr.cam.ac.uk /24 inaddr (root(servers((see(hEp:// Labeled(A(through(M( E NASA Mt View, CA F Internet Software C. Palo Alto, CA (and 17 other locations) B USC-ISI Marina del Rey, CA L ICANN Los Angeles, CA A Verisign, Dulles, VA C Cogent, Herndon, VA (also Los Angeles) D U Maryland College Park, MD G US DoD Vienna, VA H ARL Aberdeen, MD K RIPE London (+ Amsterdam, Frankfurt) J Verisign, ( 11 locations) I Autonomica, Stockholm (plus 3 other locations) m WIDE Tokyo
5 DoS(aEacks(on(DNS(Availability( 33! Defense:(ReplicaJon(and(Caching( 34! DNS(Integrity(and(the(TLD(Operators( 37! DNS(Integrity:(Cache(Poisoning( 38! Feb.(6,(2007( Botnet(aEack(on(the(13(Internet(DNS(root(servers( Lasted(2.5(hours( None(crashed,(but(two(performed(badly:( garoot((dod),(((laroot(((icann)( Most(other(root(servers(use(anycast( source: wikipedia! If(domain(name(doesn t(exist,(dns(should( return(nxdomain((nonaexistant(domain)(msg( Verisign(instead(creates(wildcard(records(for( all(.com(and(.net(names(not(yet(registered( September(15( (October(4,(2003( RedirecJon(for(these(domain(names(to(Verisign( web(portal:(( to(help(you(search ( And(serve(you(ads and(get( sponsored (search( Verisign(and(online(adverJsing(companies(make($$( Was(answer(from(an(authoritaJve(server?( Or(from(somebody(else?( DNS(cache(poisoning( Client(asks(for( Nameserver(authoritaJve(for( addijonal(secjon(for(( Thanks!((I(won t(bother(check(what(i(asked(for( DenialAofAService(AEacks(on(Hosts( DoS5 Source5 DNS5Query5 SrcIP:5DoS5Target5 5555(605bytes)5 40((amplificaJon( DNS5 Server5 DNS5Response5 (30005bytes)5 DoS5 Target5 580,000(open(resolvers(on(Internet(((KaminskyAShiffman 06)( 355 PrevenJng(AmplificaJon(AEacks( akacker5 prevent5 ip5spoofing5 ip spoofed packets! victim! replies! open5 amplifier5 disable5 open5amplifiers5 36! DNS(Integrity:(DNS(Hijacking( To(prevent(cache(poisoning,(client(remembers:( The(domain(name(in(the(request( A(16Abit(request(ID((used(to(demux(UDP(response)(( DNS(hijacking( 16(bits:((65K(possible(IDs( What(rate(to(enumerate(all(in(1(sec?((64B/packet( 64*65536*8(/(1024(/(1024(=(32(Mbps( PrevenJon:(also(randomize(DNS(source(port( Kaminsky(aEack:(this(source(port (wasn t(random( 39! Let s(strongly(believe(the(answer!( Enter(DNSSEC( DNSSEC(protects(against(data(spoofing(and( corrupjon( DNSSEC(also(provides(mechanisms(to( authenjcate(servers(and(requests( DNSSEC(provides(mechanisms(to(establish( authenjcity(and(integrity( 40!
6 PKADNSSEC((Public(Key)( 41! Verifying(the(Tree( 425 The(DNS(servers(sign(the(hash(of(resource( record(set(with(its(private((signature)(keys( Public(keys(can(be(used(to(verify(the(SIGs( Leverages(hierarchy:( AuthenJcity(of(name(server s(public(keys(is( established(by(a(signature(over(the(keys(by(the( parent s(private(key( In(ideal(case,(only(roots (public(keys(need(to(be( distributed(outaofaband( Ques'on:55www.cnn.com555?5 dns.cs.princeton.edu src.cs.princeton.edu5 stub5 5resolver5 xxx.xxx.xxx.xxx5 resolver5 transac'on55 signatures5 add5to5cache5 5(root) ask5.com5server5 5SIG5(ip5addr5and5PK5of5.com5server)5.com5 ask5cnn.com5server5555 SIG5(ip5addr5and5PK5of5cnn.com5server)5 SIG5(xxx.xxx.xxx.xxx)5 cnn.com5 Conclusions( 43! Security(at(many(layers( ApplicaJon,(transport,(and(network(layers( Customized(to(the(properJes(and(requirements( Exchanging(keys( Public(key(cerJficates( CerJficate(authoriJes(vs.(Web(of(trust( Next(Jme( Interdomain(rouJng(security( Learn(more:(take(COS(432(in(the(fall!( 11
Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System
Names vs. Addresses Computer Networks Lecture 5: Domain Name System Names are easier for human to remember www.umich.edu vs. 141.213.4.4 Addresses can be changed without changing names move www.umich.edu
Domain Name System DNS
CE443 Computer Networks Domain Name System DNS Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by
DNS: Domain Name System
DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing datagrams name, e.g., ww.yahoo.com - used by humans Q: map between
Domain Name System (DNS) Reading: Section in Chapter 9
Domain Name System (DNS) Reading: Section in Chapter 9 RFC 1034, STD 13 Name Syntax and rules for delegating authority over names Specify implementation of a distributed system that maps names to addresses
CMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 80N Fall'10 1 Announcements Forum assignment #2 posted. Due Nov. 5 th.
Domain Name System (or Service) (DNS) Computer Networks Term B10
Domain Name System (or Service) (DNS) Computer Networks Term B10 DNS Outline DNS Hierarchial Structure Root Name Servers Top-Level Domain Servers Authoritative Name Servers Local Name Server Caching and
CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP
Domain Name System Richard T. B. Ma
Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg
The Application Layer: DNS
Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)
FTP: the file transfer protocol
File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that
Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs
Naming and the DNS Focus How do we name hosts etc.? Application Presentation Topics Session Domain Name System (DNS) Email/URLs Transport Network Data Link Physical Ldns.1 Names and Addresses 43 name address
How To Map Between Ip Address And Name On A Domain Name System (Dns)
Computer Networks: Domain Name Service (DNS) CS 3516 D- term 2013 Instructor: Krishna Venkatasubramanian Quiz 2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers:
C 1. Last Time. CSE 486/586 Distributed Systems Domain Name System. Review: Causal Ordering. Review: Causally Ordered Multicast.
Last Time CSE 46/6 Distributed Systems Domain Name System Two multicast algorithms for total ordering Sequencer ISIS Multicast for causal ordering Uses vector timestamps Steve Ko Computer Sciences and
CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015
CS 43: Computer Networks Naming and DNS Kevin Webb Swarthmore College September 17, 2015 Agenda Identifiers and addressing Domain Name System History Query sequences Record types Load balancing Recall:
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
DNS. Spring 2016 CS 438 Staff 1
DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical
DNS and P2P File Sharing
Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:
Chapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
Network programming, DNS, and NAT. Copyright University of Illinois CS 241 Staff 1
Network programming, DNS, and NAT Copyright University of Illinois CS 241 Staff 1 Today Network programming tips Domain name system Network Address Translation Bonus slides (for your reference) Timers
CS244A Review Session Routing and DNS
CS244A Review Session Routing and DNS January 18, 2008 Peter Pawlowski Slides derived from: Justin Pettit (2007) Matt Falkenhagen (2006) Yashar Ganjali (2005) Guido Appenzeller (2002) Announcements PA
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński Internet application layer the email service The
Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting
Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: [email protected] http: www.ics.uci.edu/~magda Overivew of NAT NAT: Network Address Translation
DNS and electronic mail. DNS purposes
DNS and electronic mail Section 9.1.3 in the textbook DNS purposes Originally purpose was to translate hostnames into IP addresses www.csd. is easier to remember than 129.100.23.247 Lets us do load balancing
Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP
Ch 6: Networking Services: NAT, DHCP, DNS, Multicasting, NTP Magda El Zarki Prof. of CS Univ. of CA, Irvine Email: [email protected] http: www.ics.uci.edu/~magda Network Address Translation - NAT Private
DNS: Domain Name System
DNS: Domain Name System CMPSCI 491G: Computer Networking Lab V. Arun Slides adapted from Liebeherr & Zarki, Kurose & Ross, Kermani DNS: domain name system people: many identifiers: SSN, name, passport
The Domain Name System
The Domain Name System Mark Handley) UCL Computer Science CS 3035/GZ01 Today 1. The Domain Name System (DNS) 2. A Brief Word on DNS Security A name indicates what we seek. An address indicates where it
Domain Name System (DNS)
Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION
Communicating Applications
Communicating Applications Network Applications The raison d'être of computer networks Innovation happens in the application layer There is always a killer application Remote login -> Email -> Web -> P2P
2.5 DNS The Internet s Directory Service
130 CHAPTER 2 APPLICATION LAYER e-mail is also provided by Google, Yahoo!, as well as just about every major university and corporation. With this service, the user agent is an ordinary Web browser, and
K-Root Name Server Operations
K-Root Name Server Operations Andrei Robachevsky [email protected] 1 Outline Root Server System brief update Architecture Current locations Anycast deployment K.root-servers.net Server Major milestones Current
Domain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
COS 461: Computer Networks
COS 461: Computer Networks Spring 2010 (MW 3:00 4:20pm in CS 105) Prof. Mike Freedman Teaching Assistants: Muneeb Ali and David Shue hnp://www.cs.princeton.edu/courses/archive/spr10/cos461/ 1 Goals for
FTP: the file transfer protocol
FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that initiates transfer
Application Layer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
Application Layer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Web caches (proxy server) goal: satisfy client request without involving origin server v user
The Domain Name System
The Domain Name System 3035/GZ01 Networked Systems Kyle Jamieson Lecture 10 Department of Computer Science University College London Today 1. The Domain Name System (DNS) 2. DNS security: Cache poisoning
Network Layer, Part 1 Internet Architecture. History
Network Layer, Part 1 Internet Architecture These slides are created by Dr. Huang of George Mason University. Students registered in Dr. Huang s courses at GMU can make a single machine readable copy and
Resilient Networking. Overview of DNS Known attacks on DNS Denial-of-Service Cache Poisoning. Securing DNS Split-Split-DNS DNSSEC.
Resilient Networking 6: Attacks on DNS Overview of DNS Known attacks on DNS Denial-of-Service Cache Poisoning Securing DNS Split-Split-DNS DNSSEC SoSe 2014 Fachbereich Informatik Telecooperation Group
CSE/ISE 311: Systems Administra5on Networking 2
Networking 2 Por$ons courtesy Ellen Liu Outline IP address alloca$on NAT (Network address transla$on) Rou$ng configura$on DHCP (Dynamic host configura$on protocol) DNS (Domain name system) 16-2 IP Address
INTERNET DOMAIN NAME SYSTEM
INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download
IPv6 support in the DNS
IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of
Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,
CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - DNS; 22 nd Oct 2012 Instructor: Sridhar Iyer IIT Bombay Domain Name System Map between host names and IP addresses People: many identifiers: name, Passport #, Internet hosts:
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa. DNS & IPv6.
DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC [email protected], www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
Chapter 2: outline. 2.6 P2P applications 2.7 socket programming with UDP and TCP
Chapter 2: outline 2.1 principles of network applications app architectures app requirements 2.2 Web and HTTP 2.3 FTP 2.4 electronic mail SMTP, POP3, IMAP 2.5 DNS 2.6 P2P applications 2.7 socket programming
DNS : Domain Name System
1/30 DNS : Domain Name System Surasak Sanguanpong [email protected] http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why
The Domain Name System (DNS)
The Domain Name System (DNS) Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 24-1 Overview Naming hierarchy hierarchy Name resolution Other information in name servers 24-2
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming
Names & Addresses CS 9: Distributed Systems: Naming Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 970-77 What is a?
Application-layer protocols
Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer
The Application Layer. CS158a Chris Pollett May 9, 2007.
The Application Layer CS158a Chris Pollett May 9, 2007. Outline DNS E-mail More on HTTP The Domain Name System (DNS) To refer to a process on the internet we need to give an IP address and a port. These
DNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
Review of Networking Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected]
Review of Networking Basics Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected] These slides are extracted from the slides made by authors of the book (J. F. Kurose and K. Ross), available
Applications and Services. DNS (Domain Name System)
Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between
Communications and Networking
Communications and Networking History and Background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS
Hostnames CSCE 515: Computer Network Programming ------ Address Conversion Function and DNS RFC 1034, RFC 1035 Wenyuan Xu http://www.cse..edu/~wyxu/ce515f07.html Department of Computer Science and Engineering
The Domain Name System (DNS)
The Domain Name System (DNS) Each Internet host is assigned a host name and an IP address Host names are structured character strings, e.g., www.cs.iastate.edu IP addresses are 32 bit integers, e.g., 129.186.3.6
Distributed Denial of Service Attacks
Distributed Denial of Service Attacks Steve Crocker Chair, SSAC June 25, 2007 San Juan, Puerto Rico 1 Agenda Types of Attacks DDoS attacks Amplified DDoS attacks - 2006 Estonia - May 2007 What do Do 2
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
IP addresses have hierarchy (network & subnet) Internet names (FQDNs) also have hierarchy. and of course there can be sub-sub-!!
The Domain Hierarchy IP addresses have hierarchy (network & subnet) Internet names (FQDNs) also have hierarchy the general form for a fully qualified name is and of course there can be sub-sub-!! -sub-domains
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
IP addressing and forwarding Network layer
The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Internetworking with TCP/IP Unit 10. Domain Name System
Unit 10 Domain Name System Structure 10.1 Introduction 10.2 Fully Qualified Domain Names (FQDNs) Generic Domains Country Domains 10.3 Mapping domain names to IP addresses 10.4 Mapping IP Addresses to Domain
IPv6 Support in the DNS. Workshop Name Workshop Location, Date
IPv6 Support in the DNS Workshop Name Workshop Location, Date Agenda How important is the DNS? DNS Resource Lookup DNS Extensions for IPv6 Lookups in an IPv6-aware DNS Tree About Required IPv6 Glue in
Chapter 16 Route Health Injection
Chapter 16 Route Health Injection You can configure an HP Routing Switch to check the health of the HTTP application and inject a host route into the network to force a preferred route to an actively responding
The Transport Layer. Antonio Carzaniga. October 24, 2014. Faculty of Informatics University of Lugano. 2005 2007 Antonio Carzaniga
The Transport Layer Antonio Carzaniga Faculty of Informatics University of Lugano October 24, 2014 Outline Basic concepts in transport-layer protocols Multiplexing/demultiplexing UDP message format Reliable
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
Introduction to IP networking
DD2395 p2 2011 Introduction to IP networking Olof Hagsand KTH CSC 1 Example: Packet transfer www.server.org An end host requests a web-page from a server via a local-area network The aim of this lecture
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory
Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory Good day. Today we will take up two topics, DNS and
