2.1. What DNS? 2.2. How does DNS Work? edu com mil. gov arpa. in-addr. ucdavis. Figure 1. Hierarchical Structure DNS Name Space

Size: px
Start display at page:

Download "2.1. What DNS? 2.2. How does DNS Work? edu com mil. gov arpa. in-addr. ucdavis. Figure 1. Hierarchical Structure DNS Name Space"

Transcription

1 AFormal-SpecicationBasedApproachforProtectingtheDomain NameSystemy StevenCheung DepartmentofComputerScience UniversityofCalifornia Davis,CA95616 KarlN.Levitt DepartmentofComputerScience UniversityofCalifornia Davis,CA95616 Abstract Manynetworkapplicationsdependonthesecurity ofthedomainnamesystem(dns).attacksondns cancausedenialofserviceandentityauthenticationto fail.inourapproach,weuseformalspecicationsto characterizednsclientsanddnsnameservers,and todeneasecuritygoal:anameservershouldonly usednsdatathatisconsistentwithdatafromname serversthatmanagethecorrespondingdomains(i.e., authoritativenameservers).toenforcethesecurity goal,weformallyspecifyadnswrapperthatexaminestheincomingandtheoutgoingdnsmessagesof anameservertodetectmessagesthatcouldcauseviolationsofthesecuritygoal,cooperateswiththecorrespondingauthoritativenameserverstodiagnosethose messages,anddropsthemessagesthatareidentied asthreats.basedonthewrapperspecication,weimplementedawrapperprototypeandevaluateditsperformance.ourexperimentsshowthatthewrapperincursreasonableoverheadandiseectiveagainstdns attackssuchascachepoisoningandcertainspoong attacks. 1.Introduction Thispaperpresentsadetection-responseapproach forprotectingthedomainnamesystem(dns).dns managesadistributeddatabasetosupportawidevarietyofnetworkapplicationssuchaselectronicmail, WWW,andremotelogin.Forexample,networkapplicationsrelyonDNStotranslatebetweenhostnames andipaddresses.acompromisetodnsmaycause denialofservice(whenaclientcannotlocatethenetydraft:toappearinworkshopondependabilitydespite MaliciousFaults,NewYork,June2000. workaddressofaserver)andentityauthenticationto fail(whenhostnamesareusedtospecifytrustrelationshipsamonghosts).forexample,ifdnsiscompromisedtocauseaclienttouseincorrectdnsdata,the clientmaybeunabletoobtaintheipaddressofamail serverandthuscannotcommunicatewithit.asanotherexample,ifthednsmappingforwww.cnn.comis compromised,anattackermaybeabletodirectaweb browserlookingforthenewswebsitetoonethatgives outcounterfeitnews.ifthewebbrowserdoesnotauthenticatetheserver,theusermayusethecounterfeit newsasiftheyweregenuine.someapplications(e.g., Unixrlogin)usename-basedauthentication.Attacking DNScouldchangethename-to-addressmapping,and hencemayallowanattacker'smachinetomasquerade asatrustedmachine.thusprotectingdnsissecurity critical. OurapproachforprotectingDNSisdrivenbyformal specications.theuseofformalspecicationsenables reasoning,thusprovidingassuranceforoursolution. Formalmethodshavenotbeenusedinconnectionwith anintrusiondetectionapproach.usingviennadevelopmentmethod(vdm),wedevelopedformalspecicationstocharacterizednsclientsanddnsservers, andtodeneasecuritygoalasaninvariant:adns servershouldonlyusednsdatathatareconsistent withthosedisseminatedbythecorrespondingauthoritativesources.wedesignedadnswrapper,alsocharacterizedbyformalspecications,thatenforcesthesecuritygoal.ourdnswrapperexaminesdnsmessages enteringanddepartingaprotectednameservertodetectthosemessagesthatcouldleadtoviolationsofour securitygoal.ifthewrapperdoesnothaveenough informationtodeterminewhetheradnsmessagerepresentsanattack,itcollaborateswiththenameservers thatmanagetherelevantpartofthednsnamespace. IftheDNSwrappercannotverifythedataoftheDNS

2 server. sageandpreventsitfromreachingtheprotectedname messagetobetrustworthy,thewrapperlogsthemesnerabilities.section4presentsoursystemmodel.sec- aboutdns.)section3describessomeknowndnsvultem.(readersarereferredto[1,13,14]formoredetailtion5presentsadnswrapperthatenforcesoursecuritygoalfordns.basedonthewrapperspecication, Section2reviewsthebasicsofthedomainnamesys- weimplementedawrapperprototype.section6describesourexperimentsforevaluatingtheperformanctacks.section7concludes,comparesourworkwith ofthewrapperimplementationandtheirresults.the overheadsandiseectiveagainstsomeknowndnsat- resultsshowthatthednswrapperincursreasonable relatedwork,andsuggestsfuturework.forthesake ofbrevity,weomittheformalspecicationsfordns clients,dnsservers,andthednswrapperinthispaper.see[7]fordetailsofthiswork. 2.OverviewofDNS names.thedatabasehasahierarchicalstructure.a name(e.g.,cs.ucdavis.edu.)hasastructurethatre- Figure1. ectsthehierarchicalnamespace,whichisdepictedin DNSmanagesadistributeddatabaseindexedby 2.1. What DNS? edu com mil gov arpa ucdavis in-addr cs callednameservers.thenameofazoneistheconcatenationofthenodelabelsonthepathfromthetopmost spacethatismanagedtogetherbyasetofmachines, Azoneisacontiguouspartofthedomainname Figure 1. Hierarchical Structure DNS Name Space Thenameserversthatmanageazonearesaidtobe nodeofthezonetotherootofthedomainnamespace. authoritativeforthiszone.everysubtreeofthedomainnamespaceiscalledadomain.thenameofa domainisthesameasthezonenameofthetopmost nodeofthecorrespondingsubtree. verylargedomain,inasinglenameserver,there- informationabouttheentireedudomain,whichisa bydelegation.forinstance,insteadofstoringallthe tributedadministration.thedistributionisachieved OneofthemaindesigngoalsforDNSistohavedissponsibilityofmanagingtheucdavis.edudomainisdelegatedtotheauthoritativenameserversofUCDavis. Theauthoritativenameserversoftheeduzoneare equippedwiththenamesoftheauthoritativename serversoftheucdavis.eduzone.thusiftheeduservers needinformationabouttheucdavis.edudomain,they vice,itinvokestheresolveronitslocalmachine,and anapplicationonamachineneedstousethenameserallyimplementedasasetoflibraryroutines.whenever knowwhichserverstocontact. theresolverinteractswithnameserverstoobtainthe ClientsofDNSarecalledresolvers,whichareusu- informationneeded.themostcommonimplementationsofresolversarecalledstubresolvers(e.g.,bind1 resolversarestubresolvers).stubresolversonlydo answered.mostoftheworkiscarriedoutbyname toservers,andre-sendingthemifthequeriesarenot theminimaljobofassemblingqueries,sendingthem h1.cs.ucdavis.eduneedstheipaddressofh2.cs.foo.edu. nameresolutionorsimplyresolution.supposethehost Theresolverwillqueryalocalnameserverinthe cs.ucdavis.edudomain.therearetwomodesofresolutionindns:iterativeandrecursive.intheiterative mode,whenanameserverreceivesaqueryforwhich itdoesnotknowtheanswer,theserverwillreferthe queriertootherserversthataremorelikelytoknowthe someauthoritativeserversoftherootzone.moreover, therootserversknowtheauthoritativeserversofthe answer.eachserverisinitializedwiththeaddressesof serversknowtheauthoritativeserversofthird-leveldomains,andsoon.thusbyfollowingthetreestructure, thequeriercanget\closer"totheansweraftereachreferral.figure2showstheiterativeresolutionscenario. second-leveldomains(e.g.,edudomain).second-level TheprocessofretrievingdatafromDNSiscalled Forexample,whenarootserverreceivesaniterative queryforthedomainnameh2.cs.foo.edu,itrefersthe queriertotheeduservers.eventually,thequerierwill themostcommonimplementationofdns. locatetheauthoritativeserversofcs.foo.eduandobtain theipaddress.intherecursivemode,aservereither 1BINDstandsforBerkeleyInternetNameDomain,whichis servers How does DNS Work?

3 edu cs cs ucdavis foo root Figure 2. Iterative Name Resolution answersthequeryorndsouttheanswerbycontactingotherserversitselfandthenreturnstheanswerto thequerier. Theaboveresolutionprocessmaybequiteexpensiveintermsofresolutiontimeandthenumberofmessagessent.Tospeeduptheprocess,serversstorethe resultsofthepreviousqueriesintheircaches.consider theaboveexample.ifh1.cs.ucdavis.eduasksitslocal servertoresolvethesamenametwice,theservercan replyimmediatelybasedontheinformationstoredin itscachethesecondtime.also,ifinasubsequentquery h1.cs.ucdavis.eduasksitslocalservertondouttheip addressofh3.cs.foo.edu,thelocalservercanskipafew stepsandcontactacs.foo.eduserverdirectly.ifthe queriergetsananswerfromanauthoritativeserver, theansweriscalledanauthoritativeanswer.otherwise,itiscalledanon-authoritativeanswer.because theremaybechangestothemapping,serversdonot cachedataforever.authoritativeserversattachtimeto-live2(ttl)tagstodata.uponexpiration,aname servershouldremovethedatafromitscache DNS Message Format ADNSmessageconsistsofaheaderandfoursections:question,answer,authority,andadditional.A resourcerecord(rr)isaunitofinformationinthelast 2Thereisnosingle\best"TTLvalueforallresourcerecords. TheTTLvalueofaresourcerecordisbasedonatradeobetweenconsistencyandperformance.AsmallTTLwillincrease theaveragenameresolutiontimebecauseremotenameservers willremovetheresourcerecordearlierandneedtoquerythe correspondingnameserversmoreoften.ifaresourcerecordis changed,asmallttlenablesothernameserverstopurgethe staledataandtousethenewdataearlier.oneshouldreduce thettlbeforetheresourcerecordischanged.acommonttl valueisoneday(e.g.,thecs.ucdavis.eduzone),althoughsome high-levelzones(e.g.,therootzone)useamulti-dayttl. threesections.hereisalistofcommonresourcerecord types[13]: AnArecordcontainsa32-bitIPaddressforthe specieddomainname. ACNAMErecordliststheoriginal(orcanonical)nameofthespecieddomainname.Inother words,acnameresourcerecordmapsanaliasto thecanonicaldomainname. AnHINFOrecordcontainshostinformationsuch astheoperatingsystemused. AnMXrecordcontainsahostnameactingasa mailexchangeforthespecieddomain. AnNSrecordcontainsahostnamethatisanauthoritativenameserverforthespecieddomain. APTRrecordcontainsadomainnamecorrespondingtothespeciedIPaddress. AnSOArecordcontainsinformationfortheentire specieddomainsuchasthedomainadministrator'smailaddress. Theheaderhasaqueryideld,whichisused tofacilitaterequesters'matchingupresponsesto outstandingqueries.thequestionsectioncarries atargetdomainname(qname),aquerytype (QTYPE),andaqueryclass(QCLASS).Forexample,aquerytondtheIPaddressofthehost h2.cs.foo.eduhasqname=h2.cs.foo.edu,qtype=a, andqclass=in(whichstandsfortheinternet).the answersectioncarriesrrsthatdirectlyanswerthe query.theauthoritysectioncarriesrrsthatdescribe otherauthoritativeservers.forinstance,theauthoritysectionmaycontainnsrrstoreferthequerier toothernameserversduringiterativeresolution.the additionalsectioncarriesrrsthatmaybehelpfulin usingtherrsintheothersections.forinstance,the additionalsectionofaresponsemaycontainarrsto providetheipaddressesforthensrrslistedinthe authoritysection. 3.DNSVulnerabilities Bellovin[3,4],Gavron[10],SchubaandSpaord [15],Vixie[17],andCERTadvisoryCA-98.05[5]discussseveralsecurityproblemsofDNS.Inthefollowing, wedescribetwowell-knownproblemsofdnsthatare relevanttothispaper cachepoisoningandfailureto authenticatednsresponses. Inthecachepoisoningattack,anattackercantrick anameservers1toqueryanothernameservers2.if

4 S2isacompromisednameserver,theattackercanhave S2toreturnaDNSresponsethatcontainsfakedRRs. Otherwise,theattackercanmasqueradeasS2andsend thednsresponsetos1(seebelow).recallthataname servercachestheresultsofpreviousinteractionswith otherserverstoimproveperformance.whens1uses itscontaminatedcachetoresolveaname,itmayuse theincorrectdnsdatasuppliedbytheattacker. Themessageauthenticationmechanismusedby mostimplementationsofdnsisweak:adnsserver (oradnsclient)attachesanidtoaquery,anduses ittomatchwiththeidofthecorrespondingresponse. SupposeaserverS1sendsaquerytoanotherserverS2. IfanattackercanpredictthequeryidusedbyS1,the attackercansendaforgedresponsethathasamatchingqueryidtos1.whens1receivestheresponsethat claimstobefroms2,s1hasnowaytoverifythatthe responseactuallycomesfroms2.ifs2isunavailable whenthequeryissent,theattackercanjustmasqueradeass2andsendtheforgedresponsetos1.ifs2 isoperational,theattackercanmountadenialofserviceattackagainsts2toprevents2fromresponding tos1'squery.also,ifanameserverreceivesmultiple responsesforitsquery,itusestherstresponse.thus evenifs2canreplytos1,theattackercanstillsucceed iftheforgedresponsereachess1befores2'sresponse does. 4.SystemModel Inourmodel,therearetwotypesofprocesses:DNS serversanddnsclients(orresolvers).theseprocesses communicatewitheachotherthroughmessagepassing. Resolversonlycommunicatewithservers;serverscan communicatewithotherserversinadditiontocommunicatingwithresolvers.thesetwotypesofprocesses aredenotedbyserverandresolverrespectively.basically,wemodeldnsclientsanddnsserversasanobjectthatmaintainsaviewondnsdata.theviewmay bechangedonlythroughcommunicatingwithother DNScomponents(i.e.,sendingDNSrequestsandreceivingDNSresponses)orbytimeoutsforDNSdata. WeusetheViennaDevelopmentMethod(VDM)to specifyoursystemmodel,becausevdmprovidesa formallanguageforspecifyingdataandtheassociated operations,andincludesaframeworktoperformre- nementsofdataandoperations.anotherreasonis thatvdmprovidesabasisforperformingformalveri- cation,whichmakesitmoreconvenienttoextendour workinthefuture.mostofthesymbolsusedinvdm arestandardmathematicalsymbols.wewilldescribe thenon-standardorlesscommonlyusedonesaswe needthem.readersarereferredto[11,2]formore detailsonvdm. Inthefollowing,Section4.1presentsourDNSdata model.section4.2denesournotionofaprocess' viewondnsdata.section4.3formalizesthedns conceptofauthority.section4.4discussesourassumptionsaboutdns.section4.5presentsoursecuritygoal fordns DNS Data DNSmessages(oftypeMsg)areeitheraquery(of typequery)oraresponse(oftyperesp). Query[Resp=Msg Query\Resp=; AmessagemoftypeMsgconsistsofthefollowingsections:header,question,answer,authority,andadditional.WedenotethesesectionsofmbyHdr(m), Q(m),Ans(m),Auth(m),andAdd(m)respectively. Theheadersectionincludesaqueryid,anopcode3, atruncatedmessageag4,andaresponsecode5.we denotetheseeldsofmbyid(m),opcode(m),tc(m), andrcode(m)respectively.thequestionsectionconsistsofadomainname,aquerytype,andaqueryclass. Theanswer,theauthority,andtheadditionalsections consistsofresourcerecords(rr).wedenotethesetof resourcerecordsofamessagembyrrof(m).arr consistsofadomainname,atype,aclass,a32-bit TTL(inseconds),andaresourcedataeld.Foraresourcerecordr,wedenotetheseeldsbydname(r), type(r),class(r),ttl(r),andrdata(r)respectively. DNSmanagesadistributeddatabase.Thedatabase isindexedbyatuple(dname,type,class)oftypeidx. Therangeofthedatabaseisasetofresourcerecords, abbreviatedasrr.todenotethisdatabasetypein VDM,weuseamaptypeDbMap:Idxm?!RR?set. AmaptypeT=Dm?!RhasdomainDandrangeR. ThedomainandtherangeofTaredenotedbydom(T) andrng(t)respectively.amapoftypetisasetthat relatessingleitemsindtosingleitemsinr. RRType=fA;PTR;NS;CNAME;MX;SOA; =HINFO;:::g RRClass=fIN;:::g TTL =f0:::232?1g 3TheopcodeofaDNSmessagedistinguishesbetweendifferenttypesofqueries standardqueriesandinversequeries.a standardquerylooksfortheresourcedatagivenadomainname. Aninversequerylooksforthedomainnamegivenresourcedata. 4ThetruncatedmessageagindicateswhethertheDNSmessageistruncated.Messagetruncationoccurswhenthemessage lengthisgreaterthanthatallowedonthetransmissionmedium. 5Theresponsecodeeldisusedtoindicateerrorsand exceptions.

5 Idx::dname:DName type:rrtype class:rrclass RR::dname:DName type:rrtype class:rrclass ttl :TTL rdata:rdata DbMap=Idxm?!RR-set DbrepresentsthedatamanagedbyDNS. SubDomaincapturesthedomain-subdomainrelationships.Givenadomaind,thesetofallthesub-domains ofdisrepresentedbysubdomain(d).azonecontains thedomainnamesandtheassociateddataofadomain,exceptthosethatbelongtoadelegateddomain. Azoneisacontiguouspartofthedomainnamespace thatismanagedtogetherbyasetofnameservers.a zonemayhaveasetofdelegatedsubzones,represented bythefunctionsubzone.(invdm,afunctionspecicationconsistsoftwoparts.therstpartdenes theargumenttypesandtheresulttype,whichareseparatedbythesymbol\!".thesecondpartgivesthe functiondenition.)forazonez,zonedata(z)containsallresourcerecordswhosedomainnamesbelong tozonez,thezonecutdata,andthegluedata.the zonecutdatadescribethecutsaroundthebottomof zonez:inparticularthensresourcerecordsofthe nameserversforthedelegatedzonesofz.ifthereare nameserversforthedelegatedzonesresidingbelowthe zonecut,thegluedatacontaintheaddressesofthese servers. Db:DbMap SubDomain:Domainm?!Domain?set ZoneData:Zonem?!DbMap SubZone:Zone!Zone?set 8z2ZoneSubZone(z)4 fczj9rr2rngzonedata(z)type(rr)=ns^ dname(rr)6=z^cz=dname(rr)g 4.2. View Everyprocessmaintainsitsviewofthedatabase. Theviewofaserverscanbepartitionedintotheauthoritypart(denotedbyViewauth(s))andthecache part(denotedbyviewcache(s)),wheretheformertakes precedenceoverthelatter.themapoverwriteoperatorytakestwomapoperandsandreturnsamapthat containsalltheelementsinthesecondoperandand thoseintherstoperandwhosedomaindoesnotappearinthedomainofthesecondoperand.foraserver thatisnotauthoritativeforanypartofthedatabase andforaresolver,thecorrespondingviewauthis;. Viewauth:Processm?!DbMap Viewcache:Processm?!DbMap View:Process!DbMap 8p2ProcessView(p) AuthorityViewcache(p)yViewauth(p) Someserversaresaidtobeauthoritativefora zone;theirviewsonthezonedatadenethem. AuthServermapsazonetothelistofauthoritative servers.authanswerdenesthemappingfromanindextotheauthoritativeanswer,denedbytheviewof theanauthoritativeserverontheindex.authoritative returnstrueifandonlyifeveryresourcerecordinthe inputresourcerecordsetisauthoritative. AuthServer:Zonem?!Server?set AuthAnswer:Idx!RR?set 8i2dom(Db)AuthAnswer(i)= letz2zone^p2process^ i2domzonedata(z)^p2authserver(z)in Viewauth(p)(i) Authoritative:RR?set!Boolean 8rrs2RR?setAuthoritative(rrs)= 8rr2rrsrr2 AuthAnswer((dname(rr);type(rr);class(rr)) 4.4. Assumptions Inthissection,weexplicitlylistourassumptionsfor DNS.Theyconcernwithhownameserversprioritize RRsets,theaccuracyofauthoritativeDNSdata,the eectofchangesondnsdata,theaccuracyofdelegationdata,andthepowerofattackersoneavesdropping DNSpackets. Assumption1ProtectedserversdonotaddanRRto theviewcacheofaprocessifanrrthatcorrespondsto thesameindexalreadyexistsintheviewcache.moreover,protectedserverspreferauthoritativedataover cachedata. Bothofthemholdfor\good"servers(i.e.,servers thatbehaveaccordingtothednsrfc[13,14]). Someserverimplementationsrankdatafromdierent sourcesatdierentcredibilitylevels.moreover,data fromahighercredibilitylevelcanpreemptdatafrom alowercredibilitylevel.wedonotmodeldatacredibilitylevelsinourworkforthesakeofsimplicity.becauseourdnswrapperonlyallowsauthoritativedata toreachaprotectednameserver,thissimplication doesnotaectthevalidityofourresults.

6 Assumption2Datafromanauthoritativeserverare correct. Forexample,ifaserverisauthoritativeforamachine handtheserversaystheipaddressofhisi,thenwe believethattheipaddressofhisi. Assumption3WhenaserverattachesaTTLwith tsecondstoaresourcerecordforwhichtheserveris authoritative,theresourcerecordwillbevalidforthe nexttseconds. WestatethisassumptionbecausethereisnorevocationmechanisminDNS.Withoutthisassumption,one cannotdeterminethevalidityofdnsdataassoon astheyleavetheirauthoritativeservers.weargue thatthisassumptionisreasonable.whenaresource recordneedstobechanged,thettlofthisresource recordisusuallydecreasedbeforethechangeoverso thatincorrect/stalerecordswilltimeoutshortlyafter thechangeover. Assumption4Foreveryzone,thedelegationdata andthegluedataofitschildzonescorrespondtothe NSRRsandtheARRsofthenameserversofthechild zones. Anexampleviolationofthisassumptioniscalledlame delegation.lamedelegationiscausedbyoperational errors:asystemadministratorchangesthename serversforazonewithoutchangingthecorresponding delegationinformationintheparentzoneornotifying thesystemadministratoroftheparentzoneaboutthe change. Assumption5Attackerscannoteavesdroponthe DNSpacketssentbetweenourprotectedserversand thelegitimatenameservers. Thisisalimitweplaceontheattackers;ifattackers canmonitorthecommunication,ourschememayfail tocopewithspoongattacks.inthefuture,whenthe useofthednssecurityextensions[8](dnssec) whichemploysdigitalsignaturestoauthenticatedns data iswidespread,wemaydropthisassumption.an implicationofthisassumptionisthatbyrandomizingthequeryidused,theprobabilitythatanattacker canforgearesponsewhoseidmatchestherandomized queryidissmall.thusattemptsforsendingforgedresponsesbyguessingthequeryidusedcanbedetected bythewrapper Our Goal Ourgoalistoensurethattheviewofaprotected nameserveragreeswiththoseofthecorrespondingauthoritativenameservers.thisgoalisspeciedusingavdmdatainvariant.adatainvariantofa datatypespeciesthepredicatesthatmustholdtrue duringtheexecutionofasystem.ournameserver specication,whichreectstheminimalfunctionalities ofdnsserversamongexistingimplementations,does notsatisfythisdatainvariantbecauseitallowsnonauthoritativednsdatatobeusedbyanameserver. Thusforanameservers,Authoritative(rngView(s)) maynothold.inthenextsection,wewillpresent oursolution asecuritywrapperforprotectingname servers.ourdnswrapperltersoutdnsmessages containingresourcerecordsthatcannotbeveriedas authoritative.therefore,aprotectednameserverthat satisesthedatainvariantcanbeconstructedbycomposinganameserverandourdnswrapper. statednsof protectedns:server?set invmk-dns(protectedns)4 end8s2protectednsauthoritative(rngview(s)) 5.OurDNSWrapper Weusesecuritywrapper(orsimplywrapper)torefer toapieceofsoftwarethatencapsulatesacomponent, suchasanameserver,toimproveitssecurity.using wrapperstoenhancethesecurityofexistingsoftware isnotanewidea.relatedworkincludestcpwrapper [16]andTIS'genericsoftwarewrappers[9].However, ourworkisdierentinthatitaddressesproblemsthat arednsspecicanditinvolvestheuseofformalspecications. Considerawrapperw.WrapperwchecksDNSresponsepacketsgoingtoanameserverandensuresthat theyareauthenticated6andtheyagreewithauthoritativeanswers.ifaresourcerecordintheresponsedoes notcomefromanauthoritativeserver,wrapperwlocatesanauthoritativeserverandqueriesthatserver fortheauthoritativeanswer.tolocateanauthoritativeserverforazone,sayz,thewrapperstartswith aserver,says,thatisknowntobeanauthoritative 6Dataauthenticationcheckscanbeperformedbymatchingthequeryid'sofqueriestothoseofresponses,orbyusingDNSSEC.However,thequeryidgenerationprocessusedin someimplementationsofnameserversisquitepredictable.beforednsseciswidelydeployed,weneedameanstoprotect thesenameserversfromspoongattacks.

7 serverforanancestorzoneofz,andqueriesservers forauthoritativeserversofthechildzonethatiseither anancestorzoneofzorzitself.thesearchisperformedbytraversingthedomainnametree,onezone atatime,untilanauthoritativeserverforthedns databeingveriedislocated.recallthatthezonedata maintainedbyaserverincludethenameserverdataof thedelegatedzones.moreover,thezonedata,includingthezonecutdataandthegluedata,takeprecedenceoverrrsobtainedfromoutsidesources.thus thedelegationdataisimmunefromcachepoisoningattacks.ourschemeexploitsthisfacttosecurelylocate theauthoritativeservers. Letnsdenotethenameserverprotectedbywrapper w.ourwrapperconsistsoftwomainparts:wrappersq forprocessingqueries,andwrappersrforprocessingresponses.(thesubscriptsstandsfor\server".) Wrapperwprocessesqueriesgeneratedbynsbefore theyaresentout,andprocessesqueriesdestinedfor ns.wrapperwalsoprocessesresponsesdestinedfor ns;thosethatareacceptedbywwillbeforwardedto ns.whennssendsaquery,wrapperwgeneratesarandomqueryidandusesittoreplacetheoriginalquery id(usedbyns).weuseatranslationtabletotrack themappingbetweentherandomqueryid'susedbyw andtheoriginalqueryid'susedbyns. Wrappersqprocessesqueriesthatinvolvens.These queriescanbepartitionedintotwotypes.therst typecorrespondstothequeriesthataresenttons.the secondtypecorrespondstothequeriesthataregeneratedbyns.thesetwotypesofqueriesaretreated dierently.forthersttype,wrapperwchecksthe queriestodeterminewhethertheyarewell-formed (e.g.,theanswer,theauthority,andtheadditionalsectionsforastandardqueryshouldbeempty).forthe secondtype,thewrappergeneratesarandomqueryid, replacesthequeryidusedintheoriginalquerybythis randomlygeneratedqueryid,andupdatesthelocal queryidtranslationtable. Wrappersrprocessesresponsesthatarereceived bythewrapper.wrappersrhastwocomponents: Wrappersr1andWrappersr2.Wrappersr1screens outforgedresponsemessages.inotherwords,response authenticationishardened.wrappersr2veriesthe responsemessagestoensurethattheyagreewithauthoritativeanswers,andcopeswithcachepoisoning attacks.therearetwotypesofresponsesreceivedby awrapper:responsesforqueriesgeneratedbytheprotectednameserverns,andresponsesforqueriesgeneratedbythewrapperitself(formessagediagnosispurposes).whenaresponseforaquerygeneratedbyns isreceived,thewrapperusesthequeryidtranslation tabletorestorethequeryid(totheoneusedbyns) beforepassingtheresponsetowrappersr2. 6.Experiments 6.1. Overview Weconductedexperimentstoevaluatetheresponse time(i.e.,theelapsedtimebetweensendingaquery toanameserverandreceivingaresponsefromit)ofa wrappednameserver,andtoevaluatethefalsepositive rate,thefalsenegativerate,andthecomputational overhead(i.e.,cputimeused)ofourwrapper. BasedontheDNSwrapperspecication,weimplementedaprototypeoftheDNSwrapperforBINDrelease4.9.5,whichwasthelatestreleaseforBINDwhen westartedourimplementation.thednswrapper waswritteninc.wemodiedthebindnameserver sourcecodetoinvokethednswrapperuponreceivingqueriesandresponsesanduponsendingqueriesto othernameservers. Inthissection,wedescribetwosetsofexperiments andtheirresults.inexperimenta,weexaminedthe responsetime,thefalsepositiverate,andthecomputationaloverheadofourwrapperusingatraceofdns queriesreceivedbyanameserverinanoperationalsetting.inexperimentb,weexaminedthefalsenegative rateofourwrapperwithrespecttofourattacks:three cachepoisoningattacksandonespoongattack General Experimental Setup Intheseexperiments,ournameservers(BIND4.9.5) listenedtoport4000insteadofport53(thedefacto standardportnumberfornameservers)fordns queriestopreventqueriesoutsideourexperimentsfrom aectingourresults. Ineveryrunofourexperiments,westartedafresh copyofournameserverbecausenameserversmaintain acachefordnsinformationobtainedthroughinteractingwithothernameservers.thebehaviorofaname servercanbequitedierentdependingonwhetherthe DNSinformationqueriedcanbefoundinthecache. Restartingnameserverscanavoidinterferencebetween consecutiverunsoftheexperiment. WeusedamodiedversionofnslookupastheDNS clientinourexperiments.(see[1]foragoodtutorial onnslookup.)wechosenslookupbecauseitisaconvenienttoolforgeneratingdnsqueriesanddisplayingdnsresponses.moreover,nslookupcanbeeasily conguredtouseaspeciednameserverportnumber andtoqueryaspeciednameserver.ourmodied nslookupusesunixgethrtime()systemcallstorecord

8 thetimewhenaqueryissentandwhenthecorrespondingresponseisreceived.unlessotherwisespecied,we willusenslookuptorefertothismodiedversionof nslookup. Ourexperimentswereperformedonalightlyloaded SunSPARC-5runningSolaris2.5.1.Weranourname serversandnslookuponthesamemachinetoeliminate thenetworklatencyforthecommunicationbetween them,thusreducingtheinuenceofthelocalareanetworkloadontheexperimentalresults. Becausewedidnothavecontroloverexternalname servers,andtheinter-networklinksbetweenourname serverandexternalnameservers,weperformedexperimentamultipletimesandcalculatedtheaverage responsetime Experiment A 6.3.1DataSet ThedatasetforExperimentAconsistedofatraceof 1340DNSqueriesreceivedbyanameserverina\real world"setting.togatherthetraceofdnsqueries, wemodiedanameservertologalldnsqueriesit receivedandranitfortwodays.wealsomodiedthe localbindresolvercongurationletodirectalldns queriestothisnameserver.intheresolvercongurationle,thesearchlistwasconsistedofcs.ucdavis.edu., ucdavis.edu.,anducop.edu.whenabindresolveris invokedtoresolvearelativedomainname adomain namethatdoesnothaveatrailingdot itappends thedomainnamesintheorderspeciedinthesearch listandattempttoresolvethemuntilapositiveresponseisreceived.ifnoneofthemresultsinasuccessfulresolution,theresolverthengeneratesaquery fortherelativedomainnameitself.forexample,when thebindresolverisinvokedfordomainnamedn,itattemptstoresolvefordn.cs.ucdavis.edu.,dn.ucdavis.edu., dn.ucop.edu.,anddninthatorderuntilasuccessfulresolutionisobtained ExperimentalProcedure 1.Startawrappednameserver. 2.Runnslookuptoquerythewrappednameserver forresolvingthe1340dnsqueriessequentially. 3.RecordthetotalsystemCPUtimeandthetotal usercputimeused. 4.Terminatethewrappednameserver. 5.Repeattheaboveprocedureusinganunmodied nameserverinsteadofawrappednameserver ExperimentalResults Table1showsthestatisticsrelatedtoresponsetimes recordedbynslookupbasedon33runsofthisexperiment.themeanresponsetimeforthewrappedserver was0.12secondperquery,andthatfortheunmodi- edserverwas0.08secondperquery.weexaminedthe tracesegmentsthatcorrespondto\steep"increasesin theresponsetimes(e.g.,400th-600thquery),wefound thattheycouldbeexplainedbydnsqueriesgeneratedbywebsurngsessions,whichinvolvedmostly remoteanddistinctdomainnames.specically,the tracesegmentforthe400th-600thqueryincluded43 remoteanddistinctdomainnames.theaveragetotal responsetimesforthose43queriesfortheunmodied serverandthewrappedserverwere28.29secondsand 47.54secondsrespectively,whichaccountedfor83% and88%ofthetotalresponsetimesforthatinterval respectively. Table2showstheCPUtimesusedbytheunmodiedserverandthewrappedserver.Theguresshow thattheaveragecputimesusedareasmallfraction (8%fortheunmodiedserverand7%forthewrapped server)ofthetotalresponsetime.thustheresponse timeoverheadofthewrapperreportedintable1was largelyduetowaitingfortheresponsemessagesin themessagediagnosisprocess.theaveragetotalcpu timeincreasedfrom9.33secondsto11.29seconds(i.e., a21%increase). Thenumberoffalsepositivesrangedfrom2-10per run,withthemeanbeing5.85andthestandarddeviationbeing1.89.amongthefalsepositives,80%of themwerecausedbynameserverbehaviorsthatviolateournameserverspecicationortoaviolationof ourassumptions.forexample,falsepositivescaused bymiscongurationsofnameserversareinthiscategory.theremaining20%ofthefalsepositiveswere generatedwhenthewrappergaveupondiagnosing adnsmessageaftertheamountofresourcesspent (e.g.,thenumberofdnsqueriesissued)hadreached athreshold.thethresholdisusedtoensurethatthe amountofresourcesusedforverifyingamessageis bounded,thusprotectingthewrapperfromproblems likedenialofserviceattacks Experiment B ThemaingoalofExperimentBistoexaminethe detectionrateofmaliciousattacksofawrappedname server(i.e.,falsenegativerate).weinvestigatedthe followingfourtypesofattacks: Sendingincorrectresourcerecordsforaremotedomainnametothetarget:Thisisaccomplishedby

9 #queries 200UnmodiedNameServer Mean Min MaxStdDev 3.62WrappedNameServer Mean Min MaxStdDev 4.66 Table Cumulative Response Time (in Sec.) for the Two-day trace Data Set System TypeMeanMinMaxStdDevMeanMinMaxStdDev UserUnmodiedNameServer WrappedNameServer Table 2. System and Times Used (in Sec.) for the Two-day Trace Data Set. usingacnameresourcerecordintheanswersectionofaresponsemessagetointroduce(inthe thenincludingincorrectresourcerecordsforthis resourcedataeld)anarbitrarydomainnamefor whichthetargetserverisnotauthoritative,and Sendingincorrectresourcerecordsthatconict remotedomainnameintheadditionalsectionof withthezonedataforwhichthetargetisauthoritative:inparticular,theattackerusesacname theresponsemessage. highprobability. queryid'sforoutgoingqueries.thusattackerswhodo nothaveaccesstothosequerieswillhavetoguessthe queryid'susedfortheirforgedresponsemessages.as 6.4.1DataSet aresult,theirforgedmessageswillbedetectedwith Sendingresourcerecordsthatcorrespondtoanonexistingdomainnamethatlivesinthetarget server'szone. inthedomainforwhichamaliciousnameserveris resourcerecordtolinktoanaresourcerecordfor whichthetargetisauthoritative. InExperimentB,wemodiedthedatasetusedin ExperimentAbyinsertingtwoqueriesthatcorrespond toeachofthefourtypesofattacksatrandomlocations Sendingaresponsewithaguessedqueryid:In thisattack,onequeriesthetargetservertotrigger authoritativebutdonottriggeranattack. Thesequeriescorrespondtodierentdomainnames inthetwo-daytrace.moreover,wealsoinsertedfour queriesatrandomlocationsinthetraceascontrols. ittosendaquerytotheattacker,whomrecords theattackeraddsonetothequeryidusedinthe Insteadofusingthequeryidofthesecondquery, thequeryidused.asecondqueryisthenissued 6.4.2ExperimentalProcedure rstqueryandusestheresultasthequeryidin itssecondresponse. totriggerthetargettoquerytheattackeragain. 1.Startamaliciousnameserverforanewsubdomaindns.cs.ucdavis.edu.Whenthatmalicious Therstthreetypesofattackscorrespondtosending incorrectdnsdatatoanameserver(i.e.,cachepoisoningattacks).thefourthtypeofattackscorrespondsto 2.Startawrappednameserver. 3.RunnslookupwiththemodiedtraceofDNS queryidorapredictedqueryid. orsendoutresponsemessageswithanincorrect willeitherreturnincorrectdnsresourcerecords main,dependingonthedomainnamesqueried,it namesthatresideinthedns.cs.ucdavis.edu.do- nameserverisaskedtoresolveforcertaindomain masqueradingattacks.ourwrapperusedrandomized queriesasinputandsendthequeriessequentially

10 tothewrappednameserver. 4.Terminatethewrappednameserver. 5.Terminatethemaliciousnameserver. 6.Repeattheaboveprocedureusinganunmodied nameserverinsteadofawrappednameserver ExperimentalResults Werantheexperimentvetimes.Inallveruns,all eightattacks(i.e.,twofromeachofthefourattack types)werereportedcorrectlybythewrappedname server,andnoneoftheresponsemessagescorrespondingtothecontrolqueriesweremisclassiedasattacks. Whenweappliedthesefourtypesofattackstoan unmodiednameserver,thersttypeofattackssucceededinplantingincorrectdnsdataintothecache ofthetargetserver.forthesecondandthethirdtype, theunmodiednameserverdidnotcachetheincorrect DNSdatafordomainnamesthatbelongtoitsauthoritativedomain.However,thenameserverdidforward theentireresponsemessagereceived,includingthose incorrectresourcerecordsforwhichthenameserver wasauthoritative,toitsclient.thatdidnotmake muchdierenceforourexperimentsbecausetheclient usedwasnslookup,whichdidnotperformcaching. However,iftheclientwasanothernameserverthat wasnotauthoritativeforthoseincorrectdnsdata, thecacheoftheclientwouldbecorrupted.thissituationmayoccurwhentheclientisacaching-only server7thatusesanothernameserverasaforwarder8. Thefourthtypeofattackssucceededforanunmodied nameserver.itwasbecausethequeryidusedbythe unmodiednameserverwaspredictable:thequeryid usedinsuccessivequeriesalwaysdieredbyone. 7.ConclusionsandFutureWork Thispaperpresentsadetection-responseapproach forprotectingdns.ourapproachconsistsofthefollowingsteps.first,wedeneasecuritygoal name serversonlyusednsdatathatareconsistentwith thecorrespondingauthoritativedata.second,wedeclarethethreats,namelycachepoisoningandspoofingattacks.third,wedevelopadnsmodel,which includesformalcharacterizationsofdnsclientsand 7Acaching-onlyserverisanameserverthatisnotauthoritativeforanydomain. 8Aforwarderisanameservertowhichothernameservers forwardtheirrecursivequeries.aforwarderisusefulforbuilding alargecacheforremotednsdata,especiallywhencommunicationbetweenlocalmachinesandremotemachinesisslowor restricted. DNSservers.Fourth,wedesignaDNSwrapperwith theobjectivethatthecompositionofthespecication foraprotectednameserverandthatforthewrapper satisesoursecuritygoalfordns.ifthednswrapperreceivesadnsmessagethatmaycauseviolations ofthesecuritygoal,thewrapperdropsthemessage insteadofforwardingittotheprotectednameserver. Fifth,weusetheformalspecicationforthewrapper toguideourimplementationofawrapperprototype. Tocountercachepoisoning,Vixie[17]presents enhancementstobind.briey,bindversion4.9.3 checkstheinputresourcerecordsmorecarefullybeforecachingthem.moreover,itimplementsacredibilitylevelschemeinwhichresourcerecordsfromamore crediblesourcetakeprecedenceoverthosefromaless credibleone.cheswickandbellovin[6]presentadesignforadnsproxy(dnsproxy).intheirdesign,the domainnamespaceispartitionedintoregionscalled realms.arealmisservedbyasetofservers.dependingonthequerynameofadnsrequest,dnsproxyforwardstherequesttotheserversresponsibleforthecorrespondingrealm.certainresourcerecordsinresponse messages thosethatdonotrefertorealmtowhich thequerynamebelongs,andthosethatsatisfyaset oflteringrules areremovedtoprotectthequeriers. EastlakeandKaufman[8]presentsecurityextensions todns(dnssec)thatusesdigitalsignaturestosupportdataauthenticationfordnsdata.indnssec, newresourcerecordtypesareintroducedforpublic keysanddigitalsignatures.security-awareservers andsecurity-awareresolverscanusezonekeys,which areeitherstaticallyconguredorlearnedbychaining throughzones,toverifytheoriginsofresourcerecords. ComparedtothepriorworkforprotectingDNS,our DNSwrapperhasthefollowingadvantages: Providesassurancebyemployingformalspecications(writteninVDM)tocharacterizeDNScomponents,tostatethesecuritygoal,andtocharacterizeoursolution. Eectiveagainstcachepoisoningattacksandcertainspoongattacks(i.e.,queryidguessing)when theassumptionsinsection4.4aremet. CompatiblewithexistingDNSimplementations. DoesnotrequirechangesfortheDNSprotocol. Incursreasonableperformanceoverhead. Canbedeployedlocally;doesnotdependon changestootherremotednscomponents. InNovember1998,acompanycalledMen&Mice surveyedthestatusofnameserversontheinternet

11 [12].Among4184randomlypickedcomzones,1344of them(i.e.,32:1%)werefoundtobevulnerabletocache poisoningattacks.inotherwords,thenameserversof thosezonescouldbecompromisedandgaveoutincorrectinformationaboutotherdomains,includingits delegateddomains.wenotethattheeectivenessof ourdnswrapperisnotaectedbyattacksagainst externalnameserversaslongasourassumptionsare met. Thereareseveraldirectionsforfutureresearch. Tofurtherraisetheassurancelevelofourwrapper, onemayperformacompleteformalverication fromspecicationtoimplementation.thevdm specicationsdevelopedcanbeusedasthebasis forconductingtheformalverication. ResultsfromExperimentAshowa0.437%false positiverateforthednswrapper.becausethe majorityofthesefalsepositiveswerecausedby miscongurationsofexternalnameservers,anontrivialmodicationforthednswrappermaybe neededtosignicantlyreducethefalsepositive rate. WehavenotdiscussedprotectingDNSresolvers. Ifthecommunicationpathbetweenaresolverand itstrustedlocalnameserverissecure,andthe nameserverisprotectedbythednswrapper,the DNSdatareceivedbytheresolveris\safe"becauseawrappednameserveronlyusesDNSdata thatareconsistentwiththecorrespondingauthoritativeanswers.futureresearchmaybeconducted toprotectdnsresolverswhentheresolver-server communicationpathisinsecure.apossibilityis toadaptthednswrappertoprotectresolvers. Onemayapplyourapproachtoprotectothernetworkservicesandprivilegedprocesses. 8.Acknowledgments ThisworkwassupportedbyDARPAundergrant ARMY/DAAH References [1]P.Albitz,andC.Liu,\DNSandBIND."O'Reilly andassociates,inc.,1992. [2]D.Andrews,andD.Ince,\PracticalFormalMethodswithVDM."McGraw-Hill,1991. [3]S.M.Bellovin,\SecurityProblemsintheTCP/IP ProtocolSuite."ComputerCommunicationsReview,Vol.19,No.2,April1989,pp [4]S.Bellovin,\UsingtheDomainNameSystemfor SystemBreak-ins."Proc.ofthe5thUNIXSecurity Symposium,June5-7,1995,pp [5]CERTCoordinationCenter,\MultipleVulnerabilitiesinBIND."CERTAdvisoryCA-98:05, April8,1998. [6]B.Cheswick,andS.Bellovin,\ADNSFilterand SwitchforPacket-lteringGateways."Proc.ofthe 6thUNIXSecuritySymposium,July22-25,1996, pp [7]S.Cheung,\AnIntrusionToleranceApproachfor ProtectingNetworkInfrastructures."Ph.D.Dissertation,UniversityofCalifornia,Davis,September1999. [8]D.Eastlake,3rd,andC.Kaufman,\Domain NameSystemSecurityExtensions."RFC2065, January1997. [9]T.Fraser,L.Badger,andM.Feldman,\HardeningCOTSSoftwarewithGenericSoftwareWrappers."Proceedingsofthe1999IEEESymposium onsecurityandprivacy,oakland,california, May5-7,1999,pp [10]E.Gavron,\ASecurityProblemandProposed CorrectionwithWidelyDeployedDNSSoftware." RFC1535,October1993. [11]C.B.Jones,\SystematicSoftwareDevelopment usingvdm."prentice-hall,1990. [12]MenandMice,\DomainHealthSurvey." [13]P.Mockapetris,\DomainNames{Conceptsand Facilities."RFC1034,November1987. [14]P.Mockapetris,\DomainNames{ImplementationandSpecication."RFC1035,November [15]C.L.Schuba,andE.H.Spaord,\Addressing WeaknessesintheDomainNameSystemProtocol."TechnicalReport,DepartmentofComputer Sciences,PurdueUniversity,1994. [16]W.Venema,\TCPWrapper:NetworkMonitoring,AccessControl,andBoobyTraps."Proc. ofthe3rdunixsecuritysymposium,september 1992,pp [17]P.Vixie,\DNSandBINDSecurityIssues."Proc. ofthe5thunixsecuritysymposium,june5-7, 1995,pp

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay

CS 348: Computer Networks. - DNS; 22 nd Oct 2012. Instructor: Sridhar Iyer IIT Bombay CS 348: Computer Networks - DNS; 22 nd Oct 2012 Instructor: Sridhar Iyer IIT Bombay Domain Name System Map between host names and IP addresses People: many identifiers: name, Passport #, Internet hosts:

More information

Domain Name System. CS 571 Fall 2006. 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved

Domain Name System. CS 571 Fall 2006. 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved Domain Name System CS 571 Fall 2006 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved DNS Specifications Domain Names Concepts and Facilities RFC 1034, November 1987 Introduction

More information

Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming

Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming Names & Addresses CS 9: Distributed Systems: Naming Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 970-77 What is a?

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

The Domain Name System (DNS)

The Domain Name System (DNS) The Domain Name System (DNS) Each Internet host is assigned a host name and an IP address Host names are structured character strings, e.g., www.cs.iastate.edu IP addresses are 32 bit integers, e.g., 129.186.3.6

More information

The Domain Name System (DNS)

The Domain Name System (DNS) The Domain Name System (DNS) Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 24-1 Overview Naming hierarchy hierarchy Name resolution Other information in name servers 24-2

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS FALL 2011 Lecture 19: DNS Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Human Involvement

More information

Introduction to the Domain Name System

Introduction to the Domain Name System CHAPTER 14 The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses),

More information

DNS : Domain Name System

DNS : Domain Name System 1/30 DNS : Domain Name System Surasak Sanguanpong nguan@.ac.th http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why

More information

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Domain Name System

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Domain Name System Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication

More information

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all

More information

NET0183 Networks and Communications

NET0183 Networks and Communications NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many

More information

Domain Name Server. Training Division National Informatics Centre New Delhi

Domain Name Server. Training Division National Informatics Centre New Delhi Domain Name Server Training Division National Informatics Centre New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Possible Configurations

More information

Domain Name System (DNS)

Domain Name System (DNS) Lab Objectives Domain Name System (DNS) Acquiring skills related to the Domain Name System (DNS) functions Practical studying of DNS protocol in the process of its functioning Background Information DNS

More information

Domain Name System (DNS) Reading: Section in Chapter 9

Domain Name System (DNS) Reading: Section in Chapter 9 Domain Name System (DNS) Reading: Section in Chapter 9 RFC 1034, STD 13 Name Syntax and rules for delegating authority over names Specify implementation of a distributed system that maps names to addresses

More information

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System Names vs. Addresses Computer Networks Lecture 5: Domain Name System Names are easier for human to remember www.umich.edu vs. 141.213.4.4 Addresses can be changed without changing names move www.umich.edu

More information

DNS Domain Name System

DNS Domain Name System DNS Domain Name System Domain names and IP addresses People prefer to use easy-to-remember names instead of IP addresses Domain names are alphanumeric names for IP addresses e.g., neon.cs.virginia.edu,

More information

ECE 4321 Computer Networks. Network Programming

ECE 4321 Computer Networks. Network Programming ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet

More information

19 Domain Name System (DNS)

19 Domain Name System (DNS) CHAPTER 9 Domain Name System (DNS) I n this chapter, we discuss the second application program, Domain Name System (DNS). DNS is a client/server application program used to help other application programs.

More information

Vorlesung Kommunikationsnetze Domain Name System

Vorlesung Kommunikationsnetze Domain Name System Picture 15 13 Vorlesung Kommunikationsnetze Domain Name System Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Internet-Praktikum I Lab 3: DNS

Internet-Praktikum I Lab 3: DNS Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans

More information

Domain Name System Security

Domain Name System Security Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is

More information

INTERNET DOMAIN NAME SYSTEM

INTERNET DOMAIN NAME SYSTEM INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download

More information

DNS - Domain Name System

DNS - Domain Name System DNS - Domain Name System TCP/IP class 1 outline introduction naming scheme protocol format record types how it works reverse lookup implementation - named config files summary - futures 2 bibliography

More information

Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS

Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS Hostnames CSCE 515: Computer Network Programming ------ Address Conversion Function and DNS RFC 1034, RFC 1035 Wenyuan Xu http://www.cse..edu/~wyxu/ce515f07.html Department of Computer Science and Engineering

More information

Automated domain name registration: DNS background information

Automated domain name registration: DNS background information IBM eserver Automated domain name registration: DNS background information ^business on demand software ADNRbackground.ppt Page 1 of 14 Overview of z/os DNS solutions Two z/os name servers supported ƒdns

More information

CS640: Computer Networks. Naming /ETC/HOSTS

CS640: Computer Networks. Naming /ETC/HOSTS CS640: Computer Networks Aditya Akella Lecture 17 Naming and the DNS Naming Need naming to identify resources Once identified, resource must be located How to name resource? Naming hierarchy How do we

More information

Domain Name System. Overview. Domain Name System. Domain Name System

Domain Name System. Overview. Domain Name System. Domain Name System Overview Domain Name System We look first at how the Domain Name System (DNS) is implemented and the role it plays in the Internet We examine some potential DNS vulnerabilities and in particular we consider

More information

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP

More information

How to set up the Integrated DNS Server for Inbound Load Balancing

How to set up the Integrated DNS Server for Inbound Load Balancing How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,

More information

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu

More information

Domain Name System. 188lecture12.ppt. Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo

Domain Name System. 188lecture12.ppt. Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo Domain Name System 88lecture2.ppt Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo S-38.88 - Computer Networks - Spring 2003 Outline What and why? Structure of DNS Management of Domain Names Name Service in

More information

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson) Networking Overview (as usual, thanks to Dave Wagner and Vern Paxson) Focus For This Lecture Sufficient background in networking to then explore security issues in next few lectures Networking = the Internet

More information

The Domain Name System

The Domain Name System Internet Engineering 241-461 Robert Elz kre@munnari.oz.au kre@coe.psu.ac.th http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose

More information

Wireshark DNS. Introduction. nslookup

Wireshark DNS. Introduction. nslookup Wireshark DNS Introduction The Domain Name System (DNS) translates hostnames to IP addresses, fulfilling a critical role in the Internet infrastructure. In this lab, we ll take a closer look at the client

More information

Chapter 7 Implementing Domain Name System (DNS)

Chapter 7 Implementing Domain Name System (DNS) [Previous] [Next] Chapter 7 Implementing Domain Name System (DNS) About This Chapter In this chapter, you will learn how Domain Name System (DNS) is used to resolve host names on your local area network

More information

Services: DNS domain name system

Services: DNS domain name system Services: DNS domain name system David Morgan Buying numbers and names numbers are IP addresses you buy them from an ISP the ISP makes sure those addresses go to your place the names are domain names you

More information

Application Protocols in the TCP/IP Reference Model

Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management WWW Virtual Terminal Name Service File Transfer HTTP FTP Telnet SMTP DNS SNMP TFTP Internet protocols TCP UDP

More information

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2

Application Layer. CMPT371 12-1 Application Layer 1. Required Reading: Chapter 2 of the text book. Outline of Chapter 2 CMPT371 12-1 Application Layer 1 Application Layer Required Reading: Chapter 2 of the text book. Outline of Chapter 2 Network applications HTTP, protocol for web application FTP, file transfer protocol

More information

Domain Name Service (DNS) Training Division, NIC New Delhi

Domain Name Service (DNS) Training Division, NIC New Delhi Domain Name Service (DNS) Training Division, NIC New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Replicating DNS V. Dynamic update

More information

CS3250 Distributed Systems

CS3250 Distributed Systems CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted

More information

DNS Domain Name System

DNS Domain Name System Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.

More information

Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,

More information

Chapter 23 The Domain Name System (DNS)

Chapter 23 The Domain Name System (DNS) CSC521 Communication Protocols 網 路 通 訊 協 定 Chapter 23 The Domain Name System (DNS) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Names For Machines 3. Flat Namespace 4. Hierarchical Names 5.

More information

Mitigating DNS DoS Attacks

Mitigating DNS DoS Attacks Mitigating DNS DoS Attacks Hitesh Ballani and Paul Francis Cornell University ACM CCS 2008 DoS attacks on DNS Attack: Flood the nameservers of a DNS zone Goal: Disrupt the resolution of The zone s resource

More information

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng. CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP

More information

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating

More information

The Domain Name System

The Domain Name System DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),

More information

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2

More information

Advanced Networking Technologies

Advanced Networking Technologies Advanced Networking Technologies Chapter 14 Navigating Content Networks (Acknowledgement: These slides have been prepared by Dr.-Ing. Markus Hofmann) Advanced Networking (SS 15): 14 Navigating Content

More information

Wireshark Lab: DNS. 1. nslookup

Wireshark Lab: DNS. 1. nslookup Wireshark Lab: DNS Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. As described in Section 2.5 of the textbook, the Domain Name System

More information

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, www.nic.net.sa. DNS & IPv6.

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April 2009. Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, www.nic.net.sa. DNS & IPv6. DNS & IPv6 MENOG4, 8-9 April 2009 Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, www.nic.net.sa Agenda DNS & IPv6 Introduction What s next? SaudiNIC & IPv6 About SaudiNIC How a cctld Registry supports

More information

Lecture Computer Networks

Lecture Computer Networks Prof. Dr. H. P. Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Lecture Computer Networks Domain Name System

More information

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 22. Naming Paul Krzyzanowski Rutgers University Fall 2013 November 21, 2013 2013 Paul Krzyzanowski 1 My 15 MacBook Pro The rightmost computer on my desk Paul s aluminum laptop, but

More information

Development of the Domain Name System. Joey Brown David Margolies

Development of the Domain Name System. Joey Brown David Margolies Development of the Domain Name System Joey Brown David Margolies Introduction DNS provides name service for the Internet 1982 - HOSTS.TXT Centrally maintained Too large Too costly to distribute Organizations

More information

Computer Networks: Domain Name System

Computer Networks: Domain Name System Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com

More information

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication

More information

Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers

Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers Domain Name Servers COMP76 Networked Computer Systems Internet Names Hierarchical starting from the right host.subnet.organization.type Names are case insensitive and can be in either upper or lower case.

More information

3. The Domain Name Service

3. The Domain Name Service 3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records

More information

Domain Name System Richard T. B. Ma

Domain Name System Richard T. B. Ma Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg

More information

Domain Name System. Heng Sovannarith heng_sovannarith@yahoo.com

Domain Name System. Heng Sovannarith heng_sovannarith@yahoo.com Domain Name System Heng Sovannarith heng_sovannarith@yahoo.com Introduc:on to DNS Domain Name System is a distributed database system that can be serve as the founda:on for name resolu:on in a TCP/IP Network.

More information

Module 2. Configuring and Troubleshooting DNS. Contents:

Module 2. Configuring and Troubleshooting DNS. Contents: Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring

More information

How to Configure the Windows DNS Server

How to Configure the Windows DNS Server Windows 2003 How to Configure the Windows DNS Server How to Configure the Windows DNS Server Objective This document demonstrates how to configure domains and record on the Windows 2003 DNS Server. Windows

More information

The Application Layer: DNS

The Application Layer: DNS Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Spring'10 1 Announcements Guest lecture on intellectual property and

More information

Domain Name System (DNS)

Domain Name System (DNS) Domain Name System (DNS) Instructor: Anirban Mahanti Office: ICT 745 Email: mahanti@cpsc.ucalgary.ca Class Location: ICT 121 Lectures: MWF 12:00 12:50 Notes derived from Computer Networking: A Top Down

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Course 2277: Five days; Instructor-led Introduction This five-day, instructor-led

More information

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014.

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014. Application Layer Mahalingam Mississippi State University, MS September 15, 2014 Outline 1 DNS Records DNS Components 2 Message Transfer Fetching Emails 3 Applications We will focus on 3 applications DNS

More information

DNS traffic analysis -- Issues of IPv6 and CDN --

DNS traffic analysis -- Issues of IPv6 and CDN -- DNS traffic analysis -- Issues of IPv6 and CDN -- Kazunori Fujiwara ^, Akira Sato, Kenichi Yoshida University of Tsukuba ^Japan Registry Services Co., Ltd (JPRS) July 29, 2012 IEPG meeting at Vancouver

More information

Naming. Name Service. Why Name Services? Mappings. and related concepts

Naming. Name Service. Why Name Services? Mappings. and related concepts Service Processes and Threads: execution of applications or services Communication: information exchange for coordination of processes But: how can client processes (or human users) find the right server

More information

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) Email/URLs Naming and the DNS Focus How do we name hosts etc.? Application Presentation Topics Session Domain Name System (DNS) Email/URLs Transport Network Data Link Physical Ldns.1 Names and Addresses 43 name address

More information

Domain Name System DNS

Domain Name System DNS CE443 Computer Networks Domain Name System DNS Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Lesson 13: DNS Security Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation

More information

Lab 4 Domain Name System - DNS CMPE 150

Lab 4 Domain Name System - DNS CMPE 150 Lab 4 Domain Name System - DNS CMPE 150 Lab Report Reports must be written and submitted individually as PDFs. Submission Instructions: Submit your report on the ecommons by 11:55 PM on the day of your

More information

Understand Names Resolution

Understand Names Resolution Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite

More information

APNIC elearning: Reverse DNS for IPv4 and IPv6

APNIC elearning: Reverse DNS for IPv4 and IPv6 APNIC elearning: Reverse DNS for IPv4 and IPv6 06 OCT 2015 11:00 AM AEST Brisbane (UTC+10) Issue Date: 07 July 2015 Revision: 2.0 Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net

More information

CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015

CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015 CS 43: Computer Networks Naming and DNS Kevin Webb Swarthmore College September 17, 2015 Agenda Identifiers and addressing Domain Name System History Query sequences Record types Load balancing Recall:

More information

Wireshark Lab: DNS v6.01

Wireshark Lab: DNS v6.01 Wireshark Lab: DNS v6.01 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb

More information

Inferring Internet Denial-of

Inferring Internet Denial-of Inferring Internet Denial-of of-service Activity Geoffrey M. Voelker University of California, San Diego Joint work with David Moore (CAIDA/UCSD) and Stefan Savage (UCSD) Simple Question We were interested

More information

Chapter 24 The Domain Name System (DNS)

Chapter 24 The Domain Name System (DNS) Chapter 24 The Domain Name System (DNS) Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 24-1 Overview Naming hierarchy Server hierarchy Name resolution Other information

More information

Fig 1A portion of the Internet domain name space.

Fig 1A portion of the Internet domain name space. 1 Asst. Lecturar ahmed S. Kareem DNS The Domain Name System Although programs theoretically could refer to hosts, mailboxes, and other resources by their network (e.g., IP) addresses, these addresses are

More information

Introduction BIND. The DNS Protocol. History (1) DNS. History (2) Agenda

Introduction BIND. The DNS Protocol. History (1) DNS. History (2) Agenda History (1) DNS Domain Name System The Internet's Name Service even in the early days of the Internet, hosts have been also identified by s e.g. /etc/hosts.txt file on UNIX systems all s have been maintained

More information

Simulation of DNS(Domain Name System) Using SimLib

Simulation of DNS(Domain Name System) Using SimLib Simulation of DNS(Domain Name System) Using SimLib Submitted by Prem Tamang Submitted to Dr. Lawrence J. Osborne Table of Contents 1. Introduction 3 2. Motivation and Challenges. 5 3. Assumptions 5 4.

More information

Applications and Services. DNS (Domain Name System)

Applications and Services. DNS (Domain Name System) Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between

More information

Domain Name System CHAPTER 25. Figure 25.1

Domain Name System CHAPTER 25. Figure 25.1 CHAPTER 25 omain Name System There are several applications in the application layer of the Internet model that follow the client/server paradigm. The client/server programs can be divided into two categories:

More information

416 Distributed Systems. Feb 24, 2016 DNS and CDNs

416 Distributed Systems. Feb 24, 2016 DNS and CDNs 416 Distributed Systems Feb 24, 2016 DNS and CDNs Outline DNS Design Content Distribution Networks 2 Naming How do we efficiently locate resources? DNS: name à IP address Challenge How do we scale this

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

1 DNS Packet Structure

1 DNS Packet Structure Fundamentals of Computer Networking Project 1 Primer: DNS Overview CS4700/CS5700 Fall 2009 17 September 2009 The DNS protocol is well-documented online, however, we describe the salient pieces here for

More information

How To Guide Edge Network Appliance How To Guide:

How To Guide Edge Network Appliance How To Guide: How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table

More information

DNS and P2P File Sharing

DNS and P2P File Sharing Computer Networks DNS and P2P File Sharing Based on Computer Networking, 4 th Edition by Kurose and Ross DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers:

More information

Overview. Principles Creating reverse zones Setting up nameservers Reverse delegation procedures IPv6 Reverse DNS

Overview. Principles Creating reverse zones Setting up nameservers Reverse delegation procedures IPv6 Reverse DNS Reverse DNS Overview Principles Creating reverse zones Setting up nameservers Reverse delegation procedures IPv6 Reverse DNS What is Reverse DNS? Forward DNS maps names to numbers svc00.apnic.net -> 202.12.28.131

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing datagrams name, e.g., ww.yahoo.com - used by humans Q: map between

More information

Windows 2008 Server. Domain Name System Administración SSII

Windows 2008 Server. Domain Name System Administración SSII Windows 2008 Server Domain Name System Administración SSII Contenidos Introducción Configuración DNS Transferencia de zona Herramientas DNS Introducción Domain Name System is a hierarchical distributed

More information

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol

More information

An Introduction to the Domain Name System

An Introduction to the Domain Name System An Introduction to the Domain Name System Olaf Kolkman Olaf@nlnetlabs.nl October 28, 2005 Stichting NLnet Labs This Presentation An introduction to the DNS Laymen level For non-technologists About protocol

More information

DNS + DHCP. Michael Tsai 2015/04/27

DNS + DHCP. Michael Tsai 2015/04/27 DNS + DHCP Michael Tsai 2015/04/27 lubuntu.ova http://goo.gl/bax8b8 DNS + DHCP DNS: domain name < > IP address DHCP: gives you a IP + configuration when you joins a new network DHCP = Dynamic Host Configuration

More information

Domain Name System (DNS)

Domain Name System (DNS) Application Layer Domain Name System Domain Name System (DNS) Problem Want to go to www.google.com, but don t know the IP address Solution DNS queries Name Servers to get correct IP address Essentially

More information

what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference

what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference whoami work for robert morris university, pittsburgh, pa primarily mac and voip admin @mboylan

More information

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009 HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer

More information

IPv6 support in the DNS

IPv6 support in the DNS IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of

More information