DNS Tampering and Root Servers
|
|
|
- Domenic Hill
- 10 years ago
- Views:
Transcription
1 DNS Tampering and Root Servers AMS-IX: 24 Nov 2010 Renesys Corporation Martin A. Brown Doug Madory Alin Popescu Earl Zmijewski
2 Overview Brief overview of Domain Name System (DNS) Demonstrating Great Firewall DNS tampering Root servers in Beijing, China Tampered reply from Beijing I-root (in March) Who could have been affected? The DNS Stars rating system
3 Brief (remedial) tour of DNS Application looks up a name (e.g. A library/the IP stack calls out to a resolver The resolver returns a cached answer or The resolver starts a series of queries root server (.) Q: A: refer a.gtld-servers.net., b.gtld-servers.net. [ ] gtld or cctld server (net.) Q: A: refer nemix1.ams-ix.net., nemix2.ams-ix.net., ns2.surfnet.nl. an authoritatitive zone server (ams-ix.net.) Q: A: answer IPv , IPv6 2001:67c:1a8:100::7 The resolver caches ultimate answer (and intervening delegations) and returns the answer to the client.
4 Domain name system
5 Chinese firewall The Great Firewall (GFW) is a national technical control designed to implement policy and is reported to... Blackhole access to certain IPs and entire prefixes Intercept and return incorrect DNS responses Intercept TCP connections, possibly injecting TCP resets In particular, DNS queries (and answers) passing through the GFW can... Return bogus answers Affect users outside the Chinese Internet Note: GFW is a term of convenience for the non-point-source effects of a distributed technical control.
6 Try the Chinese firewall yourself... Try the following sample query several times... A Answers will vary IN A IN A IN A Obviously bogus results none of these answers is in a prefix originated by AS (Facebook, Inc.) /8 is one of the few remaining unallocated /8s /14 is originated by AS 2110 (BT Ireland, IE) /18 is originated by AS 4768 (TelstraClear, NZ) Queries are to a resolver inside China Telecom (but may or may not ever get there; check your packet capture).
7 GFW Tampering in action! Request for ' through GFW IP (tos 0x0, ttl 64, id 42149, offset 0, flags [none], proto UDP (17), length 62) SOURCE_IP > : [udp sum ok] A? (34) First response, GFW replies with bogus response IP (tos 0x20, ttl 55, id 24309, offset 0, flags [none], proto UDP (17), length 78) > SOURCE_IP.59340: [udp sum ok] 1824 q: A? 1/0/0 [5m] A (50) Second response, real server (?) refuses IP (tos 0x34, ttl 48, id 8933, offset 0, flags [none], proto UDP (17), length 62) > SOURCE_IP.59340: [udp sum ok] 1824 Refused- q: A? 0/0/0 (34) Third response, another bogus GFW reply IP (tos 0x34, ttl 227, id 18283, offset 0, flags [none], proto UDP (17), length 94) > SOURCE_IP.59340: [udp sum ok] 1824* q: A? 1/0/0 [3h14m3s] A (66)
8 What is the GFW doing? GFW uses the time-honored tradition of racing to get an answer to the client. [This well-known race was famously exploited in conjunction with authority records in the socalled Kaminsky DNS vulnerability.] The returned tampered results show that the set of bogus IPs returned all fall within a small set (in one day of lookups from a single location there were only 9 distinct bogus IPs). More details of behavior in 'The Great DNS Wall of China' (2007, Graham Lowe, Patrick Winters and Michael L. Marcus) General summary of the technical behavior of the Great Firewall in by Shawn Conaway.
9 Root servers in China There are three Beijing root server nodes: F-root, I-root and J-root. Source:
10 F-root: Just the facts IP address: Prefixes: /23 & /24 Origin: AS 3557 (Dedicated to F-root) Primary upstream: AS 1280 (ISC) AS 3557 has ~22 BGP adjacencies AS 1280 has ~20 BGP adjacencies F-root is run by ISC F-root is anycast from around the world (47 instances) 16 instances in EMEA 14 in Asia Pacific 17 in the Americas
11 I-root: Just the facts IP address: Prefixes: /23 & /24 Origin: AS (Dedicated to I-root) Single Upstream: AS 8674 (Netnod) AS 8674 has ~100 BGP adjacencies I-root is run by Autonomica Subsidiary of Sweden s Netnod I-root is anycast from around the world (36 instances) 15 instances in EMEA 14 in Asia Pacific 7 in the Americas
12 J-root: Just the facts IP address: Prefixes: /24 Origin: AS (Verisign Global Registry) Diverse Upstreams AS has ~43 BGP adjacencies J-root is run by Verisign J-root is anycast from around the world (70 instances) 31 instances in EMEA 14 in Asia Pacific 25 in the Americas
13 Anycasting (BGP) Many DNS services (not just root servers) are provided from networks which are BGP anycasted to the Internet. This works very well for UDP-based services (primary transport protocol for DNS is UDP). Root server operators install equipment in multiple geographies and advertise the same prefix from each location that logical network is available in many locations. Clients will use best path route selection to reach the nearest location (by network topology) with that prefix. The benefits of good server placement include good load distribution, improved average response latency and resiliency in the event of individual site failures.
14 Global visibility of anycasted routes... Non-Chinese peers preferring routes which transit Chinese ASNs for the Beijing F-, I- and J-root instances.
15 DNS-Operations Report (24 March 2010) Hi there! A local ISP has told us that there's some strange behavior with at least one node in i.root-servers.net (traceroute shows mostly China) It seems that when you ask A records for facebook, youtube or twitter, you get an IP and not the referral for.com It doesn't happen every time, but we have confirmed this on 4 different connectivity places (3 in Chile, one in California) This problem has been reported to Autonomica/Netnod but I don't know if anyone else is seeing this issue. This is an example of what are we seeing: $ A ;. ANSWER SECTION: IN A Mauricio Vergara Ereche Santiago CHILE
16 Chinese Client Tampering (19 Nov 2010) ; <<>> DiG ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ; IN A ;; ANSWER SECTION: IN A Deutsche Telekom ;; Query time: 2 msec ;; SERVER: #53( ) ;; WHEN: Fri Nov 19 17:52: ;; MSG SIZE rcvd: 66
17 Chinese Client Good Result (19 Nov 2010) ; <<>> DiG ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 13, ADDITIONAL: 14 ;; QUESTION SECTION: ; IN A ;; AUTHORITY SECTION: com IN NS a.gtld-servers.net. com IN NS i.gtld-servers.net. [many correct answers omitted] ;; ADDITIONAL SECTION: a.gtld-servers.net IN A a.gtld-servers.net IN AAAA 2001:503:a83e::2:30 [many correct answers omitted] ;; Query time: 50 msec ;; SERVER: #53( ) ;; WHEN: Fri Nov 19 17:52: ;; MSG SIZE rcvd: 506
18 Chinese Client Packet Capture Bad Result (10 Jun 2010) 18:06: IP SRC-IP > : A? (34) 18:06: IP > SRC-IP.57520: /0/0 A (50) Bad answer 18:06: IP > SRC-IP.57520: 54947* 1/0/0 A (66) Another bad answer (for good measure) 18:06: IP SRC-IP.128 > : icmp 102: SRC-IP.128 udp port unreachable 2nd bad answer, ICMP go away! This is completely expected behavior. The GFW is known to tamper with DNS packets. The client is inside of China. You can see the exact same behavior querying any other root name server from inside China.
19 Explanation The global advertisements for /24 include AS (I-root) and AS 8674 and then traversed several Chinese ASNs (in red). Inbound packets on this path would traverse AS (PacNet), AS 7497 (Computer Network Information Center), AS (CNNIC) before reaching AS and 8674: [ ] Peers selecting this path would clearly be sending their queries to the Beijing node. The results reported by Mauricio Vergara Ereche on the dns-operations mailing list are consistent with GFW behavior.
20 An unlikely series of events... Resolver request for ' (or any other GFWtampered name) The name is not already in cache The 'com.' zone (NS) is not cached either (48-hour TTL) Ask F-, I- or J-root instances Get directed to a root instance in Beijing Let the race begin! Query should return the 'com.' zone servers (NS) GFW may return an incorrect A record If GFW wins the race, put A record in cache Your DNS cache is now poisoned
21 National policy escapes containment Again, we learn that IP traffic does not respect jurisdictional boundaries (national or otherwise). This event demonstrates the collision of a technical resiliency tool (anycast) a technical policy enforcement control (GFW) Who was affected? Who could have been affected? Calculate the percentage of routed networks in each country which saw the path to any of the Beijing root servers at any point in 2010.
22 Who could have been affected?
23 Netnod serves Chinese market Netnod intends the Beijing node to be globally visible. Netnod employs TSIG and routinely checks serial numbers of the data at each of their root server instances against Verisign/IANA root zone data to ensure validity. The tampering of replies from the Beijing I-root was completely consistent with and almost irrefutably the GFW. Netnod withdrew their anycasted routes until their host (CNNIC) could secure assurances that the tampering would not recur. Netnod serves a large Internet user base in China and its Beijing node is one of its top 5 busiest instances. Thanks to Kurt Erik Lindqvist, CEO Netnod, for info on I-root operations and this incident.
24 The Stars DNS Rating System ***** safe Providers respect the integrity of DNS and rarely (if ever) rewrite NXDomain responses. **** mostly safe Providers might use NXDomain to make money. *** caution Providers may be required to modify resolver responses to comply with local content laws. ** strong caution Routing/switching providers may be required to modify resolver responses in flight in order to comply with local laws. * danger Routing/switching providers are required to modify all root and resolver responses in flight without warning.
25 Example ratings US would currently earn a 4 star rating 5 star rating, in the years before NXDomain monetization Recent proposed legislation, Combating Online Infringements and Counterfeits Act (COICA), could lower this rating to 3 or 2 stars. Many European nations would earn a 4 or 3 star rating Increasingly strict anti-pornography laws are being enforced (often voluntarily) with blacklists distributed and supported in ISP resolvers. The Middle East and Australia would earn a 3 star rating. China is the only country known to have earned a 1 star rating.
26 Open questions In an effort to protect against the Four Horsemen of the Infocalypse, will governments continue to encourage technical control via DNS? Probably. Could DNS-based technical controls be limited to resolvers, preventing tampering with answers from authoritative servers? What confusion ensues if tampered results are employed for further technical controls? What new technical controls will follow the wider deployment of DNSSEC, which was built to withstand in flight tampering and ensure chain of authority? What is the next leaky technical control that will affect users far from the target jurisdiction?
27 Conclusions Enable DNSSEC. Don't pass your queries across the GFW (if you can help it). If your government requires DNS-based technical controls, install them at the resolver.
28 Thank You Martin A. Brown Doug Madory Alin Popescu Earl Zmijewski Page 28
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Sparks Neo Tank Smith Dozer ABSTRACT Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Anonymous [email protected] ABSTRACT Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
The role of JANET CSIRT
The role of JANET CSIRT Bradley Freeman JANET(UK) CSIRT Member UKNOF 15 21 st January 2010 [email protected] Copyright JNT Association 2009 1 What to expect Overview of how we detect and deal with
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin
Domain Name System: DNS Objective: map names to IP addresses (i.e., high level names to low level names) Original namespace was flat, didn t scale.. Hierarchical naming permits decentralization by delegating
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Anonymous presented by Philip Levis 1 Basic Summary Great Firewall of China injects DNS responses to restrict access
DNS SECURITY TROUBLESHOOTING GUIDE
DNS SECURITY TROUBLESHOOTING GUIDE INTERNET DEPLOYMENT OF DNS SECURITY 27 November 2006 Table of Contents 1. INTRODUCTION...3 2. DNS SECURITY SPECIFIC FAILURE MODES...3 2.1 SIGNATURES...3 2.1.1 Signature
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
Creating a master/slave DNS server combination for your Grid Infrastructure
Creating a master/slave DNS server combination for your Grid Infrastructure When doing a Grid Infrastructure installation, a DNS server is needed to resolve addresses for the cluster- scan addresses. In
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
APNIC IPv6 Deployment
APNIC IPv6 Deployment Ulaanbaatar, Mongolia 19 October 2015 Issue Date: Revision: Overview Deployment motivation Network deployment IPv6 Services deployment IPv6 Anycast service IPv6 Cloud service Summary
Domain Name System Security
Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
F root anycast: What, why and how. João Damas ISC
F root anycast: What, why and how João Damas ISC Overview What is a root server? What is F? What is anycast? F root anycast. Why? How does ISC do it? What is f.root-servers.net? One the Internet s official
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Table of Contents DNS. How to package DNS messages. Wire? DNS on the wire. Some advanced topics. Encoding of domain names.
Table of Contents DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 DNS on the wire Encoding of domain names
Configuring DNS on Cisco Routers
Configuring DNS on Cisco Routers Document ID: 24182 Contents Introduction Prerequisites Requirements Components Used Conventions Setting Up a Router to Use DNS Lookups Troubleshooting You Can Ping a Web
Effect of anycast on K-root
Effect of anycast on K-root Some early results 1 K root anycast deployment 3 global nodes (BGP transit) LINX... 5459 25152 25152 i AMS-IX... 25152 25152 25152 i Tokyo (since 5/2005)... 25152 25152 25152
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
The Domain Name System: An Integral Part of the Internet. By Keiko Ishioka
The Domain Name System: An Integral Part of the Internet By Keiko Ishioka The Domain Name System (otherwise known as the Domain Name Server system) (DNS) is a distributed database that is accessed by anyone
The Domain Name System
Internet Engineering 241-461 Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
State of the "DNS privacy" project. Stéphane Bortzmeyer AFNIC [email protected]
State of the "DNS privacy" project Stéphane Bortzmeyer AFNIC [email protected] 1 / 1 State of the "DNS privacy" project Stéphane Bortzmeyer AFNIC [email protected] Warsaw OARC workshop May 2014: talk of
Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)
Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2
IPV6 SERVICES DEPLOYMENT
IPV6 SERVICES DEPLOYMENT LINX IPv6 Technical Workshop - March 2009 Jaco Engelbrecht Group Platforms Manager, clara.net DNS root zone goes AAAA! On 4 th February 2008 IANA added AAAA records for the A,
DNS Conformance Test Specification For Client
DNS Conformance Test Specification For Client Revision 1.0 Yokogawa Electric Corporation References This test specification focus on following DNS related RFCs. RFC 1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
shortcut Tap into learning NOW! Visit www.informit.com/shortcuts for a complete list of Short Cuts. Your Short Cut to Knowledge
shortcut Your Short Cut to Knowledge The following is an excerpt from a Short Cut published by one of the Pearson Education imprints. Short Cuts are short, concise, PDF documents designed specifically
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
DNS zone transfers from FreeIPA to non-freeipa slave servers
FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based
JPNIC Public Forum. Paul Vixie. Chairman, Internet Software Consortium. January 21, 2003
JPNIC Public Forum Paul Vixie Chairman, Internet Software Consortium January 21, 2003 1 Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and software architect
DNS Session 4: Delegation and reverse DNS. Joe Abley AfNOG 2006 workshop
DNS Session 4: Delegation and reverse DNS Joe Abley AfNOG 2006 workshop How do you delegate a subdomain? In principle straightforward: just insert NS records for the subdomain, pointing at someone else's
F-Root's DNSSEC Signing Plans. Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010
F-Root's DNSSEC Signing Plans Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010 What is ISC? Internet Systems Consortium, Inc. Headquartered in Redwood City, California
Enabling DNS for IPv6 CSD Fall 2011
Enabling DNS for IPv6 CSD Fall 2011 Team members: Bowei Dai [email protected] 15 credits Elis Kullberg [email protected] 18 credits Hannes Junnila [email protected] 15 credits Nur Mohammad Rashed [email protected] 15 credits
Table of Contents. Confidential and Proprietary
Table of Contents About Toshiba Strata CIX and Broadvox SIP Trunking... 1 Requirements... 2 Purpose, Scope and Audience... 3 What is SIP Trunking?... 4 Business Advantages of SIP Trunking... 4 Technical
DNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
Switchvox. Technical Application Notes
Switchvox Technical Application Notes Table of Contents About Broadvox... 1 About Switchvox... 1 Purpose, Scope and Audience... 2 Switchvox Deployment Information... 3 Switchvox External IP Address...
Domain Name System (DNS)
Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Using the Domain Name System for System Break-ins
Using the Domain Name System for System Break-ins Steven M. Bellovin Presented by: Thomas Repantis [email protected] CS255-Computer Security, Winter 2004 p.1/37 Overview Using DNS to spoof a host s name
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Forouzan: Chapter 17. Domain Name System (DNS)
Forouzan: Chapter 17 Domain Name System (DNS) Domain Name System (DNS) Need System to map name to an IP address and vice versa We have used a host file in our Linux laboratory. Not feasible for the entire
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
DNS Root NameServers
DNS Root NameServers An Overview Dr. Farid Farahmand Updated: 9/24/12 Who- is- Who! Over half million networks are connected to the Internet 5 billion users by 2015! Network numbers are managed by ICANN
What's inside the cloud?!
What's inside the cloud?! Initial Arpanet Initial Arpanet Interface Message Processors - DDP-516 mini-computers - 24 Kbyte of Core memory - Store-and-forward packet switching - Predecessors of present
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship Anonymous [email protected] Abstract China s Great Firewall passively inspects network traffic and disrupts unwanted communication
Understanding and Configuring NAT Tech Note PAN-OS 4.1
Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
Tunnel Client FAQ. Table of Contents. Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer
Tunnel Client FAQ Version 0v5, November 2014 Revised: Kate Lance Author: Karl Auer Table of Contents A. Tunnelling 1 How does tunnelling work? 2 What operating systems are supported? 3 Where can I get
NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25
NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
DNS : Domain Name System
1/30 DNS : Domain Name System Surasak Sanguanpong [email protected] http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why
Global Server Load Balancing (GSLB) Concepts
Global Server Load Balancing (GSLB) Concepts Section Section Objectives GSLB Overview GSLB Configuration Options GSLB Components Server Mode Configuration 2 Global Server Load Balancing (GSLB) Key ACOS
STATE OF DNS AVAILABILITY REPORT
STATE OF DNS AVAILABILITY REPORT VOLUME 1 ISSUE 1 APRIL 2011 WEB SITES AND OTHER ONLINE SERVICES ARE AMONG THE MOST IMPORTANT OPERATIONAL AND REVENUE GENERATING TOOLS FOR BUSINESSES OF ALL SIZES AND INDUSTRIES.
C 1. Last Time. CSE 486/586 Distributed Systems Domain Name System. Review: Causal Ordering. Review: Causally Ordered Multicast.
Last Time CSE 46/6 Distributed Systems Domain Name System Two multicast algorithms for total ordering Sequencer ISIS Multicast for causal ordering Uses vector timestamps Steve Ko Computer Sciences and
Some advanced topics. Karst Koymans. Friday, September 11, 2015
DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 Karst Koymans (UvA) DNS Friday, September 11, 2015 1 /
DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?
DNS, CDNs Weds March 17 2010 Lecture 13 DNS What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS is the system that determines this mapping. Basic idea: You contact
Application Firewalls
Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed
Securing an Internet Name Server
Securing an Internet Name Server Cricket Liu [email protected] Securing an Internet Name Server Name servers exposed to the Internet are subject to a wide variety of attacks: Attacks against the name
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques Klaus Steding-Jessen [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian
