The Collateral Damage of Internet Censorship by DNS Injection
|
|
|
- Phyllis Patrick
- 10 years ago
- Views:
Transcription
1 The Collateral Damage of Internet Censorship by DNS Injection Anonymous ABSTRACT Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access to unwanted websites. The censorship tools inspect DNS queries near the ISP s boundary routers for sensitive domain keywords and inject forged DNS responses, blocking the users from accessing censored sites, such as twitter and facebook. Unfortunately this causes collateral damage, affecting communication beyond the censored networks when outside DNS traffic traverses censored links. In this paper, we analyze the causes of the collateral damages and measure the Internet to identify the injecting activities and their effect. We find 39 ASes in China injecting forged DNS replies. Furthermore, 26% of 43,000 measured open resolvers outside China, distributed in 109 countries, may suffer some collateral damage from these forged replies. Different from previous work that considers the collateral damage being limited to queries to root servers (F, I, J) located in China, we find that most collateral damage arises when the paths between resolvers and some TLD name servers transit through ISPs in China. Categories and Subject Descriptors C.2.0 [Computer Communication Networks]: General Keywords DNS, packet injection, Internet measurement, Internet censorship, Great Firewall of China, collateral damage 1. INTRODUCTION Since DNS is essential for Internet communication, it is a common target for censorship systems. The most popular approach involves packet injection: a censorship system observes DNS requests and injects fake replies to block communication. Yet censorship systems may affect more than just the censored network. As a concrete example, consider a query for 1 from a US user, using a US-based DNS resolver. TheUSresolverwillneedtocontactoneoftheDNSTLDauthorities for.de, located in Germany. If the path to the selected TLD authority passes through China, then the Great Firewall of China (GFC) will see this query and inject a The authors wish to remain anonymous and may be reached at the provided address. 1 The Epoch Times is a news organization with connections to the Falun Gong spiritual movement. epochtimes.de is their German language site. reply which the US resolver will accept, cache, and return to the user, preventing the user from contacting the proper web server. Packet injection s popularity as a censorship mechanism arises from its ease of implementation. The censor needs to only monitor traffic and inject responses. Thus network operatorshaveusedtcppacketinjectiontoblockpeertopeer traffic [6] or undesirable web content [5], and the GFC and others use DNS packet injection to block entire sites. While some ISPs are content to block users inside their network from accessing unwanted websites using DNS injection, they may not know that their DNS injecting activities potentially affect users outside their network. In the motivating example of contacting from the US, the collateral damage was due solely to the DNS request passing through a censored network as traceroute verified that the path for HTTP traffic did not pass through any censored networks. Although the DNS community has perceived such collateral damage, they only found it happened when resolvers outside contacted DNS authorities inside the censored country [3], with the most famous examples involving queries from Chile that found themselves routed to the Chinese I- root server [8]. However, the range of the potential damage is actually much more complicated. We find that resolvers outside a censored country could suffer from collateral damage caused by DNS injection activities from censored transit networks, even both the resolvers and domains being queried are unrelated to the censored country. In this paper, we explore the extent of the collateral damage caused by DNS injection. Specifically, we try to answer the following three questions: (1) How does this collateral damage occur? (2) Which ISPs are adopting DNS injection? (3) What names and resolvers are affected? For the first question, we analyze the causes from the diversity of DNS resolution paths, as well as the dynamic routing. We utilize two tools, HoneyQueries to detect affected paths and TraceQueries to discover the points of injection. This enables us to identify the censored ASes. Finally, we perform measurements using StepNXQueries which allow us to infer whether the collateral damage effect comes from the path between a resolver and the root server or from the path between a resolver and a given TLD server. A survey of 43,842 non-censored resolvers showed 11,579 suffering from some collateral damage. Unlike the results ACM SIGCOMM Computer Communication Review 22 Volume 42, Number 3, July 2012
2 in [3], we find that the most common source of pollution exists on the paths between the resolvers and the TLD authorities, particularly the paths to.de and.kr authorities. The rest of the paper is organized as follows. In 2 we give a brief introduction to DNS resolution and how packet injection can disrupt the process. Then we analyze the cause for the collateral damage caused by DNS injection in 3. In 4 we describe our experiment methodologies and present the experiment results. We have a discussion in 5 before concluding in BACKGROUND The standard DNS resolution process [11, 12, 7] consists of several pieces, including the stub resolver on the user s computer, the recursive resolver, the root servers (. ), Top Level Domain (TLD) authorities, and the site s authority name servers. A typical DNS query process that involves all these servers is illustrated in Figure 1. If an attacker (e.g. a hacker, an ISP, or a government) has the ability of monitoring any of the steps in the DNS query process, he can inject an additional DNS response(without suppressing the legitimate one), replying with a forged response which has the appropriate query question and ID but with a bogus DNS answer, mapping the queried domain to either an invalid IP address or an IP address controlled by himself. In the absence of DNSSEC validation, the resolver will generally accept the faked answer because it arrives earlier than the real one, and, as a result, the access to the sensitive site will be blocked or redirected. The ease of this attack makes it naturally an effective censorship mechanism. It is well known that the GFC uses this mechanism. A past survey queried more than 800 DNS resolvers in China and found that 99.88% of them were affected by the GFC [9]. And [9] also found that GFC sent tampered DNS responses based on keywords in the domain name. For example, it injects a faked reply for twitter.computer.com because twitter.com is a blocked domain name. Unfortunately, the censor appears to over-react to transit DNS queries as well. It inspects all of the transit DNS queries and injects bogus responses, causing collateral damage to non-censored networks. The collateral damage of GFC was first discussed in a DNS operation mailing list when a Chilean operator found that queries from Chile and California to I.RootServers.NET sometimes experienced DNS pollution [8]. In [3], Brown et al. analyzed this incident and determined that this kind of pollution could affect many countries because three root DNS server nodes (F, I, and J) have anycast instances in China. They believed that after Netnod withdrew the anycast routes for the Chinese I-root name server from CNNIC, the collateral damage should disappear. However, our work showed this was not the case. We discovered quantities of collateral damage for TLD authorities through dedicated measurement experiments. 3. CAUSES OF COLLATERAL DAMAGE We assume that DNS censors use over-zealous pattern matching DNS requests, like GFC. Although pattern matching causes a lot of collateral damages(i.e., blocking twitter.computer.com because of twitter.com ), in this paper we focus only on those because of transit DNS queries. Collateral damage occurs when a DNS query from a recur- Passive inspection without suppressing the legitimate DNS replies TLD Server ns.com Authoritative Name Server ns.sensitive.com DNS injector (ISP, Gov.; hacker) Root Server "." 2. Recursive Resolver (Cache Server) User(Stub Resolver) 1. Figure 1: DNS query process and DNS injection sive resolver enters a censored network, causing the censorship mechanism to react. Although intuition suggests that this would be a rare occurrence, there exists several factors which may cause the censor to receive and react to DNS queries from outsiders. Iterative Queries: A recursive resolver does not send limited queries, such as asking the root for just the name servers of the desired TLD. Instead, if it lacks cache entries for the TLD authorities, it sends query with entire domain name to a root server. Similarly, the resolver sends the query with entire domain name to a TLD authority if there are no cache entries for the domain s authority. This may be further complicated by out-of-bailiwick [2] NS records. A fairly complicated but not uncommon example is given below. Suppose the DNS authorities for example. com are ns1.example.net In the absence of cached data, a resolver will handle a query of by first querying a root server and later a.com TLD authority. The reply from the.com TLD will now cause the resolver to query for ns1.example.net before resuming the query for Thus the resolver will query for www. example.com three times: to a root server, to a.com TLD server, and to ns1.example.net, and at least two queries for ns1.example.net: to a root and to a.net TLD server. Thus a simple lookup may generate numerous queries, and the disruption of any by censorship would cause resolution to fail. Redundant Servers and Anycast: Most DNS deployments use multiple servers in multiple networks to increase reliability [4], and the actual selection of particular authorities by a recursive resolver is a complex topic, with name servers using various algorithms. Thus, with 13 different roots and 13 servers for the global TLD.com, a resolver may experience collateral damage if a path to any one of these 26 IPs passes into a censored network. Further complicating the picture is the use of anycast [13] DNS authorities, where a single IP address may represent a widely deployed system of servers. Two resolvers in different networks may reach different physical servers, along very different paths, even though they are attempting to contact the same IP address. Censored Transit and Dynamic Routing: The paths from the resolver to the authorities is dynamic, routing through a series of Autonomous Systems (AS). If one transit AS implements censorship, then all traffic which passes through that AS experiences censorship, even if both the source and destination are in non-censored networks. Routing changes ACM SIGCOMM Computer Communication Review 23 Volume 42, Number 3, July 2012
3 also make it difficult to predict when and where DNS queries will pass through censored transit networks. 4. MEASUREMENT AND RESULTS By measuring of the effect of DNS injection, we want to answer the following two questions related to the collateral damage: (1) How many ASes implement DNS injection-based censorship? (2) How widely are DNS resolvers suffering from collateral damage due to censorship, and what is the cause of this collateral damage? We take three steps to achieve our goals. First, we utilize HoneyQuery, scanning the entire Internet to discover injected paths. Then we leverage TraceQuery to identify injectors on these paths. Finally we launch StepNXQuery which probes open resolvers around the world to evaluate the collateral damage caused by these injectors. 4.1 Searching for Injected Paths Like the concept of Honeytoken [14], we launch a large amount of HoneyQueries to search the censored paths. HoneyQueries are DNS resolution requests that include sensitive domain names, and HoneyQueries are expected to receive responses only when an AS on the path between the HoneyQuery sender and the destination adopts DNS-based censorship. Probing Targets: The target of the HoneyQueries are specially selected destinations, which are hosts we know do not run an active DNS server. Thus, normally no DNS responses are expected for these HoneyQueries, and any DNS reply is likely due to censorship related injections. In order to search all possible AS-level paths, ideally we should make sure that our HoneyQuery probing covers all the ASes in the Internet. We selected an IP address in each /24 of the IPv4 address and verified that the IPs are not running DNS servers. The total list of non-dns-responsive IPs in our list include 14 million IPv4 addresses, and we call this list the Probing Targets of HoneyQuery. Vantage Point: We selected a virtual private server (VPS) in AS (Psychz Networks) in US as our vantage point. Previous observers [8, 9] and our own experience indicate that DNS injectors fake answers for both inbound and outbound DNS queries. To further simplify our measurement effort, we assume that an ISP that adopts DNS based censorship technology applies the DNS injection on all the interconnect links between the ISP and all its neighbor networks. With this assumption, our HoneyQuery probing could possibly cover all the ASes from a single vantage point. Although from a single vantage point, HoneyQuery itself can not tell which ASes on a poisoned path made the injection, we use HoneyQueries simply to find enough paths that cover all poisoned ASes. Another tool called Trace- Query (presented in 4.2) locates the poisoning ASes. Domain Names used in Probing: Based on our previous experimental study, we select 10 domain names for the probing(table 1), including social networks, pornography, web hosting, portals, stream media, and search engines, which we would expect to be the targets for government or ISP censorship. Probing Result: We send HoneyQueries with these sensitive domain names to Probing Targets (14 million non- DNS-responsive IPs) from the vantage point. If there is Domain Name Category Search Engines Social Networks Social Networks Streaming Media Portal Web Hosting Pornography Sites Ranking Portal Reference Table 1: Domain Names for Probing. any valid DNS reply for a HoneyQuery, we mark the domain name as blacklisted and the path to the target IP as a poisoned Path. We also collect all the IPs used as the domain resolution answers in injected responses (we call them lemon IPs). After HoneyQuery probing, we get three lists: (1)Blacklisted Domain List, containing poisoned domain names in testing domain name set; (2)Poisoned Path List, containing paths from vantage points to the target IPs suffering directly from censorship; (3)Lemon IP List, containing the IPs used in all the bogus responses. We conducted our HoneyQuery probing during November, 2011 and obtained a poisoned path list with 388,988 destination IP addresses, distributed in 16 regions (CN, CA, US, HK, IN, AP, KR, JP, TW, DE, PK, AU, SG, ZA, SE, FI) and 197 ASes (We use MaxMind GeoIP database for IPgeolocation mapping). The top regions and ASes are shown in Table 2. Among these paths which is being poisoned, the large majority (99.80%) paths are with a target IP located in China, which is known to apply DNS based censorship. The rest (about 800) paths are with destinations outside China. It is worth to note that, for each destination IPs of the Poisoned- Path List, it certainly does not mean that their hosting ASes or regions inject faked DNS responses; but means there should be injectors on the paths from our vantage point to them. Our TraceQuery tool actually shows all these 800 paths are results of DNS poisoning from Chinese ASes. 4.2 describes how we locate the injectors. We obtained six domain names in the Blacklisted Domain- List: twitter.com, We also obtained 28 different IPs in the Lemon IP List 2, by which we can identify the polluted answers from the open resolvers in later measurements( 4.3). 4.2 Locating Poisoning ASes Given the Poisoned Path List, we identify which AS on the poisoned path injects the faked DNS response with Trace- Query. A TraceQuery is a crafted DNS query with a domain name in Blacklisted Domain List and a customized TTL in its IP header. Like traceroute, TraceQuery utilizes TTL decrements to ensure that the packets expire in the network. The query which passes an injector triggers a DNS reply before expiring. By conducting TraceQuery to the final destination in the Poisoned Path List, we reveal all the DNS injectors on the pathandtheirlocationsinthenetwork. Takethispathasan 2 Lemon IP List: ACM SIGCOMM Computer Communication Review 24 Volume 42, Number 3, July 2012
4 AS Number AS Name Router IPs 4134 Chinanet CNCGROUP China169 Backbone China Telecom (Group) CHINA RAILWAY Internet(CRNET) China Netcom Corp CNCGROUP China169 Beijing Province Guangdong Mobile Communication Co.Ltd ASN for Shandong Provincial Net of CT China Education and Research Network China Unicom China169 Guangdong province 19 Total 39 ASes Table 3: Information of top 10 poisoning ASes. Region Count Percentage US JP RU DE TW GB CA IT Total 173 regions Table 4: Distribution of open resolvers for StepNXQuery probing. Region IP Count Percentage CN CA US HK IN Total 16 regions (a) Top 5 regions. AS number Region IP Count Percentage 4134 CN CN CN CN CN Total 197 ASes (b) Top 5 ASes. Table 2: Statistics of the Poisoned Path List (identified by IP destinations) collected from HoneyQuery probing. example: VantagePoint AS1 AS2 AS3 AS4 destip, where AS2 and AS4 are deployed with DNS injectors. From the above HoneyQuery, where TTL is set to maximum value by default, we can get two faked replies. To locate all the injectors, we keep sending TraceQueries, increasing TTL one by one, until we get two replies for each query. After our TraceQuery probing with the 388,988 paths obtained from HoneyQueries (including those 800 paths not addressing to China), we found a list of 3,120 router IPs associated with DNS injection. All the IPs belong to 39 Chinese ASes. Table 3 shows the information of top ten poisoning ASes. This indicates that all DNS injections are results from China s censorship system. 4.3 Identifying the Injected Query Steps Given the list of ASes that inject DNS replies, the question remains: to what extent the censorship actions imposed within these ASes affect external resolvers? And during the DNS iterative query process, at which DNS query step does such injection happen? We probe for such collateral damage using a list of 43,842 open recursive resolvers distributed in 173 countries other than China (Table 4). These open resolvers are collected by probing DNS servers of Alexa Top 1M Websites, combined with open resolvers provided by other researchers. We probe these resolvers from our non-poisoned vantagepoint with domain names derived from the Blacklisted DomainList. ThenwecomparetheIPsinthereplieswiththose in Lemon IP list to see if the resolvers are poisoned. Based on our previous experiments, we found that the DNS censor only poisons UDP-based queries. Thus we probe using TCP, which prevents the censor from poisoning our communication with remote resolvers. To identify when the resolver triggers injection in the iterative query process, we develop and utilize a series of StepNXQueries to detect censored paths between the resolvers and the DNS hierarchy. StepNXQuery takes advantage of over-eager pattern matching in the censorship systems, which regard names such as as objectionable. Through StepNXQuery, we can guarantee that a query from the recursive resolver goes to a specific level in the DNS hierarchy by generating an NXDOMAIN (No Such Domain) triggering request. Totesttherootpathfromtheresolver, wequeryfornames like with RANDOM being a random string which will trigger a NXDOMAIN response from the root server. By repeating this test 200 times with different random strings, we take advantage of the recursive resolver s willingness to distribute queries among authorities to test as many paths from the given resolver to different roots as possible. After the root path probing, we find only 1 recursive resolver ( ) in AS24154 in TW is poisoned due to the collateral damage. The same technique allows us to probe the paths between the resolvers and the TLD servers, replacing{random} in above probing with {RANDOM}.tld. Before the StepNX- Query probing, we send queries with TLDs to the recursive resolvers, which make the TLD information cached in these resolvers. Thus our StepNXQueries will only traverse the paths between the resolvers and the TLD authorities. Unlike root probes, the TLDs suffer from substantial collateral damage. We tested all of the 312 TLDs got from ICANN. For the three TLDs in China (.cn,.xn--fiqs8s,.xn--fiqz9s), it is not a surprise that 43,322 (99.53%) resolvers return injected answers. It is of great concern that 11,573(26.40%) resolvers showed collateral damage for queries to one or more of 16 other TLDs. Figure 2 shows these TLDs and the number of af- ACM SIGCOMM Computer Communication Review 25 Volume 42, Number 3, July 2012
5 Rank Region Affected Resolvers Affected Rate 1 IR % 2 MY % 3 KR % 4 HK % 5 TW % 6 IN % 10 IT % 14 JP % 16 RU % 18 US % 20 CA % 25 DE % Total 109 Affected Regions Table 5: In different regions, the open resolvers affected because of querying for blacklisted keywords. DNS Level Affected Resolvers Affected Rate Root % TLD % Authoritative % Table 6: Number of affected resolvers in different level. fected resolvers. The second one,.xn--3eb707e, shares the same name infrastructure with the.kr cctld. It seems strange that the number of affected resolvers for.iq,.co,.travel,.no,.pl,.nz,.hk,.jp,.uk,.fi,.ca are all around 90. We check the location of their name servers and find that it is not a coincidence: UltraDNS (AS 12008) hosts some authority servers for all these TLDs except.hk. Limited by space, we only present the detailed information for the most affected TLD:.de. As shown in Figure 3, over 70% of the experimental resolvers from KR suffer collateral damage for.de queries, such as Similar to probing TLD servers, we finally constructed queries like KEYWORD.NXDOMAIN.authority.tld (e.g., www. twitter.com.abssdfds.ibm.com) to explore paths from the resolvers to authoritative name servers for several domains. We select 82 top popular domains from Alexa sites (outside of China). We see that queries for six domains could potentially trigger censorship on resolvers, as shown in Figure 4. Although the numbers of affected domains and resolvers seem small comparing to the results of TLDs testing, this may only represent the tip of the iceberg, considering the over-zealous pattern matching adopt by censorship and the huge number of domain names in the whole Internet. 4.4 Further Analysis on Measurement Results Table 5 and Table 6 give the total number of resolvers suffering from collateral damage because of paths to root, TLDs and the top 82 domain names % of the experimental resolvers are polluted, and they are distributed in 109 regions. The most affected country is Iran, 88.20% of its experimental resolvers suffer the collateral damage. Unlike the worries presented by Mauricio [8], Table 6 shows that the primary damage arises from censored transit paths to TLD servers. Our result partly confirms Mauricio [8] s claim that the operator of I-Root server, Netnod, withdrew their anycasted routes until their host (CNNIC) could secure assurances that the tampering would not recur. Besides, since the roots themselves are highly anycasted, it is unlikely that a path to a root needs to go through China. To find out why the collateral damage happened, we construct the topology of ASes neighboring CNNIC in Figure 5 using the data from the project of Internet Topology Collection [10]. According to Figure 5, AS31529, which is the AS of a.de TLD server ( ), is a customer of CN- NIC AS Meanwhile, AS24151 is also customers of other foreign ASes. As a result, traffic from foreign ASes to.de TLD server may pass through China, and then the collateral damage happens. We illustrate this with the following case. We choose a node from lookinglass [1], which lies in the same AS (AS39737) in Romania as an affected resolver ( ) does, and review the AS paths to the 6 TLD servers for.de from BGP data. Finally, we find that the AS path from AS39737 to a.de TLD server (a. nic.de, ) goes through a censoring AS (AS7497) in China, which is the cause of the collateral damage on this resolver. We show the AS path in Figure 5: 39737, 6939, 10026, 7497, 24151, AS3549 (GBLX Global Crossing, US) AS3356 (LEVEL3,US) AS 1280 (ISC, US) AS4847 CNIX-AP ASes in China... AS9700 KRNIC-AS- KR AS4635 HKIX- RS1 HK AS CNNIC-AP AS4641 ASN- CUHKNET HK AS CNNIC CRITICAL-AP (CN) AS EDNSKR1 NIDA KR AS8763 DENIC- AS DENIC eg DE AS Pacnet Global (HK) AS7497 CSTNET-AS- AP(CN) AS DENIC eg (DE) AS 6939 Hurricane Electric (US) AS Net Vision Telcom SRL (RO) Figure 5: Topology of ASes neighboring CNNIC 5. DISCUSSION The cause of the collateral damage presented in this paper is the censorship activities by ISPs providing transit, not just connectivity. We hope that this paper will raise the awareness of the collateral damage caused by indiscriminate DNS censorship. To avoid the collateral damage while keeping the censorship policies, one possibility would be for the ISPs to apply more strict checks to avoid polluting transit queries. If ISPs only censor the customers, not the transit, they may prevent the collateral damage. However, because of the closed nature of many censorship activities (such as the DNS filter in China), it is unclear to us if there are any technical challenges for those ISPs to implement such policy or not. If the censoring ISPs do not change their current practice of DNS-injection, another possibility is for neighboring ISPs to consider them invalid for transit: the neighbors should prefer alternate paths and not advertise transit whenever an alternate path exists. In particular, the TLD operators should monitor their peering arrangements to check for censored paths. ACM SIGCOMM Computer Communication Review 26 Volume 42, Number 3, July 2012
6 Number of Resolvers de xn--3e0b707e kr kp co travel pl no iq hk fi uk xn--j6w193g jp nz ca Percentage of All Resolvers Number of Resolvers zedo.com cnn.com amazon.com tumblr.com imdb.com linkedin.com Top Level Domain KR MY HK AR IL IR TW BG JP RO CA TH IT US DE Region Domain Name Figure 2: Number of affected resolvers for TLDs. Figure 3: Distribution of affected resolvers for TLD.de. Figure 4: Number of Affected resolver for authoritative domains. Finally, and most importantly, DNSSEC naturally prevents this collateral damage, especially on the TLD level. Both the.de and.kr domains sign their results, thus enabling a DNSSEC-validating resolver which rejects the unsigned injected replies while waiting for the legitimate signed replies could avoid suffering collateral damage due to packet injection. 6. CONCLUSION The contributions of this paper include: (1) Detailed analysis of collateral damage caused by DNS injection. Iterative queries to different levels of name servers, multiple name servers distributed in different locations and dynamic and anycast routing, are all factors which may cause a query to transit a censored network, even though both the user and the target are outside the censored area. (2) Discovering and locating DNS injectors. We probed all the Internet to find the indiscriminate DNS injectors, locating these DNS injectors in 39 Chinese ASes. (3) Measurement of affected recursive resolvers all over the world. We measured 43,842 open recursive resolvers in 173 countries, and found 26.41% of them in 109 countries could be polluted for some blacklisted keywords. (4) Primary path of pollution: from resolvers to TLD servers. We find that the primary collateral damage arises from transit between the resolvers and the TLD authorities, particularly the authorities for.de and.kr. We expect to continue our study on the measurement of the collateral damage caused by DNS injection, using multiple vantage points and an expanded list of HoneyQueries. And if GFC changes its DNS injection policy(such as moving to suppress other legitimate responses) later, we have to use a different methodology to adapt to the change. Although we has not come to a solution to allow recursive resolvers to be immune to the collateral damages from DNS-based censorship apart from DNSSEC validation, we hope our result can increase the Internet communities awareness of such behaviors and urge them to take actions to actively detect and resist such pollution to the whole Internet. 7. REFERENCES [1] LookinGlass. [2] Technical requirements for authoritative name servers. nameserver-requirements.html. [3] M. A. Brown, D. Madory, A. Popescu, and E. Zmijewski. DNS Tampering and Root Servers, Nov DNS-Tampering-and-Root-Servers.pdf. [4] R. Bush, M. Patton, R. Elz, and S. Bradner. Selection and Operation of Secondary DNS Servers. RFC2182, [5] J. Crandall, D. Zinn, M. Byrd, E. Barr, and R. East. ConceptDoppler: A Weather Tracker for Internet Censorship. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS 07, pages , New York, NY, USA, ACM. [6] M. Dischinger, M. Marcon, S. Guha, K. P. Gummadi, R. Mahajan, and S. Saroiu. Glasnost: Enabling End Users to Detect Traffic Differentiation. In Proceedings of the 7th USENIX conference on Networked systems design and implementation, NSDI 10, pages 27 27, Berkeley, CA, USA, USENIX Association. [7] R. Elz and R. Bush. Clarifications to the DNS Specification. RFC2181, [8] M. V. Ereche. Odd Behaviour on One Node in I root-server, [9] G. Lowe, P. Winters, and M. L. Marcus. The Great DNS Wall of China [10] W. Lucas. Internet Topology Collection. [11] P. Mockapetris. Domain Names - Concepts and Facilities. RFC1034, [12] P. Mockapetris. Domain Names - Implementation and Specification. RFC1035, [13] C. Partridge, T. Mendez, and W. Milliken. Host Anycasting Service. RFC1546, [14] L. Spitzner. Honeytokens: The Other Honeypot. honeytokens-other-honeypot, ACM SIGCOMM Computer Communication Review 27 Volume 42, Number 3, July 2012
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Sparks Neo Tank Smith Dozer ABSTRACT Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Anonymous presented by Philip Levis 1 Basic Summary Great Firewall of China injects DNS responses to restrict access
DNS Tampering and Root Servers
DNS Tampering and Root Servers AMS-IX: 24 Nov 2010 Renesys Corporation Martin A. Brown Doug Madory Alin Popescu Earl Zmijewski Overview Brief overview of Domain Name System (DNS) Demonstrating Great Firewall
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship Anonymous [email protected] Abstract China s Great Firewall passively inspects network traffic and disrupts unwanted communication
The Great DNS Wall of China
The Great DNS Wall of China Graham Lowe, Patrick Winters, Michael L. Marcus December 21, 2007 1 INTRODUCTION Repressive governments censor websites that they deem socially controversial. Subjects that
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <[email protected]> Duisburg, June 19, 2015
The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997
Network Working Group Request for Comments: 2182 BCP: 16 Category: Best Current Practice R. Elz University of Melbourne R. Bush RGnet, Inc. S. Bradner Harvard University M. Patton Consultant July 1997
EECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
The Domain Name System
Internet Engineering 241-461 Robert Elz [email protected] [email protected] http://fivedots.coe.psu.ac.th/~kre DNS The Domain Name System Kurose & Ross: Computer Networking Chapter 2 (2.5) James F. Kurose
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
The Survey Report on DNS Cache & Recursive Service in China Mainland
The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center Motivation Improve the traditional recursive
Internet Measurement Research
Internet Measurement Research Matthäus Wander Kassel, October 1, 2013 Overview How to get measurement data? Research projects Case studies of past projects Ideas and inspiration
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Application-layer protocols
Application layer Goals: Conceptual aspects of network application protocols Client server paradigm Service models Learn about protocols by examining popular application-level protocols HTTP DNS Application-layer
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
STATE OF DNS AVAILABILITY REPORT
STATE OF DNS AVAILABILITY REPORT VOLUME 1 ISSUE 1 APRIL 2011 WEB SITES AND OTHER ONLINE SERVICES ARE AMONG THE MOST IMPORTANT OPERATIONAL AND REVENUE GENERATING TOOLS FOR BUSINESSES OF ALL SIZES AND INDUSTRIES.
Using the Domain Name System for System Break-ins
Using the Domain Name System for System Break-ins Steven M. Bellovin Presented by: Thomas Repantis [email protected] CS255-Computer Security, Winter 2004 p.1/37 Overview Using DNS to spoof a host s name
Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
How To Map Between Ip Address And Name On A Domain Name System (Dns)
Computer Networks: Domain Name Service (DNS) CS 3516 D- term 2013 Instructor: Krishna Venkatasubramanian Quiz 2 DNS: domain name system people: many identifiers: SSN, name, passport # Internet hosts, routers:
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University [email protected]
Ignoring the Great Firewall of China
An Overview of Ignoring the Great Firewall of China By: Matt Landau Original Paper: Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson University of Cambridge,
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
The Application Layer: DNS
Recap SMTP and email The Application Layer: DNS Smith College, CSC 9 Sept 9, 0 q SMTP process (with handshaking) and message format q Role of user agent access protocols q Port Numbers (can google this)
Chapter 2 Application Layer
Chapter 2 Application Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP
Remote DNS Cache Poisoning Attack Lab
SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Domain Name System (or Service) (DNS) Computer Networks Term B10
Domain Name System (or Service) (DNS) Computer Networks Term B10 DNS Outline DNS Hierarchial Structure Root Name Servers Top-Level Domain Servers Authoritative Name Servers Local Name Server Caching and
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
INTERNET DOMAIN NAME SYSTEM
INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
The Use of DNS Resource Records
International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
Making the Internet fast, reliable and secure. DE-CIX Customer Summit - 2014. Steven Schecter <[email protected]>
Making the Internet fast, reliable and secure DE-CIX Customer Summit - 2014 Steven Schecter What is a Content Distribution Network RFCs and Internet Drafts define a CDN as: Content
DNS Record Injection Vulnerabilities in Home Routers
DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp, Tom Callahan, Michael Rabinovich, Mark Allman Case Western Reserve University International Computer Science Institute 1 Attacks targeting
Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming
Names & Addresses CS 9: Distributed Systems: Naming Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 970-77 What is a?
DNS: Domain Name System
DNS: Domain Name System People: many identifiers: SSN, name, passport # Internet hosts, routers: IP address (32 bit) - used for addressing datagrams name, e.g., ww.yahoo.com - used by humans Q: map between
Measurement Study on the Internet reachability. 3.1 Introduction. 3. Internet Backbone
3. Measurement Study on the Internet reachability Internet reachability can be assessed using control-plane and data-plane measurements. However, there are biases in the results of these two measurement
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Detecting Search Lists in Authoritative DNS
Detecting Search Lists in Authoritative DNS Andrew Simpson March 10 th, 2014 Summary Early research into name collisions has postulated that search list interaction drives some portion of the DNS requests
Citrix NetScaler Global Server Load Balancing Primer:
Citrix NetScaler Global Server Load Balancing Primer: Theory and Implementation www.citrix.com Background...3 DNS Overview...3 How DNS level GSLB works...4 Basic NetScaler GSLB Configuration...8 Accepting
Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion
Deploying IP Anycast Core DNS Services for University of Minnesota Introduction and General discussion Agenda Deploying IPv4 anycast DNS What is ANYCAST Why is ANYCAST important? Monitoring and using ANYCAST
CMPE 80N: Introduction to Networking and the Internet
CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 10 CMPE 80N Fall'10 1 Announcements Forum assignment #2 posted. Due Nov. 5 th.
3. The Domain Name Service
3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
IPV6 SERVICES DEPLOYMENT
IPV6 SERVICES DEPLOYMENT LINX IPv6 Technical Workshop - March 2009 Jaco Engelbrecht Group Platforms Manager, clara.net DNS root zone goes AAAA! On 4 th February 2008 IANA added AAAA records for the A,
Domain Name System Richard T. B. Ma
Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg
Teldat Router. DNS Client
Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality
IPv6 support in the DNS
IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
DATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
DNS and email issues in connecting UNINET-ZA to the Internet
DNS and email issues in connecting UNINET-ZA to the Internet Alan Barrett November 2011 Abstract This article describes some of the activities and configuration relating to the Domain Name System (DNS)
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
Domain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition April 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
A DNS Reflection Method for Global Traffic Management
A DNS Reflection Method for Global Traffic Management Cheng Huang Microsoft Research Albert Greenberg Microsoft Research Nick Holt Microsoft Corporation Jin Li Microsoft Research Y. Angela Wang Polytechnic
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
DNS. Spring 2016 CS 438 Staff 1
DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical
CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015
CS 43: Computer Networks Naming and DNS Kevin Webb Swarthmore College September 17, 2015 Agenda Identifiers and addressing Domain Name System History Query sequences Record types Load balancing Recall:
