DNSwitness: recent developments and the new passive monitor
|
|
|
- Winfred Jennings
- 9 years ago
- Views:
Transcription
1 1 DNSwitness: recent developments and the new passive monitor / DNSwitness: recent developments and the new passive monitor Stéphane Bortzmeyer AFNIC [email protected] RIPE 59 - Lisbon - October 2009
2 2 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness Where are we in the talk? 1 Reminder about DNSwitness 2 Measurements based on passive observations 3 Preliminary Results 4 Future work 5 Measurements based on active queries
3 3 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness What is AFNIC AFNIC is the registry for the TLD.fr (France). 54 employees, 1.5 million domain names and a R&D department.
4 4 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness Motivation A DNS registry has a lot of information it does not use. Our marketing team or the technical team ask for all sorts of things ( How many of our domains are used for only? ) for which we may have the answer.
5 5 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness More specific motivation Getting information about the deployment of new techniques like IPv6 We focus on things that we can obtain from the DNS because we are a domain name registry.
6 5 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness More specific motivation Getting information about the deployment of new techniques like IPv6 We focus on things that we can obtain from the DNS because we are a domain name registry. Possible surveys: IPv6, SPF, DNSSEC, EDNS0, Zonecheck... Let s build a multi-purpose platform for that!
7 6 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness Other aims 1. Versatile, able to do many different surveys (most known tools deal only with one survey), 2. Works unattended (from cron, for instance), for periodic runs, 3. Stores raw results, not just aggregates, for long-term analysis, 4. Designed to be distributable, 5. Designed to be usable by small and medium actors ( send the program to the users, not the data to a centralized analysis fabric ).
8 7 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness What we can learn from the DNS (and beyond) What we send out: active DNS queries sent to domain name servers. Active measurements. (Presented at the RIPE 57 meeting in Dubai.)
9 7 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness What we can learn from the DNS (and beyond) What we send out: active DNS queries sent to domain name servers. Active measurements. (Presented at the RIPE 57 meeting in Dubai.) What comes in: DNS queries received by authoritative name servers, passively monitored ( Who knocks at the door and what are they asking for? ). Passive measurements.
10 7 DNSwitness: recent developments and the new passive monitor / Reminder about DNSwitness What we can learn from the DNS (and beyond) What we send out: active DNS queries sent to domain name servers. Active measurements. (Presented at the RIPE 57 meeting in Dubai.) What comes in: DNS queries received by authoritative name servers, passively monitored ( Who knocks at the door and what are they asking for? ). Passive measurements. We work on both, study the long-term evolution and publish results.
11 8 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Where are we in the talk? 1 Reminder about DNSwitness 2 Measurements based on passive observations 3 Preliminary Results 4 Future work 5 Measurements based on active queries
12 9 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Passive observation of queries It works by passive monitoring of the fr name servers. We are talking about long-term monitoring, not just the quick glance that DSC offers. The idea is to address the needs of the R&D or of the marketing, not just the needs of the NOC.
13 9 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Passive observation of queries It works by passive monitoring of the fr name servers. We are talking about long-term monitoring, not just the quick glance that DSC offers. The idea is to address the needs of the R&D or of the marketing, not just the needs of the NOC. It works mostly by Ethernet port mirroring.
14 10 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Expected uses of the passive measurements It allows us to survey things like:
15 10 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Expected uses of the passive measurements It allows us to survey things like: Percentage of servers without SPR (Source Port Randomisation, see.at publications).
16 10 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Expected uses of the passive measurements It allows us to survey things like: Percentage of servers without SPR (Source Port Randomisation, see.at publications). Percentage of queries done over IPv6 transport (unlike DSC, we will be able to study long-term trends).
17 10 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Expected uses of the passive measurements It allows us to survey things like: Percentage of servers without SPR (Source Port Randomisation, see.at publications). Percentage of queries done over IPv6 transport (unlike DSC, we will be able to study long-term trends). Percentage of queries with EDNS0 or DO.
18 10 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Expected uses of the passive measurements It allows us to survey things like: Percentage of servers without SPR (Source Port Randomisation, see.at publications). Percentage of queries done over IPv6 transport (unlike DSC, we will be able to study long-term trends). Percentage of queries with EDNS0 or DO. Top N domains for which there is a NXDOMAIN reply.
19 10 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Expected uses of the passive measurements It allows us to survey things like: Percentage of servers without SPR (Source Port Randomisation, see.at publications). Percentage of queries done over IPv6 transport (unlike DSC, we will be able to study long-term trends). Percentage of queries with EDNS0 or DO. Top N domains for which there is a NXDOMAIN reply. But the list is open...
20 11 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Sampling Packet trace files can grow very large Dozens of gigabytes are very common. And, to process such humongous data, you need a lot of RAM!
21 11 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Sampling Packet trace files can grow very large Dozens of gigabytes are very common. And, to process such humongous data, you need a lot of RAM! Sampling is often the only solution, unless you have a lot of disk and machine power
22 12 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations A framework for sampling RFC 5474, A Framework for Packet Selection and Reporting (the general framework and the concepts) RFC 5475, Sampling and Filtering Techniques for IP Packet Selection (actual techniques) RFC 5476, Packet Sampling (PSAMP) Protocol Specifications (not used by DNSmezzo) Among the sampling techniques listed by RFC 5475: systematic count-based, systematic time-based, random (with various distributions),...
23 13 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Limits of sampling Sampling makes sampling errors. If a phenomenon is rare, sampling can make it disappear completely... or promote it if it falls in the sampling window!
24 13 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Limits of sampling Sampling makes sampling errors. If a phenomenon is rare, sampling can make it disappear completely... or promote it if it falls in the sampling window! Do not forget to plot the error bars.
25 13 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Limits of sampling Sampling is not suitable for many security studies: the attack can be just between the sampled packets. Example: BIND dynamic update DoS attack of 2009 where one packet was enough. References: section 9 of RFC 5475 and S. Goldberg, J. Rexford, Security Vulnerabilities and Solutions for Packet Sampling, IEEE Sarnoff Symposium, Princeton, NJ, May princeton.edu/~jrex/papers/psamp-security07.pdf.
26 14 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Implementation DNSmezzo has three parts: The capture program, which does the sampling (AFNIC uses pcapdump, from ISC). Anything which produces pcap works (tcpdump, dnscap, etc). The dissector which parses the DNS packets and stores them in a rdbms. Written in C at AFNIC. The reporting programs, typically a combination of SQL, Python and Gnuplot. Hence, we completely separate trace files parsing from data analysis.
27 15 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Capturing packets We all know capture tools like tcpdump and the pcap format it popularized Writing your own capture tool is easy but there is one already made, which suited our requirments: pcapdump, from the pcaputils package pcapdump can do the sampling, can rotate files and name them properly, etc.
28 16 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Dissecting pcap files A very common task, with a lot of code available on the Internet (I recommend Wireshark).
29 16 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Dissecting pcap files A very common task, with a lot of code available on the Internet (I recommend Wireshark). But a dangerous task, especially in a language like C Every possible error can be found in the wild. Either by malice or by bug.
30 16 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Dissecting pcap files But a dangerous task, especially in a language like C Every possible error can be found in the wild. Either by malice or by bug. If you love buffer overflows, dissecting pcap is for you. (See the list of security alerts for Wireshark.) Examples: name compression pointers going outside of the packet, section counts > 0 while the corresponding section is empty, etc.
31 16 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Dissecting pcap files But a dangerous task, especially in a language like C Every possible error can be found in the wild. Either by malice or by bug. If you love buffer overflows, dissecting pcap is for you. (See the list of security alerts for Wireshark.) Examples: name compression pointers going outside of the packet, section counts > 0 while the corresponding section is empty, etc. Tests with Python were not good, speed-wise, so we moved to C. For DNS parsing, we could have used ldns or a similar lib. For further study.
32 17 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Storing in the rdbms The relational DBMS gives us versatility and simplicity (everyone knows SQL): this is great for data analysis. A few principles: As much as possible, store the original information. You never know what you will need. Example: we keep the original case of the QNAME, we do not normalize it. As far as possible, keep the history, store the packets, not aggregates. You never know what you will want to study in the future.
33 18 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations A few implementation choices Use integers for fields like the QTYPE or QCLASS: loses typing, less convenient but allows for unexpected QTYPE, Use a special type for domain names, allowing easy extract of things like the TLD (not yet finalized), Use a proper type for IP addresses, not text, to allow things like grouping per prefix, PostgreSQL (with its rich typing system).
34 19 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Science-fiction Recode everything on a shared-nothing architecture in the cloud With MapReduce on Hadoop :-)
35 20 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Querying DNS with SQL All the data is stored in a rdbms. Analysis is then performed with SQL, without interfering with pcap parsing issues. -- Top non-existing requested domains SELECT DISTINCT domain, count(domain) AS num FROM DNS_packets WHERE NOT query AND rcode = 3 -- NXDOMAIN GROUP BY domain ORDER BY num DESC; -- Non-ASCII requests. QNAMEs are stored as UTF-8 SELECT src_address, qname FROM DNS_packets WHERE octet_length(qname) > length(qname);
36 21 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations SQL requests, the sequel -- IPv6 requests SELECT count(id) FROM DNS_packets WHERE query AND family(src_address) = 6; -- Most common QTYPE. -- RR types are stored in an auxiliary table SELECT (CASE WHEN type IS NULL THEN qtype::text ELSE type END), meaning, count(results.id) AS requests FROM (SELECT id, qtype FROM dns_packets WHERE query) AS Results LEFT OUTER JOIN DNS_types ON qtype = value GROUP BY qtype, type, meaning ORDER BY requests desc;
37 22 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Querying DNS with SQL The SQL way is often criticized for performance issues. A few methods to make things more manageable: Sampling, of course Liberal use of indexes (spend space to save time) PostgreSQL s excellent EXPLAIN command Add RAM
38 23 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Performance measure Test with 85 Mpackets (returning 192 tuples) % echoping -n 3 -m postgresql localhost -c dbname=dnsmezzo2 \ "SELECT * FROM DNS_packets WHERE qname= example.fr " Elapsed time: seconds Elapsed time: seconds Elapsed time: seconds (Once it is in the cache, it works fast.)
39 24 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Size of data On a name server with 1,300 queries/s, with a (very aggressive) sampling of 1 % and a maximum capture size of 512 bytes, the typical daily pcap file is 250 megabytes. % capinfos mezzo-a.nic.fr-sampling :00.pcap... Number of packets: File size: bytes Capture duration: seconds Start time: Tue Sep 1 00:00: End time: Wed Sep 2 00:00: Data byte rate: bytes/sec Data bit rate: bits/sec Average packet size: bytes Average packet rate: packets/sec
40 25 DNSwitness: recent developments and the new passive monitor / Measurements based on passive observations Size matters Storing it to the database expands it by a factor 5 (half of the expansion coming from the indices). dnsmezzo2=> SELECT sum(storedpackets) FROM pcap_files; sum dnsmezzo2=> SELECT pg_size_pretty(sum(filesize)) FROM pcap_files; pg_size_pretty MB dnsmezzo2=> SELECT pg_size_pretty( pg_total_relation_size( DNS_packets )); pg_size_pretty GB
41 26 DNSwitness: recent developments and the new passive monitor / Preliminary Results Where are we in the talk? 1 Reminder about DNSwitness 2 Measurements based on passive observations 3 Preliminary Results 4 Future work 5 Measurements based on active queries
42 27 DNSwitness: recent developments and the new passive monitor / Preliminary Results Actual results No long-term studies yet, the program is too recent.
43 27 DNSwitness: recent developments and the new passive monitor / Preliminary Results Actual results No long-term studies yet, the program is too recent. Still several biases (only one name server, caching at ISP,... ).
44 28 DNSwitness: recent developments and the new passive monitor / Preliminary Results AFNIC setup Sampling at 1 %, random,
45 28 DNSwitness: recent developments and the new passive monitor / Preliminary Results AFNIC setup Sampling at 1 %, random, Data collection during 24 hours (as with DITL),
46 28 DNSwitness: recent developments and the new passive monitor / Preliminary Results AFNIC setup Sampling at 1 %, random, Data collection during 24 hours (as with DITL), Just one name server,
47 28 DNSwitness: recent developments and the new passive monitor / Preliminary Results AFNIC setup Sampling at 1 %, random, Data collection during 24 hours (as with DITL), Just one name server, Capture with pcapdump.
48 29 DNSwitness: recent developments and the new passive monitor / Preliminary Results IPv6 0,6 % of requests over IPv6 (no change in 2009) Other statistics do not seem to depend on the address family (for instance, non-spr clients are as common with v6 and v4)
49 Size of the responses Response size can be an issue for IP fragmentation, for instance. Total packet size (in bytes) in.fr DNS responses infinite %age of responses / / / / / / / / / / / / / / / /2009 Run date 30 DNSwitness: recent developments and the new passive monitor / Preliminary Results 08/ / / / /2009
50 31 DNSwitness: recent developments and the new passive monitor / Preliminary Results Most queried domains A important question for the management: what are the most popular domains? Important, but there are many traps!
51 31 DNSwitness: recent developments and the new passive monitor / Preliminary Results Most queried domains A important question for the management: what are the most popular domains? Important, but there are many traps! Caching at the ISP seriously change the pattern Domains with low TTL are queried more often Infrastructure domains (used on the right-hand side of the NS records) are the most popular. If they break, they take many domains with them.
52 31 DNSwitness: recent developments and the new passive monitor / Preliminary Results Most queried domains A important question for the management: what are the most popular domains? Important, but there are many traps! Caching at the ISP seriously change the pattern Domains with low TTL are queried more often Infrastructure domains (used on the right-hand side of the NS records) are the most popular. If they break, they take many domains with them. nic.fr is by far the most often queried.
53 31 DNSwitness: recent developments and the new passive monitor / Preliminary Results Most queried domains A important question for the management: what are the most popular domains? Important, but there are many traps! Caching at the ISP seriously change the pattern Domains with low TTL are queried more often Infrastructure domains (used on the right-hand side of the NS records) are the most popular. If they break, they take many domains with them. nic.fr is by far the most often queried. The Top N study may be published separately. Wait for the paper :-)
54 32 DNSwitness: recent developments and the new passive monitor / Preliminary Results Kaminsky, one year after Still 18 % of clients without SPR (less than one port per two requests) They are not only small resolvers, they make 15 % of the requests. Methodology: we eliminate small clients (not enough requests) and recursive requests (dig... ).
55 Percentage of requests per query type QTYPE in.fr DNS requests A NS MX AAAA Others %age of query types / / / /2009 Run date 33 DNSwitness: recent developments and the new passive monitor / Preliminary Results 09/ /2009
56 34 DNSwitness: recent developments and the new passive monitor / Preliminary Results Comparison with other systems ISC SIE IIS.se dns2db DSC
57 35 DNSwitness: recent developments and the new passive monitor / Preliminary Results DNSmezzo and friends SIE is optimized for huge volumes of data, DNSmezzo for versatility. DNSmezzo typically works with sampled data (so it requires less hardware resources but it cannot do security analysis, only stats) DNSmezzo s code is published, we encourage the perform your analysis yourself which can be useful for a TLD. DSC is more targeted to real-time monitoring, its quantitative precision decreases with time (also, at AFNIC, it is not installed with QNAME parsing). DNSmezzo is very close, in its principles, to dns2db.
58 36 DNSwitness: recent developments and the new passive monitor / Preliminary Results Distribution Distributed under the free software licence GPL.
59 37 DNSwitness: recent developments and the new passive monitor / Future work Where are we in the talk? 1 Reminder about DNSwitness 2 Measurements based on passive observations 3 Preliminary Results 4 Future work 5 Measurements based on active queries
60 38 DNSwitness: recent developments and the new passive monitor / Future work Future work on DNSmezzo Parse some information that is currently ignored (such as EDNS option codes, for EDNS0-ping, for instance) Write more reports with the information we have Deploy more probes (warning: consolidation of data from different name servers is not obvious)
61 39 DNSwitness: recent developments and the new passive monitor / Measurements based on active queries Where are we in the talk? 1 Reminder about DNSwitness 2 Measurements based on passive observations 3 Preliminary Results 4 Future work 5 Measurements based on active queries
62 Active queries 40 DNSwitness: recent developments and the new passive monitor / Measurements based on active queries
63 40 DNSwitness: recent developments and the new passive monitor / Measurements based on active queries Active queries This is the realm of our DNSdelve program.
64 40 DNSwitness: recent developments and the new passive monitor / Measurements based on active queries Active queries v6-enabled v6-full v6-web v6- v6-dns IPv6 in.fr domains %age of v6 domains / / / / / / / / / / /2009 Run date
65 40 DNSwitness: recent developments and the new passive monitor / Measurements based on active queries Active queries v6-enabled v6-full v6-web v6- v6-dns IPv6 in.fr domains %age of v6 domains / / / / / / / / / / /2009 Run date
66 41 DNSwitness: recent developments and the new passive monitor / Measurements based on active queries Future work on the rest of the project Gather more users. Yes, you :-)
67 41 DNSwitness: recent developments and the new passive monitor / Measurements based on active queries Future work on the rest of the project Gather more users. Yes, you :-) Come back in one year with trends, new applications, etc.
A versatile platform for DNS metrics with its application to IPv6
A versatile platform for DNS metrics with its application to IPv6 Stéphane Bortzmeyer AFNIC [email protected] RIPE 57 - Dubai - October 2008 1 A versatile platform for DNS metrics with its application
DNSwitness: A Generic Platform For DNS-based Measurements
DNSwitness: A Generic Platform For DNS-based Measurements Journée «Mesures Internet», Paris, 24 April 2012 {Samia.Mtimet, Stephane.Bortzmeyer, Mohsen.Souissi} (at) afnic.fr Overview Motivation Principles
1 DNS Packet Structure
Fundamentals of Computer Networking Project 1 Primer: DNS Overview CS4700/CS5700 Fall 2009 17 September 2009 The DNS protocol is well-documented online, however, we describe the salient pieces here for
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
DNS Conformance Test Specification For Client
DNS Conformance Test Specification For Client Revision 1.0 Yokogawa Electric Corporation References This test specification focus on following DNS related RFCs. RFC 1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
State of the "DNS privacy" project. Stéphane Bortzmeyer AFNIC [email protected]
State of the "DNS privacy" project Stéphane Bortzmeyer AFNIC [email protected] 1 / 1 State of the "DNS privacy" project Stéphane Bortzmeyer AFNIC [email protected] Warsaw OARC workshop May 2014: talk of
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
Table of Contents DNS. How to package DNS messages. Wire? DNS on the wire. Some advanced topics. Encoding of domain names.
Table of Contents DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 DNS on the wire Encoding of domain names
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Remote DNS Cache Poisoning Attack Lab
SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory
GSI ID: 1065 DNS FLOODER V1.1 RISK FACTOR - HIGH 1.1 OVERVIEW / PLXSert has observed the release and rapid deployment of a new DNS reflection toolkit for distributed denial of service (DDoS) attacks. The
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Defending against DNS reflection amplification attacks
University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013 Authors: Thijs Rozekrans Javy de Koning
The Use of DNS Resource Records
International Journal of Advances in Electrical and Electronics Engineering 230 Available online at www.ijaeee.com & www.sestindia.org/volume-ijaeee/ ISSN: 2319-1112 Simar Preet Singh Systems Engineer,
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
dnsperf DNS Performance Tool Manual
dnsperf DNS Performance Tool Manual Version 2.0.0 Date February 14, 2012 Copyright 2002-2012, Inc. - All Rights Reserved This software and documentation is subject to and made available pursuant to the
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Internet Measurement Research
Internet Measurement Research Matthäus Wander Kassel, October 1, 2013 Overview How to get measurement data? Research projects Case studies of past projects Ideas and inspiration
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
IPv6 and DNS. Secure64
IPv6 and DNS Secure64 About me Stephan Lagerholm Director and Founder of TXv6TF. Secure64 Software Corp. Sponsor of the event. Agenda: DNS and IPv6 basics DNS64 (RFC 6147) 464XLAT (RFC 6877) Heuristic
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
DNS traffic analysis -- Issues of IPv6 and CDN --
DNS traffic analysis -- Issues of IPv6 and CDN -- Kazunori Fujiwara ^, Akira Sato, Kenichi Yoshida University of Tsukuba ^Japan Registry Services Co., Ltd (JPRS) July 29, 2012 IEPG meeting at Vancouver
IPv6 support in the DNS
IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
The Domain Name System
The Domain Name System Antonio Carzaniga Faculty of Informatics University of Lugano October 9, 2012 2005 2007 Antonio Carzaniga 1 IP addresses and host names Outline DNS architecture DNS process DNS requests/replies
SIDN Server Measurements
SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources
Coordinación. The background image of the cover is desgned by http://www.freepik.com/ GUIDE TO DNS SECURITY 2
Autor Antonio López Padilla Coordinación Daniel Fírvida Pereira This publication belongs to INTECO (Instituto Nacional de Tecnologías de la Comunicación) and is under an Attribution- NonCommercial 3.0
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
Some advanced topics. Karst Koymans. Friday, September 11, 2015
DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 Karst Koymans (UvA) DNS Friday, September 11, 2015 1 /
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Passive Monitoring of DNS Anomalies
Passive Monitoring of DNS Anomalies Bojan Zdrnja 1, Nevil Brownlee 1, and Duane Wessels 2 1 University of Auckland, New Zealand, {b.zdrnja,nevil}@auckland.ac.nz 2 The Measurement Factory, Inc., [email protected]
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
DNSSEC in your workflow
DNSSEC in your workflow Presentation roadmap Overview of problem space Architectural changes to allow for DNSSEC deployment Deployment tasks Key maintenance DNS server infrastructure Providing secure delegations
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS
Classification: TLP-GREEN RISK LEVEL: MEDIUM Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS Release Date: 6.1.16 1.0 / OVERVIEW / Akamai SIRT is investigating a new DDoS reflection
IPv6 and DNS. Secure64
IPv6 and DNS Secure64 About me Stephan Lagerholm Director and Founder of TXv6TF. Secure64 Software Corp. Sponsor of the event. AGENDA DNS and IPv6 basics IETF progress: DNS64 (RFC 6147) 464XLAT (RFC 6877)
ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
How To Understand A Network Attack
Network Security Attack and Defense Techniques Anna Sperotto (with material from Ramin Sadre) Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attacks! Many different
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Recommendations for dealing with fragmentation in DNS(SEC)
Recommendations for dealing with fragmentation in DNS(SEC) Abstract DNS response messages can sometimes be large enough to exceed the Maximum Transmission Unit (MTU) size for the underlying physical network.
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Security Monitoring of DNS traffic
Security Monitoring of DNS traffic Bojan Zdrnja CompSci 780, University of Auckland, May 2006. [email protected] Abstract The Domain Name System (DNS) is a critical part of the Internet. This paper
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
Large-scale DNS and DNSSEC data sets for network security research
Large-scale DNS and DNSSEC data sets for network security research Roland van Rijswijk-Deij 1,2, Anna Sperotto 1, and Aiko Pras 1 1 Design and Analysis of Communication Systems (DACS), University of Twente,
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
Identifying Patterns in DNS Traffic
Identifying Patterns in DNS Traffic Pieter Lexis System and Network Engineering Thu, Jul 4 2013 Reflection and Amplification Attacks DNS abused as DDoS Tool Spamhaus hit with 300 Gigabit/second DDoS Reflected
DNS and email issues in connecting UNINET-ZA to the Internet
DNS and email issues in connecting UNINET-ZA to the Internet Alan Barrett November 2011 Abstract This article describes some of the activities and configuration relating to the Domain Name System (DNS)
The Real State of WiFi Security in the Connected Home August 25, 2015
The Real State of WiFi Security in the Connected Home August 25, 2015 1 Abstract Analyzing real-world data can teach us about the state of security in the connected home. RouterCheck, a tool for testing
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
DNS/DNSSEC loose ends
DNS/DNSSEC loose ends Karst Koymans & Niels Sijm Informatics Institute University of Amsterdam Friday, September 21, 2012 Karst Koymans & Niels Sijm (UvA) DNS/DNSSEC loose ends Friday, September 21, 2012
Domain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
Section 1 Overview... 4. Section 2 Home... 5
ecogent User Guide 2012 Cogent Communications, Inc. All rights reserved. Every effort has been made to ensure that the information in this User Guide is accurate. Information in this document is subject
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.
Tools for penetration tests 1 Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus. What is a penetration test? Goals: 1. Analysis of an IT-environment and search
Security of Patched DNS. Bar Ilan University, Department of Computer Science, Network Security Group Technical Report TR12-04
1 Security of Patched DNS Bar Ilan University, Department of Computer Science, Network Security Group Technical Report TR12-04 Amir Herzberg and Haya Shulman Abstract Most caching DNS resolvers still rely
19. Exercise: CERT participation in incident handling related to the Article 13a obligations
CERT Exercises Handbook 223 223 19. Exercise: CERT participation in incident handling related to the Article 13a obligations Main Objective Targeted Audience Total Duration This exercise provides students
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
Reverse DNS considerations for IPv6
Reverse DNS considerations for IPv6 Kostas Zorbadelos OTE David Freedman - ClaraNet Reverse DNS in IPv4 Every Internet-reachable host should have a name Make sure your PTR and A records match. For every
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)
Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!
DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come! Amir Herzberg and Haya Shulman Dept. of Computer Science Bar Ilan University 8/1/2013 About us Bar Ilan University
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
Detecting BGP hijacks in 2014
Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks
Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
3. The Domain Name Service
3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records
So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
The Ultimate Business & Enterprise Hosting Solutions. www.radonhosting.com
The Ultimate Business & Enterprise Hosting Solutions Radon is for businesses that demand high performance, versatile and scalable solutions. From hosting your Website, Email, Voice, SMS and Business Applications,
