Using the Domain Name System for System Break-ins
|
|
|
- Andrew Johnston
- 9 years ago
- Views:
Transcription
1 Using the Domain Name System for System Break-ins Steven M. Bellovin Presented by: Thomas Repantis CS255-Computer Security, Winter 2004 p.1/37
2 Overview Using DNS to spoof a host s name and access network services that rely on the host name for authentication. 1. Introduction to the Domain Name System 2. Description of the Attack 3. Proposed Defenses 4. Current Status CS255-Computer Security, Winter 2004 p.2/37
3 Domain Name System (DNS) A distributed database, used to map host names to IP addresses, and vice-versa Paul Mockapetris RFCs 882, 883 (1983) RFCs 1034, 1035 (1987) CS255-Computer Security, Winter 2004 p.3/37
4 DNS Basics 1/2 Periods in domain names define zones ( Servers contain the authoritatitive data for each zone. Secondary authoritative servers poll the primary servers. If the data has changed, they initiate zone transfers. CS255-Computer Security, Winter 2004 p.4/37
5 DNS Basics 2/2 The resource records returned are cached locally for some time. The authority for a subdomain may be delegated to a subsidiary server (hierarchical namespace). CS255-Computer Security, Winter 2004 p.5/37
6 Zone Example 1/5 CS255-Computer Security, Winter 2004 p.6/37
7 Zone Example 2/5 Start Of Authority (SOA): Specifies the source of the zone information. CS255-Computer Security, Winter 2004 p.7/37
8 Zone Example 3/5 Name Server (NS): Specifies the authoritative name servers for the domain. CS255-Computer Security, Winter 2004 p.8/37
9 Zone Example 4/5 Address (A): Specifies the address of a host. CS255-Computer Security, Winter 2004 p.9/37
10 Zone Example 5/5 Host Info (HINFO): Specifies host information, like computer and operating system. CS255-Computer Security, Winter 2004 p.10/37
11 Forward queries Forward queries (asking for the IP address, providing a machine name) can be answered using the records from the zone. An item may also contain Additional Information, (e.g. providing NS and A records, when asked for the IP of an unknown host). CS255-Computer Security, Winter 2004 p.11/37
12 Inverse queries Inverse queries (asking for the machine name, providing an IP address) are answered using a separate, parallel tree, keyed by IP address. CS255-Computer Security, Winter 2004 p.12/37
13 Attack! Assumption: Attacker controlling a primary server for a DNS zone, including the inverse mapping tree, as well as all TCP port numbers. Attacker s goal: To find hosts that trust other hosts by name. Common examples: Clusters of time-sharing machines. File servers and their clients. CS255-Computer Security, Winter 2004 p.13/37
14 Starring: Softy, the victim: bullseye.softy.org ringer.softy.org groundzero.softy.org Cuckoo, the attacker: cracker.ritts.org CS255-Computer Security, Winter 2004 p.14/37
15 Guest star: The vulnerability in the address-to-name mapping! Attacker changes the inverse mapping record for from the correct cracker.ritts.org to ringer.softy.org Attacker attempts rlogin to bullseye. CS255-Computer Security, Winter 2004 p.15/37
16 ... bullseye, the victim, validates the name of the calling machine: It calls gethostbyaddr(), passing This generates a DNS inverse query for the PTR record for in-addr.arpa This retrieves ringer.softy.org Call accepted, attack succeeded. CS255-Computer Security, Winter 2004 p.16/37
17 Why? Because there is no forced linkage between the two DNS trees owned by Cuckoo, ritts.org and in-addr.arpa, allowing the latter s entries to point to softy s hosts. CS255-Computer Security, Winter 2004 p.17/37
18 The rest are details... Finding a target host name. Finding a user name to impersonate. Finding a machine trusted by the target host. CS255-Computer Security, Winter 2004 p.18/37
19 SNMP abuse Cuckoo finds the target host name from mail message or news article. He examines its TCP connection tables using SNMP. CS255-Computer Security, Winter 2004 p.19/37
20 finger abuse He examines current users using finger. He concludes: In bullseye,.rhosts file for bingo, authorizing user1 when coming from bullseye. CS255-Computer Security, Winter 2004 p.20/37
21 Done He modifies the appropriate PTR record. He creates local login names. He attacks. CS255-Computer Security, Winter 2004 p.21/37
22 Giving away information Apart from SNMP and finger... , DNS (SOA records, zone transfers, HINFO records) SMTP FTP rpcinfo...can also provide information about the victim. CS255-Computer Security, Winter 2004 p.22/37
23 The Berkeley fix Validate the inverse mapping tree by looking at the corresponding node on the forward mapping tree. If gethostbyaddr() returns bullseye.softy.org for , then gethostbyname() should return the same IP for the same name. Otherwise we have an impersonation. CS255-Computer Security, Winter 2004 p.23/37
24 How the fix is circumvented... The PTR record to answer gethostbyaddr() s request is in Cuckoo s server. The A record to answer gethostbyname() s request is in Softy s server. However the query might be answered by the local machine s name server cache. That DNS cache can be poisoned by the attacker... CS255-Computer Security, Winter 2004 p.24/37
25 Danger: Poison! The DNS message with the PTR record may contain a bogus A record in the Additional Information field (with short TTL). Or the bogus A record can be included in the NS records of a response to a lookup for a CS255-Computer Security, Winter 2004 p.25/37
26 Therefore... Caching-only name servers are vulnerable! Authoritative name servers for a domain will reject updates for their zones. Hence they cannot be poisoned. But they are vulnerable for requests outside their zone. CS255-Computer Security, Winter 2004 p.26/37
27 Extra measures The target can act as a secondary server for the inverse mapping. The target can use a local mapping table like NIS before consulting DNS. CS255-Computer Security, Winter 2004 p.27/37
28 Hardening DNS Servers Bogus A records could be tracked back, if DNS server cache entries were tagged with their source. Additional Information could be used only in the specific context in which it was returned, and then discarded. (At a performance cost.) CS255-Computer Security, Winter 2004 p.28/37
29 Defenses Use cryptographic instead of name- or address-based authentication (e.g. Kerberos). Apart from Berkeley s fix: Limit the trusted hosts to those for which the local machine has authoritative name information. Have the local name server act as a secondary server for important neighboring zones, and thus possess authoritative forward-mapping data. Have all machines possess definitive mapping information for the hosts within an organization. CS255-Computer Security, Winter 2004 p.29/37
30 Logging and Audtiing Attempts to impersonate hosts. Attempts to update authoritative zones. Attempts to connect to rlogind or rshd. Compare forward- and inverse-mapping data for a zone. CS255-Computer Security, Winter 2004 p.30/37
31 Abandon DNS? Return to static host tables? no (1990) NO! (2004) Problem lies not in DNS, but in inadequate host authentication methods. The information for host-to-address mapping is distributed, hence contamination from untrustworthy sources is always possible. The host table is huge and cannot be updated statically in a frequent and timely manner. CS255-Computer Security, Winter 2004 p.31/37
32 Is the attack still relevant? Paper written in 1990, published in : Name-based authentication is not that widely used anymore (ssh instead of rsh). Firewalls disallow remote connections. Too many BIND fixes since then. Cryptographic authentication of DNS is used in experimental testbeds. Main idea still relevant, with new misuses. CS255-Computer Security, Winter 2004 p.32/37
33 DNS Threats in 2004 Threat Analysis Of The Domain Name System. D. Atkins. IETF Draft (2003). Packet Interception ID Guessing and Query Prediction Name Games Betrayal By Trusted Server Denial of Service Authenticated Denial of Domain Names Wildcards CS255-Computer Security, Winter 2004 p.33/37
34 DNSSEC DNS Security Extensions to provide end-to-end authenticity and integrity. All answers in DNSSEC are digitally signed. By checking the signature, a resolver is able to check if the info is identical (correct and complete) to the info on the authoritative server. D. Eastlake. RFC 2535 (1987). CS255-Computer Security, Winter 2004 p.34/37
35 Conclusions Inserting bogus resource records in a victim s DNS cache. Still possible. Luckily, name-based authentication is not that widely used anymore. However, other misuses like server redirection are equally grave. DNSSEC CS255-Computer Security, Winter 2004 p.35/37
36 References 1. P. Mockapetris. RFC 1034: Domain Concepts and Facilities. IETF, P. Mockapetris. RFC 1035: Domain Implementation and Specification. IETF, S. Bellovin. Using the Domain Name System for System Break-ins. USENIX, P. Vixie. DNS and BIND security issues. USENIX, C. Schuba and E. Spafford. Addressing weaknesses in the domain name system protocol. Master s thesis, D. Eastlake. RFC 2535: Domain Name System Security Extensions. IETF, D. Atkins. Internet Draft: Threat Analysis Of The Domain Name System. IETF, CS255-Computer Security, Winter 2004 p.36/37
37 Thank you! Questions/comments? CS255-Computer Security, Winter 2004 p.37/37
Using the Domain Name System for System Break-ins
The following paper was originally published in the Proceedings of the Fifth USENIX UNIX Security Symposium Salt Lake City, Utah, June 1995. Using the Domain Name System for System Break-ins Steven M.
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
Domain Name System (DNS) Security By Diane Davidowicz 1999 Diane Davidowicz
Domain Name System (DNS) Security By Diane Davidowicz 1999 Diane Davidowicz Contents 1. Abstract...3 2. Introduction...3 3. Overview of the DNS...3 3.1. Fundamentals of DNS...4 3.1.1. The Domain Name Space...4
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
ECE 4321 Computer Networks. Network Programming
ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0) US-CERT Summary US-CERT has been alerted to an increase in distributed denial of service (DDoS) attacks using spoofed recursive DNS
Introduction to the Domain Name System
CHAPTER 14 The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses),
Protection of DNS using HAVAL
International Journal of Electronics and Computer Science Engineering 972 Available Online at www.ijecse.org ISSN- 2277-1956 Protection of DNS using HAVAL Raghvendra Vikram Singh 1, Deepak Chaudhary 2
DNS Domain Name System
Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.
DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)
DNSSEC: A Vision Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Outline DNS Today DNS Attacks DNSSEC: An Approach Countering DNS Attacks Conclusion 2 DNS Today DNS is
Introduction to DNS CHAPTER 5. In This Chapter
297 CHAPTER 5 Introduction to DNS Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. The following sections describe
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Public-Root Name Server Operational Requirements
Public-Root Name Server Operational Requirements Published January the 17 th, 2005 Status of this Document This document provides information to the Public-Root and Internet technical community. This document
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Networking Domain Name System
IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Understand Names Resolution
Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
ENTERPRISE LINUX NETWORKING SERVICES
ENTERPRISE LINUX NETWORKING SERVICES The is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
Coordinación. The background image of the cover is desgned by http://www.freepik.com/ GUIDE TO DNS SECURITY 2
Autor Antonio López Padilla Coordinación Daniel Fírvida Pereira This publication belongs to INTECO (Instituto Nacional de Tecnologías de la Comunicación) and is under an Attribution- NonCommercial 3.0
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Application Firewalls
Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed
GL275 - ENTERPRISE LINUX NETWORKING SERVICES
Length: 5 days The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts needed to implement these services securely,
CS3250 Distributed Systems
CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
Teldat Router. DNS Client
Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality
Network Security CS 192
Network Security CS 192 Firewall Rules Department of Computer Science George Washington University Jonathan Stanton 1 Client Web Auth paper Today s topics Firewall Rules Jonathan Stanton 2 Required: Additional
GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days
GL-275: Red Hat Linux Network Services Course Length: 5 days Course Description: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention
Networking Domain Name System
System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
Applications and Services. DNS (Domain Name System)
Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between
DNS. Computer Networks. Seminar 12
DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses
Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
DNS. Computer networks - Administration 1DV202. fredag 30 mars 12
DNS Computer networks - Administration 1DV202 DNS History Who needs DNS? The DNS namespace How DNS works The DNS database The BIND software Server and client configuration The history of DNS RFC 882 and
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
19 Domain Name System (DNS)
CHAPTER 9 Domain Name System (DNS) I n this chapter, we discuss the second application program, Domain Name System (DNS). DNS is a client/server application program used to help other application programs.
THE DOMAIN NAME SYSTEM DNS
Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace
Application Protocols in the TCP/IP Reference Model
Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management WWW Virtual Terminal Name Service File Transfer HTTP FTP Telnet SMTP DNS SNMP TFTP Internet protocols TCP UDP
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
I. Introduction - 1 -
Practical Domain Name System Security: A Survey of Common Hazards and Preventative Measures Nicholas A. Plante [email protected] College of Computer and Information Science Northeastern University, Boston
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary
Securing an Internet Name Server
Securing an Internet Name Server Cricket Liu [email protected] Securing an Internet Name Server Name servers exposed to the Internet are subject to a wide variety of attacks: Attacks against the name
Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System
Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication
An Introduction to the Domain Name System
An Introduction to the Domain Name System Olaf Kolkman [email protected] October 28, 2005 Stichting NLnet Labs This Presentation An introduction to the DNS Laymen level For non-technologists About protocol
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
DNS Session 4: Delegation and reverse DNS. Joe Abley AfNOG 2006 workshop
DNS Session 4: Delegation and reverse DNS Joe Abley AfNOG 2006 workshop How do you delegate a subdomain? In principle straightforward: just insert NS records for the subdomain, pointing at someone else's
Recommendations for dealing with fragmentation in DNS(SEC)
Recommendations for dealing with fragmentation in DNS(SEC) Abstract DNS response messages can sometimes be large enough to exceed the Maximum Transmission Unit (MTU) size for the underlying physical network.
Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour
Response Policy Zones for the Domain Name System (DNS ) By Paul Vixie, ISC (et.al.) 2010 World Tour Overview Motivation for DNS Response Policy Zones Relationship to DNS RBL (DNSBL) Constraints and Goals
Reverse DNS considerations for IPv6
Reverse DNS considerations for IPv6 Kostas Zorbadelos OTE David Freedman - ClaraNet Reverse DNS in IPv4 Every Internet-reachable host should have a name Make sure your PTR and A records match. For every
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
HTG XROADS NETWORKS. Network Appliance How To Guide: DNS Delegation. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: DNS Delegation How To Guide DNS Delegation (The Simple Redundancy Solution) The key requirement when performing DNS based network redundancy and load
CS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Exercise: Chapters 13, 15-18 18 1. [Kaufman] 13.1
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
Networking Domain Name System
System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information
Domain Name Server. Training Division National Informatics Centre New Delhi
Domain Name Server Training Division National Informatics Centre New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Possible Configurations
Proxies. Chapter 4. Network & Security Gildas Avoine
Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open
Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)
Date: 8/27/2012 Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS) Table of Contents 1 Overview...2 1.1 Other Resources...2 1.1.1 State of Minnesota Standards and Guidelines...2
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Domain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
Internetworking with TCP/IP Unit 10. Domain Name System
Unit 10 Domain Name System Structure 10.1 Introduction 10.2 Fully Qualified Domain Names (FQDNs) Generic Domains Country Domains 10.3 Mapping domain names to IP addresses 10.4 Mapping IP Addresses to Domain
Understanding DNS (the Domain Name System)
Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2
Domain Name System. Overview. Domain Name System. Domain Name System
Overview Domain Name System We look first at how the Domain Name System (DNS) is implemented and the role it plays in the Internet We examine some potential DNS vulnerabilities and in particular we consider
ENTERPRISE LINUX NETWORKING SERVICES
ENTERPRISE LINUX NETWORKING SERVICES COURSE DESCRIPTION: The GL275 is an expansive course that covers a wide range of network services useful to every organization. Special attention is paid to the concepts
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
The Domain Name System (DNS)
The Domain Name System (DNS) Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ 24-1 Overview Naming hierarchy hierarchy Name resolution Other information in name servers 24-2
Domain Name System (DNS)
Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION
KB259302 - Windows 2000 DNS Event Messages 1 Through 1614
Page 1 of 6 Knowledge Base Windows 2000 DNS Event Messages 1 Through 1614 PSS ID Number: 259302 Article Last Modified on 10/29/2003 The information in this article applies to: Microsoft Windows 2000 Server
Namecoin as alternative to the Domain Name System
Namecoin as alternative to the Domain Name System Xander Lammertink Author, UvA System and Network Engineering [email protected] Marco Davids Supervisor, SIDN Labs Abstract: This paper researches
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
