The Collateral Damage of Internet Censorship by DNS Injection
|
|
|
- Reynold Caldwell
- 9 years ago
- Views:
Transcription
1 The Collateral Damage of Internet Censorship by DNS Injection Anonymous presented by Philip Levis 1
2 Basic Summary Great Firewall of China injects DNS responses to restrict access to domain names This affects traffic originating outside China 26.4% of open resolvers affected.de is the most affected TLD (70% of open resolvers in kr) Explain how, where, and why this happens Present several possible solutions 2
3 Just To Be Clear This talk assumes that the Great Firewall of China is not designed to restrict Internet access to computers outside of China. Collateral damage means restricting access to computers outside China. 3
4 DNS Overview root. top level domain (TLD).com,.edu,.cn,.de Internet domain (authoritative) stanford.edu, baidu.cn client resolver
5 DNS Injection DNS server Censoring AS resolver client 5
6 DNS Injection DNS server Censoring AS DNS injector resolver client 6
7 DNS Injection DNS server DNS injector Censoring AS lemon IP resolver client 7
8 DNS Injection DNS server Censoring AS DNS injector Typically affects both inbound and outbound queries lemon IP resolver client 8
9 DNS Injection DNS server Censoring AS DNS injector Typically affects both inbound and outbound queries. lemon IP resolver client 9 Typically does not suppress correct response, just wins race to respond.
10 Methodology HoneyQueries to detect autonomous systems paths to whom see DNS injection TraceQueries to identify location of injectors on affected paths StepNXQueries to measure collateral damage of DNS injection 10
11 HoneyQuery HoneyQuery: DNS query to sensitive domains, sent to unresponsive IP Assumption: all observed DNS responses are from DNS injectors Send from a single vantage point (AS 40676) 14 million IPs that cover all /24 subnets Paths spread to discover all injecting autonomous systems Record IPs in responses: lemon IPs 11
12 Probed Domain Names Domain Category Search Engine Social Network Social Network Streaming Media Portal Web Hosting Pornography Site Ranking Portal Reference 12
13 Blacklisted Domains Domain Category Search Engine Social Network Social Network Streaming Media Portal Web Hosting Pornography Site Ranking Portal Reference 13
14 HoneyQuery Results 28 lemon IPs found Use later to detect injected responses 388,988 (2.7%) of HoneyQueries responded Use to generate poisoned path list Destination Count Percentage CN 388, % CA % US % HK % IN % Top 5 of 16 regions Why are paths to IP addresses outside of China experiencing DNS injection? 14
15 TraceQuery For each IP address in the poisoned path list, send a DNS query to a blacklisted domain with increasing TTL Queries which reach an injector will trigger a response Mark IP address and autonomous system of router for TTL that triggers response Sometimes queries trigger multiple responses, from multiple injectors 15
16 Example AS1 AS2 AS3 AS4 16
17 Example AS1 AS2 AS3 AS4 17
18 Example lemon IP AS1 AS2 AS3 AS4 18
19 Example lemon IP AS1 AS2 AS3 AS4 19
20 Example lemon IP, lemon IP AS1 AS2 AS3 AS4 20
21 Example lemon IP, lemon IP, good IP AS1 AS2 AS3 AS4 21
22 Example lemon IP, lemon IP, good IP AS1 AS2 Injector A AS3 Injector B AS4 22
23 TraceQuery Results Found 3,120 router IP addresses associated with DNS injection All 3,120 IP addresses belong to 39 Chinese autonomous systems AS Name AS Number IPs Chinanet CNCGroup China169 Backbone China Telecom (Group) CHINA RAILWAY Internet (CRNEt) China Netcom Corp Top 5 ASes by router IP count How much does this affect the Internet? 23
24 Methodology Tested 43,842 open DNS resolvers in 173 countries outside of China List from probing DNS servers of Alexa 1M top websites Supplemented by lists from researchers Query for blacklisted domain from vantage point, check if response is lemon IP Test blacklisted name for all 312 TLDs Also, check against TCP-based DNS queries (injectors do not target DNS queries over TCP) 24
25 StepNX Query To identify where injection occurs, inject random strings into domain name Injectors use very liberal pattern matching Generate invalid names, expect NXDOMAIN response path to root server path to TLD server Repeat 200 times to try different servers/paths DNS Level Affected Resolvers Affected Rate Root % TLD % Authoritative % Which resolution step sees injection 25
26 StepNX Query To identify where injection occurs, inject random strings into domain name Injectors use very liberal pattern matching Generate invalid names, expect NXDOMAIN response path to root server path to TLD server Repeat 200 times to try different servers/paths DNS Level Affected Resolvers Affected Rate Root % TLD % Authoritative % Which resolution step sees injection 26
27 Who s Affected? 3 TLDs affected almost completely (99.53%) cn, xn--fiqs8s, xn--fiqz9s Expected: domains from within Great Firewall of China 11,573 (26.4%) of resolvers affected for one or more of 16 unexpected TLDs 27 TLD Affected Resolvers de 8192 xn--3e0b707e 5641 kr 4842 kp 384 co 90 travel 90 pl 90 no 90 iq 90 hk 90 fi 90 uk 90 xn--j6w193g 90 jp 90 nz 90 ca unexpected TLDs affected by DNS injection on path from an open resolver
28 Whose Resolvers? Open resolvers in 109 regions affected Region Affected Resolvers Percentage Iran % Myanmar % Korea % Hong Kong % Taiwan % India % Top 6 regions by affected open resolver percentage 28
29 Details:.de Region Resolvers Affected kr 76% my 66% hk 54% ar 44% il 42% ir 36% tw 36% bg 31% jp 28% ro 25% 10 regions whose open resolvers are most greatly affected for.de queries 29
30 nic.de, ) goes through a censoring AS (AS7497) in China, which is the cause of the collateral damage on this resolver. We show the AS path in Figure 5: 39737, 6939, 10026, 7497, 24151, Example.de Injection AS3549 (GBLX Global Crossing, US) AS3356 (LEVEL3,US) AS 1280 (ISC, US) AS4847 CNIX-AP AS9700 KRNIC-AS- KR AS4635 HKIX- RS1 HK AS4641 ASN- CUHKNET HK AS CNNIC CRITICAL-AP (CN) AS8763 DENIC- AS DENIC eg DE AS Pacnet Global (HK) AS7497 CSTNET-AS- AP(CN) AS 6939 Hurricane Electric (US) AS Net Vision Telcom SRL (RO) ASes in China... AS CNNIC-AP AS EDNSKR1 NIDA KR AS DENIC eg (DE) 30 Figure 5: Topology of ASes neighboring CNNIC
31 nic.de, ) goes through a censoring AS (AS7497) in China, which is the cause of the collateral damage on this resolver. We show the AS path in Figure 5: 39737, 6939, 10026, 7497, 24151, Example.de Injection AS3549 (GBLX Global Crossing, US) AS3356 (LEVEL3,US) AS 1280 (ISC, US) AS4847 CNIX-AP AS9700 KRNIC-AS- KR AS4635 HKIX- RS1 HK AS4641 ASN- CUHKNET HK AS CNNIC CRITICAL-AP (CN) AS8763 DENIC- AS DENIC eg DE AS Pacnet Global (HK) AS7497 CSTNET-AS- AP(CN) AS 6939 Hurricane Electric (US) AS Net Vision Telcom SRL (RO) ASes in China... AS CNNIC-AP AS EDNSKR1 NIDA KR AS DENIC eg (DE) 31 Figure 5: Topology of ASes neighboring CNNIC
32 nic.de, ) goes through a censoring AS (AS7497) in China, which is the cause of the collateral damage on this resolver. We show the AS path in Figure 5: 39737, 6939, 10026, 7497, 24151, Example.de Injection AS3549 (GBLX Global Crossing, US) AS3356 (LEVEL3,US) AS 1280 (ISC, US) AS4847 CNIX-AP AS9700 KRNIC-AS- KR AS4635 HKIX- RS1 HK AS4641 ASN- CUHKNET HK AS CNNIC CRITICAL-AP (CN) AS8763 DENIC- AS DENIC eg DE AS Pacnet Global (HK) AS7497 CSTNET-AS- AP(CN) AS 6939 Hurricane Electric (US) AS Net Vision Telcom SRL (RO) ASes in China... AS CNNIC-AP AS EDNSKR1 NIDA KR AS DENIC eg (DE) 32 Figure 5: Topology of ASes neighboring CNNIC
33 Solutions DNS injectors could filter out transit queries Autonomous systems could avoid transit through injecting neighbors Particularly, TLD operators could monitor peering paths Security extensions for DNS (DNSSEC) prevent injection DNSSEC has signed responses Resolvers would reject injected responses, accept slower ones from authoritative servers.de and.kr both support DNSSEC 33
34 Conclusion Great Firewall of China s DNS injection is affecting lookups originating outside China Caused by queries traversing Chinese ASes Effect is greatest at routes between resolvers and TLDs Suggestions on preventing collateral damage Some recent changes... 34
35 Questions please contact Anonymous
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Anonymous [email protected] ABSTRACT Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access
The Collateral Damage of Internet Censorship by DNS Injection
The Collateral Damage of Internet Censorship by DNS Injection Sparks Neo Tank Smith Dozer ABSTRACT Some ISPs and governments (most notably the Great Firewall of China) use DNS injection to block access
DNS Tampering and Root Servers
DNS Tampering and Root Servers AMS-IX: 24 Nov 2010 Renesys Corporation Martin A. Brown Doug Madory Alin Popescu Earl Zmijewski Overview Brief overview of Domain Name System (DNS) Demonstrating Great Firewall
The curse of the Open Recursor. Tom Paseka Network Engineer [email protected]
The curse of the Open Recursor Tom Paseka Network Engineer [email protected] Recursors Why? Exist to aggregate and cache queries Not every computer run its own recursive resolver. ISPs, Large Enterprises
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <[email protected]> Duisburg, June 19, 2015
The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship
Towards a Comprehensive Picture of the Great Firewall s DNS Censorship Anonymous [email protected] Abstract China s Great Firewall passively inspects network traffic and disrupts unwanted communication
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
The Great DNS Wall of China
The Great DNS Wall of China Graham Lowe, Patrick Winters, Michael L. Marcus December 21, 2007 1 INTRODUCTION Repressive governments censor websites that they deem socially controversial. Subjects that
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
The Survey Report on DNS Cache & Recursive Service in China Mainland
The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center Motivation Improve the traditional recursive
HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
DNS traffic analysis -- Issues of IPv6 and CDN --
DNS traffic analysis -- Issues of IPv6 and CDN -- Kazunori Fujiwara ^, Akira Sato, Kenichi Yoshida University of Tsukuba ^Japan Registry Services Co., Ltd (JPRS) July 29, 2012 IEPG meeting at Vancouver
Detecting Search Lists in Authoritative DNS
Detecting Search Lists in Authoritative DNS Andrew Simpson March 10 th, 2014 Summary Early research into name collisions has postulated that search list interaction drives some portion of the DNS requests
Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
Harness Your Internet Activity!
Harness Your Internet Activity Random Subdomain Attacks Plaguing the Internet Agenda Brief Intro Covered at last OARC Attack overview Latest data Progress on open dns proxies in home gateways Impact of
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
EECS 489 Winter 2010 Midterm Exam
EECS 489 Winter 2010 Midterm Exam Name: This is an open-book, open-resources exam. Explain or show your work for each question. Your grade will be severely deducted if you don t show your work, even if
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance
Lab 12.1.7 Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team
Internet Measurement Research
Internet Measurement Research Matthäus Wander Kassel, October 1, 2013 Overview How to get measurement data? Research projects Case studies of past projects Ideas and inspiration
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas
Internet (IPv4) Topology Mapping Kamil Sarac ([email protected]) Department of Computer Science The University of Texas at Dallas Internet topology measurement/mapping Need for Internet topology measurement
Multihoming: An Overview
Multihoming: An Overview & a brief introduction to GSE(8+8) Lixia Zhang IAB BOF on IPv6 Multihoming RIPE 2006 Customer network 1 1.1.16.0/20 Single Home Global Routing Table...... 1.1.0.0/16 2.2.0.0/16.......
Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.
RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional
Application Note. SIP Domain Management
Application Note SIP Domain Management 28 March 2008 Table of Contents 1 WHAT IS A SIP DOMAIN?... 1 2 LOCAL SIP DOMAIN... 2 3 OTHER SIP DOMAIN... 3 4 DNS CONSIDERATIONS... 4 5 USING A PUBLIC DNS... 5 6
How Your Computer Accesses the Internet through your Wi-Fi for Boats Router
How Your Computer Accesses the Internet through your Wi-Fi for Boats Router By default, a router blocks any inbound traffic from the Internet to your computers except for replies to your outbound traffic.
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide
Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
LinkProof DNS Quick Start Guide
LinkProof DNS Quick Start Guide TABLE OF CONTENTS 1 INTRODUCTION...3 2 SIMPLE SCENARIO SINGLE LINKPROOF WITH EXTERNAL SOA...3 3 MODIFYING DNS ON THE EXTERNAL SOA...4 3.1 REFERRING THE A RECORD RESOLUTION
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
DNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days)
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services (5 days) Course 2277: Five days; Instructor-led Introduction This five-day, instructor-led
Click on Start Control Panel Windows Firewall. This will open the main Windows Firewall configuration window.
Configuring Windows Firewall on Windows 7 CheckPoint server to allow SQL traffic for database connections and to allow HTTP traffic for Thin Client connections. Description This document provides step
Internet Performance Impacts of Canadian Content Hosting
Internet Performance Impacts of Canadian Content Hosting Jim Cowie, Chief Scientist DNS-OARC 2015 Montreal, October 2015 Global Content, Local Hosting Content localization is a form of international trade
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
APNIC elearning: BGP Basics. Contact: [email protected]. erou03_v1.0
erou03_v1.0 APNIC elearning: BGP Basics Contact: [email protected] Overview What is BGP? BGP Features Path Vector Routing Protocol Peering and Transit BGP General Operation BGP Terminology BGP Attributes
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
allow all such packets? While outgoing communications request information from a
FIREWALL RULES Firewalls operate by examining a data packet and performing a comparison with some predetermined logical rules. The logic is based on a set of guidelines programmed in by a firewall administrator,
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
My Services Online Service Support. User Guide for DNS and NTP services
My Services Online Service Support User Guide for DNS and NTP services Table of Contents 1 MY SERVICES... 3 2 ACCESSING MY SERVICES VIA THE INTERNET... 3 2.1 Logging into My Services... 3 2.2 My Services
INTERNET DOMAIN NAME SYSTEM
INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
Chapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
SIP, Security and Session Border Controllers
SIP, Security and Session Border Controllers SIP, Security and Session Border Controllers Executive Summary Rolling out a public SIP service brings with it several security issues. Both users and Service
Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015
Monitoring the DNS Gustavo Lozano Event Name XX XXXX 2015 Agenda 1 2 3 Components of the DNS Monitoring gtlds Monitoring other components of the DNS 4 5 Monitoring system Conclusion 2 Components of the
Managing (VoIP) Applications DYSWIS
Managing (VoIP) Applications DYSWIS Henning Schulzrinne Dept. of Computer Science Columbia University July 2005 DYSWIS 1 Overview User experience for VoIP still inferior Existing network management doesn
WPAD TECHNOLOGY WEAKNESSES. Sergey Rublev Expert in information security, "Positive Technologies" ([email protected])
WPAD TECHNOLOGY WEAKNESSES Sergey Rublev Expert in information security, "Positive Technologies" ([email protected]) MOSCOW 2009 CONTENTS 1 INTRODUCTION... 3 2 WPAD REVIEW... 4 2.1 PROXY AUTO CONFIGURATION
Ignoring the Great Firewall of China
An Overview of Ignoring the Great Firewall of China By: Matt Landau Original Paper: Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson University of Cambridge,
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
LAN TCP/IP and DHCP Setup
CHAPTER 2 LAN TCP/IP and DHCP Setup 2.1 Introduction In this chapter, we will explain in more detail the LAN TCP/IP and DHCP Setup. 2.2 LAN IP Network Configuration In the Vigor 2900 router, there are
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.
CS 355 Computer Networking Wei Lu, Ph.D., P.Eng. Chapter 2: Application Layer Overview: Principles of network applications? Introduction to Wireshark Web and HTTP FTP Electronic Mail: SMTP, POP3, IMAP
nexvortex Setup Guide
nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex
Preventing your Network from Being Abused by Spammers
Preventing your Network from Being Abused by Spammers Marcelo H. P. C. Chaves [email protected] CERT.br Computer Emergency Response Team Brazil NIC.br - Network Information Center Brazil CGI.br - Brazilian Internet
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
Source-Connect Network Configuration Last updated May 2009
Source-Connect Network Configuration Last updated May 2009 For further support: Chicago: +1 312 706 5555 London: +44 20 7193 3700 [email protected] This document is designed to assist IT/Network
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Peering in Hong Kong. Che-Hoo CHENG CUHK/HKIX www.hkix.net
Peering in Hong Kong Che-Hoo CHENG CUHK/HKIX www.hkix.net How Internet Operates in simple terms Internet is composed of networks of ISPs and users User networks connect to ISPs Small ISPs connect to large
LISP Functional Overview
CHAPTER 2 This document assumes that the reader has prior knowledge of LISP and its network components. For detailed information on LISP components, their roles, operation and configuration, refer to http://www.cisco.com/go/lisp
DNS Record Injection Vulnerabilities in Home Routers
DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp, Tom Callahan, Michael Rabinovich, Mark Allman Case Western Reserve University International Computer Science Institute 1 Attacks targeting
Internet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide
I nt er netload Bal anc i nggui de Peplink Balance Internet Load Balancing Solution Guide http://www.peplink.com Copyright 2010 Peplink Internet Load Balancing Instant Improvement to Your Network Introduction
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface
How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway
Email Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <[email protected]>, <[email protected]>
BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely
Lesson 5-3: Border Gateway Protocol
Unit 5: Intradomain and Interdomain Protocols Lesson 5-3: Gateway Protocol At a Glance The Gateway Protocol (BGP) is an interdomain routing protocol used in TCP/IP internetworks. BGP was created to allow
The Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
Installing Policy Patrol on a separate machine
Policy Patrol 3.0 technical documentation July 23, 2004 Installing Policy Patrol on a separate machine If you have Microsoft Exchange Server 2000 or 2003 it is recommended to install Policy Patrol on the
Creating a VPN with overlapping subnets
Creating a VPN with overlapping subnets This recipe describes how to construct a VPN connection between two networks with overlapping IP addresses in such a way that traffic will be directed to the correct
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition August 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
Citrix NetScaler Global Server Load Balancing Primer:
Citrix NetScaler Global Server Load Balancing Primer: Theory and Implementation www.citrix.com Background...3 DNS Overview...3 How DNS level GSLB works...4 Basic NetScaler GSLB Configuration...8 Accepting
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
