Domain Name System. Overview. Domain Name System. Domain Name System

Size: px
Start display at page:

Download "Domain Name System. Overview. Domain Name System. Domain Name System"

Transcription

1 Overview Domain Name System We look first at how the Domain Name System (DNS) is implemented and the role it plays in the Internet We examine some potential DNS vulnerabilities and in particular we consider a selection of the DNS cache-poisoning techniques available to attackers For more information on DNS see Chapter 8 of Tanenbaum s Computer Networks, 4th edition Layers below the application layer support the network applications (e.g. web browsers) with which users are familiar However, applications also rely on support protocols in the application layer and one such support protocol is DNS, the protocol responsible for naming across the Internet A flexible mapping from host names to IP addresses is required for two reasons: 1. IP addresses are difficult to remember 2. Sending to dobrien@[ ] ties a host (here an server) to a particular IP address (which we might wish to subsequently change) In ARPANET the mapping was stored in a single file called hosts.txt which every host would download nightly As the Internet expanded a distributed DNS was developed Copyright c 2016, Darragh O Brien, Dublin City University 1 Copyright c 2016, Darragh O Brien, Dublin City University 2 Domain Name System Domain Name System DNS is a hierarchical naming scheme backed by a distributed database and is used for mapping host names to IP addresses Typically, to use DNS a local resolver is invoked (by gethostbyname) and passes to a local DNS server (over UDP to port 53) the name of the host whose IP address is sought The local DNS server (with the help of other DNS servers) maps the host name to an IP address and returns it to the resolver which hands it to the application A hierarchical approach simplifies managing a large and constantly changing set of mappings Top level domains come in several types: countries (.ie), generics (.com), sponsored (.aero) and infrastructure (.arpa) The number of generics is expanding and is expected to exceed 1300 over the next few years Generic Countries int com edu gov mil org net jp us nl... sun yale acm ieee ac co oce vu eng cs eng jack jill keio nec cs ai linda cs csl flits fluit robot pc24 Copyright c 2016, Darragh O Brien, Dublin City University 3 Copyright c 2016, Darragh O Brien, Dublin City University 4

2 Domain Name System Domains and Zones A domain is a node in the hierarchical DNS namespace tree and is identified by a domain name e.g. dcu.ie A fully qualified domain name is a leaf in the DNS namespace and identifies a particular device on the Internet e.g. Each domain must be registered only with the domain that dominates it (perhaps requiring the payment of an annual fee) A zone is a region of the namespace whose administration has been delegated to a particular authority by its parent administrator (a zone contains one or more domains) The dcu.ie zone s administrator has delegated the administration of the computing.dcu.ie subdomain to technical staff in the School of Computing (who could (but do not) divide that domain into further administrative zones) Generic Countries int com edu gov mil org net jp us nl... sun yale acm ieee ac co oce vu eng cs eng jack jill keio nec cs ai linda cs csl flits fluit robot pc24 Copyright c 2016, Darragh O Brien, Dublin City University 5 Copyright c 2016, Darragh O Brien, Dublin City University 6 Domain Name System Domain Name System From the diagram we see that Yale has a name server that handles the yale.edu and eng.yale.edu domains but not the cs.yale.edu domain which is in a separate zone that has its own name server A zone file contains all of the resource records associated with that zone and it is these records that make up the DNS database It is resource records that are served by name servers to resolvers inquiring about hosts in a zone Most resource records are a simple IP address hostname mapping but other kinds of resource records also exist The different kinds of resource records that may be associated with a particular zone are given below Copyright c 2016, Darragh O Brien, Dublin City University 7 Copyright c 2016, Darragh O Brien, Dublin City University 8

3 Domain Name System Domain Name System An SOA record provides administrative information about the zone e.g. the name of the primary authoritative name server for this zone and the address of the zone s administrator An A record holds the IPv4 address of a host An AAAA record holds the IPv6 address of a host An MX record provides the name of a mail server for the zone (a zone may have several, each with an associated priority) An NS record associates a name server with the zone (a zone may have several, each with an associated priority) A CNAME record allows aliases to be created so one host can go by several names A PTR record is used for reverse lookups A HINFO record associates particular hardware and/or operating system information with a particular host An SRV record identifies the location of services A TXT record allows arbitrary zone information to be recorded Every resource record has an associated timeout (specified in seconds) which determines for how long it should be cached by requesting clients and servers before being discarded Some of the resource records associated with the cs.vul.nl zone are given below Copyright c 2016, Darragh O Brien, Dublin City University 9 Copyright c 2016, Darragh O Brien, Dublin City University 10 Name Servers Normally a zone has a primary name server that is configured by an administrator and one or more secondary servers that get their information from the primary server Secondary servers are synchronised with the primary server by periodically performing a zone transfer i.e. downloading the definitive zone file from the primary server For reliability some name servers may be located outside their zone A zone knows the name servers for the zones immediately below it An authoritative record is one returned from a zone by its name server and is always correct A non-authoritative record is a cached record returned by an intermediary server and not the definitive name server for a zone Whether an answer is authoritative or non-authoritative is indicated in the results returned to a resolver Copyright c 2016, Darragh O Brien, Dublin City University 11 Copyright c 2016, Darragh O Brien, Dublin City University 12

4 Start Of Authority Start Of Authority The SOA record contains the following fields: Serial number: indicates the version of the zone file and is incremented whenever the zone file is modified Refresh interval: determines how often secondary name servers will check for updates to the zone file Retry interval: determines how long secondary name servers should wait before attempting again a failed zone transfer Expiry time: determines how long secondary name servers will continue to use outdated zone files when unable to perform a zone transfer TTL: determines for how long negative results (e.g. domain does not exist) will be cached by this server $ dig +multiline soa ;; ANSWER SECTION: computing.dcu.ie. 600 IN SOA Mailhost.computing.dcu.ie. McGorman.computing.dcu.ie. ( ; serial 1800 ; refresh (30 minutes) 600 ; retry (10 minutes) ; expire (4 weeks 2 days) 3600 ; minimum (1 hour) ) Copyright c 2016, Darragh O Brien, Dublin City University 13 Copyright c 2016, Darragh O Brien, Dublin City University 14 Name Servers Recursive and Iterative Queries A resolver s query can be recursive or iterative Recursive queries travel the DNS hierarchy until resolved when the answer is returned to the resolver With each iterative query only the next name server in the chain is returned The various stages of a recursive query (assuming no cached records along the way) are illustrated here: Originator flits.cs.vu.nl 1 8 VU CS name server 2 Edu name server Yale name server Yale CS name server cs.vu.nl edu-server.net yale.edu cs.yale.edu 7 The various stages of the following iterative query follow $ dig +trace Copyright c 2016, Darragh O Brien, Dublin City University 15 Copyright c 2016, Darragh O Brien, Dublin City University 16

5 Lookup Root (.) Servers Lookup.ie Servers ; <<>> DiG P2 <<>> +trace ;; global options: +cmd IN NS j.root-servers.net IN NS k.root-servers.net IN NS l.root-servers.net IN NS i.root-servers.net IN NS d.root-servers.net IN NS c.root-servers.net IN NS b.root-servers.net IN NS m.root-servers.net IN NS g.root-servers.net IN NS e.root-servers.net IN NS a.root-servers.net IN NS h.root-servers.net IN NS f.root-servers.net. ;; Received 699 bytes from #53 in 33 ms ie IN NS a.iedr.ie. ie IN NS b.iedr.ie. ie IN NS c.iedr.ie. ie IN NS d.iedr.ie. ie IN NS ns3.ns.esat.net. ie IN NS gns1.domainregistry.ie. ie IN NS gns2.domainregistry.ie. ie IN NS ns-ie.nic.fr. ;; Received 611 bytes from l.root-servers.net in 78 ms Copyright c 2016, Darragh O Brien, Dublin City University 17 Copyright c 2016, Darragh O Brien, Dublin City University 18 Lookup rte.ie Servers Lookup IP Address rte.ie IN NS ns-1264.awsdns-30.org. rte.ie IN NS ns-448.awsdns-56.com. rte.ie IN NS ns-872.awsdns-45.net. rte.ie IN NS ns-1539.awsdns-00.co.uk. ;; Received 179 bytes from gns1.domainregistry.ie in 211 ms IN A ;; Received 195 bytes from ns-872.awsdns-45.net in 2 ms Copyright c 2016, Darragh O Brien, Dublin City University 19 Copyright c 2016, Darragh O Brien, Dublin City University 20

6 DNS Cache Poisoning DNS Cache Poisoning DNS cache poisoning is a technique used to trick clients into contacting a malicious rather than the intended system An attacker could attempt to mount a man-in-the-middle attack (without having to sniff the victim s traffic) as follows: 1. Submit a DNS query for to the target DNS server 2. Forge the reply thereby injecting a bogus IP address into the DNS server s cache (both request/response are over UDP and so are easily forged) 3. When the real reply arrives it will be dropped as unsolicited traffic 4. When Alice subsequently uses the poisoned DNS server to resolves she ends up visiting What can be done to mitigate this kind of attack? Alice 1 2 DNS server 1. Give me Bob's IP address (Bob's IP address) 3. GET index.html 4. Bob's home page 3 4 (a) Bob's Web server ( ) Alice 1 2 Cracked DNS server 3 4 Trudy's Web server ( ) 1. Give me Bob's IP address (Trudy's IP address) 3. GET index.html 4. Trudy's fake of Bob's home page (b) Copyright c 2016, Darragh O Brien, Dublin City University 21 Copyright c 2016, Darragh O Brien, Dublin City University 22 DNS Cache Poisoning DNS Cache Poisoning To prevent the latter attack and to associate a reply with a particular DNS request, each DNS request carries a sequence number To trick the target DNS server the attacker must guess the sequence number the DNS server used in its request for One approach to guessing the sequence number is for the attacker to register her own domain and query it through the target DNS server When the query arrives she notes the sequence number it contains and immediately queries the target DNS server for Into her spoofed replies the attacker places sequence numbers in the vicinity of the one just received and one is likely to match Trudy DNS server for com Alice's ISP's cache 1. Look up foobar.trudy-the-intruder.com (to force it into the ISP's cache) 2. Look up (to get the ISP's next sequence number) 3. Request for (Carrying the ISP's next sequence number, n) 4. Quick like a bunny, look up bob.com (to force the ISP to query the com server in step 5) 5. Legitimate query for bob.com with seq = n+1 6. Trudy's forged answer: Bob is , seq = n+1 7. Real answer (rejected, too late) What can be done to mitigate this kind of attack? Copyright c 2016, Darragh O Brien, Dublin City University 23 Copyright c 2016, Darragh O Brien, Dublin City University 24

7 DNS Cache Poisoning DNS Cache Poisoning To prevent the latter attack DNS servers use a randomised sequence number in each DNS query thus making the attacker s task more difficult If the spoofed reply does not arrive in time with a correctly guessed sequence number it will be dropped and the real IP address (when it arrives) of is cached Before attempting the attack again the attacker must wait until the cached entry for expires In July 2008 Dan Kaminsky released details of an alternative (and highly effective) DNS poisoning approach When a name server cannot answer a query the ANSWER section of its DNS reply is blank but the AUTHORITY and ADDITIONAL INFO sections indicate to whom the requester should now direct the query The DNS server is basically saying: I don t know the answer, ask this name server... Kaminsky s approach does not forge the A resource record for but instead forges AUTHORITY and ADDITIONAL INFO records for the bob.com domain Copyright c 2016, Darragh O Brien, Dublin City University 25 Copyright c 2016, Darragh O Brien, Dublin City University 26 DNS Cache Poisoning Summary The attacker continuously queries at the target DNS server for non-existent machines in the bob.com domain and spoofs the reply I don t know that machine s IP address but X does (where X is the IP address of the attacker s DNS server) The crucial difference to earlier poisoning techniques is that there is no time-to-live constraint as each request for a randomly generated machine in the target domain generates a new query from the target DNS machine Soon (it can take as little time as 10 seconds) the spoofed authority and additional info records are accepted by the target DNS server and thereafter every query for a machine in bob.com, including is answered by evil.net We looked at how DNS works We examined some of the DNS cache poisoning techniques available to attackers Secure DNS (DNSsec), which solves the spoofing problem through authenticating DNS servers is gradually gaining more widespread adoption Copyright c 2016, Darragh O Brien, Dublin City University 27 Copyright c 2016, Darragh O Brien, Dublin City University 28

8 Overview Web and Newsgroup Searches The first step in performing a network security assessment is to gather all publicly available relevant information on the target network s organisation and topology Here we look at some of the techniques and tools involved in performing Internet host and network enumeration For more information see Chapter 3 of McNab s Network Security Assessment Simple Google searches may reveal security-relevant information e.g. publicly accessible web server directory listings A directory listing is an automatically-generated web page that lists files and directories on a web server Such listings are a threat to confidentiality and allow the web server s file system to be navigated by simply clicking on file and directory names (effectively turning it into an FTP server) The following Google search finds directory listings by locating pages in the DCU domain that contain the string parent directory and have the string index of in their title: intitle:index.of "parent directory" site:.dcu.ie Copyright c 2016, Darragh O Brien, Dublin City University 29 Copyright c 2016, Darragh O Brien, Dublin City University 30 Web and Newsgroup Searches Domain and IP WHOIS Registrars We can also use Google to search for specific filetypes For example, the following Google search will locate all publicly accessible Excel spreadsheets in the DCU domain: filetype:xls site:.dcu.ie WHOIS registrars can provide useful information on domains: Geographical locations and postal addresses Administrative contact details Assigned network blocks Name server details The whois utility can be used to query WHOIS registrars Alternatively, web-based whois queries can be submitted through web sites such as Copyright c 2016, Darragh O Brien, Dublin City University 31 Copyright c 2016, Darragh O Brien, Dublin City University 32

9 Border Gateway Protocol Autonomous System 1213 The Border Gateway Protocol (BGP) uses Autonomous System (AS) numbers to define collections of IP networks and routers that present a common routing policy to the Internet We can use whois queries to find the AS number associated with a given network We can then use web sites such as to reveal all network blocks associated with that AS number This all helps in building up a picture of the target network whois reveals DCU has been assigned /16 whois reveals /16 is part of AS reveals AS1213 is controlled by Ireland s HEA (Higher Education Authority) AS1213 is composed of eleven network blocks AS1213 comprises 1.7 million IP addresses One network block is reserved for Broadband for Schools Ten network blocks are class B networks assigned to various third level institutions in Ireland Copyright c 2016, Darragh O Brien, Dublin City University 33 Copyright c 2016, Darragh O Brien, Dublin City University 34 DNS Querying DNS Querying Utilities such as nslookup, host and dig are used to issue general DNS queries to DNS servers Other specific tools are available to perform reverse DNS sweeping and forward DNS grinding against DNS servers Poorly configured DNS servers may allow the enumeration of: 1. Host operating system and hardware platform information in the form of Host Information (HINFO) resource records 2. Names and IP addresses of internal or non-public hosts and networks For each new network block uncovered by DNS querying a new round of WHOIS queries and web searches can be instigated The nslookup utility can be used in an interactive fashion to identify the IP address and hostname of a domain s mail server MX record details are useful to attackers because the mail servers they identify often reside along the corporate network boundary between the Internet and the internal network IP addresses listed in DNS records can be fed into whois queries to further enhance an overall picture of the network Copyright c 2016, Darragh O Brien, Dublin City University 35 Copyright c 2016, Darragh O Brien, Dublin City University 36

10 DNS Querying DNS Querying $ nslookup > server ns1.tcd.ie Default server: ns1.tcd.ie Address: #53 > set querytype=ns > dcu.ie Server: ns1.tcd.ie Address: #53 $ nslookup > server ns1-ext.dcu.ie Default server: ns1-ext.dcu.ie Address: #53 > set querytype=mx > computing.dcu.ie Server: ns1-ext.dcu.ie Address: #53 dcu.ie dcu.ie dcu.ie dcu.ie dcu.ie nameserver = ns5.univie.ac.at. nameserver = ns1-ext.dcu.ie. nameserver = ns1.tcd.ie. nameserver = auth-ns1.ucd.ie. nameserver = ns2-ext.dcu.ie. mail exchanger = 100 bodkin.nuigalway.ie. mail exchanger = 10 mailhost.computing.dcu.ie. mail exchanger = 120 mxbackup.esat.net. mail exchanger = 50 scan4.dcu.ie. Copyright c 2016, Darragh O Brien, Dublin City University 37 Copyright c 2016, Darragh O Brien, Dublin City University 38 DNS Zone Transfers DNS Zone Transfers The handiest way of collecting all information about machines within a DNS domain is to request a zone transfer The zone file contains all the information a DNS server knows about a particular domain As mentioned previously, a domain is typically served by a primary and one or more secondary name servers with the secondary servers kept in sync with the primary server by periodically requesting a zone transfer All of host, dig and nslookup can be used to request a zone transfer (i.e. an AXFR record query) from a DNS server: $ host -l ucia.gov relay2.ucia.gov $ ucia.gov axfr... alpamayo.computing.dcu.ie. CNAME mail.computing.dcu.ie. ampato.computing.dcu.ie. A aoraki.computing.dcu.ie. A apollo.computing.dcu.ie. A arizona.computing.dcu.ie. A atcdf.computing.dcu.ie. A babel.computing.dcu.ie. A babylon5.computing.dcu.ie. A berlin.computing.dcu.ie. A zag.computing.dcu.ie. HINFO "PC" "NT"... Copyright c 2016, Darragh O Brien, Dublin City University 39 Copyright c 2016, Darragh O Brien, Dublin City University 40

11 Forward DNS Grinding Reverse DNS Sweeping Where zone transfers are unavailable forward hostname grinding may be useful in enumerating valid DNS address records One tool that automates the process and supports dictionary based hostname grinding is txdns txdns simply guesses likely hostnames and queries the target DNS server for records on those hosts Below txdns is used to successfully query likely mail server hostnames in the bankofengland.co.uk domain: $ txdns -f mail-dict.txt bankofengland.co.uk mail.bankofengland.co.uk mail2.bankofengland.co.uk mailhost.bankofengland.co.uk After uncovering the network blocks assigned to the target organisation a reverse DNS sweep can help enumerate specific network hosts that may not be publicly accessible but still have DNS hostnames associated with them Although very simple (they basically repeatedly call gethostbyaddr) such tools can be surprisingly effective This technique can identify particular departments and machines (machines are often named after their owners), information that may be useful to an attacker Departments may have associated subdomains with name servers that can be queried for zone transfers, etc. Copyright c 2016, Darragh O Brien, Dublin City University 41 Copyright c 2016, Darragh O Brien, Dublin City University 42 Web Server Crawling Enumeration Countermeasures Google and Netcraft can be queried to build a list of accessible web servers in the target organisation Such web servers can then be crawled and mirrored using tools such as Wikto, HTTrack and wget Once web servers contents have been locally mirrored their contents can be more effectively scanned and analysed in the hunt for possibly security-sensitive information Configure web servers to disable indexing of directories that do not contain an index.html file Use generic references in WHOIS database entries (e.g. refer to the IT helpdesk rather than to a named individual) Configure all name servers to allow zone transfers only between authorised primary and secondary DNS servers Remove unnecessary information (e.g. HINFO records) from zone files Copyright c 2016, Darragh O Brien, Dublin City University 43 Copyright c 2016, Darragh O Brien, Dublin City University 44

12 Enumeration Countermeasures Summary Ensure that non-public IP addresses are not mapped to hostnames within the zone files of publicly accessible DNS servers (thus reducing the impact of both reverse DNS sweeping and forward DNS grinding) (The practice of separating internal/external DNS zones is known as split-horizon DNS) Configure SMTP servers to ignore messages to non-existent recipients (or to send responses that reveal neither details of the internal network organisation nor software versions) Here we looked at some of the techniques and tools available when performing Internet host and network enumeration Once we have formed a picture of the target organisation s network we can go on to scan the network for accessible services using tools such as nmap We next attempt to work which software is providing those services (again nmap can help us out) We then consult a vulnerability database to check if any running software contains exploitable vulnerabilities We finally use an exploit framework such as Metasploit to exploit the identified vulnerability in the software and take over the host Copyright c 2016, Darragh O Brien, Dublin City University 45 Copyright c 2016, Darragh O Brien, Dublin City University 46

DNS : Domain Name System

DNS : Domain Name System 1/30 DNS : Domain Name System Surasak Sanguanpong nguan@.ac.th http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why

More information

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014.

Domain Name System E-mail WWW. Application Layer. Mahalingam Ramkumar Mississippi State University, MS. September 15, 2014. Application Layer Mahalingam Mississippi State University, MS September 15, 2014 Outline 1 DNS Records DNS Components 2 Message Transfer Fetching Emails 3 Applications We will focus on 3 applications DNS

More information

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all

More information

CS3250 Distributed Systems

CS3250 Distributed Systems CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted

More information

DNS Domain Name System

DNS Domain Name System DNS Domain Name System Domain names and IP addresses People prefer to use easy-to-remember names instead of IP addresses Domain names are alphanumeric names for IP addresses e.g., neon.cs.virginia.edu,

More information

The Domain Name System

The Domain Name System DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),

More information

Internet-Praktikum I Lab 3: DNS

Internet-Praktikum I Lab 3: DNS Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans

More information

Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS

Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS Hostnames CSCE 515: Computer Network Programming ------ Address Conversion Function and DNS RFC 1034, RFC 1035 Wenyuan Xu http://www.cse..edu/~wyxu/ce515f07.html Department of Computer Science and Engineering

More information

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Concept. DNS - Domain Name System Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication

More information

Application Protocols in the TCP/IP Reference Model

Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management WWW Virtual Terminal Name Service File Transfer HTTP FTP Telnet SMTP DNS SNMP TFTP Internet protocols TCP UDP

More information

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0 THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people

More information

How-to: DNS Enumeration

How-to: DNS Enumeration 25-04-2010 Author: Mohd Izhar Ali Email: johncrackernet@yahoo.com Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS

More information

ECE 4321 Computer Networks. Network Programming

ECE 4321 Computer Networks. Network Programming ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet

More information

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System

Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.

More information

Fig 1A portion of the Internet domain name space.

Fig 1A portion of the Internet domain name space. 1 Asst. Lecturar ahmed S. Kareem DNS The Domain Name System Although programs theoretically could refer to hosts, mailboxes, and other resources by their network (e.g., IP) addresses, these addresses are

More information

DNS Domain Name System

DNS Domain Name System Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.

More information

Copyright 2012 http://itfreetraining.com

Copyright 2012 http://itfreetraining.com In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the

More information

Module 2. Configuring and Troubleshooting DNS. Contents:

Module 2. Configuring and Troubleshooting DNS. Contents: Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring

More information

Domain Name System. 188lecture12.ppt. Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo

Domain Name System. 188lecture12.ppt. Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo Domain Name System 88lecture2.ppt Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo S-38.88 - Computer Networks - Spring 2003 Outline What and why? Structure of DNS Management of Domain Names Name Service in

More information

Domain Name System. CS 571 Fall 2006. 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved

Domain Name System. CS 571 Fall 2006. 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved Domain Name System CS 571 Fall 2006 2006, Kenneth L. Calvert University of Kentucky, USA All rights reserved DNS Specifications Domain Names Concepts and Facilities RFC 1034, November 1987 Introduction

More information

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Lesson 13: DNS Security Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation

More information

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12 DNS Computer networks - Administration 1DV202 DNS History Who needs DNS? The DNS namespace How DNS works The DNS database The BIND software Server and client configuration The history of DNS RFC 882 and

More information

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. First Edition THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To

More information

Domain Name System. Heng Sovannarith heng_sovannarith@yahoo.com

Domain Name System. Heng Sovannarith heng_sovannarith@yahoo.com Domain Name System Heng Sovannarith heng_sovannarith@yahoo.com Introduc:on to DNS Domain Name System is a distributed database system that can be serve as the founda:on for name resolu:on in a TCP/IP Network.

More information

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Domain Name System

Application Protocols in the TCP/IP Reference Model. Application Protocols in the TCP/IP Reference Model. DNS - Domain Name System Application Protocols in the TCP/IP Reference Model Application Protocols in the TCP/IP Reference Model File Transfer E-Mail Network Management Protocols of the application layer are common communication

More information

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works

More information

The Domain Name System (DNS)

The Domain Name System (DNS) The Domain Name System (DNS) Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 24-1 Overview Naming hierarchy hierarchy Name resolution Other information in name servers 24-2

More information

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology

Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2

More information

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015 Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating

More information

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1 SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,

More information

DNS - Domain Name System

DNS - Domain Name System DNS - Domain Name System TCP/IP class 1 outline introduction naming scheme protocol format record types how it works reverse lookup implementation - named config files summary - futures 2 bibliography

More information

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013

Distributed Systems. 22. Naming. 2013 Paul Krzyzanowski. Rutgers University. Fall 2013 Distributed Systems 22. Naming Paul Krzyzanowski Rutgers University Fall 2013 November 21, 2013 2013 Paul Krzyzanowski 1 My 15 MacBook Pro The rightmost computer on my desk Paul s aluminum laptop, but

More information

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University mweigle@cs.clemson.edu

More information

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at

Internet Security [1] VU 184.216. Engin Kirda engin@infosys.tuwien.ac.at Internet Security [1] VU 184.216 Engin Kirda engin@infosys.tuwien.ac.at Christopher Kruegel chris@auto.tuwien.ac.at Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will

More information

Domain Name System (DNS) Fundamentals

Domain Name System (DNS) Fundamentals Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

How to set up the Integrated DNS Server for Inbound Load Balancing

How to set up the Integrated DNS Server for Inbound Load Balancing How to set up the Integrated DNS Server for Introduction Getting Started Peplink Balance has a built-in DNS server for inbound link load balancing. You can delegate a domain s NS/SOA records, e.g. www.mycompany.com,

More information

Understanding DNS (the Domain Name System)

Understanding DNS (the Domain Name System) Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2

More information

Understand Names Resolution

Understand Names Resolution Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite

More information

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. . Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name

More information

Domain Name System Security

Domain Name System Security Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is

More information

The Application Layer. CS158a Chris Pollett May 9, 2007.

The Application Layer. CS158a Chris Pollett May 9, 2007. The Application Layer CS158a Chris Pollett May 9, 2007. Outline DNS E-mail More on HTTP The Domain Name System (DNS) To refer to a process on the internet we need to give an IP address and a port. These

More information

Computer Networks: Domain Name System

Computer Networks: Domain Name System Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com

More information

DNS + DHCP. Michael Tsai 2015/04/27

DNS + DHCP. Michael Tsai 2015/04/27 DNS + DHCP Michael Tsai 2015/04/27 lubuntu.ova http://goo.gl/bax8b8 DNS + DHCP DNS: domain name < > IP address DHCP: gives you a IP + configuration when you joins a new network DHCP = Dynamic Host Configuration

More information

Domain Name Server. Training Division National Informatics Centre New Delhi

Domain Name Server. Training Division National Informatics Centre New Delhi Domain Name Server Training Division National Informatics Centre New Delhi Domain Name Service (DNS) I. History of DNS II. DNS structure and its components III. Functioning of DNS IV. Possible Configurations

More information

The role of JANET CSIRT

The role of JANET CSIRT The role of JANET CSIRT Bradley Freeman JANET(UK) CSIRT Member UKNOF 15 21 st January 2010 bradley.freeman@ja.net Copyright JNT Association 2009 1 What to expect Overview of how we detect and deal with

More information

How to Add Domains and DNS Records

How to Add Domains and DNS Records How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.

More information

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol

More information

DNS at NLnet Labs. Matthijs Mekking

DNS at NLnet Labs. Matthijs Mekking DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the

More information

Chapter 9: Name Services. 9.1 Introduction 9.2 Name services and the DNS 9.3 Directory services 9.6 Summary

Chapter 9: Name Services. 9.1 Introduction 9.2 Name services and the DNS 9.3 Directory services 9.6 Summary Chapter 9: Name Services 9.1 Introduction 9.2 Name services and the DNS 9.3 Directory services 9.6 Summary Learning objectives To understand the need for naming systems in distributed systems To be familiar

More information

Remote DNS Cache Poisoning Attack Lab

Remote DNS Cache Poisoning Attack Lab SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following

More information

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide

HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V

More information

INTERNET DOMAIN NAME SYSTEM

INTERNET DOMAIN NAME SYSTEM INTERNET DOMAIN NAME SYSTEM http://www.tutorialspoint.com/internet_technologies/internet_domain_name_system.htm Copyright tutorialspoint.com Overview When DNS was not into existence, one had to download

More information

by telnet 142.58.110.2. 1 E.g., the machine fraser has IP address 142.58.110.2. You can login to fraser from anywhere in the world

by telnet 142.58.110.2. 1 E.g., the machine fraser has IP address 142.58.110.2. You can login to fraser from anywhere in the world 21 3.5 Naming and Look-Up Service 3.5.1 Host addresses and Port numbers A client requiring a service needs to lote a server that will provide the desired service. In JavaRMI discussed in 3.3, rmiregistry

More information

THE DOMAIN NAME SYSTEM DNS

THE DOMAIN NAME SYSTEM DNS Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace

More information

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org

Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP

More information

Automated domain name registration: DNS background information

Automated domain name registration: DNS background information IBM eserver Automated domain name registration: DNS background information ^business on demand software ADNRbackground.ppt Page 1 of 14 Overview of z/os DNS solutions Two z/os name servers supported ƒdns

More information

Section 1 Overview... 4. Section 2 Home... 5

Section 1 Overview... 4. Section 2 Home... 5 ecogent User Guide 2012 Cogent Communications, Inc. All rights reserved. Every effort has been made to ensure that the information in this User Guide is accurate. Information in this document is subject

More information

How To Guide Edge Network Appliance How To Guide:

How To Guide Edge Network Appliance How To Guide: How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table

More information

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley abulley@ghana.com

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley abulley@ghana.com Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley abulley@ghana.com Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

Introduction to the Domain Name System

Introduction to the Domain Name System CHAPTER 14 The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses),

More information

Glossary of Technical Terms Related to IPv6

Glossary of Technical Terms Related to IPv6 AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid

More information

Domain Name System (DNS) Reading: Section in Chapter 9

Domain Name System (DNS) Reading: Section in Chapter 9 Domain Name System (DNS) Reading: Section in Chapter 9 RFC 1034, STD 13 Name Syntax and rules for delegating authority over names Specify implementation of a distributed system that maps names to addresses

More information

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s) Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.

More information

The Domain Name System from a security point of view

The Domain Name System from a security point of view The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {davby@ida.liu.se} Project Report for Information Security

More information

Configuring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files

Configuring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files Configuring DNS BIND: UNIX Name Service Configuring the BIND name server (named) Configuring the BIND resolver Constructing the name server database files Zone: a collection of domain information contained

More information

- Domain Name System -

- Domain Name System - 1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize

More information

DNS security: poisoning, attacks and mitigation

DNS security: poisoning, attacks and mitigation DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain

More information

NET0183 Networks and Communications

NET0183 Networks and Communications NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many

More information

DNSSEC Applying cryptography to the Domain Name System

DNSSEC Applying cryptography to the Domain Name System DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC

More information

DNS. Computer Networks. Seminar 12

DNS. Computer Networks. Seminar 12 DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses

More information

The Domain Name System

The Domain Name System The Domain Name System Antonio Carzaniga Faculty of Informatics University of Lugano October 9, 2012 2005 2007 Antonio Carzaniga 1 IP addresses and host names Outline DNS architecture DNS process DNS requests/replies

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Introduction to DNS CHAPTER 5. In This Chapter

Introduction to DNS CHAPTER 5. In This Chapter 297 CHAPTER 5 Introduction to DNS Domain Name System (DNS) enables you to use hierarchical, friendly names to easily locate computers and other resources on an IP network. The following sections describe

More information

Using the Domain Name System for System Break-ins

Using the Domain Name System for System Break-ins Using the Domain Name System for System Break-ins Steven M. Bellovin Presented by: Thomas Repantis trep@cs.ucr.edu CS255-Computer Security, Winter 2004 p.1/37 Overview Using DNS to spoof a host s name

More information

Networking Domain Name System

Networking Domain Name System System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information

More information

How to Configure the Windows DNS Server

How to Configure the Windows DNS Server Windows 2003 How to Configure the Windows DNS Server How to Configure the Windows DNS Server Objective This document demonstrates how to configure domains and record on the Windows 2003 DNS Server. Windows

More information

DNS Service on Linux. Supawit Wannapila CCNA, RHCE supawit.w@cmu.ac.th

DNS Service on Linux. Supawit Wannapila CCNA, RHCE supawit.w@cmu.ac.th DNS Service on Linux Supawit Wannapila CCNA, RHCE supawit.w@cmu.ac.th Host Name Resolution Common Host Name Service Files (/etc/hosts and /etc/networks) DNS (/etc/resolv.conf) Multiple client-side resolvers:

More information

Use Domain Name System and IP Version 6

Use Domain Name System and IP Version 6 Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)

More information

More Internet Support Protocols

More Internet Support Protocols Domain Name System (DNS) Ch 2.5 More Internet Support Protocols Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember

More information

Windows 2008 Server. Domain Name System Administración SSII

Windows 2008 Server. Domain Name System Administración SSII Windows 2008 Server Domain Name System Administración SSII Contenidos Introducción Configuración DNS Transferencia de zona Herramientas DNS Introducción Domain Name System is a hierarchical distributed

More information

DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved

DNS ActiveX Control for Microsoft Windows. Copyright Magneto Software All rights reserved DNS ActiveX Control for Microsoft Windows Copyright Magneto Software All rights reserved 1 DNS Overview... 3 1.1 Introduction... 3 1.2 Usage... 3 1.3 Property... 4 1.4 Event... 4 1.5 Method... 4 1.6 Error

More information

Domain Name System DNS

Domain Name System DNS CE443 Computer Networks Domain Name System DNS Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Coordinación. The background image of the cover is desgned by http://www.freepik.com/ GUIDE TO DNS SECURITY 2

Coordinación. The background image of the cover is desgned by http://www.freepik.com/ GUIDE TO DNS SECURITY 2 Autor Antonio López Padilla Coordinación Daniel Fírvida Pereira This publication belongs to INTECO (Instituto Nacional de Tecnologías de la Comunicación) and is under an Attribution- NonCommercial 3.0

More information

Domain Name System Richard T. B. Ma

Domain Name System Richard T. B. Ma Domain Name System Richard T. B. Ma School of Computing National University of Singapore CS 3103: Compute Networks and Protocols Names Vs. Addresses Names are easier for human to remember www.comp.nus.edu.sg

More information

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 34 DNS & Directory Good day. Today we will take up two topics, DNS and

More information

An Intrusion Detection System for Kaminsky DNS Cache poisoning

An Intrusion Detection System for Kaminsky DNS Cache poisoning An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati drbj153@alumni.iitg.ernet.in, b.kaushik@iitg.ernet.in Abstract : Domain

More information

Motivation. Users can t remember IP addresses. Implemented by library functions & servers. - Need to map symbolic names (www.stanford.

Motivation. Users can t remember IP addresses. Implemented by library functions & servers. - Need to map symbolic names (www.stanford. Motivation 2 cs.princeton.edu User 1 user @ cs.princeton.edu Name server Mail program 192.12.69.5 3 TCP 192.12.69.5 4 192.12.69.5 5 IP Users can t remember IP addresses - Need to map symbolic names (www.stanford.edu)

More information

DNS Pharming Attack Lab

DNS Pharming Attack Lab CNT 5410 - Fall 2014 1 DNS Pharming Attack Lab (This is a modified version of the exercise listed below. Modifications are to provide tighter configuration so as to minimize the risk of traffic leaving

More information

The Root of the Matter: Hints or Slaves

The Root of the Matter: Hints or Slaves The Root of the Matter: Hints or Slaves David Malone October 21, 2003 Abstract We consider the possibility of having a name server act as a slave to the root zone, rather than caching

More information

Introduction to DNS and Application Issues related to DNS. Kirk Farquhar

Introduction to DNS and Application Issues related to DNS. Kirk Farquhar Introduction to DNS and Application Issues related to DNS Kirk Farquhar 1 Content What is DNS? How it all works Setting up your domain Creating your nameserver files The Resolver Testing Firewall configuration

More information

IPv6 support in the DNS

IPv6 support in the DNS IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of

More information

4.1 NAMING ENTITIES 184 NAMING CHAP. 4. 4.1.1 Names, Identifiers, and Addresses

4.1 NAMING ENTITIES 184 NAMING CHAP. 4. 4.1.1 Names, Identifiers, and Addresses 184 NAMING CHAP. 4 4.1 NAMING ENTITIES In this section, we first concentrate on different kinds of names, and how names are organized into name spaces. We then continue with a discussion of the important

More information

Applications and Services. DNS (Domain Name System)

Applications and Services. DNS (Domain Name System) Applications and Services DNS (Domain Name Service) File Transfer Protocol (FTP) Simple Mail Transfer Protocol (SMTP) Malathi Veeraraghavan Distributed database used to: DNS (Domain Name System) map between

More information

1. LAB SNIFFING LAB ID: 10

1. LAB SNIFFING LAB ID: 10 H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB

More information

K-Root Name Server Operations

K-Root Name Server Operations K-Root Name Server Operations Andrei Robachevsky andrei@ripe.net 1 Outline Root Server System brief update Architecture Current locations Anycast deployment K.root-servers.net Server Major milestones Current

More information

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you

More information

Configuring DNS. Finding Feature Information

Configuring DNS. Finding Feature Information The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS FALL 2011 Lecture 19: DNS Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Human Involvement

More information

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System Names vs. Addresses Computer Networks Lecture 5: Domain Name System Names are easier for human to remember www.umich.edu vs. 141.213.4.4 Addresses can be changed without changing names move www.umich.edu

More information