Defeating DNS Amplification Attacks. Ralf Weber Senior Infrastructure Architect
|
|
|
- Ann Kelley
- 10 years ago
- Views:
Transcription
1 Defeating DNS Amplification Attacks Ralf Weber Senior Infrastructure Architect
2 History DNS amplification attacks aren't new Periodically reemerge as attackers read history books J NANOG 56 Reports of unusual DNS traffic on authoritative DNS servers Resource Rate Limiting (RRL) proposed for nameservers Subsequently implemented in BIND, NLNet NSD, Knot, more NLNet paper shows effectiveness for certain attacks Largest DDoS ever uses open resolvers - April Gbps targeted at Spamhaus Providers worldwide see attacks using their DNS resolvers Trouble for networks: load balancer failures, saturated links, server stress, operational duress No media headlines but lots of targets suffer with traffic spikes 2
3 Quick Introduction Amplification attacks rely on: Spoofed IP source addresses UDP as transport Small DNS questions that generate large DNS answers ANY queries are an old favorite, 80x amplification DNSSEC-signed zones were an early favorite, but seem to have diminished Other query types showing up: TXT, even A/AAAA Attackers appear to be creating "purpose built" RRs 3
4 What amplification can be achieved? One commonly used query in the past ANY ripe.net" Yields an impressively large answer (MSG SIZE rcvd: 2884): ; <<>> DiG P1 <<>> ripe.net +edns=0 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, ANSWER: 26, AUTHORITY: 6, ADDITIONAL: 3 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;ripe.net. IN ANY ;; ANSWER SECTION: ripe.net. 197 IN RRSIG NSEC ripe.net. dodaf81ic+j6dscnmdbvvaept7slxpz0bir4jnh+4c53rbhnm8hh46gx jfyab2cozkdwnkwmbw/ ifnx3c6ggcz7uromfwzmthbxptvzjyldj/thr CrO2ntlLdP8MrM5EUyq35FiSDNIv1uyzaEo9rXNsMGjMH2bd5cQqSpbV ylu= ripe.net. 197 IN NSEC 256cns.ripe.net. A NS SOA MX AAAA RRSIG NSEC DNSKEY ripe.net. 197 IN RRSIG MX ripe.net. AJfdeBOkOwdMTfybgvidmHeeQzm6ybwxLEN1qcPp2YQvoWE2VbrLmeUo JiKvecGHQlACBr1VKuguGq++bEYTXbGkragc7iG19SaisTHwWFZHLjka l3xhxl2q890pnykpiyfgf6zpmsyebc92byqdgxtqnwpyvwghhloyysq0 ZAA= ripe.net. 197 IN MX 250 postlady.ripe.net. ripe.net. 197 IN MX 200 postgirl.ripe.net. ripe.net IN RRSIG NS ripe.net. RGDUw6Cu6Sh7zixsKiiJyDIIkEZEK4LagEl09s6ZnGN27GQAFHkSE9up IkAfsaJWe3Nl9fjQFWfJ/hZ5rHcgsz5LD/eK4W5VUWpZc6BX0YuikxPb LSxMoFebAkqRkIEp7TTMRUuaZyTK +m0uadlgpp0nyx8ee6uze8cj2zv0 xog= ripe.net. 197 IN RRSIG AAAA ripe.net. CiltCl8jysHsg2MHsU/ 4bPlt7jYaFSJGZnMe0NcTACnCocAEO3+B5Y7s 9QQDWXAxVyXTPs9dtiAdEtLOH0R0TBH45I+OExxhS5CWYBJO+TWghV/r WNyFOuUDAlFmP2KdgPpMRqfw49l7o75owbnAjefcyVZ32OtBX50LTDBe 10A= ripe.net. 197 IN AAAA 2001:67c:2e8:22::c100:68b ripe.net IN RRSIG A ripe.net. FlR1BIoGLmKUmvDHvhmDBzV6q2YXmLpZ8KpPfVw9Dw2k/O6EBSx+mXwq lvwuudtslbhgfyqvgb50hfkcrrdbnzusze9e0sqkmjr8pfu6egckjf2p dbveonsjowyygqe7l+4bhb1cx5cseo+vscl7uie99ccqyhvkyngejcy0 Ckk= ripe.net IN A ripe.net IN RRSIG SOA ripe.net. GKCyXEz2xtCj0czgyZ6CEPzL7BNldfK1iz7JiFaIw87UEZA1OjY2rP04 qsu1bt9kpmhwkvy9eqjeshgswbgrdy/1y0ldzpyyhszvbolkpu/jxcvr G/ NI23fvzs96Mc5iTp3ovuhLQfgS0z31oJJMd4yowcRL4dhs1jmgmeL/ nqq= ripe.net IN SOA pri.authdns.ripe.net. dns.ripe.net ripe.net IN RRSIG DNSKEY ripe.net. EbHIOgtEY/NV4DMXZpcqXFlVfICcaRD+gpXnyRnu11x4EZAFbYXl42HG OxTZE7Z168qxHuLCeVKat0L0w7nh5ShVpfPUXhdt+fVXoDukI19aAgWy ydmavd4zm2zkc8e3lkknzs9xuksx+laec7ff/+3gvuhi/avl8nc/a3bp vpoxe5mrpz/ OGwd5aQtvgm811IysdOPZWbqSJDRKTeanAyhIk8FLN2hm trltkjfardakogpmzi1ga/3dfojrlbipunip4c6xdi6y9gjw+3omj8lz cvleundj188ujs9z6fqr6zodiwvmdzwwcyd +rbr6dhvezilrk8hfbjsb LjbkSg== ripe.net IN DNSKEY AwEAAX7Dm18EOseQjbKJQDhhFqkfNMjW4z2miK5/+3j33krF2KungE43 AMmUo3hgjND4A547zCLTYGV +TchFXtVwdErJtLKs1giAfkrpvl9hYxY+ eofslspfu6n8bqd7lsiqdynq0ig9agk6k1dane9zwuw6x37duibaglub 4/yLguoT ripe.net IN DNSKEY AwEAAZYzmLhqQKDgm +OA5gfvGU6Twt9WuF2P5akXQxZxATZ79apyjW6K 1ZFeZ76Yo3L4EoGEkSBntx0m7Gacr/ry9oGmmyhK5oS9EfeitHdAV14F gkn+qi0romt32rgdsfiy210fblobwubcco6c +2hYbB2CeNHF6BtYivGL arbact2f ripe.net IN DNSKEY AwEAAXf2xwi4s5Q1WHpQVy/kZGyY4BMyg8eJYbROOv3YyH1U8fDwmv6k BVxWZntYtYUOU0rk+Y7vZCvSN1AcYy0/ ZjL7cNlkc3Ordl2DialFHPI6 UbSQkIp3l/5fSWw5xnbnZ8KA7g3E6fkADNIEarMI4ARCWlouk8GpQHt1 1wNW1c65SWB8i958WZJ6LI0pOTNK+BIx8u98b+EVr7C08dPpr9V6Eu/7 3uiPsUqCyRqMLotRFBwK8KgvF9KO1c9MXjtmJxDT067oJoNBIK+gvSO9 QcGaRxuGEEFWvCbaTvgbK4E0OoIXRjZriJj8LXXLBEJen6N0iUzj8nqy XSCm5sNxrRk= ripe.net IN DNSKEY AwEAAYSPd7+AJXOT1k1d6eUKRCsw5cSGpzsWIjVCDjbWdNomt4mCh5of SSnf60kmNCJgeCvPYwlOWX08TPLpCHqvBh8UERkaym8oT0U2lKrOt+0W EyksYc5EnLp7HQVvH +KaF8XiuPsemLLNbhosGofv5v0Jj2TKxJI/sgf1 n9wtkmy1bcttasun5gmjkdv0xrpkkza4rcqv8sl8pz2pzjvixpn0abgx WtRjWXXJ27mUq6+PR7+zgBvLkmSV4F1bNXOgikeN5KBlutEKBKYYcYRb fr5kdyyj0mv/2utsrjt7lwnxayaj88xuz4wcbv01eumzszu21ighro1n Z4HFSr9jb3U= ripe.net IN RRSIG DS net. GTgWhptNaMhw9gId4KrnVunBMQwgOwH8rSS16BCkrIiSy9sOLSqTvt6l EITrEMarfeZ3TL0NlcLkOLtddPtUl791/ Iib219s76ekGyysVeoaFkkm OBn0zcvDX9joDHleBb/UuuRA+HFiV3DnicGgZQXnaEZDkfHfUrxOyt2F JMU= ripe.net IN DS D99D98D0C374C1157F73282DB3E29E61E365DD9EBA435802D27A69 847C24FC ripe.net IN DS CB13971FC7D4DF7CB3C6EB82DF FE6371 ripe.net IN NS ns3.nic.fr. ripe.net IN NS pri.authdns.ripe.net. ripe.net IN NS sec3.apnic.net. ripe.net IN NS sns-pb.isc.org. ripe.net IN NS tinnie.arin.net. ripe.net IN NS sec1.apnic.net. ;; AUTHORITY SECTION: ripe.net IN NS sns-pb.isc.org. ripe.net IN NS tinnie.arin.net. ripe.net IN NS sec3.apnic.net. ripe.net IN NS sec1.apnic.net. ripe.net IN NS pri.authdns.ripe.net. ripe.net IN NS ns3.nic.fr. ;; ADDITIONAL SECTION: pri.authdns.ripe.net IN A pri.authdns.ripe.net IN AAAA 2001:67c:e0::5 ;; Query time: 337 msec ;; SERVER: #53( ) ;; WHEN: Thu Oct 10 16:34: ;; MSG SIZE rcvd: 2884 There are lots of similar queries Attackers also creating purpose built amplification zones (more later) 4
5 Some Simple Math A relatively low bandwidth home broadband connection (~2-3 Mbps) can generate 58 Mbps at a DNS server! 18 home connections = ~ 1Gbps of traffic A few thousand connections = 100s of Gbps as was seen with attack on spamhaus Mustering these kinds of resources is pretty easy 5
6 Several Variants of Amplification Attacks Send queries directly to authoritative servers Response Rate Limiting helps But attackers probably will adapt More work needed here, but not the topic of this presentation Send queries to open resolvers on the Internet Works well but Best Practices will deter these attacks Shut down open resolvers or limit IP ranges that can access the server when possible Closely monitor for attack activity Not the focus of this presentation, but some techniques discussed here apply Send queries to open DNS proxies on home gateways Huh? 6
7 Using ISP Resolvers for DNS Amplification 1. Attacker 1. Spoof address 2. Send queries to open DNS proxies on provider networks Border router Internet Target ISP Resolver 2. Home Gateway Provider Network 3. ISP Resolver 3. Receive queries on WAN interface 4. Proxy query to ISP resolver 7. Forward answer to Target 5. Receive and resolve query 6. Answer the query as it s from a legilmate user!
8 Advantages of This Attack (for Attackers) ISP resolvers are a great resource Lots of them out there Usually high capacity Reliable and available ISP Best Practices won't deter this attack! Restricting resolver IP Ranges doesn't work Queries appear to be sourced from internal IP ranges Filtering DNS queries at the border isn't an easy option Other DNS traffic: incoming answers to recursive queries from provider resolvers, incoming queries to authoritative servers, source port 53 Subscribers may run DNS servers Upgrading Home Gateways is challenging (impossible?) - lots of running room 8
9 How Did We Figure this Out? Many reports from ISPs about attacks on their networks isc.org/ripe.net in the most used domains Interesting work from openresolverproject.org Millions of open resolvers Scan with CHAOS query returns versions of resolvers A BIG surprise 445,881 Open Vantio Resolvers What? We have not sold anywhere near 445,881 copies of Vantio If we had I guess I would not be giving this talk here today! Someone is stealing our SW? (and they're not even using it right!) No something else must be going on Customers seeing attacks restrict IP ranges ("closed resolvers) Queries have to be coming from legitimate IPs What's going on????? 9
10 Testing to Find "Real" Resolvers Setup special domain: restest.rwdns.de Ask every unique open resolver/proxy: dig On auth server the resolver query source is seen:: querystore.replay duration=10m filter=((zone (true (restest.rwdns.de))))! {client-address =>!' #56355'! local-address =>!' #53'! name =>!!!' restest.rwdns.de! Leverage excellent work from openresolverproject.org (Jared Mauch NTT ) periodic scans to identify open resolvers map open proxies to actual resolvers! 10
11 How the scan works Internet Home gateway Openresolver project scan host Router Generic Host Authoritative Server for openresolvertest.net DNS Resolver Open home gateway Open Resolver DNS Resolver DNS query with embedded obfuscated IP of device queried as first label (e.g 9317a672.openresolvertest.net) Lookup to forwarder or authoritative server for the query Answer of back from auth or forwarder (static ) Answer back to scan host (static )
12 What is happening Host at NTT sends every IPv4 address a unique DNS query that encodes the IP in the 1 st label Proxies will forward to the actual resolvers Open DNS resolvers will directly ask the authoritative ANS serves answers on the authoritative side and stores Embedded IP of original request from the scan host Client IP of the actual resolver Lets look at the data.
13 A New View of the World Courtesy of DNS Data! 13
14 Continent Distribution Continent Open DNS proxies Percentage Asia ,61% Europe ,25% South America ,74% North Anerica ,68% Africa ,11% Australia ,61% 5.11% 0.61% 10.68% 13.74% 22.25% 47.61% Asia Europe South America North Anerica Africa Australia 14
15 Countries in Asia Country Open DNS proxies Percentage China ,67% Vietnam ,52% India ,05% Thailand ,77% Korea ,07% Taiwan ,54% Indonesia ,15% Iran ,67% Kazakhstan ,63% Japan ,02% 15
16 Some interesting data points Number of open proxies as of 21 st of February is Roughly 24 Million But only resolvers are seen on the authoritative server That s less than 1% AS with most open proxies has Resolver with most open proxies has Probably hierarchical caching 76% of proxies use resolvers in their AS Presumambly ISP resolvers ISPs are not responsible for these attacks Home gateway vendors are. But ISPs can help to defend against them 16
17 DNS Proxies that use ISP resolvers AS Number Open Proxies Country CN CN TW ID IN KR VN CN KR TH Total of = 26% of the world or 46% of Asia 17
18 What can be Done? Basic DNS Housekeeping Have DNS logging turned on all the time Essential resource to identify attack activity Get a dashboard up so baseline DNS operation is always visible Familiarity with "normal" makes it easier to spot changes Queries per second, settable graph window Top domains queried scrollable through a few hundred domains Distribution of Query Types Check for domains that yield the biggest responses 18
19 Mitigating Attacks First characterize the attack Use your logged data! Identify and Classify (current findings) : Purpose built amplification domains. ANY queries to legitimate domains. Dual use domains Watch out for new patterns 19
20 Mitigating Attacks Purpose built amplification domains No need to ever answer these queries Use reputation lists DROP action ANY queries Rate limit to low QPS TRUNCATE action Allows legitimate requests to be answered Dual use domains Filters based on Query Type to capture Rate limit to low QPS TRUNCATE action Last Resort Size based rate limiter Set up a reasonable QPS threshold for queries with large answers (measure first mine is 0.5% of normal traffic) 20
21 Summary DNS Amplification attacks are increasingly coming from home gateways ISP can help to defend against them BCP 38 (will help other ISPs and the community) Monitor your DNS traffic Use resolvers for mitigation Home gateway vendors should pay more attention to DNS Default configuration should not be open to the Internet Use better toolboxes for building them There is some cool work going on in the IETF homenet WG 21
22 Thank You
23 Backup slides
24 So what are these hosts doing Answering DNS queries Very large message sizes have been observed: ~ 4000 bytes! Domains "purpose built" for amplification are being uncovered A, MX, and Text records Dummy data Some domains have real data with some record types (A, AAA) and bad with others (TXT, ANY) Also finding "dual use " domains Legitimate domains inadvertently optimized for amplification? Some admins may not understand effects of their entries ;-) 250 different MX entries might not be a good idea Several 4096 bits DNSKEY might be more secure but 24
25 Samples isc.org ANY doc.gov ANY irlwinning.com A or ANY in-addr.arpa PTR outmail.zyngamail.com A A. ANY 25
26 isc.org dig isc.org any!! [..]! ;; ANSWER SECTION:! isc.org.!!6836!in!txt!"$id: isc.org,v :27:44 bicknell Exp $"! isc.org.!!6836!in!txt!"v=spf1 a mx ip4: /21 ip4: /16 ip6:2001:04f8::0/32 ip6:2001:500:60::65/128 ~all"! isc.org.!!6836!in!rrsig!txt isc.org. lgn51hbvr3edudl7myfydq+is3vza2rveznsm2ezs4zkmwy+yleli4yh BXuzFtK9Rg3N0CON6/SQJYA8TuUG78UE9OoP4/nLkOaDHLkHMTgq1yHz 8oJ0n5mzHIcNgYqphd34yRjBoldjtE9Rhrp4Q3aGVyzW21nPY6NIRlAW BNk=! [..]! ;; Query time: 1 msec! ;; SERVER: #53( )! ;; WHEN: Thu Oct 3 12:31: ! ;; MSG SIZE rcvd: 2045! 26
27 doc.gov any dig doc.gov any! ;; Truncated, retrying in TCP mode.! [..]! ;; ANSWER SECTION:! doc.gov.!!25!in!dnskey! AwEAAeBP9cEQR3eTa4u1x3WpLwnCog7rw/ l22hxgwihzijgaz26+l/cw +QEHS9bAlJnRtZhmlBYN72DvfpshuEL2o6hh2yVw7wcRC4fNOTxOeury wlrkkzqe0wc4fyaxlxjsiwrwleb3h4yyqibgbprwygy1ndnapp/sj4ax 53p7RM2rHWcFc89KZ7vJMMzgmZF2v+jo96OGJU7g2Nu4vEZzj8iMJCT6 BGolQRVE/ svymrqdwpqoij/scpip//tkzlko5j2jnwgo4h01zpr+bse3 mdznrj33fyj2waol8d9km2gn3h6u8uhas9ghumc2isjcf1gn6odnc0ki s8kkshwllk0=! [..]! ;; Query time: 11 msec! ;; SERVER: #53( )! ;; WHEN: Thu Oct 3 12:34: ! ;; MSG SIZE rcvd: 8161! 27
28 irlwinning.com dig +trace irlwinning.com any! [..]! ;; ANSWER SECTION:! irlwinning.com.!!4045!in!ns!ns1.irlwinning.com.! irlwinning.com.!!4045!in!ns!ns2.irlwinning.com.! irlwinning.com.!!21578!in!a! ! [..]! irlwinning.com.!!21578!in!a! ! irlwinning.com.!!21578!in!a! ! irlwinning.com.!!73!in!soa!ns1.irlwinning.com. packets.irlwinning.com !! ;; ADDITIONAL SECTION:! ns1.irlwinning.com.!3647!in!a! ! ns2.irlwinning.com.!3647!in!a! !! ;; Query time: 39 msec! ;; SERVER: #53( )! ;; WHEN: Mon Oct 7 10:45: ! ;; MSG SIZE rcvd: 4011! 28
29 in-addr.arpa PTR dig in-addr.arpa PTR! ;; Truncated, retrying in TCP mode.! [..]! ;; ANSWER SECTION:! in-addr.arpa. 3600!IN!PTR!windowsmobilelive.gr.! in-addr.arpa. 3600!IN!PTR!windowsmobilelive.ie.! in-addr.arpa. 3600!IN!PTR!windowsmobilelive.in.! in-addr.arpa. 3600!IN!PTR!windowsmobilelive.com.es.! [..]! in-addr.arpa. 3600!IN!PTR!windowsmobilelive.com.sg.! in-addr.arpa. 3600!IN!PTR!windowsmobilelive.fr.!! ;; Query time: 14 msec! ;; SERVER: #53( )! ;; WHEN: Thu Oct 3 12:42: ! ;; MSG SIZE rcvd: 12453! 29
30 outmail.zyngamail.com A dig outmail.zyngamail.com A! [..]! ;; ANSWER SECTION:! outmail.zyngamail.com.!300!in!a! ! outmail.zyngamail.com.!300!in!a! ! outmail.zyngamail.com.!300!in!a! ! outmail.zyngamail.com.!300!in!a! ! outmail.zyngamail.com.!300!in!a! ! [..]! outmail.zyngamail.com.!300!in!a! ! outmail.zyngamail.com.!300!in!a! ! outmail.zyngamail.com.!300!in!a! ! outmail.zyngamail.com.!300!in!a! !! ;; Query time: 19 msec! ;; SERVER: #53( )! ;; WHEN: Thu Oct 3 12:45: ! ;; MSG SIZE rcvd: 1778! 30
31 netfirms.com dig [..]! ;; ANSWER SECTION:! ;; Query time: 104 msec! ;; SERVER: #53( )! ;; WHEN: Thu Oct 3 12:45: ! ;; MSG SIZE rcvd: 61! 31
32 somethingstrange.netfirms.com dig somethingstrange.netfirms.com! ;; Truncated, retrying in TCP mode.! [..]! ;; ANSWER SECTION:! somethingstrange.netfirms.com IN!A! ! somethingstrange.netfirms.com IN!A! ! somethingstrange.netfirms.com IN!A! ! somethingstrange.netfirms.com IN!A! ! somethingstrange.netfirms.com IN!A! ! somethingstrange.netfirms.com IN!A! !! ;; Query time: 8 msec! ;; SERVER: #53( )! ;; WHEN: Thu Oct 3 12:50: ! ;; MSG SIZE rcvd: 4026! 32
33 . the root dig any.! [..]! ;; ANSWER SECTION:!.!!!42321!IN!NSEC!ac. NS SOA RRSIG NSEC DNSKEY!.!!!42321!IN!RRSIG!NSEC Ntf5bDYSPNFwQiD +BWYxV2dfroUhPUs3tV4q20eaM5mbDfYEHuMlwr9u lnp8wv/ uazyzmhrqzb2xl0nkjwd3aky1w15y+acxeghtqaabhbx/1xm8 L6XYr/uyfhiY/ BCnIvwWlOUoK/7m/20LIuNyiaBlYISVcloYJwwxFtYT e8s=! [..]!.!!!86382!IN!SOA!a.root-servers.net. nstld.verisign-grs.com !.!!!86382!IN!RRSIG!SOA DoGy06dHpVdSKwx9nn82m7pSZCHOg5x1/ n36+4wvkaenflx22tslvwyl b0pvkzvv8dxei4z5jqtu9xwpxurvhdw29q2fumb7fs87t0ve9r4lu87x 3t0pvqYB5+uqCdxVkhO1iIRROXhrMX2q253qtmfAVhtdfCeXAvoIZxBO yqk=!! ;; Query time: 38 msec! ;; SERVER: #53( )! ;; WHEN: Mon Oct 7 10:50: ! ;; MSG SIZE rcvd: 1649! 33
How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net
Surviving a DDoS Attack: What every host needs to know Maria Karaivanova, Business Development David Koston, Platform www.cloudflare.com DDoS Attacks are becoming massive, and easier to initiate!2 Major
DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014
DRDoS Attacks: Latest Threats and Countermeasures Larry J. Blunk Spring 2014 MJTS 4/1/2014 Outline Evolution and history of DDoS attacks Overview of DRDoS attacks Ongoing DNS based attacks Recent NTP monlist
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
The curse of the Open Recursor. Tom Paseka Network Engineer [email protected]
The curse of the Open Recursor Tom Paseka Network Engineer [email protected] Recursors Why? Exist to aggregate and cache queries Not every computer run its own recursive resolver. ISPs, Large Enterprises
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
Defending against DNS reflection amplification attacks
University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013 Authors: Thijs Rozekrans Javy de Koning
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques
DNS Amplification Attacks as a DDoS Tool and Mitigation Techniques Klaus Steding-Jessen [email protected]! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br Brazilian
Creating a master/slave DNS server combination for your Grid Infrastructure
Creating a master/slave DNS server combination for your Grid Infrastructure When doing a Grid Infrastructure installation, a DNS server is needed to resolve addresses for the cluster- scan addresses. In
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
Harness Your Internet Activity!
Harness Your Internet Activity Random Subdomain Attacks Plaguing the Internet Agenda Brief Intro Covered at last OARC Attack overview Latest data Progress on open dns proxies in home gateways Impact of
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)
Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Reverse DNS considerations for IPv6
Reverse DNS considerations for IPv6 Kostas Zorbadelos OTE David Freedman - ClaraNet Reverse DNS in IPv4 Every Internet-reachable host should have a name Make sure your PTR and A records match. For every
DNS SECURITY TROUBLESHOOTING GUIDE
DNS SECURITY TROUBLESHOOTING GUIDE INTERNET DEPLOYMENT OF DNS SECURITY 27 November 2006 Table of Contents 1. INTRODUCTION...3 2. DNS SECURITY SPECIFIC FAILURE MODES...3 2.1 SIGNATURES...3 2.1.1 Signature
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
DNSSEC and DNS Proxying
DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
DNS Record Injection Vulnerabilities in Home Routers
DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp, Tom Callahan, Michael Rabinovich, Mark Allman Case Western Reserve University International Computer Science Institute 1 Attacks targeting
Domain Name System Security
Abstract Domain Name System Security Ladislav Hagara [email protected] Department of Automated Command Systems and Informatics Military Academy in Brno Brno, Czech Republic Domain Name System (DNS) is one of
Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin
Domain Name System: DNS Objective: map names to IP addresses (i.e., high level names to low level names) Original namespace was flat, didn t scale.. Hierarchical naming permits decentralization by delegating
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013
Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai
DNS : Domain Name System
1/30 DNS : Domain Name System Surasak Sanguanpong [email protected] http://www...ac.th/~nguan Last updated: May 24, 1999 Outline 2/30 DNS basic name space name resolution process protocol configurations Why
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
DNS. Computer Networks. Seminar 12
DNS Computer Networks Seminar 12 DNS Introduction (Domain Name System) Naming system used in Internet Translate domain names to IP addresses and back Communication works on UDP (port 53), large requests/responses
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
Enabling DNS for IPv6 CSD Fall 2011
Enabling DNS for IPv6 CSD Fall 2011 Team members: Bowei Dai [email protected] 15 credits Elis Kullberg [email protected] 18 credits Hannes Junnila [email protected] 15 credits Nur Mohammad Rashed [email protected] 15 credits
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
Forouzan: Chapter 17. Domain Name System (DNS)
Forouzan: Chapter 17 Domain Name System (DNS) Domain Name System (DNS) Need System to map name to an IP address and vice versa We have used a host file in our Linux laboratory. Not feasible for the entire
How To Understand The Effect Of A Domain Name Extension On A Network Attack On A Domain Names Server (Dns)
DNSSEC and Its Potential for DDoS Attacks A Comprehensive Measurement Study Roland van Rijswijk-Deij University of Twente and SURFnet bv [email protected] Anna Sperotto University of Twente [email protected]
The role of JANET CSIRT
The role of JANET CSIRT Bradley Freeman JANET(UK) CSIRT Member UKNOF 15 21 st January 2010 [email protected] Copyright JNT Association 2009 1 What to expect Overview of how we detect and deal with
DNS Resolving using nslookup
DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based
DNS zone transfers from FreeIPA to non-freeipa slave servers
FreeIPA Training Series DNS zone transfers from FreeIPA to non-freeipa slave servers FreeIPA 3.0 and bind-dyndb-ldap 2.3 Petr Špaček 01-03-2013 Text file based
How To Protect A Dns Authority Server From A Flood Attack
the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
IPv6 Support in the DNS. Workshop Name Workshop Location, Date
IPv6 Support in the DNS Workshop Name Workshop Location, Date Agenda How important is the DNS? DNS Resource Lookup DNS Extensions for IPv6 Lookups in an IPv6-aware DNS Tree About Required IPv6 Glue in
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
DNS Conformance Test Specification For Client
DNS Conformance Test Specification For Client Revision 1.0 Yokogawa Electric Corporation References This test specification focus on following DNS related RFCs. RFC 1034 DOMAIN NAMES - CONCEPTS AND FACILITIES
Coordinación. The background image of the cover is desgned by http://www.freepik.com/ GUIDE TO DNS SECURITY 2
Autor Antonio López Padilla Coordinación Daniel Fírvida Pereira This publication belongs to INTECO (Instituto Nacional de Tecnologías de la Comunicación) and is under an Attribution- NonCommercial 3.0
Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)
Unbound a caching, validating DNSSEC resolver UKUUG Spring 2011 Conference Leeds, UK March 2011 Jan-Piet Mens $ dig 1.1.0.3.3.0.8.1.7.1.9.4.e164.arpa naptr Do you trust your name server? DNS clients typically
DDoS attacks & other online vulnerabilities
DDoS attacks & other online vulnerabilities Mitigating common threats 1 888 99 FLARE [email protected] www.cloudflare.com Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks
DNS Pharming Attack Lab
CNT 5410 - Fall 2014 1 DNS Pharming Attack Lab (This is a modified version of the exercise listed below. Modifications are to provide tighter configuration so as to minimize the risk of traffic leaving
DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)
DNS Some advanced topics Karst Koymans (with Niels Sijm) Informatics Institute University of Amsterdam (version 2.6, 2013/09/19 10:55:30) Friday, September 13, 2013 Karst Koymans (with Niels Sijm) (UvA)
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference
what s in a name? taking a deeper look at the domain name system mike boylan penn state mac admins conference whoami work for robert morris university, pittsburgh, pa primarily mac and voip admin @mboylan
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Table of Contents DNS. How to package DNS messages. Wire? DNS on the wire. Some advanced topics. Encoding of domain names.
Table of Contents DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 154, 2015/09/14 10:44:10) Friday, September 11, 2015 DNS on the wire Encoding of domain names
Response Differences between NSD and other DNS Servers
Response Differences between NSD and other DNS Servers Jelte Jansen, NLnet Labs Wouter Wijngaards, NLnet Labs NLnet Labs document 2006-004 September 5, 2006 Abstract This note describes observed differences
HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V
SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks
SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks A Report from the ICANN Security and Stability Advisory Committee (SSAC) March 2006 Page 1 of 16 Executive Summary In early February
DNS Session 4: Delegation and reverse DNS. Joe Abley AfNOG 2006 workshop
DNS Session 4: Delegation and reverse DNS Joe Abley AfNOG 2006 workshop How do you delegate a subdomain? In principle straightforward: just insert NS records for the subdomain, pointing at someone else's
Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies APNIC 36 26 th August 2013
Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies APNIC 36 26 th August 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai
Module 2. Configuring and Troubleshooting DNS. Contents:
Configuring and Troubleshooting DNS 2-1 Module 2 Configuring and Troubleshooting DNS Contents: Lesson 1: Installing the DNS Server Role 2-3 Lesson 2: Configuring the DNS Server Role 2-9 Lesson 3: Configuring
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Operational Problems in IPv6: Fallback and DNS issues
Operational Problems in : Fallback and DNS issues Tomohiro Fujisaki, Arifumi Matsumoto, Katsuyasu Toyama,Tsuyoshi Toyono and Shirou Niinobe Nippon Telegraph and Telephone Corporation Network problems associated
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
THE DOMAIN NAME SYSTEM DNS
Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace
Hostnames. HOSTS.TXT was a bottleneck. Once there was HOSTS.TXT. CSCE515 Computer Network Programming. Hierarchical Organization of DNS
Hostnames CSCE 515: Computer Network Programming ------ Address Conversion Function and DNS RFC 1034, RFC 1035 Wenyuan Xu http://www.cse..edu/~wyxu/ce515f07.html Department of Computer Science and Engineering
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Networking Domain Name System
IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0) US-CERT Summary US-CERT has been alerted to an increase in distributed denial of service (DDoS) attacks using spoofed recursive DNS
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Teldat Router. DNS Client
Teldat Router DNS Client Doc. DM723-I Rev. 10.00 March, 2003 INDEX Chapter 1 Domain Name System...1 1. Introduction...2 2. Resolution of domains...3 2.1. Domain names resolver functionality...4 2.2. Functionality
Understand Names Resolution
Understand Names Resolution Lesson Overview In this lesson, you will learn about: Domain name resolution Name resolution process steps DNS WINS Anticipatory Set 1. List the host name of 4 of your favorite
IPv6 support in the DNS
IPv6 support in the DNS How important is the DNS? Getting the IP address of the remote endpoint is necessary for every communication between TCP/IP applications Humans are unable to memorize millions of
2.0 Dual WAN Select Dual-WAN, you will see the following screen shot, Figure 0.1(Dual-WAN Screen Shot) Figure 0.1(Dual-WAN Screen Shot)
Dual WAN Configuration 1.0 Login First login to Management UI, (192.168.1.1) default router IP You will be requiring entering the user name and password, which are both admin by default. Select System
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
DNS Service on Linux. Supawit Wannapila CCNA, RHCE [email protected]
DNS Service on Linux Supawit Wannapila CCNA, RHCE [email protected] Host Name Resolution Common Host Name Service Files (/etc/hosts and /etc/networks) DNS (/etc/resolv.conf) Multiple client-side resolvers:
How to Enable Internet for Guest Virtual Machine using Wi-Fi wireless Internet Connection.
How to Enable Internet for Guest Virtual Machine using Wi-Fi wireless Internet Connection. Table of Contents 1) Host, Guest and VBox version.... 2 2) Check your current Host and Guest Details... 3 3) Now
Domain Name System (DNS)
Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION
The Domain Name System: An Integral Part of the Internet. By Keiko Ishioka
The Domain Name System: An Integral Part of the Internet By Keiko Ishioka The Domain Name System (otherwise known as the Domain Name Server system) (DNS) is a distributed database that is accessed by anyone
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
Distributed Denial of Service Attacks
Distributed Denial of Service Attacks Steve Crocker Chair, SSAC June 25, 2007 San Juan, Puerto Rico 1 Agenda Types of Attacks DDoS attacks Amplified DDoS attacks - 2006 Estonia - May 2007 What do Do 2
Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
DNS amplification attacks
amplification attacks Matsuzaki Yoshinobu 2006/04/25 Copyright (C) 2006 Internet Initiative Japan Inc. 1 amplification attacks Attacks using IP spoofed dns query generating a traffic overload
How To Guide Edge Network Appliance How To Guide:
How To Guide Edge Network Appliance How To Guide: ActiveDNS v 4.01 Edge Network Appliance How To Guide: ActiveDNS 2007 XRoads Networks 17165 Von Karman, Suite 112 888-9-XROADS v 4.01 updated 09/11/07 Table
Using Webmin and Bind9 to Setup DNS Sever on Linux
Global Open Versity Systems Integration Hands-on Labs Training Manual Using Webmin and Bind9 to Setup DNS Sever on Linux By Kefa Rabah, [email protected] March 2008 Installing and Configuring
dnsperf DNS Performance Tool Manual
dnsperf DNS Performance Tool Manual Version 2.0.0 Date February 14, 2012 Copyright 2002-2012, Inc. - All Rights Reserved This software and documentation is subject to and made available pursuant to the
