Network Security. DNS (In)security. Radboud University, The Netherlands. Autumn 2015
|
|
|
- Damon Carson
- 10 years ago
- Views:
Transcription
1 Network Security DNS (In)security Radboud University, The Netherlands Autumn 2015
2 A short recap Routing means directing (Internet) traffic to its target Internet is divided into 52, 000 Autonomous Systems Routing inside an AS uses Interior Gateway Protocols (RIP, OSPF, IS-IS) Routing between ASs uses Border Gateway Protocol (BGP) Large-scale routing attacks are not suitable for homework... Smaller-scale attacks: Source-routing attacks ICMP redirect attacks Rogue DHCP (attacks not only routing) Firewalls are concepts to separate networks Common firewall concept: Packet filtering (iptables) iptables can also be used for NAT (and port forwarding) SSH, SSHuttle, and corkscrew are helpful tools to circumvent firewalls Network Security DNS (In)security 2
3 secure_redirects Recall ICMP redirects ( hey, I know a better route than the one you re using ) Last lecture: Enable/disable them through /proc/sys/net/ipv4/conf/*/accept_redirects Additional flag: /proc/sys/net/ipv4/conf/*/secure_redirects Meaning: Accept a redirect only to a known gateway Disables the idea of dumb clients that learn best routes from default gateway Network Security DNS (In)security 3
4 DNS and domain names So far: Configure hostname/ip pairs in /etc/hosts Important for local configuration (and overrides), but does not scale More flexible solution: Domain Name System (DNS) Idea: Query a server for a domain name, receive answer DNS typically uses UDP on port 53 Domain names have a hierarchy (different levels separated by. ) Highest domain: root domain (empty string) Next highest: top-level domains (TLDs), e.g.,.nl,.org,.eu Administration of top-level domains by Internet Corporation for Assigned Names and Numbers (ICANN) Administrations of domains below a TLD by registries, e.g., Stichting Internet Domeinregistratie Nederland (SIDN) for.nl DNS servers are typically resposible for one specific domain (DNS zone) Network Security DNS (In)security 4
5 DNS servers and requests Two kind of DNS servers: recursive and authoritative Recursive servers (or DNS caches) forward requests to other servers, remember (cache) the reply for a certain amount of time Authoritative servers are responsible for a certain domain (or DNS zone) and know the hosts in their domain, know the authoritative DNS servers of their subdomains Two types of requests: recursive or iterative Recursive request (to a DNS cache): give me the answer or an error Iterative request (to an authoritative server): give me the answer or tell me who might know Network Security DNS (In)security 5
6 DNS example You try to access sandor.cs.ru.nl, send request to DNS cache (e.g., ) may know the DNS server for top-level domain.nl: ns1.dns.nl asks ns1.dns.nl for ru.nl nameserver: ns1.surfnet.nl asks ip-int-ipam.uci.ru.nl for cs.ru.nl nameserver: ns2.science.ru.nl asks ns2.science.ru.nl for sandor.cs.ru.nl IP address: sandor.cs.ru.nl tells your client (e.g., SSH client) the IP address of sandor.cs.ru.nl Network Security DNS (In)security 6
7 DNS entry types Type A NS CNAME Meaning Address record: returns a 32-bit IP address, used to map hostnames to addresses Nameserver: Lists the authoritative nameservers of a DNS zone Canonical Name: Assigns a hostname alias to a hostname SOA Start Of Authority : Lists authoritative information about the zone: primary DNS server, mail address of administrator replaced by a.), serial number, refresh times and timeouts. MX TXT Mail Exchanger: Gives a mail server responsible for the domain Text field: Originally arbitrary human-readable text, today often used for machine-readable data Four sections in a DNS reply: The QUESTION SECTION (repetition of the question) The ANSWER SECTION The AUTHORITY SECTION The ADDITIONAL SECTION Network Security DNS (In)security 7
8 resolv.conf, dig, and whois The list of (recursive) nameservers to access is in /etc/resolv.conf It s typically dynamically updated from DHCP information This is another attack vector for rogue DHCP! Command-line tool to request DNS information: dig, examples: Find IP address of sandor.cs.ru.nl dig sandor.cs.ru.nl Ask ns1.dns.nl for ru.nl autoritative DNS servers of ru.nl: ru.nl NS Ask ns1.science.ru.nl for all information of science.ru.nl science.ru.nl ANY Reverse lookup hostname for : dig -x Find out about ICANN registration information of a domain: whois, e.g.: whois cryptojedi.org Network Security DNS (In)security 8
9 The DNS root servers Whenever a DNS server does not know the authoritative DNS servers of a Domain, it asks the DNS root servers DNS root servers are extremely critical piece of Internet infrastructure How many are there? Answer: 13 Names of these servers: a.root-servers.net... m.root-servers.net Those servers are actually highly redundant, some even distributed over the globe Network Security DNS (In)security 9
10 DNS tunneling Firewalls may block anything, but typically not DNS Idea: set up authoritative DNS server for some subdomain tunnel.mydomain.nl Encode SSH traffic as DNS requests to this server Tunnel SSH traffic through DNS This is slow (small payload, UDP is not reliable) Ready-made client/server: ozymandns by Kaminsky: Tutorial for DNS tunneling (with ozymandns): Network Security DNS (In)security 10
11 DNS DDoS amplification DNS (typically) uses UDP No session establishment: send request, get answer Answer can be much larger than the request Idea: Spoof IP address of DOS victim in DNS request Victim will receive much more data than attacker has to send This is called DNS (D)DOS amplification Network Security DNS (In)security 11
12 DNS DDoS countermeasures? Very hard to defend against DDOS (and DNS amplification) Can (temporarily) block packets from open DNS servers Can (temporarily) block large DNS reply packets Can try to filter spoofed IP addresses ( ingres and egress filtering ) Network Security DNS (In)security 12
13 DNS spoofing Probably most obvious DNS attack: send wrong answer Send wrong answer to client: hit one target Send wrong answer to DNS cache: hit many targets Answers contain validity period It s possible to poison DNS caches for a pretty long time Network Security DNS (In)security 13
14 In the old days $ ;; ANSWER SECTION: IN A ;; AUTHORITY SECTION: attacker.com IN NS ns1.attacker.com. ;; ADDITIONAL SECTION: ns1.attacker.com IN A IN A The bailiwick check Idea of the attack: wrong entry for ends up in cache Countermeasure (since 1997): use bailiwick check Reject ADDITIONAL information if the requested server is not authorized to answer for the domain Network Security DNS (In)security 14
15 Short interlude: A bailiwick Definition of BAILIWICK 1. the office or jurisdiction of a bailiff 2. a special domain Source: Definition of BAILIFF 1. a: an official employed by a British sheriff to serve writs and make arrests and executions b: a minor officer of some United States courts usually serving as a messenger or usher 2. chiefly British: one who manages an estate or farm Source: Network Security DNS (In)security 15
16 The race for the answer A client is asking for an IP address; if attacker answers first, he wins Not quite that easy: Request contains 16-bit Query ID (QID) DNS reply has to have the right ID Attacker has to guess the ID This is a bit similar to the TCP ISN in a session-stealing attack In the old days use simply increasing IDs: easy for an attacker to figure out Nowadays use randomized 16-bit ID The attacker can start the race: Lure victim to website at Include picture from Attacker sees website request, knows that DNS request for will follow Attacker can send many packets Attacker can also try to run DOS against real DNS server Network Security DNS (In)security 16
17 Kaminsky s attack (2008) Idea: Use website with many links on subdomains: <img src=" <img src=" <img src=" Victim will request all of those subdomains, race for each query Attacker crafts answer packet for each of those requests: ;; ANSWER SECTION: aaaa.target.com. 120 IN A ;; AUTHORITY SECTION: target.com IN NS ns.target.com. ;; ADDITIONAL SECTION: IN A The client requested the IP address with target.com domain The answer for passes the bailiwick check! The value defines the validity period of the information: 7 days Network Security DNS (In)security 17
18 Impact of Kaminsky s attack Network Security DNS (In)security 18
19 Source-port randomization Kaminsky s attack hit most big DNS server suites djbdns was not affected (same for PowerDNS, MaraDNS, and Unbound) djbdns randomizes the UDP source port Not just 16 bits of entropy to guess for an attacker but 32 bits Today, all DNS servers randomize the source port Potential problem with NAT: source port is rewritten Network Security DNS (In)security 19
20 Birthday attacks Imagine that a DNS server is sending out many identical requests (with different source port and QID) Attacker spoofs replies with different port+qid combinations Any collision with one of the requests wins Do servers send out identical requests? Some do, e.g., djbdns s dnscache (Kevin Day, 2009): Trigger 200 identical queries (default size of query queue) Need to be fast, send these queries before first reply is received Increase attacker s success probability from 1/2 32 to 200/2 32 Network Security DNS (In)security 20
21 More randomization? The QUESTION section of a DNS request is copied to the reply Some bits in the QUESTION section, don t matter: is the same as The 0x20 bit changes capitalization of letters Idea: Use this bit for extra entropy Slight problem: DNS standard does not require the QUESTION section to be copied bit-by-bit Other idea: query repetition (another 32 bits of entropy) Adds additional complications (not broadly implemented) Bernstein on randomization: It is clear that enough randomization effort would be able to stop all blind forgeries. Network Security DNS (In)security 21
22 The easy way... A passive MitM can read DNS requests Becoming a passive MitM is not that hard: Sniff WiFi ARP spoofing Be an ISP Be a network administrator in a company A DNS attacker can poison a DNS cache Affects many more clients than a MitM between clients! Network Security DNS (In)security 22
23 DNS censorship DNS can be used for censorship: April 1997: German provider DFN blocks IPs of xs4all.nl German Zugangserschwerungsgesetz Child Sexual Abuse Anti Distribution Filter (CSAADF) by CIRCAMP used in Denmark, Finland, Italy, Newzealand, Norway, Sweden und der Switzerland Idea in all these cases: redirect (spoof) DNS Circumvention: Use alternative DNS Source: Network Security DNS (In)security 23
24 DNSSEC Idea: Use cryptographically signed DNS entries Design descision: sign information offline: No need for expensive public-key crypto for each reply No need to hold the private keys on DNS servers Public keys are authenticated through a chain of trust Root of trust: public keys of the DNS root servers Additional (cryptographic) information in new DNS entry types: RRSIG: DNSSEC signature DNSKEY: public key to verify signature Network Security DNS (In)security 24
25 More amplification! DNSSEC does not increase the size of DNS requests DNSSEC does significantly increase the size of DNS replies Modern DDOS uses DNS+DNSSEC RFC 4033: DNSSEC provides no protection against denial of service attacks. Security-aware resolvers and security-aware name servers are vulnerable to an additional class of denial of service attacks based on cryptographic operations. Network Security DNS (In)security 25
26 DNS zone enumeration You want DNS to answer a request for domain names You do not want to hand out a list of all domain names Finding all hosts in a DNS zone is called zone enumeration Problem for DNSSEC: offline-signed answer for non-existing entries (negative answer) First solution: Don t sign (bad idea, can use for attack) Second idea: Sign There is no name between smtp.example.com and This trivially allows zone enumeration: Try some hostname, this will give you 1 or 2 valid hostnames Try just before (alphabetically) a valid hostname: find previous Try just after (alphabetically) a valid hostname: find next RFC 4033: DNSSEC introduces the ability for a hostile party to enumerate all the names in a zone by following the NSEC chain. Network Security DNS (In)security 26
27 NSEC3 Idea: Hash domain names, sign information on gaps between existing hashes Example: request for (non-existing) test.example.com Hash test.example.com (with SHA-1), obtain: 401f83bc96721eeeba6f5c1c54cf0a83dc08a30b Signed answer: There is no name with hash between dddd23cf6cf00f5d6ad9a45cd0a8e03 and 512e9305c87f4f1ccdbacb80c559f3dce496ae29. Problem: Can revert these hashes Wait, shouldn t it be hard to compute preimages of hashes? Well, domain names are not that hard to guess, can just try valid domain names, e.g dddd23cf6cf00f5d6ad9a45cd0a8e03 smtp.example.com 512e9305c87f4f1ccdbacb80c559f3dce496ae29 Software by Niederhagen: Try 6000 billion hashes per week on NVIDIA GTX295 GPU This is much faster than trying domain names through DNS queries Network Security DNS (In)security 27
28 More DNSSEC problems Second implication of offline-signed records: replay attacks Attack scenario: Company runs server at DNS server sends signed name resolution for this name/ip, attacker records it Company moves or changes provider, now is at Attacker replays name resolution to DNSSEC uses bleeding-edge crypto (1024-bit RSA) DNSSEC does not encrypt queries; from RFC 4033: Due to a deliberate design choice, DNSSEC does not provide confidentiality Network Security DNS (In)security 28
29 DNSCurve Alternative to DNSSEC proposed by Bernstein: DNSCurve Idea is to encrypt and authenticate DNS traffic (not sign records) The idea is a bit similar to SSL/TLS (next lecture) DNSCurve does not have the problems that come with offline signing: No zone enumeration No replay attacks It also has other advantages over DNSSEC: Much stronger (and faster) crypto Much more limited amplification issues (replies grow, but so do requests) Confidentiality of DNS requests (encryption) Potential disadvantage of DNSCurve: crypto keys need to be on DNS servers Addional disadvantage: It s much easier to deploy than DNSSEC, does not create as many jobs for consultants Network Security DNS (In)security 29
30 More reading... Dan Bernstein about DNSCurve (and DNSSEC vulnerabilities): Dan Kaminsky s answer: DNSSEC Is Not Necessarily An Offline Signer In Fact, It Works Better Online! Network Security DNS (In)security 30
31 Next lecture: October 14, 10:30, in HG Network Security DNS (In)security 31
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
The Domain Name System from a security point of view
The Domain Name System from a security point of view Simon Boman Patrik Hellström Email: {simbo105, pathe321}@student.liu.se Supervisor: David Byers, {[email protected]} Project Report for Information Security
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works
DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!
DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come! Amir Herzberg and Haya Shulman Dept. of Computer Science Bar Ilan University 8/1/2013 About us Bar Ilan University
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
Network Security. Routing and Firewalls. Radboud University Nijmegen, The Netherlands. Autumn 2014
Network Security Routing and Firewalls Radboud University Nijmegen, The Netherlands Autumn 2014 A short recap IP spoofing by itself is easy Typically used in conjunction with other attacks, e.g.: DOS attacks
Lesson 13: DNS Security. Javier Osuna [email protected] GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna [email protected] GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
- Domain Name System -
1 Name Resolution - Domain Name System - Name resolution systems provide the translation between alphanumeric names and numerical addresses, alleviating the need for users and administrators to memorize
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Introduction to Network Operating Systems
As mentioned earlier, different layers of the protocol stack use different kinds of addresses. We can now see that the Transport Layer (TCP) uses port addresses to route data to the correct process, the
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Vendor and NGO's involved Two phase deployment First release a generic fix for the Kaminsky attack that does not leak information
Remote DNS Cache Poisoning Attack Lab
SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace
Motivation Domain Name System (DNS) IP addresses hard to remember Meaningful names easier to use Assign names to IP addresses Name resolution map names to IP addresses when needed Namespace set of all
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Section 1 Overview... 4. Section 2 Home... 5
ecogent User Guide 2012 Cogent Communications, Inc. All rights reserved. Every effort has been made to ensure that the information in this User Guide is accurate. Information in this document is subject
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Copyright 2012 http://itfreetraining.com
In order to find resources on the network, computers need a system to look up the location of resources. This video looks at the DNS records that contain information about resources and services on the
How to Add Domains and DNS Records
How to Add Domains and DNS Records Configure the Barracuda NextGen X-Series Firewall to be the authoritative DNS server for your domains or subdomains to take advantage of Split DNS or dead link detection.
Agenda. Network Services. Domain Names. Domain Name. Domain Names Domain Name System Internationalized Domain Names. Domain Names & DNS
Agenda Network Services Domain Names & DNS Domain Names Domain Name System Internationalized Domain Names Johann Oberleitner SS 2006 Domain Names Naming of Resources Problems of Internet's IP focus IP
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
ECE 4321 Computer Networks. Network Programming
ECE 4321 Computer Networks Network Programming Name Space System.Net Domain Name System (DNS) To resolve computer naming Host database is split up and distributed among multiple systems on the Internet
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
Defending against DNS reflection amplification attacks
University of Amsterdam System & Network Engineering RP1 Defending against DNS reflection amplification attacks February 14, 2013 Authors: Thijs Rozekrans Javy de Koning
High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago
High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,
Deploying DNSSEC: From End-Customer To Content
Deploying DNSSEC: From End-Customer To Content March 28, 2013 www.internetsociety.org Our Panel Moderator: Dan York, Senior Content Strategist, Internet Society Panelists: Sanjeev Gupta, Principal Technical
Networking Domain Name System
IBM i Networking Domain Name System Version 7.2 IBM i Networking Domain Name System Version 7.2 Note Before using this information and the product it supports, read the information in Notices on page
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
Networking Domain Name System
System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information
The Domain Name System
DNS " This is the means by which we can convert names like news.bbc.co.uk into IP addresses like 212.59.226.30 " Purely for the benefit of human users: we can remember numbers (e.g., telephone numbers),
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Network Fundamentals. 2010 Carnegie Mellon University
Network Fundamentals What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working Together
Definition of firewall
Internet Firewalls Definitions: firewall, policy, router, gateway, proxy NAT: Network Address Translation Source NAT, Destination NAT, Port forwarding NAT firewall compromise via UPnP/IGD Packet filtering
Understanding DNS (the Domain Name System)
Understanding DNS (the Domain Name System) A white paper by Incognito Software January, 2007 2007 Incognito Software Inc. All rights reserved. Understanding DNS (the Domain Name System) Introduction...2
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <[email protected]> Duisburg, June 19, 2015
The Impact of DNSSEC on the Internet Landscape Matthäus Wander Duisburg, June 19, 2015 Outline Domain Name System Security problems Attacks in practice DNS Security Extensions
Domain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
DNSSEC and DNS Proxying
DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for
How-to: DNS Enumeration
25-04-2010 Author: Mohd Izhar Ali Email: [email protected] Website: http://johncrackernet.blogspot.com Table of Contents How-to: DNS Enumeration 1: Introduction... 3 2: DNS Enumeration... 4 3: How-to-DNS
Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010
Presented by Greg Lindsay Technical Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group April 7, 2010 Windows 7 DNS client DNS devolution Security-awareness:
DNS + DHCP. Michael Tsai 2015/04/27
DNS + DHCP Michael Tsai 2015/04/27 lubuntu.ova http://goo.gl/bax8b8 DNS + DHCP DNS: domain name < > IP address DHCP: gives you a IP + configuration when you joins a new network DHCP = Dynamic Host Configuration
Coordinación. The background image of the cover is desgned by http://www.freepik.com/ GUIDE TO DNS SECURITY 2
Autor Antonio López Padilla Coordinación Daniel Fírvida Pereira This publication belongs to INTECO (Instituto Nacional de Tecnologías de la Comunicación) and is under an Attribution- NonCommercial 3.0
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
CS3250 Distributed Systems
CS3250 Distributed Systems Lecture 4 More on Network Addresses Domain Name System DNS Human beings (apart from network administrators and hackers) rarely use IP addresses even in their human-readable dotted
Resilient Networking. Overview of DNS Known attacks on DNS Denial-of-Service Cache Poisoning. Securing DNS Split-Split-DNS DNSSEC.
Resilient Networking 6: Attacks on DNS Overview of DNS Known attacks on DNS Denial-of-Service Cache Poisoning Securing DNS Split-Split-DNS DNSSEC SoSe 2014 Fachbereich Informatik Telecooperation Group
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
DNS Pharming Attack Lab
CNT 5410 - Fall 2014 1 DNS Pharming Attack Lab (This is a modified version of the exercise listed below. Modifications are to provide tighter configuration so as to minimize the risk of traffic leaving
DNS Domain Name System
Domain Name System DNS Domain Name System The domain name system is usually used to translate a host name into an IP address Domain names comprise a hierarchy so that names are unique, yet easy to remember.
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)
DNSSEC: A Vision Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Outline DNS Today DNS Attacks DNSSEC: An Approach Countering DNS Attacks Conclusion 2 DNS Today DNS is
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
DNS. Spring 2016 CS 438 Staff 1
DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
3. The Domain Name Service
3. The Domain Name Service n Overview and high level design n Typical operation and the role of caching n Contents of DNS Resource Records n Basic message formats n Configuring/updating Resource Records
Namecoin as alternative to the Domain Name System
Namecoin as alternative to the Domain Name System Xander Lammertink Author, UvA System and Network Engineering [email protected] Marco Davids Supervisor, SIDN Labs Abstract: This paper researches
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers
Domain Name Servers COMP76 Networked Computer Systems Internet Names Hierarchical starting from the right host.subnet.organization.type Names are case insensitive and can be in either upper or lower case.
Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Installing and Setting up Microsoft DNS Server
Training Installing and Setting up Microsoft DNS Server Introduction Versions Used Windows Server 2003 Setup Used i. Server Name = martini ii. Credentials: User = Administrator, Password = password iii.
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market
Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer
CPSC 360 Network Programming Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer Systems Michele Weigle Department of Computer Science Clemson University [email protected]
Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 09. Naming Paul Krzyzanowski Rutgers University Fall 2015 October 7, 2015 2014-2015 Paul Krzyzanowski 1 Naming things Naming: map names to objects Helps with using, sharing, and communicating
Attack and Defense Techniques
Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Domain Name System. Overview. Domain Name System. Domain Name System
Overview Domain Name System We look first at how the Domain Name System (DNS) is implemented and the role it plays in the Internet We examine some potential DNS vulnerabilities and in particular we consider
THE DOMAIN NAME SYSTEM DNS
Announcements THE DOMAIN NAME SYSTEM DNS Internet Protocols CSC / ECE 573 Fall, 2005 N. C. State University copyright 2005 Douglas S. Reeves 2 Today s Lecture I. Names vs. Addresses II. III. IV. The Namespace
