The Future of DNS. Johan Ihrén Netnod. October 15,
|
|
|
- Christine Lindsey
- 10 years ago
- Views:
Transcription
1 The Future of DNS Johan Ihrén Netnod October 15, 2015 Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, 1 / 16
2 The Future of DNS I have no idea about the future of DNS. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 2 / 16
3 The Future of DNS Fin. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, 3 / 16
4 The Future of DNS: Complexity Johan Ihrén Netnod October 15, 2015 Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, 4 / 16
5 Once upon a time DNS was simple In the early days, DNS was not considered a problem (but rather a solution) the only thing needed was the DNS server of course it was both authoritative and recursive everyone behaved nicely (at least regarding DNS) for a long time there was often only one server and only one implementation DNS server Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 5 / 16
6 Once upon a time DNS was simple In the early days, DNS was not considered a problem (but rather a solution) the only thing needed was the DNS server of course it was both authoritative and recursive everyone behaved nicely (at least regarding DNS) for a long time there was often only one server and only one implementation (BIND4.7.2beta26 if I remember correctly) However, things went south over time: good guys started doing bad things (split-dns, strange forwarding setups, policy-based responses, lots of rope everywhere) bad guys showed up doing bad things (also with DNS) Over time, the One True implementation started cracking at the seams Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 5 / 16
7 What happens when stuff is attacked (i.e. bad guys doing bad things and good guys doing stupid things)? Defenses get developed. defense may require new protocols and it most certainly requires new software, and not least new architectural solutions And therefore protocols get more complicated (DNSSEC, privacy stuff,...) software get more ////////////// complicated sophisticated (BIND4, BIND8, BIND9, [BIND10]) alternative approaches get traction (NSD, Unbound, PowerDNS, PDNS Recursor, Knot-DNS, Knot-DNS Resolver,...) Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, 6 / 16
8 Separation of Authoritative and Recursive Service For a long time it has been Best Current Practice to separate authoritative and recursive service authoritative service is simple and crucially important to customers, recursive service is difficult, and only important to your own organisation (ignoring ISPs for the moment) auth server recursive server However, most of the evolution happened in the authoritative end because of the primary funding source (TLD registries) This is likely a major reason for recursive service evolving much later than many of the changes in the authoritative service, in spite of recursive service being more complex from the start. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 7 / 16
9 Developments in Authoritative Service Anycast DNS is no longer just for root and TLDs it s rather well established also in the enterprise sector in five years I m sure that frightening fraction of mom-pop-and-the-dog zones will be anycast And while global anycast for a few dozen TLD zones is a well-known problem space, trying to do the same thing for hundreds of thousands or even millions of enterprise zones does pose significant technical challenges add stats gathering from a large anycast platform, DDOS defences and load balancing and it starts getting complicated anycast doesn t make monitoring and debugging any easier either Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 8 / 16
10 Developments in Authoritative Service Anycast DNS is no longer just for root and TLDs it s rather well established also in the enterprise sector in five years I m sure that frightening fraction of mom-pop-and-the-dog zones will be anycast And while global anycast for a few dozen TLD zones is a well-known problem space, trying to do the same thing for hundreds of thousands or even millions of enterprise zones does pose significant technical challenges add stats gathering from a large anycast platform, DDOS defences and load balancing and it starts getting complicated anycast doesn t make monitoring and debugging any easier either distribution master Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 8 / 16
11 Developments in Authoritative Service Anycast DNS is no longer just for root and TLDs it s rather well established also in the enterprise sector in five years I m sure that frightening fraction of mom-pop-and-the-dog zones will be anycast And while global anycast for a few dozen TLD zones is a well-known problem space, trying to do the same thing for hundreds of thousands or even millions of enterprise zones does pose significant technical challenges add stats gathering from a large anycast platform, DDOS defences and load balancing and it starts getting complicated anycast doesn t make monitoring and debugging any easier either distribution master Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 8 / 16
12 Load Balancing DNS? Is that really needed? Isn t anycast DNS supposed to solve that problem? Well, anycast is obviously a global form of load balancing, but that may not always be enough especially not when it becomes important to separate attack traffic from real traffic, to be able to provide service for the latter while getting rid of the former So how to do local load balancing for DNS? do it with a h/w load balancer that knows enough about DNS (extra h/w, possibly a new single point of failure) do it directly in the routing infrastructure (avoiding extra h/w) do it in software that knows a lot about DNS (eg. dnsdist) 1st auth server 2nd auth server 3rd auth server 4th auth server dnsdist Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 9 / 16
13 Developments in Recursive Service For a very long time Recursive Service = BIND9. then Unbound arrived and we finally had a modern recursive-only implementation as an alternative. then nothing happened for a long time again (because all funding was going into the authoritative side). But that is changing, and now we re rapidly getting more implementations of recursive servers to choose from designs like PDNS Recursor and Knot Resolver (which are both quite different from BIND9 and Unbound) are challenging the way to provide recursive service new things like confederations of recursive servers (that share cache and possibly other data) rate limiting also for recursive service (previously a no-no) Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 10 / 16
14 Implementation Space Once the mirage of only needing the One True Implementation of DNS (BIND) disappeared we started to see other implemenations. Authoritative: NSD YADIFA PowerDNS Knot-DNS And later on the recursive side: Unbound PDNS Recursor Knot-DNS Resolver Initially, they were rather similar, but over time they are becoming more and more different in various ways. The choice is becoming more difficult... and more imporant. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, 11 / 16
15 Configuration Plane Complexity DNS is migrating from a static service (or set of services) that is configured via a static config file to a dynamic service that is configured in other ways : configuration via database configuration via APIs scriptable configs with CLI access to the nameserver Interestingly, two of the most interesting new recursive servers (PDNS Recursor and Knot-DNS Resolver) provide high-level scripting of configs via built in Lua support. while I m all for Lua, it is clear that being able to script entire new functions that modify the server behaviour... will be used in creative ways also, this breaks the old assumption that server behaviour can be understood from the config file. Now there s a running config and a written config and they can be different Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 12 / 16
16 Development of APIs As DNS space consolidates and fewer providers provide service for vast numbers of zones (athoritative service) or vast numbers of users (recursive service) but always with vast numbers of servers, the configuration file disappears. one of the new requirements on DNS service is becoming API access What is that? Well, there are provisioning APIs (adding and removing zones, modifying content of zones, etc) stats APIs (returning statistics and sometimes pretty graphics) management APIs (managing servers, modifying policies, etc) With the APIs follow new needs for authentication and authorization models. And later perhaps standardization work. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, 13 / 16
17 DNSSEC Complexity DNSSEC is no longer a novelty, it s in wide use and millions of zones are signed (in.se about 40% of the delegations are signed and there are other TLDs with even higher DNSSEC adoption). However, just because many zones are signed (i.e. someone figured out how to sign the zone and perhaps even do KSK rollovers) doesn t mean there aren t problems. DNSSEC keys are a headache. Keep them in the filesystem and you go mad. Keep them in an HSM and... you get to deal with the HSM. HSMs can break. HSMs have a different set of vulnerabilities than DNS. At some point the HSMs need replacement (i.e. an HSM rollover ). regardless of whether HSMs are used or not, at some point DNSSEC algorithm rollovers will be needed. Those make KSK rollovers seems trivial by comparision. Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 14 / 16
18 Policy Knobs and the Resulting Complexity Another major change in DNS service is the increasing breakage of the assumption that the contents of the zone defines the answer that the stub resolver (i.e. the end user) should get. There are an increasing amount of policy knobs in the authoritative space: geography-based responses, multiple levels of split-dns (now also with DNSSEC), etc And even more in the recursive area: RPZ (response-policy-zones) all sorts of local overrides that modify the response received from the authoritative servers loadable modules and scripting support specifically designed for reponse modification An interesting sub-topic here is the future clash between DNSSEC (which is designed to detect in-flight modifications to responses) and the percieved need for recursive tweaks that do just that... Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, 15 / 16
19 Some Predictions for the Future 1 The drivers for further DNS evolution remain DNS service and routing is becoming more and more mixed up due to prevalent use of anycast, both for authoritative and for recursive service hence DNS will continue to become an ever more complex service with increasing complexity more and more of the hobbyist level DNS service will be edged out 2 DNS is becoming a more professionalised service with a smaller number of professional providers however, fewer providers implies ever more zones per provider (and the zone count is not going down) which by itself adds complexity 3 DNS consulting will remain a good field of work Netnod Customer Mtg, Oct 2015, October 15, 2015, DNS and Complexity, [email protected] 16 / 16
DNSSEC Applying cryptography to the Domain Name System
DNSSEC Applying cryptography to the Domain Name System Gijs van den Broek Graduate Intern at SURFnet Overview First half: Introduction to DNS Attacks on DNS Second half: DNSSEC Questions: please ask! DNSSEC
THE MASTER LIST OF DNS TERMINOLOGY. First Edition
THE MASTER LIST OF DNS TERMINOLOGY First Edition DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To
THE MASTER LIST OF DNS TERMINOLOGY. v 2.0
THE MASTER LIST OF DNS TERMINOLOGY v 2.0 DNS can be hard to understand and if you re unfamiliar with the terminology, learning more about DNS can seem as daunting as learning a new language. To help people
PowerDNS Introduction
PowerDNS Introduction OX Summit 2015 All presentations will be on: https://www.powerdns.com/oxsummit PowerDNS History Founded in 1999 to provide database driven DNS + geographical load balancing between
ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE
ANATOMY OF A DDoS ATTACK AGAINST THE DNS INFRASTRUCTURE ANATOMY OF A DDOS ATTACK AGAINST THE DNS INFRASTRUCTURE The Domain Name System (DNS) is part of the functional infrastructure of the Internet and
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] http://www.nlnetlabs.nl/ 28 Feb 2013 Stichting NLnet Labs
page 1 DNS Rate Limiting W. Matthijs Mekking [email protected] page 2 One slide DNS Root www.nlnetlabs.nl A Referral: nl NS www.nlnetlabs.nl A 213.154.224.1 www.nlnetlabs.nl A www.nlnetlabs.nl A 213.154.224.1
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
A Survey of cctld DNS Vulnerabilities. ITU cctld Workshop March 3, 2003 [email protected]
A Survey of cctld DNS Vulnerabilities ITU cctld Workshop March 3, 2003 [email protected] RATIONALE Health-check on DNS infrastructure > Now becoming a critical national resource Attacks on DNS servers
Network Infrastructure Under Siege
Network Infrastructure Under Siege Char Sample Security Engineer, CERT Information Security Decisions TechTarget Disclaimer Standard Disclaimer - This talk represents the opinions and research of the presenter
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers Agenda How do you
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without
DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS
AFNIC s Issue Papers DNSSEC Domain Name System Security Extensions 1 - Organisation and operation of the DNS 2 - Cache poisoning attacks 3 - What DNSSEC can do 4 - What DNSSEC cannot do 5 - Using keys
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
Harness Your Internet Activity!
Harness Your Internet Activity Random Subdomain Attacks Plaguing the Internet Agenda Brief Intro Covered at last OARC Attack overview Latest data Progress on open dns proxies in home gateways Impact of
Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion
Deploying IP Anycast Core DNS Services for University of Minnesota Introduction and General discussion Agenda Deploying IPv4 anycast DNS What is ANYCAST Why is ANYCAST important? Monitoring and using ANYCAST
DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. [email protected] and [email protected]. http://www.nlnetlabs.nl/ 8 Feb 2006 Stichting NLnet Labs
DNS Risks, DNSSEC Olaf M. Kolkman and Allison Mankin [email protected] and [email protected] 8 Feb 2006 Stichting NLnet Labs DNSSEC evangineers of the day Allison: Independent consultant Member of the Internet2
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)
5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep) survey says: There are things that go bump in the night, and things that go bump against your DNS security. You probably know
DNSSEC and DNS Proxying
DNSSEC and DNS Proxying DNS is hard at scale when you are a huge target 2 CloudFlare DNS is big 3 CloudFlare DNS is fast 4 CloudFlare DNS is always under attack 5 CloudFlare A secure reverse proxy for
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION
USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure method for communicating in the Domain Name System (DNS) from a primary to a secondary
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
DNSSEC Deployment a case study
DNSSEC Deployment a case study Olaf M. Kolkman [email protected] RIPE NCCs Project Team: Katie Petrusha, Brett Carr, Cagri Coltekin, Adrian Bedford, Arno Meulenkamp, and Henk Uijterwaal Januari 17, 2006
All about the PowerDNS nameserver and how you can use it.
PowerDNS.COM BV All about the PowerDNS nameserver and how you can use it. bert hubert [email protected] http://wiki.powerdns.com - http://www.powerdns.com http://netherlabs.nl What is PowerDNS? PowerDNS
Defending your DNS in a post-kaminsky world. Paul Wouters <[email protected]>
Defending your DNS in a post-kaminsky world Paul Wouters Overview History of DNS and the Kaminsky attack Various DNS problems explained Where to address the DNS problem Nameservers,
DNSSEC in your workflow
DNSSEC in your workflow Presentation roadmap Overview of problem space Architectural changes to allow for DNSSEC deployment Deployment tasks Key maintenance DNS server infrastructure Providing secure delegations
Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011
The Internet is for Everyone. Become an ISOC Member. Cyber Security Symposium 2011 Where is Hong Kong in the secure Internet infrastructure development Warren Kwok, CISSP Internet Society Hong Kong 12
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/
The story of dnsdist - or - Do we need a DNS Delivery Controller? http://dnsdist.org/ PowerDNS Very briefly so you know where we come from Open source nameserver, around since 2000, open source since 2002,
Building Nameserver Clusters with Free Software
Building Nameserver Clusters with Free Software Joe Abley, ISC NANOG 34 Seattle, WA, USA Starting Point Discrete, single-host authoritative nameservers several (two or more) several (two or more) geographically
F-Root's DNSSEC Signing Plans. Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010
F-Root's DNSSEC Signing Plans Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010 What is ISC? Internet Systems Consortium, Inc. Headquartered in Redwood City, California
The Survey Report on DNS Cache & Recursive Service in China Mainland
The Survey Report on DNS Cache & Recursive Service in China Mainland Wei WANG, Chinese Academy of Sciences Zhiwei YAN, China Internet Network Information Center Motivation Improve the traditional recursive
Products, Features & Services
Products, Features & Services PowerDNS PowerDNS, founded in the late 1990s, is a premier supplier of DNS software, services and support. Deployed throughout the world with some of the most demanding users
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
IPV6 SERVICES DEPLOYMENT
IPV6 SERVICES DEPLOYMENT LINX IPv6 Technical Workshop - March 2009 Jaco Engelbrecht Group Platforms Manager, clara.net DNS root zone goes AAAA! On 4 th February 2008 IANA added AAAA records for the A,
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment
DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment Dan York, CISSP Senior Content Strategist, Internet Society Eurasia Network Operators' Group (ENOG) 4 Moscow, Russia October
A versatile platform for DNS metrics with its application to IPv6
A versatile platform for DNS metrics with its application to IPv6 Stéphane Bortzmeyer AFNIC [email protected] RIPE 57 - Dubai - October 2008 1 A versatile platform for DNS metrics with its application
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution
F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution As market leaders in the application delivery market and DNS, DHCP, and IP Address Management (DDI) market
How To Plan For Cloud Computing
Minutes on Modern Finance Best Practice Series Tax Implications of Cloud Computing: What Every CFO Needs to Know Lost in the Cloud The Tax Implications of Cloud Computing If you re like most chief financial
DNSSEC for Everybody: A Beginner s Guide
DNSSEC for Everybody: A Beginner s Guide San Francisco, California 14 March 2011 4:00 to 5:00 p.m. Colonial Room The Schedule 2 This is Ugwina. She lives in a cave on the edge of the Grand Canyon... This
High-Performance DNS Services in BIG-IP Version 11
F5 White Paper High-Performance DNS Services in BIG-IP Version 11 To provide high-quality user experiences on the Internet, networks must be designed with optimized, secure, highly available, and high-performance
Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)
Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business
Akamai CDN, IPv6 and DNS security. Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013
Akamai CDN, IPv6 and DNS security Christian Kaufmann Akamai Technologies DENOG 5 14 th November 2013 Agenda Akamai Introduction Who s Akamai? Intelligent Platform & Traffic Snapshot Basic Technology Akamai
How To Use The Domain Name Server (Dns)
DNS Out There... Lars- Johan Liman, M.Sc. Sr. Systems Specialist Netnod Internet Exchange Bear in Mind... One DB to Rule Them All... DNS in a database. DNS is one database that is distributed over many
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
F5 Intelligent DNS Scale. Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689
F5 Intelligent Scale Philippe Bogaerts Senior Field Systems Engineer mailto: [email protected] Mob.: +32 473 654 689 Intelligent and scalable PROTECTS web properties and brand reputation IMPROVES web application
Unbound a caching, validating DNSSEC resolver. Do you trust your name server? Configuration. Unbound as a DNS cache (SEC-less)
Unbound a caching, validating DNSSEC resolver UKUUG Spring 2011 Conference Leeds, UK March 2011 Jan-Piet Mens $ dig 1.1.0.3.3.0.8.1.7.1.9.4.e164.arpa naptr Do you trust your name server? DNS clients typically
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
PowerDNS dnsdist. NLUUG Najaarsconferentie 2015. Presentation is on: https://www.powerdns.com/nluug. http://dnsdist.org/
PowerDNS dnsdist NLUUG Najaarsconferentie 2015 Presentation is on: https://www.powerdns.com/nluug http://dnsdist.org/ [email protected] / @powerdns_bert Outline PowerDNS/Open-Xchange/Dovecot/Bert
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
A Technical Overview of.tel. Jim Reid [email protected]
A Technical Overview of.tel Jim Reid [email protected] Introduction Why.tel is different Architectural overview Technical/business considerations DNS characteristics/challenges Why.tel is different Not just
How To Set Up A Net Integration Firewall
Net Integration Technologies, Inc. http://www.net itech.com Net Integrator Firewall Technical Overview Version 1.00 TABLE OF CONTENTS 1 Introduction...1 2 Firewall Architecture...2 2.1 The Life of a Packet...2
Securing DNS Infrastructure Using DNSSEC
Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias [email protected] February 28, 2009 Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING
PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD
DNS and BIND. David White
DNS and BIND David White DNS: Backbone of the Internet Translates Domains into unique IP Addresses i.e. developcents.com = 66.228.59.103 Distributed Database of Host Information Works seamlessly behind
NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS
NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng
DNS Measurements, Monitoring & Quality Control
DNS Measurements, Monitoring & Quality Control Universität Bielefeld [email protected] CENTR General Assembly Budapest, 2003-06-02 CENTR GA 2003-06-02 DNS Monitoring 1 of 18 The Monitor Some
CENSURFRIDNS a.k.a. UNCENSOREDDNS. Thomas Steen Rasmussen [email protected]
CENSURFRIDNS a.k.a. UNCENSOREDDNS Thomas Steen Rasmussen [email protected] Agenda Introduction DNS blocking in Denmark What is UncensoredDNS? Why was it started? Issues with DNS blocking A basic conflict:
The F5 Intelligent DNS Scale Reference Architecture.
The F5 Intelligent DNS Scale Reference Architecture. End-to-end DNS delivery solutions from F5 maximize the use of organizational resources, while remaining agile and intelligent enough to scale and support
Distributed Denial of Service Attacks
Distributed Denial of Service Attacks Steve Crocker Chair, SSAC June 25, 2007 San Juan, Puerto Rico 1 Agenda Types of Attacks DDoS attacks Amplified DDoS attacks - 2006 Estonia - May 2007 What do Do 2
How To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Reducing the Impact of Amplification DDoS Attack
Reducing the Impact of Amplification DDoS Attack hello! I am Tommy Ngo I am here to present my reading: reducing the impact of amplification DDoS attack 2 1. Background Let s start with what amplification
Lecture 2 CS 3311. An example of a middleware service: DNS Domain Name System
Lecture 2 CS 3311 An example of a middleware service: DNS Domain Name System The problem Networked computers have names and IP addresses. Applications use names; IP uses for routing purposes IP addresses.
Networking Domain Name System
System i Networking Domain Name System Version 6 Release 1 System i Networking Domain Name System Version 6 Release 1 Note Before using this information and the product it supports, read the information
STATE OF DNS AVAILABILITY REPORT
STATE OF DNS AVAILABILITY REPORT VOLUME 1 ISSUE 1 APRIL 2011 WEB SITES AND OTHER ONLINE SERVICES ARE AMONG THE MOST IMPORTANT OPERATIONAL AND REVENUE GENERATING TOOLS FOR BUSINESSES OF ALL SIZES AND INDUSTRIES.
Networking Domain Name System
System i Networking Domain Name System Version 5 Release 4 System i Networking Domain Name System Version 5 Release 4 Note Before using this information and the product it supports, read the information
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
Application Note. SIP Domain Management
Application Note SIP Domain Management 28 March 2008 Table of Contents 1 WHAT IS A SIP DOMAIN?... 1 2 LOCAL SIP DOMAIN... 2 3 OTHER SIP DOMAIN... 3 4 DNS CONSIDERATIONS... 4 5 USING A PUBLIC DNS... 5 6
Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
iseries DNS iseries DNS Copyright International Business Machines Corporation 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule
Yahoo Attack. Is DDoS a Real Problem?
Is DDoS a Real Problem? Yes, attacks happen every day One study reported ~4,000 per week 1 On a wide variety of targets Tend to be highly successful There are few good existing mechanisms to stop them
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
Part 5 DNS Security. SAST01 An Introduction to Information Security 2015-09-21. Martin Hell Department of Electrical and Information Technology
SAST01 An Introduction to Information Security Part 5 DNS Security Martin Hell Department of Electrical and Information Technology How DNS works Amplification attacks Cache poisoning attacks DNSSEC 1 2
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010
Presented by Greg Lindsay Technical Writer Windows Server Information Experience Presented at: Seattle Windows Networking User Group April 7, 2010 Windows 7 DNS client DNS devolution Security-awareness:
DNS Response Policy Zones Roadmap to Accellerate Adoption
DNS Response Policy Zones Roadmap to Accellerate Adoption Hugo M. Connery Based on input from the DNS RPZ Community June 28, 2013 Contents 1 Introduction 1 1.1 Audience....................................
How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address
DNS Amplification Are YOU Part of the Problem? (RIPE66 Dublin, Ireland - May 13, 2013) Merike Kaeo Security Evangelist, Internet Identity [email protected] INTRO Statistics on DNS Amplification
DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .
Computer System Security and Management SMD139 Lecture 5: Domain Name System Peter A. Jonsson DNS Translation of Hostnames to IP addresses Hierarchical distributed database DNS Hierarchy The Root Name
IANA Functions to cctlds Sofia, Bulgaria September 2008
IANA Functions to cctlds Sofia, Bulgaria September 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers What is IANA? Internet Assigned Numbers Authority
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
DNS. DNS Fundamentals. Goals of this lab: Prerequisites: LXB, NET
DNS DNS Fundamentals Goals of this lab: Learn how the domain name system works Learn about tools to test and troubleshoot DNS Learn how to deploy a basic DNS service Prerequisites: LXB, NET REVISION: 2.0
