DNS Record Injection Vulnerabilities in Home Routers



Similar documents
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Attack and Defense Techniques

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)

Security of IPv6 and DNSSEC for penetration testers

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Securing the Transition Mechanisms

How To Understand A Network Attack

DNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Defeating DNS Amplification Attacks. Ralf Weber Senior Infrastructure Architect

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

DOMAIN NAME SECURITY EXTENSIONS

How To Protect A Dns Authority Server From A Flood Attack

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

DDoS Attacks Can Take Down Your Online Services

Acquia Cloud Edge Protect Powered by CloudFlare

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

CloudFlare advanced DDoS protection

DNS security: poisoning, attacks and mitigation

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Chapter 11 Cloud Application Development

A Very Incomplete Diagram of Network Attacks

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

DNS amplification attacks

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Exploiting Foscam IP Cameras.

Securing an Internet Name Server

Web Application Security

CS 558 Internet Systems and Technologies

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

An Intrusion Detection System for Kaminsky DNS Cache poisoning

Insecurity breeds at home

CSE 127: Computer Security. Network Security. Kirill Levchenko

UX5000 with CommPartners SIP Trunks

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net

DNS Best Practices. Mike Jager Network Startup Resource Center

SysSec 7 Network Security. Aurélien Francillon

What is Web Security? Motivation

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Content Distribution Networks (CDN)

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Shell over what?! Naughty CDN manipulations. Roee Cnaan, Information Security Consultant

ExamPDF. Higher Quality,Better service!

Arbor s Solution for ISP

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

CS 356 Lecture 16 Denial of Service. Spring 2013

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

A S B

Advanced Computer Networks. Layer-7-Switching and Loadbalancing

Putting the Tools to Work DDOS Attack

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

DDoS attacks in CESNET2

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

The curse of the Open Recursor. Tom Paseka Network Engineer

PolyServe Understudy QuickStart Guide

- Domain Name System -

Building Secure Network Infrastructure For LANs

CS514: Intermediate Course in Computer Systems

Internet Security [1] VU Engin Kirda

Guidelines for Web applications protection with dedicated Web Application Firewall

Use Domain Name System and IP Version 6

How To Block A Ddos Attack On A Network With A Firewall

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Application-layer protocols

Survey on DDoS Attack in Cloud Environment

The Domain Name System from a security point of view

DDoS Vulnerability Analysis of Bittorrent Protocol

Vulnerabili3es and A7acks

Debugging With Netalyzr

HOST AUTO CONFIGURATION (BOOTP, DHCP)

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

DNS Pinning and Web Proxies

1 Scope of Assessment

DNS at NLnet Labs. Matthijs Mekking

Web-Application Security

Check list for web developers

Web Application Hosting Cloud Architecture

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Infoblox Inc. All Rights Reserved. Talks about DNS: architectures & security

The Trivial Cisco IP Phones Compromise

Transcription:

DNS Record Injection Vulnerabilities in Home Routers Kyle Schomp, Tom Callahan, Michael Rabinovich, Mark Allman Case Western Reserve University International Computer Science Institute 1

Attacks targeting DNS resolvers Various attempts to poison DNS resolver caches Bailiwick violations Kaminsky vulnerability Tempting targets because they handle a large number of clients One successful attack many victims Mitigations for these problems Bailiwick rules nearly universally applied Transaction ID randomization, ephemeral port randomization, 0x20 encoding 16% of resolvers use static ephemeral port Kaminsky vulnerable 2

Open resolvers: a (still) growing problem openresolverproject.org indicates there are 27 million open resolvers on the Internet! Researchers found just 15 million open resolvers in 2008 Almost doubling in last 6 years (Recent downturn) But what are open resolvers? Leonard, Derek, and Dmitri Loguinov. "Demystifying service discovery: implementing an internet-wide scanner." Proceedings of the 10th ACM SIGCOMM conference on Internet measurement. ACM, 2010. 3

Many open resolvers are home routers The evidence Many open resolvers have names from the Alexa top 1,000 in cache Used low-end embedded device in residential location % of Open Resolvers RomPager embedded web server on port 80 24% Basic HTTP auth realm header (``3068 DSL-2641R'') 24% BPL listed by Spamhaus 51% BPL listed by ISP 17% DNS response from wrong port (self-nating) 48% Total 78% From a sample of 1 million open resolvers 4

Home routers as simple DNS forwarders Accept a request from a device www.google.com? Home Router Device Resolver 5

Home routers as simple DNS forwarders Accept a request from a device Forward the request to an upstream resolver www.google.com? www.google.com? Home Router Device Resolver 5

Home routers as simple DNS forwarders Accept a request from a device Forward the request to an upstream resolver Cache the response www.google.com? CACHE: www.google.com = G www.google.com? www.google.com = G Home Router Device Resolver 5

Home routers as simple DNS forwarders Accept a request from a device Forward the request to an upstream resolver Cache the response Return the response to the device CACHE: www.google.com? www.google.com = G www.google.com? www.google.com = G www.google.com = G Home Router Device Resolver 5

What could go wrong? besides home routers acting as open resolvers not a good thing Serious vulnerabilities have previously been discovered in resolvers operated by major DNS providers Might home routers have DNS vulnerabilities as well? 6

Preplay vulnerability Schomp, Kyle, and Tom Callahan, and Michael Rabinovich, and Mark Allman. Assessing DNS vulnerability to record injection." PAM 2014. Many home routers simply do not validate DNS responses Responses accepted from any source IP address / port Ephemeral port number not validated Transaction ID either unmodified in forwarding or not validated No guessing involved in the attacks at all! In open resolver samples, 7-9% have this vulnerability Estimate 2-3 million boxes on the Internet are vulnerable 7

Example preplay attack www.victim.com? Home Router Attacker Attacker sends request for domain name to poison Device 8

Example preplay attack www.victim.com? www.victim.com = A Home Router Attacker Attacker sends request for domain name to poison Attacker immediately sends a response binding to A (before response from shared resolver) Device 8

Example preplay attack www.victim.com? Attacker www.victim.com = A Home Router CACHE: www.victim.com = A Attacker sends request for domain name to poison Attacker immediately sends a response binding to A (before response from shared resolver) The home router inserts the binding into its cache Device 8

Example preplay attack www.victim.com? www.victim.com? Attacker www.victim.com = A Home Router CACHE: www.victim.com = A Attacker sends request for domain name to poison Attacker immediately sends a response binding to A (before response from shared resolver) The home router inserts the binding into its cache Client device subsequently requests domain name Device 8

Example preplay attack www.victim.com? www.victim.com? Attacker www.victim.com = A Home Router CACHE: www.victim.com = A www.victim.com = A Attacker sends request for domain name to poison Attacker immediately sends a response binding to A (before response from shared resolver) The home router inserts the binding into its cache Client device subsequently requests domain name Receives poison Device 8

But there s more Preplay vulnerability doesn t require any guessing Another 7-10% of home routers are only protected by a variable port number Guessing the correct port number from [0,65535] is hard But the selected port number may not be random 9

Why poison home router caches? Attack on major DNS resolver Complex attack Affects potentially thousands Detectable via IDS Poison whole domains Attack on home router Trivial to launch Single household affected No one s watching Poison single query string 10

Home routers putting us at risk Record injection not the only reason home routers are dangerous Reflection / DNS amplification attacks because they are open Indirect attacks on closed portions of the resolver infrastructure Home router x.com? Closed ISP Resolver Attacker 11

What can we do about this? Home router software doesn t get updated Wait a few years for hardware update Future models could have an automatic update feature Vendors can push security updates UDP/53 blocking to residential IP address ranges Nearly all home routers only accept DNS requests on port 53 Blocking would be effective *Some* use port 53 as the ephemeral port Care must be taken not to block their legitimate traffic Make exceptions for popular public DNS resolvers (i.e., 8.8.8.8) Might block other legitimate client traffic 12

Thank you! Questions? Kyle Schomp kgs7@case.edu 13