DNS as a Control Point for Cyber Risk. Dr. Paul Vixie, CEO Farsight Security



Similar documents
DNS as a Forensics Tool. Dr. Paul Vixie, CEO Farsight Security, Inc FIRST, Boston

Domain Name Abuse: How Cheap New Domain Names Fuel The ecrime Economy

DNS Firewalls with BIND: ISC RPZ and the IID Approach. Tuesday, 26 June 2012

Response Policy Zones

Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl 28 Feb 2013 Stichting NLnet Labs

DNS at NLnet Labs. Matthijs Mekking

DNS Response Policy Zone (DNSRPZ)

Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS. Dr. Paul Vixie, CEO, Farsight Security, Inc.

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

Domain Name System :49:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Internet Security [1] VU Engin Kirda

Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall

DNSSEC and DNS Proxying

Lecture 2 CS An example of a middleware service: DNS Domain Name System

Talk-101 User Guide. DNSGate

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

Description: Objective: Attending students will learn:

Firewalls 1 / 43. Firewalls

How to set up the Integrated DNS Server for Inbound Load Balancing

We Know It Before You Do: Predicting Malicious Domains

3. The Domain Name Service

WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA

DNS. Some advanced topics. Karst Koymans. (with Niels Sijm) Informatics Institute University of Amsterdam. (version 2.6, 2013/09/19 10:55:30)

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

FAQ (Frequently Asked Questions)

Glossary of Technical Terms Related to IPv6

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

Web Hosting 101. with Patrick McNeil

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, DNS & IPv6.

ThreatSTOP Technology Overview

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

DNS. DNS Fundamentals. Goals of this lab: Prerequisites: LXB, NET

Domain Name System (DNS) Fundamentals

How to Configure the Windows DNS Server

Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution

Copyright

CS3250 Distributed Systems

Chapter 11 Cloud Application Development

SIE, PassiveDNS, and data combining

Defending against DNS reflection amplification attacks

WHEN THE HUNTER BECOMES THE HUNTED HUNTING DOWN BOTNETS USING NETWORK TRAFFIC ANALYSIS

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Mail agents. Introduction to Internet Mail. Message format (2) Authenticating senders

Marketing 201. How a SPAM Filter Works. Craig Stouffer Pinpointe On-Demand cstouffer@pinpointe.com (408) x125

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

DNS Response Policy Zones Roadmap to Accellerate Adoption

Ralph Dolmans A solution for the DNS amplification attack problem

Computer Networks. Secure Systems

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Domain Name System (DNS) RFC 1034 RFC

INTRODUCTION TO FIREWALL SECURITY

Configuring DNS on Cisco Routers

How to Add Domains and DNS Records

Installing and Setting up Microsoft DNS Server

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

DNSSEC Applying cryptography to the Domain Name System

Intro to Firewalls. Summary

Motivation. Domain Name System (DNS) Flat Namespace. Hierarchical Namespace

Acquia Cloud Edge Protect Powered by CloudFlare

The Domain Name System

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

Lab - Observing DNS Resolution

Table of Contents DNS. How to package DNS messages. Wire? DNS on the wire. Some advanced topics. Encoding of domain names.

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

Security Monitoring of DNS traffic

CSE543 - Computer and Network Security Module: Firewalls

Whose IP Is It Anyways: Tales of IP Reputation Failures

Using the Intrusion Prevention System in MultiNet V5.3

IETF Update on RDAP. ICANN52 Singapore CCTLD Tech Day. Marc Blanchet Viagénie

How To Attack Isc.Org.Org With A Dnet On A Network With A Pnet On The Same Day As A Dbus On A Pc Or Ipnet On An Ipnet.Org On A 2.5Th Gen.Net

Comprehensive Understanding of Malicious Overlay Networks

Portal Administration. Administrator Guide

Operational Problems in IPv6: Fallback and DNS issues

Debugging With Netalyzr

Network Security - ISA 656 Firewalls & NATs

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)

DNS amplification attacks

Use Domain Name System and IP Version 6

The Domain Name System from a security point of view

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley

Network reconnaissance and IDS

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

CSC574 - Computer and Network Security Module: Firewalls

Unix System Administration

Transcription:

DNS as a Control Point for Cyber Risk Dr. Paul Vixie, CEO Farsight Security

Topics DNS Purpose and Role DNS Actions and Reactions DNS Control Points

Topic DNS purpose and role

Internet as Territory But what is the internet? It's the largest equivalence class in the reflexive transitive symmetric closure of the relationship can be reached by an IP packet from. (Seth Breidbart) IP addresses, IP packets, underlie everything We overlay IP with many things, e.g., the web Most important overlay (a layer) is: DNS 10/6/2014 Farsight Security, Inc. 4

DNS as Map Most everything we do on the Internet B2C Web, B2B Web, E-mail, I-M, <your idea here> relies on TCP/IP, and begins with a DNS lookup Mobile Internet is dominated by search but search itself relies extensively upon DNS DNS has a rigorous internal structure Things that are in fact related, are related in DNS You can have whois privacy, but not DNS privacy 10/6/2014 Farsight Security, Inc. 5

Criminal DNS The Internet has been a great accelerator of human civilization Sadly, the criminals came along for the ride Criminals can t do Internet crime without DNS Cheap throw-away domain names DNS registrars and servers in bad neighborhoods Whois privacy or simply bad whois data Nature, to be commanded, must be obeyed. (Francis Bacon) 10/6/2014 Farsight Security, Inc. 6

So, About that Internal Structure Domain names are grouped into zones A zone has one or more name servers Each name server has one or more addresses Other domain names also have addresses IP addresses are grouped into netblocks Domain names appear in a lot of places: Web http://domain/ E-mail somebody@domain 10/6/2014 Farsight Security, Inc. 7

Traditional DNS Forensics DNS lets anybody look up a <domain,type> You get back the current set of resource records But there s no way to see the history And, your query exposes your interest Whois lets you check ownership of a domain But it s usually hidden/private or inaccurate 10/6/2014 Farsight Security, Inc. 8

Topic DNS Actions and Reactions

too cheap to meter SpamAssassin as a teaching tool Dotted quads as spamsign RRP and EPP: solving the.com problem Running a race to the bottom Fluidity having only one purpose 30 seconds? Really? Fitting Sturgeon s revelation 90% of <thing> is crap

Takedown: Far End Tactics Since we can t prevent it we ll have to evolve coping strategies Takedown as a Service (TaaS?) Yes, you can outsource this now A new profit center! Kill all you want, we ll make more Whack-a-mole as a Service (WaaS?) Incrementalism breeds better criminals

Firewalls: Near End Tactics If we can t prevent it and takedown is hard our coping strategy is, fight on the threshold You can filter IP+port, URL, and now even DNS But you can t keep up with the churn So, another outsourceable profit center! And you can t afford manual configuration So, firewall config now follows a pub-sub model This predates Puppet et al by a decade or more

DNS Control Points Attribution

Owner Lookup, Show History $ dnsdb_query -r vix.com/ns/vix.com... ;; record times: 2010-07-04 16:14:12.. 2013-05-12 00:55:59 ;; count: 2221563; bailiwick: vix.com. vix.com. NS ns.sql1.vix.com. vix.com. NS ns1.isc-sns.net. vix.com. NS ns2.isc-sns.com. vix.com. NS ns3.isc-sns.info. ;; record times: 2013-10-18 06:30:10.. 2014-02-28 18:13:10 ;; count: 330; bailiwick: vix.com. vix.com. NS buy.internettraffic.com. vix.com. NS sell.internettraffic.com. 10/6/2014 Farsight Security, Inc. 14

Owner Wildcards, Left Hand $ dnsdb_query -r \*.vix.com/a fgrep 24.104.150 internal.cat.lah1.vix.com. A 24.104.150.1 ss.vix.com. A 24.104.150.2 gutentag.vix.com. A 24.104.150.3 lah1z.vix.com. A 24.104.150.4 mm.vix.com. A 24.104.150.11 ww.vix.com. A 24.104.150.12 external.cat.lah1.vix.com. A 24.104.150.33 wireless.cat.lah1.vix.com. A 24.104.150.65 wireless.ss.vix.com. A 24.104.150.66 ap-kit.lah1.vix.com. A 24.104.150.67 cat.lah1.vix.com. A 24.104.150.225 vix.com. A 24.104.150.231 deadrat.lah1.vix.com. A 24.104.150.232 ns-maps.vix.com. A 24.104.150.232 ns.lah1.vix.com. A 24.104.150.234 10/6/2014 Farsight Security, Inc. 15

Owner Wildcards, Right Hand $ dnsdb_query -r vixie.\*/ns ;; zone times: 2010-08-13 16:10:10.. 2012-12-31 17:24:50 ;; count: 872; bailiwick: com. vixie.com. NS ns2317.hostgator.com. vixie.com. NS ns2318.hostgator.com. ;; zone times: 2010-04-24 16:12:21.. 2010-08-12 16:09:01 ;; count: 111; bailiwick: com. vixie.com. NS ns23.domaincontrol.com. vixie.com. NS ns24.domaincontrol.com. ;; zone times: 2010-10-20 20:52:43.. 2012-03-31 20:54:04 ;; count: 0; bailiwick: info. vixie.info. NS ns31.domaincontrol.com. vixie.info. NS ns32.domaincontrol.com. ^C 10/6/2014 Farsight Security, Inc. 16

Data Lookup, By Name $./dnsdb_query -n ss.vix.su/mx vix.su. MX 10 ss.vix.su. dns-ok.us. MX 0 ss.vix.su. mibh.com. MX 0 ss.vix.su. iengines.com. MX 0 ss.vix.su. toomanydatsuns.com. MX 0 ss.vix.su. farsightsecurity.com. MX 10 ss.vix.su. anog.net. MX 0 ss.vix.su. mibh.net. MX 0 ss.vix.su. tisf.net. MX 10 ss.vix.su. iengines.net. MX 0 ss.vix.su. al.org. MX 0 ss.vix.su. vixie.org. MX 0 ss.vix.su. redbarn.org. MX 0 ss.vix.su. benedelman.org. MX 0 ss.vix.su. 10/6/2014 Farsight Security, Inc. 17

Data Lookup, by IP Address $ dnsdb_query -r ic.fbi.gov/mx ic.fbi.gov. MX 10 mail.ic.fbi.gov. $ dnsdb_query -r mail.ic.fbi.gov/a mail.ic.fbi.gov. A 153.31.119.142 $ dnsdb_query -i 153.31.119.142 ic.fbi.gov. A 153.31.119.142 mail.ic.fbi.gov. A 153.31.119.142 mail.ncijtf.fbi.gov. A 153.31.119.142 10/6/2014 Farsight Security, Inc. 18

Data Lookup, by IP Address Block $ dnsdb_query -i 153.31.119.0/24 grep -v infragard vpn.dev2.leo.gov. A 153.31.119.70 mail.leo.gov. A 153.31.119.132 www.biometriccoe.gov. A 153.31.119.135 www.leo.gov. A 153.31.119.136 cgate.leo.gov. A 153.31.119.136 www.infraguard.net. A 153.31.119.138 infraguard.org. A 153.31.119.138 www.infraguard.org. A 153.31.119.138 mx.leo.gov. A 153.31.119.140 ic.fbi.gov. A 153.31.119.142 mail.ic.fbi.gov. A 153.31.119.142 mail.ncijtf.fbi.gov. A 153.31.119.142 10/6/2014 Farsight Security, Inc. 19

Technical Formatting Notes These slides show a DNS output conversion The real output is in JSON format, i.e.: $ dnsdb_query -r f.root-servers.net/a/root-servers.net ;; record times: 2010-06-24 03:10:38.. 2014-03-05 01:22:56 ;; count: 715301521; bailiwick: root-servers.net. f.root-servers.net. A 192.5.5.241 $ dnsdb_query -r f.root-servers.net/a/root-servers.net -j {"count": 715301521, "time_first": 1277349038, "rrtype": "A", "rrname": "f.root-servers.net.", "bailiwick": "rootservers.net.", "rdata": ["192.5.5.241"], "time_last": 1393982576} 10/6/2014 Farsight Security, Inc. 20

DNS Control Points DDoS Resistance with DNS-RRL

DNS Response Rate Limiting (RRL) If you run a DNS content ( authority ) server, it has to be massively overprovisioned Because OPN s don t have SAV, your server is a purpose-built DNS DDoS reflecting amplifier BIND and NSD now support DNS RRL, which accurately guesses what s safe to drop Your authority servers need this, whereas your recursive servers need to be firewalled off

Spoofed Source Attacks attacker Src addr: (target) Botted server, in the cloud, Gigabit speed target Internet Dst addr: (target) reflector

RRL In Action: Afilias

DNS Control Points DNS Firewalls with DNS-RPZ

Response Policy Zones: High Level Uses DNS zones to carry DNS Firewall policy R-P-Z = Response Policy Zones Pub-sub is handled by NOTIFY/TSIG/IXFR Many publishers, many subscribers, one format Pay other publishers, or create your own Or do both, plus a private white-list Simple failure or walled garden, as you choose We call this taking back the streets ( the DNS )

RPZ Capabilities Triggers (RR owners): If the query name is $X If the response contains an address in CIDR $X If any name server name is $X If any name server address is in CIDR $X If the query source address is in CIDR $X Actions (RR data): Synthesize NXDOMAIN Synthesize CNAME Synthesize NODATA Synthesize an answer Answer with the truth

Why Use RPZ? Easy stuff: Block access to DGA C&C s Block access to known phish/driveby Block e-mail if envelope/header is spammy More interesting stuff: Block DNS A/AAAA records in bad address space E.g., import Cymru Bogons or Spamhaus DROP list Block DNS records in your own address space After allowing your own domains to do so, of course

Implications of RPZ Controlled Balkanization Open market for producers and consumers Differentiated service at a global scale Instantaneous takedown

RPZ Deployment Status The RPZ standard is open and unencumbered So far implemented only in BIND Performance is pretty reasonable New features will be backward compatible This is not an IETF standard

DNS Control Points Newly Observed Domains (NOD) An RPZ and RHSBL Feed

Newly Observed Domains 60% of the spam we studied used a header or envelope domain name less than 24 hours old Most new domains are rapidly taken down Casa Vixie uses a 10 minute NXDOMAIN rule FSI NOD (5m, 10m, 30m, 1h, 3h, 6h, 12h, 24h) Streams: newly active vs. newly observed Feeds: RPZ (for DNS Firewalls) vs. RHSBL (for Spam Assassin)

Newly Observed Domains & SRA vixie@linux1:~$ sh -x go-sra + exec sratool connect ssh sra-dev-ssh@mc2.iad1.fsi.io * HELLO srad version 0.1.0~a12+1407901 SRA protocol 1 > channel 212 on * OK CHANNEL ON/OFF channel ch212 on > count 3 > 10 watch ch=212 10 OK WATCH started 10 ch212 SIE newdomain rdata=cname webredir.vip.gandi.net rrname=news.aldatub.io 10 ch212 SIE newdomain rdata=ns ns1.hostedtube.com rrname=pornmovieonlinefree.xxx 10 ch212 SIE newdomain rdata=ns ns1.zippro2.com rrname=yulinovasoft.ru packet count limit exceeded > ^D

Newly Observed Domains & DNS vixie@linux1:~$ whois -h whois.nic.xxx pornmovieonlinefree.xxx Domain Name:PORNMOVIEONLINEFREE.XXX Domain ID: D2148460-XXX Creation Date: 18-Mar-2014 23:30:58 UTC Updated Date: 19-Mar-2014 04:41:19 UTC... vixie@linux1:~$ dig +short txt news.aldatub.io.v1.bl.dns-nod.net "first_seen=1395334293" vixie@linux1:~$ dig +short a news.aldatub.io.v1.bl.dns-nod.net 127.0.0.3

Limited Bibliography https://www.farsightsecurity.com/ http://www.redbarn.org/dns/ratelimits http://dnsrpz.info/