Mitigating DNS DoS Attacks



Similar documents
Mitigating DNS DoS Attacks

Review of Mitigating DNS DoS Attacks

Network Working Group. Category: Best Current Practice S. Bradner Harvard University M. Patton Consultant July 1997

NET0183 Networks and Communications

- Domain Name System -

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

The Internet Domain Name System

Computer Networks: Domain Name System

IP addresses have hierarchy (network & subnet) Internet names (FQDNs) also have hierarchy. and of course there can be sub-sub-!!

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

Understand Names Resolution

The Domain Name System

DNS and BIND. David White

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Naming and the DNS. Focus. How do we name hosts etc.? Application Presentation Topics. Session Domain Name System (DNS) /URLs

DNS and Interface User Guide

Lecture 2 CS An example of a middleware service: DNS Domain Name System

EECS 489 Winter 2010 Midterm Exam

Domain Name System (DNS) RFC 1034 RFC

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008

Module 2. Configuring and Troubleshooting DNS. Contents:

IPv6 support in the DNS

Enhancing DNS Resilience against Denial of Service Attacks

The Case for Pushing DNS

ECE 4321 Computer Networks. Network Programming

The secret life of a DNS query. Igor Sviridov <sia@nest.org>

Response Policy Zones for the Domain Name System (DNS RPZ) By Paul Vixie, ISC (et.al.) 2010 World Tour

Domain Name Servers. Domain Types WWW host names. Internet Names. COMP476 Networked Computer Systems. Domain Name Servers

Managing DNS Server Properties

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl 28 Feb 2013 Stichting NLnet Labs

Development of the Domain Name System. Joey Brown David Margolies

DNS. Computer networks - Administration 1DV202. fredag 30 mars 12

Applications & Application-Layer Protocols: The Domain Name System and Peerto-Peer

Domain Name System DNS

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

The Root of the Matter: Hints or Slaves

Introduction to the Domain Name System

How To Understand The Power Of A Content Delivery Network (Cdn)

An Introduction to the Domain Name System

Domain Name System. CS 571 Fall , Kenneth L. Calvert University of Kentucky, USA All rights reserved

CS3600 SYSTEMS AND NETWORKS

How To Manage Dns On An Elfiq Link Load Balancer (Link Balancer) On A Pcode (Networking) On Ipad Or Ipad (Netware) On Your Ipad On A Ipad At A Pc Or Ipa

DNS. Spring 2016 CS 438 Staff 1

HW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009

Introduction to DNS CHAPTER 5. In This Chapter

DNS, CDNs Weds March Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?

Distributed Systems. 22. Naming Paul Krzyzanowski. Rutgers University. Fall 2013

Week 3 / Paper 2. Bernhard Ager, Wolfgang Mühlbauer, Georgios Smaragdakis, Steve Uhlig ACM IMC 2010.

DNS and BIND Primer. Pete Nesbitt linux1.ca. April 2012

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DNS + DHCP. Michael Tsai 2015/04/27

DNS Domain Name System

Domain Name System (DNS)

The Design and Implementation of a Next Generation Name Service for the Internet

Measurements and Laboratory Simulations of the Upper DNS Hierarchy

DNS Queries And IPv6 Root Servers

A New Look at the Old Domain Name System

Configuration Notes 0215

The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0)

DNS traffic analysis -- Issues of IPv6 and CDN --


Measuring Query Latency of Top Level DNS Servers

CS 43: Computer Networks Naming and DNS. Kevin Webb Swarthmore College September 17, 2015

Names vs. Addresses. Flat vs. Hierarchical Space. Domain Name System (DNS) Computer Networks. Lecture 5: Domain Name System

Networking Overview. (as usual, thanks to Dave Wagner and Vern Paxson)

A Quick Introduction to the Domain Name System

Application and service delivery with the Elfiq idns module

CMPE 80N: Introduction to Networking and the Internet

Services: DNS domain name system

Configuring DNS. Finding Feature Information

Understanding DNS: Essential knowledge for all IT professionals

Understanding DNS (the Domain Name System)

DNS: Domain Name System

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

Domain Name System Richard T. B. Ma

Copyright

Domain Name Server. Training Division National Informatics Centre New Delhi

DNS: How it works. DNS: How it works (more or less ) DNS: How it Works. Technical Seminars Spring Paul Semple psemple@rm.

ICP. Cache Hierarchies. Squid. Squid Cache ICP Use. Squid. Squid

Global Server Load Balancing

Internet-Praktikum I Lab 3: DNS

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

Authority Server Selection of DNS Caching Resolvers

The Domain Name System (DNS)

dnsperf DNS Performance Tool Manual

DNS Domain Name System

Domain Name System (or Service) (DNS) Computer Networks Term B10

[Home] [Current Edition] [Compendium] [Forum] [Web Archive] [ Archive] [Guestbook] [Subscribe] [Advertising Rates]

How To Map Between Ip Address And Name On A Domain Name System (Dns)

Domain Name System :49:44 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

CSIS 3230 Computer Networking Principles, Spring 2012 Lab 7 Domain Name System (DNS)

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

Information- Centric Networks. Section # 3.2: DNS Issues Instructor: George Xylomenos Department: Informatics

Distributed Systems. 09. Naming. Paul Krzyzanowski. Rutgers University. Fall 2015

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski

The Internet Domain Name System Explained for Non- Experts

Domain Name System (DNS) Reading: Section in Chapter 9

CMPE 80N: Introduction to Networking and the Internet

An Intrusion Detection System for Kaminsky DNS Cache poisoning

Transcription:

Mitigating DNS DoS Attacks Hitesh Ballani and Paul Francis Cornell University ACM CCS 2008

DoS attacks on DNS Attack: Flood the nameservers of a DNS zone Goal: Disrupt the resolution of The zone s resource records And the records for any of the sub-zones. edu. com. us. jp. cornell.edu. cmu.edu mit.edu cs.cornell.edu. eng.cornell.edu.

DoS attacks on DNS Attack: Flood the nameservers of a DNS zone Goal: Disrupt the resolution of The zone s resource records And the records for any of the sub-zones FLOOD ATTACK. edu. com. us. jp. cornell.edu. cmu.edu mit.edu cs.cornell.edu. eng.cornell.edu.

DoS attacks on DNS Attack: Flood the nameservers of a DNS zone Goal: Disrupt the resolution of The zone s resource records And the records for any of the sub-zones Attacks aplenty (some successful, other not!) Microsoft attacked (2001) DNS Root Servers attacked (2002) SCO attacked (2003) Akamai attacked (2004) Root Servers, TLDs and UltraDNS (2006) Root Servers attacked (2007)

Networking community to the rescue Kangasharaju et. al.(g Cox et. al.(g Theimer et. al(g Ramasubramaniam et. al.(g Handley et. al.(g Deegan et. al.(g [INFOCOM 00] [IPTPS 02] [ICDCS 02] [SIGCOMM 04] [HotNets 05] [SIGCOMM CCR 05]

Networking community to the rescue Kangasharaju et. al.(g Cox et. al.(g Theimer et. al(g Ramasubramaniam et. al.(g Handley et. al.(g Deegan et. al.(g [INFOCOM 00] [IPTPS 02] [ICDCS 02] [SIGCOMM 04] [HotNets 05] [SIGCOMM CCR 05] Decouple data distribution from authority hierarchy Ensure availability of data distribution mechanism

Networking community to the rescue Kangasharaju et. al.(g Cox et. al.(g Theimer et. al(g Ramasubramaniam et. al.(g Handley et. al.(g Deegan et. al.(g [INFOCOM 00] [IPTPS 02] [ICDCS 02] [SIGCOMM 04] [HotNets 05] [SIGCOMM CCR 05] Decouple data distribution from authority hierarchy Ensure availability of data distribution mechanism Centralized approaches(g

Networking community to the rescue Kangasharaju et. al.(g Cox et. al.(g Theimer et. al(g Ramasubramaniam et. al.(g Handley et. al.(g Deegan et. al.(g [INFOCOM 00] [IPTPS 02] [ICDCS 02] [SIGCOMM 04] [HotNets 05] [SIGCOMM CCR 05] Decouple data distribution from authority hierarchy Ensure availability of data distribution mechanism Centralized approaches(g Peer-to-peer approaches(g

A complementary tact to handle DoS attacks Do away with the need for 100% availability Clients are able to resolve a zone s records even when the zone s nameservers are not available

In this paper A minor modification in the caching behavior of DNS resolvers Reduces the need for nameserver availability in the existing DNS framework Mitigates the impact of DoS attacks on DNS

Talk Outline Introductiong( DNS Resolvers Todayg( Proposed Modificationg( Evaluationg( The Goodg( The Bad and the Uglyg(

DNS Resolvers Today(g Client Root-Server A? www.cornell.edu Resolver Nameserver (.edu TLD) Cache Nameserver (.cornell.edu)

DNS Resolvers Today(g Client Root-Server A? www.cornell.edu Resolver Nameserver (.edu TLD) Lookup A? www.cornell.edu Cache Nameserver (.cornell.edu) Resolution Process 1. Lookup the resolver cache 2. Traverse down the DNS hierarchy 3. Traversal fails Resolution fails

DNS Resolvers Today(g Client Root-Server A? www.cornell.edu Resolver Nameserver (.edu TLD) Lookup NS?.cornell.edu NS?.edu Cache Nameserver (.cornell.edu) Resolution Process 1. Lookup the resolver cache 2. Traverse down the DNS hierarchy 3. Traversal fails Resolution fails

DNS Resolvers Today(g Client Root-Server Resolver Nameserver (.edu TLD) Cache Nameserver (.cornell.edu) Resolution Process 1. Lookup the resolver cache 2. Traverse down the DNS hierarchy 3. Traversal fails Resolution fails

DNS Resolvers Today(g Client Root-Server www.cornell.edu A=128.253.161.221 Resolver Nameserver (.edu TLD) Cache Nameserver (.cornell.edu) Resolution Process 1. Lookup the resolver cache 2. Traverse down the DNS hierarchy 3. Traversal fails Resolution fails

DNS Resolvers Today(g Client Root-Server Resolver Cache Traversal fails Nameserver (.edu TLD) Nameserver (.cornell.edu) Resolution Process 1. Lookup the resolver cache 2. Traverse down the DNS hierarchy 3. Traversal fails Resolution fails

DNS Resolvers Today(g Client Root-Server Resolver Nameserver (.edu TLD) Cache responses for TTL period Cache Nameserver (.cornell.edu) Resolver caching behavior Cached records expunged after their TTL expires

Proposed Modification(g Client Root-Server Resolver Nameserver (.edu TLD) Stale Cache Stale Records Cache Nameserver (.cornell.edu) Cached records expunged to a Stale Cache

Proposed Modification(g Client Root-Server Resolver Nameserver (.edu TLD) Stale Cache.edu NS Lookup Cache Modified Resolution Process 1. Lookup the resolver cache 2. Traverse down the DNS hierarchy Nameserver (.cornell.edu) 3. Traversal fails Resolution can continue

Proposed Modification(g Client Root-Server Resolver Nameserver (.edu TLD) Stale Cache Cache Lookup successful Modified Resolution Process 1. Lookup the resolver cache 2. Traverse down the DNS hierarchy Nameserver (.cornell.edu) 3. Traversal fails Resolution can continue

Proposed Modification(g Client Root-Server Resolver Nameserver (.edu TLD) Stale Cache Cache Lookup successful Nameserver (.cornell.edu) Stale records for a zone used only when the nameservers for the zone are unavailable

Stale Cache Details(g Expunging records from the Stale Cache Responses from nameservers used to clean up the stale cache Stale Cache lookup time not critical Lookups can be done while querying the nameservers

Talk Outline Introductiong( DNS Resolvers Todayg( Proposed Modificationg( Evaluationg( The Goodg( The Bad and the Uglyg(

DNS Trace Collection Cornell CS Dept. INTERNET DNS Trace Collector Anonymise DNS Trace 65-Day DNS Trace 138 million DNS packets 4.5 million unique DNS names Trace collected at Border Router Network s resolvers could not answer the collected queries

Stale Cache Simulation Simulation Variables Stale Cache Size Number of days for which stale records are kept Varied from 1 to 30 days Attack Duration Varied from 3 to 24 hours

Is History Useful? Attack: Entire DNS Fails

Is History Useful? Attack: Entire DNS Fails Fraction of Queries Answered 1 0.9 0.8 0.7 0.6 0.5 0.4 03 Hr 06 Hr 12 Hr 24 Hr 1 2 3 5 7 10 14 21 30 Stale Cache Size (days) 14-Day Stale Cache can answer 80% queries

Is History Useful? Attack: Entire DNS Fails Fraction of Accurate Records 1 0.998 0.996 0.994 0.992 0.99 0.988 0.986 0.984 03 Hr 06 Hr 12 Hr 24 Hr 1 2 3 5 7 10 14 21 30 Stale Cache Size (days) 99.6% accurate answers with 14-Day Stale Cache

Root-Servers Fail Other Attack Scenarios Queries for Top-level Domains (TLDs) not resolved Stale Cache can answer all such queries TLD Nameservers Fail Queries for two-level names (eg, a.com) not resolved Stale Cache can answer >75% such queries Accuracy of answers is 99.4%

Depends on network Number of hosts Query-rate For the collected trace Memory Footprint 1300 hosts and 25 DNS pkts/sec Month-long Stale Cache = 313MB

Proposed Modification: Pros Increased DNS Robustness Nameserver availability less crucial Mitigates the impact of DoS attacks Simplicity Does not change the basic protocol operation Does not impose any load on DNS Does not impact the query resolution latency Incremental Deployment Motivation for deployment

Talk Outline Introductiong( DNS Resolvers Todayg( Proposed Modificationg( Evaluationg( The Goodg( The Bad and the Uglyg(

Ballani Vixie Obsolete Autonomy Attack Latency Too specific

Ballani Vixie Obsolete Autonomy Attack Latency Too specific Possibility of obsolete information being used Obselete zone records used by a resolver only if Zone s records have been updated since the last access by the resolver Zone s nameservers are inaccessible

Ballani Vixie Obsolete Autonomy Attack Latency Too specific Possibility of obsolete information being used Obselete zone records used by a resolver only if Zone s records have been updated since the last access by the resolver Zone s nameservers are inaccessible Trade-off between the possibility of obsolete information being used and the inability to resolve queries

Ballani Vixie Obsolete Autonomy Attack Latency Too specific Possibility of obsolete information being used Obselete zone records used by a resolver only if Zone s records have been updated since the last access by the resolver Zone s nameservers are inaccessible Trade-off between the possibility of obsolete information being used and the inability to resolve queries Restrict the Stale Cache size

Ballani Vixie Obsolete Autonomy Attack Latency Too specific Greg Minshall s former CEO:... he would sign (almost) any contract, as long as he could get out of it in a finite period of time

Ballani Vixie Obsolete Autonomy Attack Latency Too specific Greg Minshall s former CEO:... he would sign (almost) any contract, as long as he could get out of it in a finite period of time Zone Autonomy Does the.com zone operator control access to the.xxx.com sub-zone? Today Proposed.xxx.com NS records expire after a TTL period?

Obsolete Autonomy Attack Latency Too specific Ballani Vixie Greg Minshall s former CEO:... he would sign (almost) any contract, as long as he could get out of it in a finite period of time Zone Autonomy Does the.com zone operator control access to the.xxx.com sub-zone? Today.xxx.com NS records expire after a TTL period Proposed Can respond with a NXDOMAIN for queries for.xxx.com Zone operators still control access to their sub-zones

Obsolete Autonomy Attack Latency Too specific Ballani Vixie Attackers forcing the use of obsolete records for a zone by Waiting for the zone s records to be updated And then flooding the zone s nameservers

Obsolete Autonomy Attack Latency Too specific Ballani Vixie Attackers forcing the use of obsolete records for a zone by Waiting for the zone s records to be updated And then flooding the zone s nameservers

Obsolete Autonomy Attack Latency Too specific Ballani Vixie Resolution latency in the face of attacks Resolver must query each nameserver of a zone before using the zone s records from the stale cache Given default resolver timeout configurations, this can lead to high resolution latencies

Obsolete Autonomy Attack Latency Too specific Ballani Vixie Resolution latency in the face of attacks Resolver must query each nameserver of a zone before using the zone s records from the stale cache Given default resolver timeout configurations, this can lead to high resolution latencies Alleviative: Resolvers configured with aggressive retry and timeout values

Obsolete Autonomy Attack Latency Too specific Ballani Vixie DNS servers can still be overwhelmed Unable to update the zone s records Application servers can still be DoS ed

Obsolete Autonomy Attack Latency Too specific Ballani Vixie DNS servers can still be overwhelmed Unable to update the zone s records Application servers can still be DoS ed Do DNS servers and Application servers share the network bottleneck?

Summary A minor modification in the caching behavior of DNS resolvers Reduces the need for nameserver availability in the existing DNS framework Mitigates the impact of DoS attacks on DNS Stale Cache Modifies the DNS caching semantics Does not impact fundamental DNS characteristics

Thank You!