DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008



Similar documents
Securing DNS Infrastructure Using DNSSEC

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

DOMAIN NAME SECURITY EXTENSIONS

DNS security: poisoning, attacks and mitigation

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

Computer Networks: Domain Name System

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

An Intrusion Detection System for Kaminsky DNS Cache poisoning

STATE OF DNS AVAILABILITY REPORT

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Security of IPv6 and DNSSEC for penetration testers

DNS Record Injection Vulnerabilities in Home Routers

Use Domain Name System and IP Version 6

INFORMATION SECURITY REVIEW

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

A Survey of cctld DNS Vulnerabilities. ITU cctld Workshop March 3, 2003

Network Security. DNS (In)security. Radboud University, The Netherlands. Autumn 2015

Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015

Internet-Praktikum I Lab 3: DNS

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

Securing an Internet Name Server

DNSSEC Applying cryptography to the Domain Name System

IANA Functions to cctlds Sofia, Bulgaria September 2008

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

DNS traffic analysis -- Issues of IPv6 and CDN --

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

Using the Domain Name System for System Break-ins

NET0183 Networks and Communications

DNS Security: New Threats, Immediate Responses, Long Term Outlook Infoblox Inc. All Rights Reserved.

The Domain Name System from a security point of view

Remote DNS Cache Poisoning Attack Lab

The Domain Name System

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

IPV6 SERVICES DEPLOYMENT

Copyright

Basic DNS Course. Module 1. DNS Theory. Ron Aitchison ZYTRAX, Inc. Page 1 of 24

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Packet Sniffing on Layer 2 Switched Local Area Networks

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

DNS at NLnet Labs. Matthijs Mekking

The secret life of a DNS query. Igor Sviridov <sia@nest.org>

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

DNS Best Practices. Mike Jager Network Startup Resource Center

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl 28 Feb 2013 Stichting NLnet Labs

FAQ (Frequently Asked Questions)

SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks

Deploying DNSSEC: From End-Customer To Content

Verisign/ICANN Proposal in Response to NTIA Request

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Content Distribution Networks (CDN)

Keyword: Cloud computing, service model, deployment model, network layer security.

Attack and Defense Techniques

DNS and BIND. David White

3. The Domain Name Service

Domain Name System (DNS) RFC 1034 RFC

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Public-Root Name Server Operational Requirements

How To Stop A Malicious Dns Attack On A Domain Name Server (Dns) From Being Spoofed (Dnt) On A Network (Networking) On An Ip Address (Ip Address) On Your Ip Address On A Pc Or Ip Address

Security in the Network Infrastructure - DNS, DDoS,, etc.

Distributed Denial of Service Attacks

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

Predictability of Windows DNS resolver. ing. Roberto Larcher robertolarcher@hotmail.com

Top Five DNS Security Attack Risks and How to Avoid Them

Coordinación. The background image of the cover is desgned by GUIDE TO DNS SECURITY 2

A S B

Application Firewalls

F-Root's DNSSEC Signing Plans. Keith Mitchell Internet Systems Consortium DNS-OARC NANOG48, Austin, 24 th Feb 2010

Enterprise Architecture Office Resource Document Design Note - Domain Name System (DNS)

Transcription:

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers

Agenda How do you attack the DNS? What has been discovered? Short term solutions Long term solutions Work ICANN has done to help

How do you attack the DNS?

A typical DNS query

A typical DNS query centr.org?

centr.org? 192.0.2.0 A typical DNS query

The DNS is not secure A computer sends a question to a DNS server, asking a question like What is the IP address for aftld.org? The computer gets an answer, and if the answer appears to match the question it asked, completely trusts that it is correct. There are multiple ways that traffic on the Internet can be intercepted and rerouted, or impersonated, so that the answer given is false.

Receiving the wrong answer Something in the network between the computer and the server has intercepted or redirected the traffic.

centr.org? Receiving the wrong answer Something in the network between the computer and the server has intercepted or redirected the traffic.

centr.org? 6.6.6.0 Receiving the wrong answer Something in the network between the computer and the server has intercepted or redirected the traffic.

Receiving the wrong answer A server on the network responds with the wrong answer, quicker than the correct server can give the right answer.

centr.org? Receiving the wrong answer A server on the network responds with the wrong answer, quicker than the correct server can give the right answer.

centr.org? 6.6.6.0 Receiving the wrong answer A server on the network responds with the wrong answer, quicker than the correct server can give the right answer.

centr.org? 192.0.2.0 6.6.6.0 Receiving the wrong answer A server on the network responds with the wrong answer, quicker than the correct server can give the right answer.

Cache poisoning To improve efficiency, DNS servers typically store results in a cache to speed further lookups. This is the typical configuration at ISPs, etc. If the wrong answer gets remembered it will be served to future lookups. One successful cache poisoning attack can therefore affect many users.

How does one spoof a response A question is sent out, and the querying computer waits for an answer to return It knows it has received the answer to its question when several attributes in the answer match the question it asked It comes back to the same IP address it was sent from It comes back to the same port number is was sent from The question matches the question asked A unique transaction number matches what was sent

To spoof a response You need to get all these attributes the same in your forged answer packet The IP address needs to match. If you know the IP address of the recursive name server this is known by the attacker, and does not need to be guessed. The question needs to match. The attacker will know what this is, because they will be injecting their own questions into the recursive server. What remains to guess is the transaction number and the port number

But...

But... Everything I have told you so far has been known for years.

What has been discovered recently?

This attack is highly effective Dan Kaminsky identified there is a straightforward way to flood the recursive server with lots of answers, so that the right combination would be sent very quickly (a few seconds) It was also identified that the two identifiers the attacker needs to guess are not fully random (or not random at all)

Why is this attack concerning to TLDs? If a name server provides both recursive and authoritative name service, a successful attack on the recursive portion can store bad data that is given to computers that want authoritative answers. The net result is one could insert or modify domain data inside a TLD.

Short term solutions

1. Maximise the amount of randomness Most implementations use randomised transaction numbers already. (The risk with that was discovered years ago, and fixed in most software) Most implementations do NOT randomise the port number. In fact most always used the same port number (53, the port number IANA has assigned for DNS) The patches that have been released in the last few months work by randomising the source port for the recursive server.

2. Disable open recusive name servers The attack is not effective if the attacker can not send question packets to the name server. If you must run a recursive name server, limit access to only those computers that need it. (e.g. your customers). The will still be able to execute the attack, but the exposure is constrained. Turning off open recursive name servers is a good idea anyway, because they can be used for other types of attack (denial of service)

Long term solution

Introduce security to the DNS The DNS is insecure. Upgrade the DNS for security. DNSSEC is the current answer to this problem. This attack provides clear incentive to deploy a solution like DNSSEC, because without security the DNS will continue to be vulnerable to cache poisoning attacks.

What has ICANN done

Impact on TLDs At the time the vulnerability because known, a survey of TLD operators found that 72 TLDs had authorities that were providing open recursive service. ICANN contacted all TLDs affected Explained the situation, and the urgency to fix it Provided advice on how to reconfigure name servers Expedited root zone change requests, if required

80 70 60 50 40 30 20 10 0 24 July 31 July 7 Aug 15 Aug 25 Aug TLDs affected

72 80 70 60 50 40 30 20 10 0 24 July 31 July 7 Aug 15 Aug 25 Aug TLDs affected

72 80 70 60 50 40 30 20 26 10 0 24 July 31 July 7 Aug 15 Aug 25 Aug TLDs affected

Checking tool We developed a tool which we ran daily against TLDs, and shared results with affected TLDs. It became clear a web-based tool where TLD operators could self-test would be useful, so it was reimplemented this way. The tool is not TLD specific, and works with any domain name. It is at http://recursive.iana.org/

Vulnerability checking tool

How the tool works The tool checks for the two aspects that enable the attack

Recursive? How the tool works The tool checks for the two aspects that enable the attack

Recursive? NO Safe How the tool works The tool checks for the two aspects that enable the attack

Recursive? YES Random? NO Safe How the tool works The tool checks for the two aspects that enable the attack

Recursive? YES Random? NO YES Safe Vulnerable How the tool works The tool checks for the two aspects that enable the attack

Recursive? YES Random? NO Highly Vulnerable NO YES Safe Vulnerable How the tool works The tool checks for the two aspects that enable the attack

over 100,000 domains tested

Work continues We are still working with the last remaining TLDs that are affected. Our goal is to reduce the number to zero. It is anticipated a ban on open recursive name servers will be instituted as a formal IANA requirement on future root zone changes. Work on DNSSEC, and signing the root, to facilitate a longer term solution

Thanks! kim.davies@icann.org