Securing DNS Infrastructure Using DNSSEC



Similar documents
DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

DNS security: poisoning, attacks and mitigation

DNS Risks, DNSSEC. Olaf M. Kolkman and Allison Mankin. and 8 Feb 2006 Stichting NLnet Labs

Deploying DNSSEC: From End-Customer To Content

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

Computer Networks: Domain Name System

FAQ (Frequently Asked Questions)

Network Security - ISA 656 Security

STATE OF DNS AVAILABILITY REPORT

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

Security in the Network Infrastructure - DNS, DDoS,, etc.

WHITE PAPER. Best Practices DNSSEC Zone Management on the Infoblox Grid

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

DNS at NLnet Labs. Matthijs Mekking

Internet Security [1] VU Engin Kirda

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

DNSSEC Applying cryptography to the Domain Name System

SIP and VoIP 1 / 44. SIP and VoIP

DOMAIN NAME SECURITY EXTENSIONS

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

How To Protect Your Network From Attack

Internet-Praktikum I Lab 3: DNS

Next Steps In Accelerating DNSSEC Deployment

CS5008: Internet Computing

Securing an Internet Name Server

Security of IPv6 and DNSSEC for penetration testers

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Security vulnerabilities in the Internet and possible solutions

COSC 472 Network Security

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

Payment Card Industry (PCI) Data Security Standard

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

INFORMATION SECURITY REVIEW

Firewalls, Tunnels, and Network Intrusion Detection

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

The Domain Name System from a security point of view

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

Remote Access Security

TELE 301 Network Management. Lecture 18: Network Security

TLS and SRTP for Skype Connect. Technical Datasheet

PCI Security Scan Procedures. Version 1.0 December 2004

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Securing End-to-End Internet communications using DANE protocol

Introduction to the DANE Protocol

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

F5 and Infoblox DNS Integrated Architecture Offering a Complete Scalable, Secure DNS Solution

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

DNSSEC Deployment a case study

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

Public-Root Name Server Operational Requirements

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015

Network Security Fundamentals

Application Firewalls

Portal Administration. Administrator Guide

Content Teaching Academy at James Madison University

ACCEPTABLE USE AND TAKEDOWN POLICY

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

IANA Functions to cctlds Sofia, Bulgaria September 2008

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CYBERTRON NETWORK SOLUTIONS

Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015

Secure Domain Name System (DNS) Deployment Guide

Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

An Introduction to the Domain Name System

Network Infrastructure Under Siege

Basic Vulnerability Issues for SIP Security

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Potential Targets - Field Devices

Internal Server Names and IP Address Requirements for SSL:

Transcription:

Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias rmohan@afilias.info February 28, 2009

Agenda Getting Started Finding out what DNS does for you What Can Go Wrong A Survival Guide to DNSSEC Why Techies Created DNSSEC What Can Happen Without DNSSEC Why Should Anyone Care Consequences Responsibilities of Network Operators (ISPs), Registrars, Registries, Root Operators, ICANN and others The Road Ahead Signing the root What domain name owners can do Q&A Session

What the DNS is used for Web, Email, Streaming Media, Instant Messaging the Internet depends on the DNS DNS decides if your site can be reached DNS determines if your email can be delivered DNS is the Internet directory and phone book Provides directions on where computers are for each domain name DNS Prevents Outages and Provides Redundancy DNS mismanagement can result in Internet outages even if your Internet connection is working

What Does The DNS Do For You Tells machines where to go when you: Type in a web address Send an email User ISP Name Server Operators Cache Resolver Do I already have the answer? Send the answer back to resolver Else, contact Domain Name Server Am I online? Where should I go to get my answer? My local Internet Service Provider Name Server Find the IP address Send it back

Why A8ack the DNS Money Lot of money waiting to be made (stolen) when ecommerce and banking is compromised Power ISPs, Network operators and the Danish Internet user can be hijacked and forcibly redirected Reduces credibility and erodes trust Control Allows spying on users without their knowledge or control

What Can Go Wrong Forgery The DNS data being returned to your ISP can be forged Especially easy on a wireless network Result: You are transported where you did not mean to go Poisoning The DNS data can be modified Causes your ISP s cache to have valid but wrong information on where to go Eavesdropping Can intercept your DNS data and just listen before passing on Other things that can go wrong: Alteration of zone data Impersonation of master/ cache Unauthorized updates

2005 ISP A8ack In March April 2005, users of an ISP had specific spyware, spam and pay per click trojans, from redirection sites The ISP s cache had hundreds of DNS names spoofed AmericanExpress.com FedEx.com CitiCards.com DHL USA.com Sabre.com Source: Allison Mankin

July 2008 researcher Dan Kaminsky discloses evidence of massive Internet vulnerability Easy cache poisoning Exposes all recursive DNS resolvers to takeover Allows all Internet traffic to be hijacked on compromised DNS resolvers Less than one second to compromise a vulnerable server Completely transparent to Internet user Worldwide critical problem: DNS vendors and other companies issued emergency patches

1) Break past most username/password prompts on websites, no matter how the site is built. 2) Break the Certificate Authority system used by SSL, because Domain Validation sends an email and email is insecure. 3) Expose the traffic of SSL VPNs, because the certificate check is now circumvented 4) Force malicious automatic updates to be accepted 5) Cause millions of lines of totally untested network code to be exposed to attack 6) Leak TCP and UDP connectivity behind the firewall, to any website, in an attack we thought we already fixed twice 7) Expose the traffic of tools that don t even pretend to be secure, because it s behind the firewall or protected by a splittunneling IPsec VPN. Source: http://www.doxpara.com/

DNSSEC Explained DNSSEC is the Internet s answer to DNS Identity Theft It protects users from DNS attacks It makes systems detect DNS attacks Almost everything in DNSSEC is digitally signed Allows authentication of the ORIGIN of the DNS data Ensures INTEGRITY of the DNS data Digitally signed = Public Key Cryptography Secret Private Key, Open Public Key DNS Messages are scrambled using the Private Key the Public Key is needed to unscramble it [a.k.a. SIGNING ] You now know WHO sent the message (since private key is unique) If data is MODIFIED, mangled, or otherwise compromised en route The signature is no longer valid DNSSEC = DNS Security Extensions

The Chain of Trust If I trust a public key from someone, I can use that key to verify the signature and authenticate the source Make sure the root zone key can be trusted Pointers in the root zone point to lower zones (com/ org/info/de etc) Each pointer is validated with the previous validated zone key Only the key for the root zone is needed to validate all the DNSSEC keys on the Internet How to update these keys and propagate them are not done yet

Technical Details behind DNSSEC AUTHENTICATES every set of DNS data this is called a DNS Resource Record set, or RRs (A records, MX records, DNAMEs, etc, etc) Authenticates absence of DNS data xyz.icann.org does not exist Creates four new DNS record types Validates using Chain Of Trust Each answer is signed DNSSEC: Provides no CONFIDENTIALITY of DNS data No protection against Denial of Service attacks SSL, IPSec are not enough

Roles and ResponsibiliGes Registrars, network operators, registries, ICANN, root server operators large network must coordinate and interact Create DNSSEC Capable Name Servers for the TLD and lower level zones Put policies together Zone walking How to handle key rollover How can you ensure that when the key has to be changed, it is propagated securely, safely, and quickly?

DNSSEC Trust Anchor Repositories (TAR) A Trust Anchor Repository (TAR) can be defined as a repository or set of repositories that may be used for storing Secure Entry Point (SEP) aka zone keys for one or more DNS zones Interim approach to implementing DNSSEC Compensates for no signed root or TLDs Provides secure locations to obtain DNSSEC validation information, absent a signed root zone Proposed types of TARs: Global TARs Community of Interest (CoI) TARs Local TARs

Summary Root must be signed! 6 7 cctlds already signed.org has announced plans to sign in 1H 2009 Trust Anchor Repositories allow look aside mechanism for DNSSEC keys Evangelize the need for DNSSEC at industry companies organizations Policies must be established What to read: Introductions: www.dnssec.net Tutorials: http://www.ripe ncc.org/training/dnssec/material/ Other material: http://www.nlnetlabs.nl/dnssec/ http://www.ripe.net/disi/

Make the DNS immune to DNS Identity Theft Implement DNSSEC at the root and TLD zones Immunization against DNS hijacking Proven Chain of Trust model protection Public key cryptography with strong encryption will protect DNS system Secure storage of keys in Trust Anchor Repository Results in guaranteed lookups in a safe environment Build a strong foundation for domain name owners Allows domain name owners to digitally sign their domains protects their names from hijacking

Talk to your web site host provider or technical provider about Signing your zone with a DNSSEC key This will automatically protect visitors to your website from being hijacked It will increase the perception and reality of security for your organization Sign up with mailing lists to understand more about implementing DNSSEC Eliminate DNS identity theft Ensure safety for your clients Improve your branding

Mailing Lists dnssec@cafax.se operators and developers working on dnssec namedroppers@ops.ietf.org DNSEXT IETF working group (DNS protocol development) dnsop@cafax.se DNSOP IETF working group (operational DNS issues) techsec@ripe.net RIPE Technical Security working group dns wg@ripe.net RIPE DNS working group

Securing DNS Infrastructure Using DNSSEC Ram Mohan Executive Vice President, Afilias rmohan@afilias.info February 28, 2009