NSEC3 Hash Breaking. GPU-based. Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis IEEE NCA 2014. <matthaeus.wander@uni-due.



Similar documents
The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. Duisburg, June 19, 2015

Verteilte Systeme - Overview

Internet Measurement Research

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

Internet-Praktikum I Lab 3: DNS

Large-scale DNS and DNSSEC data sets for network security research

Security of IPv6 and DNSSEC for penetration testers

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

DNSSEC Applying cryptography to the Domain Name System

Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

Computer Networks: Domain Name System

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

DNS & IPv6. Agenda 4/14/2009. MENOG4, 8-9 April Raed Al-Fayez SaudiNIC CITC rfayez@citc.gov.sa, DNS & IPv6.

Domain Name System (DNS)

Domain Name System Richard T. B. Ma

Introduction Header Body content Todo List. Analysis. Joe Huang Anti-Spam Team Cellopoint. February 21, Joe Huang Analysis 1 / 62

DNS at NLnet Labs. Matthijs Mekking

DNS/DNSSEC loose ends

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

Lecture 2 CS An example of a middleware service: DNS Domain Name System

DNSSEC and DNS Proxying

The Domain Name System (DNS)

IPv6 support in the DNS

One year of DANE Tales and Lessons Learned. sys4.de

Network Security. DNS (In)security. Radboud University, The Netherlands. Autumn 2015

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

DNSSEC Practice Statement (DPS)

Per informazioni:

DomainWire. Edition 11 Q Council of European National Top level Domain Registries -

Overview of DNSSEC deployment worldwide

DNS: Domain Name System

Chapter 2 Application Layer

Section 1 Overview Section 2 Home... 5

A Security Evaluation of DNSSEC with NSEC3

SIDN Server Measurements

DNS Domain Name System

IANA Functions to cctlds Sofia, Bulgaria September 2008

Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check

CS3250 Distributed Systems

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

How To Understand The Effect Of A Domain Name Extension On A Network Attack On A Domain Names Server (Dns)

DNSSEC for Everybody: A Beginner s Guide

Domain Name System Security

Password Cracking Beyond Brute-Force

DNS. The Root Name Servers. DNS Hierarchy. Computer System Security and Management SMD139. Root name server. .se name server. .

THE DOMAIN NAME SYSTEM DNS

Agenda. Network Services. Domain Names. Domain Name. Domain Names Domain Name System Internationalized Domain Names. Domain Names & DNS

Guidance for Preparing Domain Name Orders, Seizures & Takedowns

Domain Name System (or Service) (DNS) Computer Networks Term B10

DATA COMMUNICATOIN NETWORKING

Resilient Networking. Thorsten Strufe. Module 5: Name Resolution / DNS

Domain Name System DNS

Detecting Search Lists in Authoritative DNS

Internet Security [1] VU Engin Kirda

DDoS Vulnerability Analysis of Bittorrent Protocol

Domain Name System. Overview. Domain Name System. Domain Name System

Chapter 8. Network Security

The Domain Name System

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

Adobe Systems Software Ireland Ltd

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Deploying DNSSEC: From End-Customer To Content

Dynamic Searchable Encryption in Very Large Databases: Data Structures and Implementation

The Domain Name System from a security point of view

QUESTIONS AND ANSWERS

Midterm. Name: Andrew user id:

INTERNET DOMAIN NAME SYSTEM

Database Design Patterns. Winter Lecture 24

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

DNS. Spring 2016 CS 438 Staff 1

Wildcard and SAN: Understanding Multi-Use SSL Certificates

Defending against DNS reflection amplification attacks

Secure Remote Password (SRP) Authentication

The Domain Name System

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Types of hypertext. Hypertext documents can either be 1.Static 2.Dynamic

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31,

Snow Agent System Pilot Deployment version

Attack Frameworks and Tools

Speeding up GPU-based password cracking

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

The Collateral Damage of Internet Censorship by DNS Injection

DomainWire. Edition 13 Q Council of European National Top level Domain Registries -

Transcription:

GPU-based NSEC3 Hash Breaking Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis <matthaeus.wander@uni-due.de> IEEE NCA 2014 Cambridge, August 22, 2014

NSEC3 FUNDAMENTALS Matthäus Wander 2

Secure Denial of Existence with DNSSEC Query: www? ftp mail ns1 www Matthäus Wander 3

Secure Denial of Existence with DNSSEC Query: www? www A 192.0.2.1 ftp mail ns1 Response www Signed resource record Authenticity verified with PKI built into DNSSEC Matthäus Wander 4

Secure Denial of Existence with DNSSEC Query: test? ftp mail ns1 Not found www Query name: n Matthäus Wander 5

Secure Denial of Existence with DNSSEC Query: test? ftp mail ns1 Not found www Query name: n NSEC Matthäus Wander 6

Secure Denial of Existence with DNSSEC Query: test? ns1 NSEC www ftp mail ns1 Query name: Response: n Not found (r 1,r2 ) with r1 n r2 www NSEC Matthäus Wander 7

Zone Enumeration Copy DNSSEC zone by crawling NSEC records Nominet (.uk) position: Zone file enumeration is a show-stopper for us that will prevent us from fully implementing DNSSEC. DENIC (.de) position: In conflict with Germany s Federal Data Protection Act Matthäus Wander 8

Secure Denial of Existence with DNSSEC Query: test? ftp mail ns1 Not found www NSEC Matthäus Wander 9

Secure Denial of Existence with DNSSEC Query: test? ftp mail ns1 3a45 78a1 8e5d Not found Hash query name: h(n) www NSEC b105 NSEC3 Matthäus Wander 10

Secure Denial of Existence with DNSSEC Query: test? 78a1 NSEC3 8e5d Not found ftp mail ns1 www 3a45 78a1 8e5d b105 Hash query name: Response: h(n) NSEC NSEC3 (h(r1 ), h(r2 )) with h(r1 ) h(n) h(r2 ) Matthäus Wander 11

Reasons for and against NSEC3 Privacy Opt-out feature CPU load Message size How well does NSEC3 prevent zone enumeration? Matthäus Wander 12

NSEC3 Definition domain name salt h(n, s, 0 ) SHA1( n s ) h(n, s, i) SHA1( h(n,s,i 1) s ), for i 0 additional iterations Repeated SHA1 computation Salt is identical for all names in a DNSSEC zone Matthäus Wander 13

May 2014 Top-Level Domain Survey TLD i Salt at. 5 b4c3ee8e123154f8 ch. 2 e7bd8151 cn. 10 aef123ab com. 0 de. 15 ba5eba11 eu. 1 5ca1ab1e fr. 1 41b69d30 TLD i Salt info. 1 d399eaab jp. 8 f5435b71d7 net. 0 nl. 5 c9545f07a61d0d33 org. 1 d399eaab ru. 3 00ff uk. 0 335 use NSEC3, 53 use NSEC, 185 not signed 60% of TLDs with NSEC3 use i=1 42% of TLDs with NSEC3 change the salt Matthäus Wander 14

ATTACKING NSEC3 1. Collect hashes 2. Reverse hashes Matthäus Wander 15

Why AMD Graphic Cards? Matthäus Wander 16

ATTACKING NSEC3 1. Collect hashes 2. Reverse hashes Matthäus Wander 17

Hash Crawling Retrieve NSEC3 hashes from name server Send queries for random non-existing names M8eZcl8.com? 78a1 NSEC3 8e5d Not found Check hash before sending query NSEC3 gap NSEC3 gap NSEC3 gap Matthäus Wander 18

Crawling 345,000 Hashes from.com 1e+12 1e+10 1e+08 1e+06 10000 100 1 Hashing attempts Gaps in use 00:00 02:00 04:00 06:00 08:00 10:00 12:00 Time in hours Matthäus Wander 19

ATTACKING NSEC3 1. Collect hashes 2. Reverse hashes Matthäus Wander 20

GPU-based NSEC3 Hash Breaking Iterate through cleartext candidate names Compute NSEC3 hash, compare with known hashes Global memory access on GPU is expensive Bloom filter for 300% speedup Start Python Generate next name Create bloom filter Start OpenCL kernel Retrieve names Compute hash value Hit? Yes Write name No Done Yes End? No Matthäus Wander 21

Brute-Force Attack 1 to 8 characters 9 characters Matthäus Wander 22

Dictionary Attack Effectiveness depends on dictionary quality Good public lists (Alexa, Quantcast) List of all IPv4 reverse mappings (not exhaustive!) 7.1 mio candidate names Generate more candidates by inserting strings Insert most common 200,000 n-grams (with 1 n 15) foo.com. e efoo.com. feoo.com. foeo.com. fooe.com. Matthäus Wander 23

Dictionary Attack Matthäus Wander 24

Effectiveness of Insertion Wordlist Matthäus Wander 25

Markov Attack Some strings are more probable than others th more common in English than tx Model language with 1 st order Markov chains Markov attack requires training Use hits from brute-force and dictionary attacks Markov model derived from names found Enumerate most probable names Omit others (with given time frame) Matthäus Wander 26

Markov Attack Matthäus Wander 27

Discussion Reversed 65%.com domains after 5 days Server operator pays for NSEC3 with CPU load Adjust iterations to increase CPU workload Attacker Server operator Matthäus Wander 28

Discussion Reversed 65%.com domains after 5 days Server operator pays for NSEC3 with CPU load Adjust iterations to increase CPU workload Attacker Server operator Matthäus Wander 29

Discussion Reversed 65%.com domains after 5 days Server operator pays for NSEC3 with CPU load Adjust iterations to increase CPU workload Attacker Server operator Matthäus Wander 30

Efficiency of CPU vs. GPU Matthäus Wander 31

Conclusions NSEC3 returns negative DNSSEC responses without disclosing existing domain names GPUs very efficient for breaking NSEC3 hashes Reversed 65%.com domains after 5 days Assess whether weak privacy justifies the costs Future work: GPU-based NSEC3 accelerators for DNSSEC servers Matthäus Wander 32