DNSSEC Support in SOHO CPE. OARC Workshop Ottawa 24 th September 2008



Similar documents
Test Report: DNSSEC Impact on Broadband Routers and Firewalls September, 2008

Use Domain Name System and IP Version 6

DOMAIN NAME SECURITY EXTENSIONS

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

Recommendations for dealing with fragmentation in DNS(SEC)

Introduction to Network Operating Systems

DNS Best Practices. Mike Jager Network Startup Resource Center

M2M Series Routers. Virtual Router Redundancy Protocol (VRRP) Configuration Whitepaper

Digi Connect WAN Application Guide Using the Digi Connect WAN and Digi Connect VPN with a Wireless Router/Access Point

Enabling NAT and Routing in DGW v2.0 June 6, 2012

LAN TCP/IP and DHCP Setup

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Network Protocol Configuration

ThinkTel ITSP with Registration Setup Quick Start Guide

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

IP Filter/Firewall Setup

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

Chapter 10 Troubleshooting

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Tech-Note Bridges Vs Routers Version /06/2009. Bridges Vs Routers

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

RedRapid X WIRELESS MODEM ROUTER. Quick Installation Guide (DN-7060)

Chapter 5 Customizing Your Network Settings

What is included in the ATRC server support

IPv4 and IPv6 Integration. Formation IPv6 Workshop Location, Date

Security of IPv6 and DNSSEC for penetration testers

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl 28 Feb 2013 Stichting NLnet Labs

Identifying Patterns in DNS Traffic

How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

DNS, DNSSEC and DDOS. Geoff Huston APNIC February 2014

IPv6 and DNS. Secure64

Chapter 4 Customizing Your Network Settings

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

UK Quick Install Guide

This Lecture. The Internet and Sockets. The Start If everyone just sends a small packet of data, they can all use the line at the same.

Initial Access and Basic IPv4 Internet Configuration

Topic 7 DHCP and NAT. Networking BAsics.

Draytek Vigor 2820/2830 Configuration. A guide for Exa Resellers and IT Contractors

Technical Support Information Belkin internal use only

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

IPV6 FRAGMENTATION. The Case For Deprecation. Ron Bonica NANOG58

Basic IPv6 WAN and LAN Configuration

Predictability of Windows DNS resolver. ing. Roberto Larcher robertolarcher@hotmail.com

White Paper Copyright 2011 Nomadix, Inc. All Rights Reserved. Thursday, January 05, 2012

IPv6 and DNS. Secure64

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Comtrend 1 Port Router Installation Guide CT-5072T

INLICHTINGEN DIENSTEN INLICHTINGEN DIENSTEN

IPv6 Hardening Guide for Windows Servers

WAN Traffic Management with PowerLink Pro100

The Myth of Twelve More Bytes. Security on the Post- Scarcity Internet

Internet Access Setup

Chapter 2 Introduction

ETSF10 Part 3 Lect 2

Georgia College & State University

Case Study 2 SPR500 Fall 2009

Supporting Multiple Firewalled Subnets on SonicOS Enhanced

How to configure your Thomson SpeedTouch 780WL for ADSL2+

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

Behavioral Differences Regarding DNS Queries and Domain Name Resolution in Different OSs

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Multifunctional Broadband Router User Guide. Copyright Statement

IP(v6) security. Matěj Grégr. Brno University of Technology, Faculty of Information Technology. Slides adapted from Ing.

Linksys E2000 Wireless-N Router Configuration Guide

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

ROUTER CONFIGURATION

Using a Cisco PIX Firewall to Limit Outbound Internet Access

Attack and Defense Techniques

Appendix IP CAMERA Network Connections

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

CCNA Exploration: Accessing the WAN Chapter 7 Case Study

Computer Networks. Introduc)on to Naming, Addressing, and Rou)ng. Week 09. College of Information Science and Engineering Ritsumeikan University

Evaluation guide. Vyatta Quick Evaluation Guide

IETF DPRIVE WG: Encrypting DNS

Firewalls. Mahalingam Ramkumar

Configuring Dynamic DNS

SSAC Advisory SAC008 DNS Distributed Denial of Service (DDoS) Attacks

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008

DNS FLOODER V1.1. akamai s [state of the internet] / Threat Advisory

his document discusses implementation of dynamic mobile network routing (DMNR) in the EN-4000.

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Firewalls CSCI 454/554

ECE 578 Term Paper Network Security through IP packet Filtering

Configuring Static IP for your Pace Devices

More Internet Support Protocols

Chapter 2 Introduction

PPTP Server Access Through The

Application-layer protocols

Cisco Expressway Basic Configuration

Network Basics GRAPHISOFT. for connecting to a BIM Server (version 1.0)

Controlling Ashly Products From a Remote PC Location

DSL-G604T Install Guides

INTRODUCTION TO FIREWALL SECURITY

Deploying IP Anycast. Core DNS Services for University of Minnesota Introduction and General discussion

Danware introduces NetOp Remote Control in version 7.01 replacing version 7.0 as the shipping version.

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

Transcription:

DNSSEC Support in SOHO CPE OARC Workshop Ottawa 24 th September 2008

or: How not to write a DNS proxy

Study Details What is the impact of DNSSEC on consumer-class broadband routers? Joint study between Nominet UK and Core Competence Core Competence funded by Shinkuro, Inc., under contract from ISOC, ICANN, Afilias Conducted July and August 2008 Expansion of.se s previous study

Devices Tested 4 SOHO Firewalls 12 Dual Ethernet Gateways 8 ADSL Routers Selected based on market share and popularity All tested with out of the box configuration as far as possible NAT-PT and DHCP

Test Environment Queries sent with dig and custom Perl scripts using Net::DNS Packets captured on both LAN and WAN side of unit under test with Wireshark/tcpdump Queries sent both directly to the unit under test ( proxy mode ) and through the unit to the upstream RDNS ( routed mode ) Upstream DNS on a private network, with a fake root RDNS and ADNS running Bind-9.5-P1

Test Environment

DHCP Behaviour 15 devices put their own (LAN) IP address in their DHCP server s Domain Name Server option But 9 of those 15 have no way to change the DHCP settings A further six devices put the upstream address in, but only once the WAN link is up ( chicken and egg problem) The remaining three don t proxy by default

Proxy Behaviour #1 Devices that were dumb about DNS tended to do better than smart devices, but only so long as they did the rest of UDP/IP correctly: Fragment reassembly was a big problem Some fragments black-holed Some sent from the wrong Source IP Typically evident in packets near the WAN MTU

Proxy Behaviour #2 Many implementors only appear to have read (some of) RFC1035, and no subsequent RFCs: Responses truncated at 512 bytes (without setting TC) Responses having TC flag cleared in transit Packets dropped in either direction when CD=1 or AD=1 EDNS0 packets black-holed or rejected No support for failover to TCP QIDs not random [NB: this is for future study]

NAT-PT Behaviour Half of the devices tested had poor source port randomization in their NAT-PT logic Most (if not all) of those pick source ports sequentially Risk of cache poisoning attacks not mitigated When combined with poor QID selection, severe risk of exposure to normal response spoofing attacks

Results Only six of 24 devices were mostly compatible with DNSSEC out of the box 18 of the 22 devices that actually do DNS proxying had limitations on packet size (512 bytes or ~MTU) 6 of those 22 had incompatibilities that effectively prevent use of proxy mode for DNSSEC However all devices handled DNSSEC correctly when using routed mode Only one device could proxy DNS over TCP

Unaffected Configurations Anything using route mode: Fully validating local recursors NB: some still prone to cache poisoning Potential high load on authority servers Clients with hard-coded settings NB: some clients (e.g. Mac OS X) make it hard to ignore DHCP settings. They default to adding the hard-coded list to the DHCP settings, not replacing them. Good news! That covers most configurations that would be used by more technically sophisticated users

Affected Configurations Anything that uses DHCP to get DNS settings and where: the response is a large RRset (containing DNSSEC records or otherwise); or the server returns unexpected flags (c.f. Bind 9.4.1 bug found in the.se study); or the client is a security-aware stub Is this a likely deployment model for desktop DNSSEC? Could a client detect whether the proxy is good, and failover to fully recursive otherwise?

Study Follow-up IETF draft - BCP for how to write a proxy Vendor fixes? Research on the quality of PRNGs for Source Port ID Query ID Fuzzed queries and responses - can we actually crash the routers? fpdns Mk II - for identifying RDNS? How common is it to run a recursor behind NAT?