The Impact of DNSSEC. Matthäus Wander. on the Internet Landscape. <matthaeus.wander@uni-due.de> Duisburg, June 19, 2015



Similar documents
NSEC3 Hash Breaking. GPU-based. Matthäus Wander, Lorenz Schwittmann, Christopher Boelmann, Torben Weis IEEE NCA

DNSSEC. Matthäus Wander. Erlangen, April 20, and the Hassle of Negative Responses.

Internet Measurement Research

Part 5 DNS Security. SAST01 An Introduction to Information Security Martin Hell Department of Electrical and Information Technology

DNSSEC: A Vision. Anil Sagar. Additional Director Indian Computer Emergency Response Team (CERT-In)

DNSSEC Applying cryptography to the Domain Name System

Internet-Praktikum I Lab 3: DNS

DNS at NLnet Labs. Matthijs Mekking

EECS 489 Winter 2010 Midterm Exam

Presented by Greg Lindsay Technical Writer Windows Server Information Experience. Presented at: Seattle Windows Networking User Group April 7, 2010

DNSSEC. Introduction. Domain Name System Security Extensions. AFNIC s Issue Papers. 1 - Organisation and operation of the DNS

Use Domain Name System and IP Version 6

Deploying DNSSEC: From End-Customer To Content

Monitoring the DNS. Gustavo Lozano Event Name XX XXXX 2015

DNS Cache Poisoning Vulnerability Explanation and Remedies Viareggio, Italy October 2008

Network Infrastructure Under Siege

Computer Networks: Domain Name System

The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

DNSSEC for Everybody: A Beginner s Guide

DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

Where is Hong Kong in the secure Internet infrastructure development. Warren Kwok, CISSP Internet Society Hong Kong 12 August 2011

page 1 DNS Rate Limiting W. Matthijs Mekking matthijs@nlnetlabs.nl 28 Feb 2013 Stichting NLnet Labs

Resilient Networking. Overview of DNS Known attacks on DNS Denial-of-Service Cache Poisoning. Securing DNS Split-Split-DNS DNSSEC.

DOMAIN NAME SECURITY EXTENSIONS

Overview of DNSSEC deployment worldwide

Network Security. DNS (In)security. Radboud University, The Netherlands. Autumn 2015

DNS security: poisoning, attacks and mitigation

Security of IPv6 and DNSSEC for penetration testers

DNSSEC and DNS Proxying

DNSSEC. Introduction Principles Deployment

Q3 State of DNS Report DNSSEC Deployment in.gov

CS Lecture 22 DNS Security

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008

DRDoS Attacks: Latest Threats and Countermeasures. Larry J. Blunk Spring 2014 MJTS 4/1/2014

DNSSEC in stats. GC-SEC Global Cyber Security Center. Andrea Rigoni. CENTR Bruxelles, 7th October Global Cyber Security Center Director General

The Collateral Damage of Internet Censorship by DNS Injection

This is the author manuscript, before publisher editing. The original publication is available at

XN--P1AI (РФ) DNSSEC Policy and Practice Statement

The Survey Report on DNS Cache & Recursive Service in China Mainland

DNSSEC in your workflow

A Security Evaluation of DNSSEC with NSEC3

Outline : Computer Networking. Narrow Waist of the Internet Key to its Success. NSF Future Internet Architecture

Introduction to Network Operating Systems

A Case for Comprehensive DNSSEC Monitoring and Analysis Tools

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Names & Addresses. Names & Addresses. Names vs. Addresses. Identity. Names vs. Addresses. CS 194: Distributed Systems: Naming

The Domain Name System from a security point of view

DNS SECURITY TROUBLESHOOTING GUIDE

Defending against DNS reflection amplification attacks

DNSSEC - Why Network Operators Should Care And How To Accelerate Deployment

ICS 351: Today's plan. DNS WiFi

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

DNSSEC - SECURE DNS FOR GOVERNMENT. Whitepaper

Securing DNS Infrastructure Using DNSSEC

EDU DNSSEC Testbed. Shumon Huque, University of Pennsylvania Larry Blunk, MERIT Network

THE MASTER LIST OF DNS TERMINOLOGY. v 2.0

DNS Security FAQ for Registrants

DNSSEC Practice Statement (DPS)

An Intrusion Detection System for Kaminsky DNS Cache poisoning

Blocking DNS Messages is Dangerous

Domain Name Service (DNS) Training Division, NIC New Delhi

Networking Domain Name System

Defending your DNS in a post-kaminsky world. Paul Wouters <paul@xelerance.com>

Distributed Systems 19. Content Delivery Networks (CDN) Paul Krzyzanowski

Georgia College & State University

Chapter 25 Domain Name System Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

DNSSec Operation Manual for the.cz and e164.arpa Registers

A Best Practices Architecture for DNSSEC

CS 348: Computer Networks. - DNS; 22 nd Oct Instructor: Sridhar Iyer IIT Bombay

The secret life of a DNS query. Igor Sviridov <sia@nest.org>

DNS. Spring 2016 CS 438 Staff 1

Windows 2008 Server. Domain Name System Administración SSII

Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System

A Very Incomplete Diagram of Network Attacks

Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015

THE MASTER LIST OF DNS TERMINOLOGY. First Edition

CMPE 80N: Introduction to Networking and the Internet

How To Understand The Effect Of A Domain Name Extension On A Network Attack On A Domain Names Server (Dns)

CS 355. Computer Networking. Wei Lu, Ph.D., P.Eng.

Domain Name System Security

DNS traffic analysis -- Issues of IPv6 and CDN --

ARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table

Verteilte Systeme - Overview

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Measurements and Laboratory Simulations of the Upper DNS Hierarchy

How to Install the Active Directory Domain Services (AD DS) Role in Windows Server 2008 R2 and Promote a Server to a Domain Controller

Reliable Strong Cache and Security for the Domain Name System

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

DNS Best Practices. Mike Jager Network Startup Resource Center

CSE 127: Computer Security. Network Security. Kirill Levchenko

THE DOMAIN NAME SYSTEM DNS

NET0183 Networks and Communications

The Graph Name System: pathnames and petnames in a rootless DNS

A Fair Solution to DNS Amplification Attacks

Large-scale DNS and DNSSEC data sets for network security research

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Reverse DNS considerations for IPv6

Transcription:

The Impact of DNSSEC on the Internet Landscape Matthäus Wander <matthaeus.wander@uni-due.de> Duisburg, June 19, 2015

Outline Domain Name System Security problems Attacks in practice DNS Security Extensions (DNSSEC) Protection and new problems Adoption in practice Matthäus Wander 2

DOMAIN NAME SYSTEM Matthäus Wander 3

Domain Name System (DNS) Stub Resolver Recursive Resolver Recursive Resolver Distributed Database Hierarchical Namespace Authoritative Name Servers Resolve domain names to data (e.g. IP address) Data sets: resource records Matthäus Wander 4

DNS Spoofing Attacks Stub Resolver Recursive Resolver Recursive Resolver Attacker Goals: Divert application to another server Deny service Authoritative Name Servers Matthäus Wander 5

DNS Spoofing Attacks Stub Resolver Recursive Resolver Recursive Resolver On-path attacker: Sees query, spoofs response (e.g. public WiFi) Authoritative Name Servers Off-path attacker: Predicts query, spoofs response (anywhere in the Internet) Matthäus Wander 6

Man-in-the-Middle Attack Stub Resolver Recursive Resolver Recursive Resolver Man-in-the-middle (MITM) attacker: Sees query, spoofs response Authoritative Name Servers Filtering of resolver users Matthäus Wander 7

Man-in-the-Middle Attack Stub Resolver Recursive Resolver Man-in-the-middle (MITM) attacker: Sees query, spoofs response Authoritative Name Servers Filtering of resolver users Matthäus Wander 8

Man-in-the-Middle Attack Stub Resolver ISP Router Recursive Resolver MITM attack on IP router: Deep Packet Inspection of DNS traffic Router sees query, spoofs response Authoritative Name Servers Effective filtering of all DNS queries in network Matthäus Wander 9

Cumulated responses Probing for DNS Injectors Published in: IEEE Access, 2014 Responses for facebook.com Vantage point Round-trip time [s] Matthäus Wander 10

DNS Injection over Time Published in: IEEE Access, 2014 Responses for facebook.com Matthäus Wander 11

Impact Assessment on Third Parties Published in: IEEE Access, 2014 Unrelated third party routed through censored country Matthäus Wander 12

Open Resolver Measurement Published in: IEEE Access, 2014 Worldwide impact of Chinese DNS injection Top-level domains 1144 name servers Multiple vantage points 255k open resolvers worldwide Sender Open Resolver www.minghui.org.s1.verteiltesysteme.net. IN A? Destination: TLD server Matthäus Wander 13

Affected resolvers Affected resolvers Open Resolver Results Published in: IEEE Access, 2014 15k resolvers (6%) affected by Chinese DNS injection 14k affected when contacting e.dns.kr Country Matthäus Wander 14 Destination name server

.kr Top-Level Domain Servers Published in: IEEE Access, 2014 Matthäus Wander 15

Impact Assessment on Third Parties Published in: IEEE Access, 2014 Unrelated third party routed through censored country into Matthäus Wander 16

DNSSEC Matthäus Wander 17

Concept DNS zone Stub Resolver Recursive Resolver Recursive Resolver Authoritative Name Server Security goals: data integrity and authenticity Signatures pre-generated over DNS data sets End-to-end security between validator and signer Matthäus Wander 18

Public Key Distribution. Public key net: key fingerprint net. Public key verteiltesysteme.net: key fingerprint Resolver has copy of root public key verteiltesysteme.net. Public key Signed resource records Matthäus Wander 19

Trust Model DNSSEC Root Zone Top-level 2nd level Authority limited to subnamespace Powerful root authority Matthäus Wander 20

Cache Lock-in Stub Resolver Recursive Resolver Recursive Resolver Authoritative Name Server CD=1 CD=1 DNS zone Cache Cache Cache End-to-end security: validation on end host Independent of validation failures on intermediate resolvers Request response without DNSSEC validation Problem: cache lock-in Matthäus Wander 21

Cache Lock-in Stub Resolver Recursive Resolver Recursive Resolver Authoritative Name Server CD=1 CD=1 DNS zone Cache Cache Cache Omit intermediate resolvers Effectiveness of intermediate caching? Matthäus Wander 22

Trace-driven Simulation of Cache Effectiveness Cache Clients Recursive Resolver Cache collection point Authoritative Name Servers Cache Cache Cache models: Shared cache in front of 10k clients 10k independent caches Matthäus Wander 23

Queries per 10-min bucket Bandwidth Overhead 80000 70000 60000 50000 40000 30000 Internal External (shared) External (10k) External traffic: Shared cache: 2.44 GBytes 10k caches: 7.55 GBytes 20000 10000 0 17 Sep 19 Sep 21 Sep Universität 23 SepDuisburg-Essen 25 27 29 Sep Matthäus Wander 24

Latency Overhead Matthäus Wander 25

Latency Overhead Q 0,75 +24 ms Q 0,9 +74 ms Utilize intermediate DNS caches Q 0,5 +11 ms Fall back to autonomous resolution on failure Matthäus Wander 26

Privacy and Confidentiality Published in: IEEE NCA, 2014 Client: no privacy improvement Cleartext DNSSEC messages Server: discloses hash values of zone contents Server proves non-existence Client queries h( test )=80a1 DNS zone Server database Hashing supposed to hide names 78a1 NSEC3 8e5d Break NSEC3 hash values with GPU-based attacks One GPU reveals 65%.com hash values in 5 days Matthäus Wander 27

ADOPTION OF DNSSEC Matthäus Wander 28

Signed Top-Level Domains Matthäus Wander 29

Signed Second-Level Domains DNS zone Server database TLD Domains 1. nl 2,279,702 2. br 566,694 3. cz 448,984 4. com 426,182 5. se 349,514 6. eu 320,311 7. fr 205,662 8. no 119,759 9. be 92,385 10. net 81,391 11. org 46,382 12. ovh 29,372 13. nu 21,126 14. de 20,004 Total: 5,146,705 signed domains Matthäus Wander 30

Algorithms and Key Sizes Algorithm Survey of 3.4M domains Domains RSA/MD5 0 DSA/SHA-1 2,176 RSA/SHA-1 1,547,782 RSA/SHA-256 1,869,157 RSA/SHA-512 1,100 GOST R 34.10-2001 30 ECDSA P-256/SHA-256 29 ECDSA P-384/SHA-384 19 >99% use RSA RSA Key Size Domains 512 13,674 768 25 1024 3,152,420 1032 535 1152 108 1280 185,825 1304 105 1536 106 2048 59,907 2560 1 3072 3 4096 5,135 Shortest RSA key per domain Result Domains No DNSKEY (dangling DS) 17,751 No trusted DNSKEY (dangling DS) Matthäus Wander 31 1,066 No RRSIG for trusted DNSKEY 238 Signature expired 2,138 Signature verify failure 5 Validation failure 21,198 Validation success 3,416,700 0,6% domains fail validation

Measuring Validating Clients Published in: LNCS PAM, 2013 https://sigok.verteiltesysteme.net/a.png https://sigfail.verteiltesysteme.net/b.png Invisible 1px images SigOk SigFail DNSKEY Recursive Resolver Authoritative Name Server Matthäus Wander 32

DNSSEC Validation Published in: LNCS PAM, 2013 841k test results from 557k distinct IP addresses Matthäus Wander 33

DNSSEC Validation per Country Published in: LNCS PAM, 2013 2012 2013 Median per country: 1% Matthäus Wander 34

DNSSEC Validation per Country 2014 2015 Median per country: 20% Matthäus Wander 35

Conclusions (1/2) DNS spoofing used for Internet filtering 6% resolvers worldwide affected by Chinese DNS injection Evidence of router-based DNS injection in Iran Political changes in DNS filtering observable from outside DNS caching causes lock-in on bogus data Trace-driven simulation shows moderate benefit of caching Suggestion: omit DNS caches on DNSSEC validation failure Matthäus Wander 36

Conclusions (2/2) DNSSEC secures data integrity and authenticity Hashing is ineffective for protecting the DNS database First-time survey of all DNSSEC signed domains 5M signed domains: >99% use RSA, 0.6% are broken 3-year measurement of validating clients Worldwide increase of DNSSEC adoption Varies by country (median 20%) Matthäus Wander 37

Referenced Publications M. Wander, T. Weis: Measuring Occurrence of DNSSEC Validation, Passive and Active Measurement (PAM), LNCS Springer, 2013. M. Wander, C. Boelmann, L. Schwittmann, T. Weis: Measurement of Globally Visible DNS Injection, IEEE Access, 2014. M. Wander, L. Schwittmann, C. Boelmann, T. Weis: GPU-based NSEC3 Hash Breaking, IEEE NCA, 2014. Awarded best student paper. Matthäus Wander 38