root gtld cctld cct..rs .co.c m .org .ne.n t .uk .de .org.o. rg.rs

Size: px
Start display at page:

Download "root gtld cctld cct..rs .co.c m .org .ne.n t .uk .de .org.o. rg.rs"

Transcription

1 DNS, DHCP i upravljanje adresama Mr Nenad Krajnović Katedra za telekomunikacije, ETF krajko@etf.bg.ac.rs DNS Domain Name Service IP adresa je neophodna da bi bila moguća komunikacija između računara na Internetu Lakše je pamtiti imena nego gomilu brojeva DNS uspostavlja vezu između alfanumeričkog imena i IP adrese i obrnuto Kako formirati tabelu sa imenima i IP adresama? 2 Primer DNS tabele ; ; ETF.BG.AC.RS domain definitions ; $TTL IN SOA NS.ETF.BG.AC.RS. HOSTMASTER.ETF.BG.AC.RS. ( ; serial ; refresh 3600 ; retry ; expire ) ; minimum negative caching ; --- DNS-ovi za zone ETF.BG.AC.RS. (Elektrotehnicki fakultet Univ. u Beogradu) IN NS NS.ETF.BG.AC.RS. IN NS ZMAJ.ETF.BG.AC.RS. IN NS NS.RCUB.BG.AC.RS. IN NS AVALA.YUBC.NET. ; --- MX zapis za razmenu poste za domen ETF.BG.AC.RS IN MX 10 zmaj.etf.bg.ac.rs. ; --- web server za domen ETF.BG.AC.RS IN A rtr1 svarog kondor proxy vhost1 www IN A IN A IN A IN A IN A IN CNAME vhost1.etf.bg.ac.rs. 3 1

2 Formiranje DNS tabele U doba ARPANET-a se tabela ručno formirala (održavana od strane SRI-NIC-a) Problemi sa ovakvim rešenjem: Opterećenje host-a a sa koga su preuzimani podaci Kolizija po pitanju imena (isto ime za više računara) Konzistentnost podataka u tabeli Problem rešen uvođenjem DNS-a (autor Paul Mockapetris RFC 1034, 1035) 4 Formiranje DNS tabele U početku se ručno unosili podaci Sledeći korak je bio korišćenje uporednih tabela (spreadsheets spreadsheets) )za formiranje zone file-a Namenski pisani skriptovi za formiranje zone file-a 5 Organizacija FQDN prostora Nije praktično čuvati sve IP adrese i sve nazive (FQDN) na lokalnom DNS serveru (zbog potrebne memorije, update- a, brzine odziva, cene,...) Hijerarhijska organizacija Nezavisno od adresne hijerarhije DNS je globalno distribuirana, skalabilna, pouzdana, labavo povezana, dinamička baza podataka Sastoji se od tri komponente: Domenskog prostora Servera koji čine taj prostor raspoloživ Klijenata (resolvers)) koji šalju upite serverima u vezi domena 6 2

3 Šta nudi DNS? DNS predstavlja mehanizam pretraživanja globalne baze podataka sa podacima o nazivima domena i IP adresama 7 DNS globalno distribuirana baza Podaci se lokalno formiraju ali su globalno raspoloživi Ne postoji računar koji sadrži sve DNS podatke sa celog Interneta DNS upit (lookup)) može da postavi bilo koji računar na Internetu U cilju poboljšanja performansi, dobijeni odgovori se lokalno keširaju 8 DNS labavo povezana baza Svaka zona ima svoj serijski broj koji se povećava kada dođe do promene Promene u zoni se distribuiraju na osnovu vremenskog parametra postavljenog od strane administratora ili automatski Vreme čuvanje keširanih podataka zavisi od vremenskog parametra postavljenog od strane administratora (u zone file-u) 9 3

4 DNS - skalabilnost Veličina baze ničim nije ograničena Jedan server može da čuva podatke za samo nekoliko imena a može i za par desetina miliona imena (ne preporučuje se) Nema ograničenja po pitanju broja upita koje može da obradi jedan server (tipično a može i preko upita) Upiti se distribuiraju između master i slave servera 10 DNS - pouzdanost Podaci koji se unose samo na master serveru se distribuiraju do jednog ili više slave servera tako da se kod svih servera nalaze isti podaci Odgovore na upite ravnopravno mogu da pruže i master i slave serveri 11 DNS dinamička baza Svaki podatak u bazi se može i dinamički menjati Na Internetu se stalno menjaju podaci u DNS tabelama Dinamičke promene su moguće samo na master serveru Promena podataka na master serveru odmah inicira kopiranje tih podataka na sve slave servere 12 4

5 gtld.com.org.net root.uk.rs cctld.de domen.org.rsrs.ac.rs.co.rs.ni.ac.rs.bg.ac.rs.ns.ac.rs domen.fon.bg.ac.rs.etf.bg.ac.rs.grf.bg.ac.rsrs domen Organizacija domenskog prostora Hijerarhijska Svako ime na prethodnoj slici predstavlja domen/poddomen Svaki domen sadrži određeni broj RR (Resource Record) Primeri RR-a: address (A), pointer (PTR), mail exchange (MX), name server (NS), start of authority (SOA) 14 Zone, delegacija, domeni Glavni domeni se dele na zone koje možemo nazivati poddomenima Zone su administrativne tvorevine koje sadrže podatke o delu domenskog prostora Nadležnost nad zonama se dodeljuje u hijerarhijskom smislu (delegacija domena) 15 5

6 DNS serveri DNS serveri su serveri koji sadrže podatke o domenima i koji odgovaraju na DNS upite Odgovori master i slave servera se smatraju za autoritativne dok se odgovori dobijeni od rekurzivnih (caching)) smatraju za neautoritativne odgovore 16 Kako radi DNS? Klijent šalje upit lokalnom.com Root name name serveru da bi dobio name server IP adresu odredišta server autoritativni Lokalni server šalje prvi odgovor upit root name serveru a posle rekurzivno šalje CISCO.COM upite DNS serverima dok name server Local DNS ne dođe do servera koji server ima potrebne podatke NE autoritativni caching odgovor Lokalni server šalje konačni odgovor klijentu i Q: What is the address for te podatke pamti u cache- u zbog sledećih upita A:

7 Sadržaj zone file-a ; ; ETF.BG.AC.RS domain definitions ; $TTL IN SOA NS.ETF.BG.AC.RS. HOSTMASTER.ETF.BG.AC.RS. ( ; serial ; refresh 3600 ; retry ; expire ) ; minimum negative caching ; --- DNS-ovi za zone ETF.BG.AC.RS. (Elektrotehnicki fakultet Univ. u Beogradu) IN NS NS.ETF.BG.AC.RS. IN NS ZMAJ.ETF.BG.AC.RS. IN NS NS.RCUB.BG.AC.RS. IN NS AVALA.YUBC.NET. ; --- MX zapis za razmenu poste za domen ETF.BG.AC.RS IN MX 10 zmaj.etf.bg.ac.rs. ; --- web server za domen ETF.BG.AC.RS IN A rtr1 svarog kondor proxy vhost1 www IN A IN A IN A IN A IN A IN CNAME vhost1.etf.bg.ac.rs. 19 Resource Records (RR) Zone file se sastoji iz zaglavlja i resource record-a zmaj.etf.bg.ac.rs IN A labela ttl klasa uvek IN tip podatka podatak 20 Primer ; ; ETF.BG.AC.RS domain definitions ; $TTL IN SOA NS.ETF.BG.AC.RS. HOSTMASTER.ETF.BG.AC.RS. ( ; serial ; refresh 3600 ; retry ; expire ) ; minimum negative caching ; --- DNS-ovi za zone ETF.BG.AC.RS. (Elektrotehnicki fakultet Univ. u Beogradu) IN NS NS.ETF.BG.AC.RS. IN NS ZMAJ.ETF.BG.AC.RS. IN NS NS.RCUB.BG.AC.RS. IN NS AVALA.YUBC.NET. ; --- MX zapis za razmenu poste za domen ETF.BG.AC.RS IN MX 10 zmaj.etf.bg.ac.rs. ; --- web server za domen ETF.BG.AC.RS IN A zaglavlje rtr1 svarog kondor zmaj proxy IN A IN A IN A IN A IN A RR 21 7

8 Tipovi podataka u RR-u A označava IP adresu host-a CNAME označava alternativno ime (canonical name) ) za neki host HINFO podaci o procesoru i OS-u,... MX redni broj + naziv servera koji je mail server NS naziv servera koji je autoritativni name server za taj domen 22 Tipovi podataka u RR-u TXT proizvoljan tekstualni podatak za objašnjenje prethodnih RR-a LOC za unošenje geografskih koordinata DNS servera (nije obavezno) secret-wg.org IN LOC ( N E 0m 100m 100m 100m ) secret-wg.org IN TXT Demonstration and test zone 23 Zaglavlje zone file-a SOA Starting of Authority zapis koji služi za predstavljanje podataka koji se odnose na sam domen 24 8

9 Zaglavlje zone file-a Naziv domena Master DNS server adresa za kontakt etf.bg.ac.rs. IN SOA NS.ETF.BG.AC.RS. HOSTMASTER.ETF.BG.AC.RS. ( ; serial ; refresh 3600 ; retry ; expire ) ; minimum negative caching Serijski broj Timing parametri 25 Timing parametri u SOA zapisu Vreme se izražava u sekundama a novi RFC-ovi su dozvolili i druge vremenske veličine: h časova M minuta W - nedelja 26 Timing parametri u SOA zapisu Refresh vreme osvežavanja; posle isteka tog vremena će slave server da proveri da li je došlo do promene sadržaja podataka na master serveru Retry ako provera podataka na master serveru nije uspela, posle isteka ovog vremena će slave server ponovo pokušati sa proverom podataka 27 9

10 Timing parametri u SOA zapisu Expire ako ponovni pokušaji provere serijskog broja na master serveru nisu uspeli do isteka expire vremena, tada slave server proglašava svoje podatke za ne važeće i odbacuje ih Poslednje polje u SOA zapisu je u početku označavalo TTL (Time To Live) vreme koliko je odgovor validan 28 Timing parametri u SOA zapisu RFC 2308 doneo promenu tako da sada poslednje polje u SOA zapisu predstavlja vreme koliko treba čuvati negativan odgovor (odgovor da traženi podatak ne postoji) Default vrednost za TTL se zadaje pre SOA zapisa sa: $TTL 3h 29 Klasičan format zone file-a ; ; ETF.BG.AC.RS domain definitions ; etf.bg.ac.rs. IN SOA NS.ETF.BG.AC.RS. HOSTMASTER.ETF.BG.AC.RS. ( ; serial ; refresh 3600 ; retry ; expire ) ; minimum negative caching ; --- DNS-ovi za zone ETF.BG.AC.RS. (Elektrotehnicki fakultet Univ. u Beogradu) etf.bg.ac.rs IN NS NS.ETF.BG.AC.RS. etf.bg.ac.rs IN NS ZMAJ.ETF.BG.AC.RS. etf.bg.ac.rs IN NS NS.RCUB.BG.AC.RS. etf.bg.ac.rs IN NS AVALA.YUBC.NET. ; --- MX zapis za razmenu poste za domen ETF.BG.AC.RS etf.bg.ac.rs IN MX 10 zmaj.etf.bg.ac.rs. ; --- web server za domen ETF.BG.AC.RS etf.bg.ac.rs IN A rtr IN A svarog IN A kondor IN A zmaj IN A proxy IN A

11 Skraćeni format zone file-a ; ; ETF.BG.AC.RS domain definitions ; $TTL IN SOA NS.ETF.BG.AC.RS. HOSTMASTER.ETF.BG.AC.RS. ( ; serial ; refresh 3600 ; retry ; expire ) ; minimum negative caching ; --- DNS-ovi za zone ETF.BG.AC.RS. (Elektrotehnicki fakultet Univ. u Beogradu) IN NS NS.ETF.BG.AC.RS. IN NS ZMAJ.ETF.BG.AC.RS. IN NS NS.RCUB.BG.AC.RS. IN NS AVALA.YUBC.NET. ; --- MX zapis za razmenu poste za domen ETF.BG.AC.RS IN MX 10 zmaj.etf.bg.ac.rs. ; --- web server za domen ETF.BG.AC.RS IN A rtr1 IN A svarog IN A kondor IN A zmaj IN A proxy IN A Inverzni (reverse)) DNS Inverzni DNS radi mapiranje IP adrese u ime kada znate samo IP adresu Popunjava se na isti način kao i direktni DNS Obavezan je za svaku IP adresu koja je dodeljena nekom uređaju 32 Inverzni DNS net edu com google ripe isi sun tislabs moon www disi ftp www ws2 ws1 arpa in-addr IP v4 addresses 33 11

12 Primer inverznog zone file-a ; ; in-addr.arpa definition ; $TTL $ORIGIN IN SOA NS.ETF.BG.AC.RS. HOSTMASTER.ETF.BG.AC.RS. ( ; serial ; refresh 3600 ; retry ; expire ) ; minimum negative caching ; --- DNS-ovi za zone in-addr.arpa (Elektrotehnicki fakultet Univ. u Beogradu) IN NS NS.ETF.BG.AC.RS. IN NS ZMAJ.ETF.BG.AC.RS. IN NS NS.RCUB.BG.AC.RS. IN NS NS.BEOTEL.NET. IN NS FON.FON.BG.AC.RS. 1 IN 4 IN 8 IN 10 IN 62 IN PTR PTR PTR PTR PTR rtr1.etf.bg.ac.rs. svarog.etf.bg.ac.rs. kondor.etf.bg.ac.rs. proxy.etf.bg.ac.rs. zmaj.etf.bg.ac.rs. 34 DNS zahtevi Za svaki domen moraju da postoje minimalno dva DNS servera DNS serveri moraju da budu na različitim mrežama Preporučljivo je da ima nekoliko DNS servera 35 DHCP Dynamic Host Configuration Protocol Protokol koji omogućava dinamičko dodeljivanja IP adrese i ostalih tehničkih parametara računarima vezanim u mrežu Definisan u RFC-u 2131 a dopunjen u RFC-u

13 Kako DHCP radi? DHCP server dinamički dodeljuje IP adresu Formira adresni pool da bi efikasnije koristio adresni prostor i podržao mobilne korisnike Klijent šalje broadcast discovery paket na lokalnu mrežu Više servera može da odgovori na taj upit Klijent bira onog koji je prvi odgovorio ili onog koji ima najbolji odgovor Evo tvoje konfiguracije: IP adresa: Subnet maska: Default ruteri: , DNS serveri: , Lease time: : 5 dana LAN Pošalji mi konfiguracion e podatke 37 DHCP proces otkrivanja servera DHCP klijent šalje DISCOVER pakete broadcast-om om na LAN DHCP serveri odgovaraju sa OFFER paketom koji sadrži i informacije o uslovima dobijanja resursa DHCP klijent na osnovu toga bira server i šalje REQUEST kao broadcast Izabrani DHCP server odgovara sa ACK paketom klijent Server 1 Server 2 38 DHCP format paketa OP Code (1) HW Type (1) HW Length (1) HOPS (1) Seconds (2) Transaction ID (XID) (4) Flags (2) Client IP Address (CIADDR) (4) Your IP Address (YIADDR) (4) Server IP Address (SIADDR) (4) Gateway IP Address (GIADDR) (4) Client Hardware Address (CHADDR) (16) Server Name (SNAME) (64) Filename (128) DHCP Options (variable) 39 13

14 DHCP format paketa OP Code definiše tip poruke koja se šalje: 1 bootprequest 2 bootpreply HW Type definiše tip mreže i adrese: 1 10 Mbps ethernet HW Length definiše dužinu HW adrese: 6 10Mbps ethernet 40 DHCP format paketa HOPS klijent ovde upisuje vrednost 0; opciono se koristi kada postoji relay agent Transaction ID (XID) slučajan broj izabran od strane klijenta; služi za povezivanje poruka koje razmenjuju klijent i server 41 DHCP format paketa Seconds broj sekundi od trenutka kada je klijent započeo proces dobijanja IP adrese; popunjava klijent Flags B broadcast flag klijent ga postavlja na 1 ako ne može da prihvati unicast paket pre nego što je dobio kompletnu IP adresu; ako može da prihvati unicast adresu tada je ovaj bit 0 B All bits are zero 42 14

15 DHCP format paketa CIADDR IP adresa klijenta; upisuje je klijent kada šalje poruku za obnavljanje dodele postojeće IP adrese YIADDR IP adresa klijenta koju upisuje DHCP server kada je dodeli klijentu 43 DHCP format paketa SIADDR IP adresa sledećeg DHCP servera u nizu koga treba kontaktirati GIADDR IP adresa relay agenta; upisuje je relay agent ako postoji na mreži a poruka prolazi kroz njega CHADDR hardverska adresa klijenta 44 DHCP format paketa SNAME ime DHCP servera; polje je opciono, ako se ne koristi u njemu se nalazi prazan string File kada se šalje DHCPDISCOVER poruka tada je prazno a ako je to DHCPOFFER onda sadrži puno ime direktorijuma Options opciono polje 45 15

16 DHCP Options Kroz opciona polja server šalje klijentu razne parametre Do sada definisano preko 100 raznih opcija Većina klijenata podržava oko 10 opcija Na raspolaganju su i opcije razvijene od strane proizvođača 46 Zajedničke DHCP opcije Lease time Code: 51 Subnet mask Code: 1 Default Routers Code: 3 DNS servers Code: 6 Domain name Code: 15 Host name Code: 12 WINS servers Code: 44 NetBIOS Node Type Code: 46 Client Identifier Code: Unapređenja u radu DNS servisa RFC 2136 Dynamic DNS update RFC 1995 Incremental zone transfer RFC 1996 Notify 48 16

17

18

19

20

21 61 62 Problemi sa DNS-om? Na prvi pogled, sve radi kako treba Problem je što prilikom slanja upita i dobijanja odgovora ne postoji autentifikacija odgovora Klijent ne zna: Odakle je odgovor stvarno došao? Da li je server poslao tačne podatke? Da li je klijent primio ono što je server poslao? 63 21

22 Razbijanje DNS servisa Bombardovanje klijenta lažnim odgovorima Pogađanje šta bi odgovor mogao da bude Presretanje paketa sa odgovorom i modifikovanje Funkcioniše samo ako je napadač blizu klijentu ili serveru Postavljanje lažnog servera za neku zonu Prevariti ostale servere da šalju upite lažnom serveru Lažiranje tabela rutiranja u cilju preusmeravanja saobraćaja ka lažnim root DNS serverima ili DNS serverima interesantne zone 64 Posledice... Klijent ne može da bude siguran da li je stvarno dobio odgovor od nadležnog DNS servera Klijent ne može da bude siguran da li je dobio prave podatke u odgovoru Da li će klijent pristupiti traženom serveru ili nekom lažnom? 65 Osnovni tipovi kripto zaštite Dva osnovna sistema kripto zaštite: sistem sa simetričnim ključem - isti tajni ključ se koristi i za šifrovanje i za dešifrovanje podataka sistem sa asimetričnim ključem - postoje dva ključa, javniitajni 66 22

23 10/19/2014 Sistem sa simetričnim ključem isti tajni ključ izvorište odredište 67 Sistem sa simetričnim ključem tajnost ključa utiče na sigurnost celog sistema brz sistem što je veoma dobro sa stanovišta performansi najčešće se koriste AES, 3DES i RC-4 algoritmi dužina ključa utiče na kvalitet kripto zaštite (današnji ključevi su 512-bitni i više) 68 Sistem sa asimetričnim ključem problem tajnosti ključa u sistemu sa simetričnim ključem razrešen je u sistemu sa asimetričnim ključem ovde se koriste dva ključa, javniitajni javni ključ se slobodno distribuira dok je tajni poznat samo vlasniku kombinacijom javnog i tajnog ključa dobija se novi ključ koji se koristi za šifrovanje 69 23

24 Sistem sa asimetričnim ključem novodobijeni ključ se koristi za šifrovanje kao i kod sistema sa simetričnim ključem najčešće se koriste dva algoritma Diffie- Hellman (DH) i Rivest-Shamir-Adlemen (RSA) problem ako se neko ubaci u prenos javnih ključeva (man man-in-the-middle) 70 DH algoritam A B tajni javni javni tajni ključ ključ ključ ključ sa sa sa sa lok.a lok.b lok.a lok.b DH algoritam za proračun ključa DH deljeni tajni ključ DH deljeni tajni ključ 71 DH - man-in-the-middle A M B 72 24

25 Transaction Signatures (TSIG) Defined in RFC 2845 Computed on the fly Not in zone files Added to Additional Section of DNS replies Uses a shared secret and cryptographic hash functions Currently HMAC-MD5 MD5 Timestamps prevent replay attacks 73 TSIG Overview "Lightweight" digital signature Cryptographic hash of: DNS query or answer Timestamp Shared secret Can be anything (within reason) Usually generated by dnssec-keygen Use any tool that generates a base-64 encoded string 74 Cryptographic Hash Functions Very strong checksums Mathematically proven to have almost no chance of a collision: Different inputs cannot result in the same hash value MD5 hash of ASCII character 1 b026324c6904b2a9cb4b88d6d61c81d1 MD5 hash of ASCII character 2 26ab0db90d72e28ad0ba1e22ee

26 TSIG Validation Other party knows: Contents of DNS packet Choosen crypto hash algorithm Time of day (UTC) Shared Secret It can compute the TSIG hash value If the calculated hash matches the TSIG hash in DNS packet, all is well If not, something has gone wrong: Wrong timestamp Different shared secret 76 TSIG Shared Secret An obvious vulnerability Has to remain secret Systems using TSIG should be under one administrative & operational control Authenticating zone transfers? Many TLDs do this already Dynamic DNS update requests DHCP server, nsupdate 77 Timestamps and TSIG Transaction Signatures include a timestamp Prevents replay attacks Fuzz factor allows clocks to be out by up to a few minutes Systems using TSIG should have their clocks synchronised Should be running NTP anyway Run Secure NTP if you're paranoid Or buy an atomic clock! 78 26

27 Why Secure DNS? The DNS is not secure!!! Servers could be lying Cache poisoning attacks Servers could be spoofed Answers could be tampered with UDP makes these attacks simple This is what Secure DNS is designed to solve 79 What DNSSEC Does Not Do Prevent/thwart denial-of of-service attacks Stop name server compromises Buffer overflows Run BIND9 to stop that! Environment variable leakages Confidentiality of DNS data The DNS is public after all What Secure DNS Proves Data authenticity What was received was what the server sent Non-repudiation Who/what signed the data Name server authenticity (in theory anyway) An answer for foo.example.com comes from the genuine name servers for example.com Should be a chain of trust to the root 81 27

28 The Chain of Trust Public key for example.com is signed with the private key for.com.com trusts the example.com key Public key for.com is signed with the private key for the root Root zone trusts the.com key Everyone trusts the root zone s public key Openly published Built in to every name server? 82 Validation Model Answer for example.com is provably correct It s been signed with the example.com key Nobody could have tampered with the data The example.com key was signed by the key for.com so the example.com key is OK The.com key was signed by the root key so the delegation to com can be trusted too The root key is known and trusted by everyone 83 Secure DNS Overview Defined in RFC2535 (DNSSEC) Raft of enhancements & extensions since then: RFC2536, RFC2537, RFC2931, RFC3007, RFC3008, RFC3090, RFC3110, etc Three new resource records: KEY, SIG and NXT Digital signatures of DNS data Industrial-strength strength crypto: DSA, RSA, Diffie-Helman 84 28

29 Public Key Cryptography Asymmetric encryption: RSA, DSA Public key and private key pairs Data encoded with public key can only be decoded with the corresponding private key and vice versa Digital signatures Non-repudiation Confidentiality Not used in DNSSEC! DNS is supposed to be public after all 85 DNSSEC Signatures Don't explicitly sign the actual DNS data Sign a hash of the data instead (SHA1) Less data to sign Names must be normalised to a canonical form: All in lower-case Fully qualified domain names Handled automatically by the zone signing tool 86 Signing a Zone 4 steps: Generate a key Get parent to sign zone key Incorporate parent's signature of zone key Sign the zone Can self-sign sign when the parent zone is not DNSSEC-aware e.g. self-sign sign example.com if com is not signed 87 29

30 Comments on Signed Zone Original ordering is lost So are any comments in the unsigned zone file Signed zone files are not human-readable "No user serviceable parts inside" Zone file is approximately 4 times bigger: Each RR has a SIG record And an NXT record which also has a SIG record 88 DNSSEC-aware queries Note use of EDNS0 protocol Bigger DNS payloads/buffers Standard DNS query only has 512 byte payload Prevents truncated responses and TCP retries DNSSEC-aware answer is much bigger All the crypto stuff: SIGs, KEY Exceeds standard 512-byte limit Trivial example with small key size 89 Setting Up Islands of Trust Root zone is signed! (15. July 2010.) Top-level zones are not signed (yet) How to verify another DNSSEC-aware zone? trusted-keys statement in named.conf Add another "trusted" zone's public key to server Zone's public key sent by some out-of-band means to another DNSSEC-aware name server eg. business partner, supplier, ASP 90 30

31 Algorithms Implementations must support DSA RSA will become mandatory too No patent issues any more DSA is faster than RSA at signing g Takes longer to verify DSA signatures though Using >1 algorithm doesn't provide stronger authenticity or "security" DNS data will be insecure if either key is compromised 91 Sample Zone Signing Times Very modest hardware: 300 Mhz Pentium 100 Resource Records: 7.6 seconds 100,000 Resource Records: 7445 seconds Clearly linear Faster processors mean quicker signing Moore s Law is a big help here Crypto hardware makes it even faster Zone signing is inherently parallelisable Multi-processor systems, clusters 92 SIG Verification Times Same modest hardware: Verifying 1 RRset, 1 SIG record DSA-512: 108 ms DSA-1024: 346 ms RSA-512: 20 ms RSA-1024: 110ms Same linear speed-up with faster CPUs and/or special crypto hardware (RSA chips) Validating a single SIG record can t easily be done in parallel 93 31

32 Choosing Key Lengths Keys should be no bigger than parent zone's key No point making them larger Parent's key"strength" defines child's "strength" Use larger key sizes for long-lived lived SIGs Beware of cryptanalysis Shorter key lengths make sense for short- lived signatures Typically valid for less than a week 94 Good Crypto Policy Don't use one key for everything Maybe: RSA to sign zone data DSA to sign child keys or: 768-bit keys for signing zone data 1024-bit keys for signing child keys Change the keys "often enough" 95 Secure Dynamic Update Defined in RFC3007 But not well explained in BIND9 documentation yet On-line signing BIND9 computes SIG and NXT records on the fly Dynamic update requests on signed zones Name server needs to read the file containing the private key Storing private keys on-line is maybe not a good idea 96 32

33 DNSSEC Problems Bigger DNS packets Typically break 512-byte payload limit Need EDNS0 to allow bigger packets And prevent truncated responses => TCP retries Zone files are bigger and unreadable Signed zones can't be altered by hand Signing means changes to admin procedures check-out, modify, check, check-in, sign zone Add/remove/change keys 97 Parent zone should sign child zone's keys Implies close coupling of parent and child zones No bad thing, but too many broken/lame delegations ~25% in tightly controlled registries??% in.com High levels of DNS cluelessness No top-level domains are signed yet 98 Awkward registry/registrar relationships Who signs what and how? NXT records allow the whole zone to be traversed Key rollover is hard (and recursive!) Root zone key is a weakness 99 33

34 DNSSEC Future Some registries are planning to sign their TLDs for real Projects under way in Netherlands, Sweden & Germany RIPE's in-addr.arpa tree Verisign/NSI's plans for.com Further protocol extensions The DS (Delegation Signer) record Opt-in Alterations to NXT record 100 Tranzicija DNS servera Promena ISP-a podrazumeva i promenu IP adresa na DNS serverima Da bi promene DNS servera bile vidljive u svetu, one moraju da se evidentiraju i u DNS serverima za nadređene domene (.co.yu,.org.yu,.com,.org,.net,...) Izmene nadređenih DNS tabela ne mogu da se obave trenutno U zavisnosti od domena, na izmenu se može čekati od par sati do više dana ili nedelja 101 Tranzicija DNS servera Promena IP adrese bez izmene podataka u DNS tabelama i propagacije tih informacija dovodi do prekida komunikacije sa korisnicima Dva slučaja: Single homed sistem Multi homed sistem

35 Tranz. DNS-a single homed sistem Korisnik ima samo jedan link ka Internetu Gašenje jednog linka i aktivacija drugog g zahteva trenutne izmene IP adrese servera (svaki ISP rutira samo za svoj adresni prostor) Najčešće se DNS serveri nalaze kod ISP-a 103 Tranz. DNS-a single homed sistem Prilikom prelaska na novog ISP-a zadržavanje DNS hosting-a a kod starog ISP-a još neko vreme Prilikom promene linka i IP adresa, treba izvršiti promenu podataka i u DNS tabelama na starom DNS serveru U DNS-u se sada nalaze IP adrese novog ISP-a što omogućava normalan rad korisnika 104 Tranz. DNS-a single homed sistem Prekid u radu je minimalan traje koliko treba da se izmene iz DNS tabele propagiraju p po Internetu Bez obzira na preduzete mere, prekid u vidljivosti servera na lokalnoj mreži ipak postoji (za korisnike koji pristupaju sa Interneta)

36 Tranz. DNS-a single homed sistem Uspostavljeni su novi linkovi, serveri se vide sa novim IP adresama ali DNS serveri su i dalje kod starog ISP-a Podizanje novih DNS servera kod novog ISP-a Formiranje DNS tabela sa novim podacima koji su validni 106 Tranz. DNS-a single homed sistem Prijava izmene DNS servera nadređenom Internet registru za vaš domen (.co.rs,.org.rs,.com,.org,.net,...) Tek po ažuriranju DNS tabela za nadređeni domen (.co.rs,.org.rs,.com,.org,.net,...) treba isključiti DNS kod starog ISP-a 107 Tranz. DNS-a multi homed sistem Multi homed sistem znači da postoje dva linka ka dva ISP-a Omogućava korisniku da samostalno izvrši tranziciju DNS-a bez prekida komunikacije i bez zavisnosti od dobre volje ISP-a

37 Tranz. DNS-a multi homed sistem Scenario: Promena jednog od dva ISP-a čije adrese koriste DNS serveri ili, Postojanje samo jednog ISP-a a uspostavlja se i drugi link pri čemu se DNS serveri postavljaju da koriste adresni opseg novog ISP-a 109 Tranz. DNS-a multi homed sistem Uspostavljanje novog linka ka novom ISP-u (za slučaj da ne postoje dva ISP- a) Podizanje novih DNS servera koji će da koriste adresni opseg novog ISP-a ili dodavanje mrežnih kartica na postojeće DNS servere sa novim IP adresama 110 Tranz. DNS-a multi homed sistem Upisivanje novih podataka u tabele postojećih DNS servera (koji se vide na starim IP adresama) Tim postupkom će sav saobraćaj ka web i ostalim javnim serverima da dolazi preko novog linka Prijava izmene DNS servera nadređenom Internet registru

38 Tranz. DNS-a multi homed sistem Po dobijanju potvrde da je izvršena izmena u nadređenim DNS tabelama, može da se isključe stari DNS serveri ili da se ukinu stare IP adrese i link ka starom ISP-u Tranzicija DNS-a i IP adresa praktično prolazi bez prekida servisa za korisnike! 112 BIND Najpoznatija i najčešće korišćenja implementacija DNS servisa je BIND Autori: Internet Systems Consortium (ISC) Softver može besplatno da se preuzme sa njihovog web sajta Knjige DNS and BIND, 5 th edition,, Paul Albitz, Cricket Liu, O Reilly, may DHCP, A Guide to Dynamic TCP/IP Network Configuration, Barry Kercheval, Prentice Hall

39 Utilities nslookup Command line utility za slanje upita DNS serveru; postoji za Unix i za Windows dig Još jedan klijent ipconfig Klijent za Win XP koji omogućava da se vidi kompletna konfiguracija 115 DNS, DHCP i upravljanje adresama Mr Nenad Krajnović Katedra za telekomunikacije, ETF krajko@etf.bg.ac.rs 39

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail What is DNS? Systems to convert domain names into ip addresses: For an instance; www.tashicell.com 118.103.136.66 Reverse: 118.103.136.66 www.tashicell.com DNS Hierarchy Root Servers The top of the DNS

More information

New Challenges and Dangers for the DNS. Jim Reid ORIGIN TIS-INS

New Challenges and Dangers for the DNS. Jim Reid ORIGIN TIS-INS New Challenges and Dangers for the DNS Jim Reid ORIGIN TIS-INS Jim.Reid@nl.origin-it.com DNS Challenges - Netadmin99 Santa Clara Slide 1 Introduction new technologies IPv6, W2K dynamic DNS updates secure

More information

Domain Name System Security

Domain Name System Security Domain Name System Security T-110.4100 Tietokoneverkot October 2008 Bengt Sahlin 2008/10/02 Bengt Sahlin 1 Objectives Provide DNS basics, essential for understanding DNS security

More information

Računarske osnove Interneta (SI3ROI, IR4ROI)

Računarske osnove Interneta (SI3ROI, IR4ROI) Računarske osnove terneta (SI3ROI, IR4ROI) Vežbe MPLS Predavač: 08.11.2011. Dražen Drašković, drazen.draskovic@etf.rs Autori: Dražen Drašković Naučili ste na predavanjima MPLS (Multi-Protocol Label Switching)

More information

Virtuelne Privatne Mreže.

Virtuelne Privatne Mreže. Virtuelne Privatne Mreže Kripto zaštita Mr Nenad Krajnović, dipl. inž. e-mail: krajko@etf.bg.ac.yu VPN - kripto zaštita prethodno opisane metode su obezbeđivale virtuelne mreže pošto se podaci prenose

More information

VRIJEDNOSTI ATRIBUTA

VRIJEDNOSTI ATRIBUTA VRIJEDNOSTI ATRIBUTA Svaki atribut (bilo da je primarni ključ, vanjski ključ ili običan atribut) može i ne mora imati ograničenja na svojim vrijednostima. Neka od ograničenja nad atributima: Null / Not

More information

Outline NET 412 NETWORK SECURITY PROTOCOLS. Reference: Lecture 7: DNS Security 3/28/2016

Outline NET 412 NETWORK SECURITY PROTOCOLS. Reference:  Lecture 7: DNS Security 3/28/2016 Networks and Communication Department NET 412 NETWORK SECURITY PROTOCOLS Lecture 7: DNS Security 2 Outline Part I: DNS Overview of DNS DNS Components DNS Transactions Attack on DNS Part II: DNS Security

More information

Domain Name System Security

Domain Name System Security Domain Name System Security T-110.4100 Tietokoneverkot September 2010 Bengt Sahlin 2011/09/27 Bengt Sahlin 1 Objectives Provide DNS basics, essential for understanding DNS security

More information

Domain Name System Security

Domain Name System Security Slide title 70 pt APITALS Domain Name System Security e subtitle um 30 pt Bengt Sahlin Ericsson Research NomadicLab Bengt.Sahlin@ericsson.com Objectives Provide DNS basics, essential for understanding

More information

DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION

DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION Peter R. Egli 1/10 Contents 1. Security Problems of DNS 2. Solutions for securing DNS 3. Security with DNSSEC

More information

An Overview of DNSSEC. Cesar Diaz! lacnic.net!

An Overview of DNSSEC. Cesar Diaz! lacnic.net! An Overview of DNSSEC Cesar Diaz! cesar@ lacnic.net! 1 DNSSEC??? The DNS Security Extension (DNS SEC) attach special kind of information called criptographic signatures to the queries and response that

More information

RIP v2. Mr Nenad Krajnović Katedra za telekomunikacije

RIP v2. Mr Nenad Krajnović Katedra za telekomunikacije RIP v2 Mr Nenad Krajnović Katedra za telekomunikacije E-mail: krajko@etf.bg.ac.yu Istorijat Nastao kao pokušaj da se RIPv1 protokol popravi i prilagodi novim potrebama Definisan u okviru RFC-a 2453 Ima

More information

By Paul Wouters

By Paul Wouters By Paul Wouters Overview presentation Theory of DNSSEC Using bind with DNSSEC Securing Ò.nlÓ with SECREG Securing Ò.orgÓ with VerisignLabs Deploying DNSSEC on large scale Audience participation

More information

DNSSEC Trust tree: (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d

DNSSEC Trust tree:  (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d DNSSEC Trust tree: www.dnslab.org. (A) ---dnslab.org. (DNSKEY keytag: 7308 alg ---dnslab.org. (DNSKEY keytag: 9247 ---dnslab.org. (DS keytag: 9247 dig DNSSEC ---org. (DNSKEY keytag: 24209 a Domain Name

More information

Overview. Last Lecture. This Lecture. Next Lecture. Scheduled tasks and log management. DNS and BIND Reference: DNS and BIND, 4 th Edition, O Reilly

Overview. Last Lecture. This Lecture. Next Lecture. Scheduled tasks and log management. DNS and BIND Reference: DNS and BIND, 4 th Edition, O Reilly Last Lecture Overview Scheduled tasks and log management This Lecture DNS and BIND Reference: DNS and BIND, 4 th Edition, O Reilly Next Lecture Address assignment (DHCP) TELE 301 Lecture 11: DNS 1 TELE

More information

Operation Manual DHCP H3C S3600 Series Ethernet Switches-Release Table of Contents

Operation Manual DHCP H3C S3600 Series Ethernet Switches-Release Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-1 1.2.1 IP Address Assignment Policy... 1-1 1.2.2 Obtaining IP Addresses

More information

Uputstvo za korišćenje logrotate funkcije

Uputstvo za korišćenje logrotate funkcije Copyright AMRES Sadržaj Uvod 3 Podešavanja logrotate konfiguracionog fajla 4 Strana 2 od 5 Uvod Ukoliko je aktivirano logovanje za RADIUS proces, može se desiti da posle određenog vremena server bude preopterećen

More information

DNS Concepts. Acknowledgements July 2005, Thimphu, Bhutan. In conjunction with SANOG VI. Bill Manning Ed Lewis Joe Abley Olaf M.

DNS Concepts. Acknowledgements July 2005, Thimphu, Bhutan. In conjunction with SANOG VI. Bill Manning Ed Lewis Joe Abley Olaf M. 16-20 July 2005, Thimphu, Bhutan In conjunction with SANOG VI DNS Concepts Acknowledgements Bill Manning Ed Lewis Joe Abley Olaf M. Kolkman NeuStar 1 Purpose of naming Addresses are used to locate objects

More information

Protocol Classification

Protocol Classification DNS and DHCP TCP/IP Suite Suite of protocols (not just TCP and IP) Main protocols TCP and UDP at the Transport Layer, and IP at the Network Layer Other protocols ICMP, ARP, Telnet, Ftp, HTTP, SMTP, SNMP

More information

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014 Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder System and Network Engineering July 2014 DNS Main Components Server Side: Authoritative Servers Resolvers (Recursive Resolvers, cache) Client

More information

DNS Mark Kosters Carlos Martínez ARIN - LACNIC

DNS Mark Kosters Carlos Martínez ARIN - LACNIC DNS Workshop @CaribNOG8 Mark Kosters Carlos Martínez ARIN - LACNIC DNS Refresher and Intro to DNS Security Extension (DNSSEC) Outline Introduction DNSSEC mechanisms to establish authenticity and integrity

More information

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO DNS Workshop @CaribNOG12 Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO DNS Refresher and Intro to DNS Security Extension (DNSSEC) Outline Introduction DNSSEC mechanisms to establish authenticity and

More information

DNS. Introduction To. everything you never wanted to know about IP directory services

DNS. Introduction To. everything you never wanted to know about IP directory services Introduction To DNS everything you never wanted to know about IP directory services Linux Users Victoria, April 3 rd 2007 what is the domain name system anyway? it's like a phone book...kinda DNS is (1)

More information

Računarska tehnika i računarske komunikacije Osnovi računarskih mreža 2. Vežba 3 Adresiranje. Dynamic Host Configuration Protocol (DHCP)

Računarska tehnika i računarske komunikacije Osnovi računarskih mreža 2. Vežba 3 Adresiranje. Dynamic Host Configuration Protocol (DHCP) Računarska tehnika i računarske komunikacije Osnovi računarskih mreža 2 2017-2018 Vežba 3 Adresiranje Dynamic Host Configuration Protocol (DHCP) Dynamic Host Configuration Protocol je klijent-server protokol

More information

page 1 Plain Old DNS WACREN, DNS/DNSSEC Regional Workshop Ouagadougou, October 2016

page 1 Plain Old DNS WACREN, DNS/DNSSEC Regional Workshop Ouagadougou, October 2016 page 1 Plain Old DNS WACREN, DNS/DNSSEC Regional Workshop Ouagadougou, 10-14 October 2016 page 2 IP: Identifiers on the Internet The fundamental identifier on the internet is an IP address. Each host connected

More information

Troubleshooting DHCP server configuration 28

Troubleshooting DHCP server configuration 28 Contents DHCP overview 1 Introduction to DHCP 1 DHCP address allocation 1 Allocation mechanisms 1 Dynamic IP address allocation process 2 IP address lease extension 2 DHCP message format 3 DHCP options

More information

Operation Manual DHCP. Table of Contents

Operation Manual DHCP. Table of Contents Table of Contents Table of Contents Chapter 1 DHCP Overview... 1-1 1.1 Introduction to DHCP... 1-1 1.2 DHCP IP Address Assignment... 1-2 1.2.1 IP Address Assignment Policy... 1-2 1.2.2 Obtaining IP Addresses

More information

Secured Dynamic Updates

Secured Dynamic Updates Secured Dynamic Updates Caution Portions of this slide set present features that do not appear in BIND until BIND 9.3 Snapshot code is available for this BIND 9.2 can perform most of the dynamic update

More information

Introduction to DHCP. DHCP Overview

Introduction to DHCP. DHCP Overview Table of Contents Introduction to DHCP 1 DHCP Overview 1 DHCP Address Allocation 2 Allocation Mechanisms 2 Dynamic IP Address Allocation Process 2 DHCP Message Format 3 Protocols and Standards 4 DHCP Server

More information

DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber

DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber (ralf.weber@nominum.com) Who is Nominum? Mission Product Leadership Industry Expertise Deliver the Trusted Internet Experience Strategic Partners:

More information

PREDMET. Osnove Java Programiranja. Čas JAVADOC

PREDMET. Osnove Java Programiranja. Čas JAVADOC PREDMET Osnove Java Programiranja JAVADOC Copyright 2010 UNIVERZITET METROPOLITAN, Beograd. Sva prava zadržana. Bez prethodne pismene dozvole od strane Univerziteta METROPOLITAN zabranjena je reprodukcija,

More information

Uputstvo za podešavanje mail klijenta

Uputstvo za podešavanje mail klijenta Uputstvo za podešavanje mail klijenta 1. Podešavanje Thunderbird mail klijenta 1.1 Dodavanje mail naloga Da biste podesili Vaš mail klijent (u ovom slučaju Thunderbird) da prima i šalje mail-ove potrebno

More information

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 DNSSEC 2 2 DNS: Data Flow Zone administrator

More information

Programiranje III razred

Programiranje III razred Tehnička škola 9. maj Bačka Palanka Programiranje III razred Naredbe ciklusa for petlja Naredbe ciklusa Veoma često se ukazuje potreba za ponavljanjem nekih naredbi više puta tj. za ponavljanjem nekog

More information

DNS. dr. C. P. J. Koymans. September 16, Informatics Institute University of Amsterdam. dr. C. P. J. Koymans (UvA) DNS September 16, / 46

DNS. dr. C. P. J. Koymans. September 16, Informatics Institute University of Amsterdam. dr. C. P. J. Koymans (UvA) DNS September 16, / 46 DNS dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 16, 2008 dr. C. P. J. Koymans (UvA) DNS September 16, 2008 1 / 46 DNS and BIND DNS (Domain Name System) concepts theory

More information

UNIVERZITET U BEOGRADU ELEKTROTEHNIČKI FAKULTET

UNIVERZITET U BEOGRADU ELEKTROTEHNIČKI FAKULTET UNIVERZITET U BEOGRADU ELEKTROTEHNIČKI FAKULTET Katedra za elektroniku Računarska elektronika Grupa br. 11 Projekat br. 8 Studenti: Stefan Vukašinović 466/2013 Jelena Urošević 99/2013 Tekst projekta :

More information

DNS SECurity Extensions technical overview

DNS SECurity Extensions technical overview The EURid Insights series aims to analyse specific aspects of the domainname environment. The reports are based on surveys, studies and research developed by EURid in cooperation with industry experts

More information

Networking Potpourri: Plug-n-Play, Next Gen

Networking Potpourri: Plug-n-Play, Next Gen Networking Potpourri: Plug-n-Play, Next Gen 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia

More information

Unaprjeñenje sigurnosti u mrežama pružatelja

Unaprjeñenje sigurnosti u mrežama pružatelja Unaprjeñenje sigurnosti u mrežama pružatelja usluga Miroslav Šimić miroslav.simic@snt.hr CCIE #19429 Agenda Zaštita mrežne infrastrukture Zaštita na rubovima mreže Uočavanje i sprječavanje napada Agenda

More information

Welcome! Acknowledgements. Introduction to DNS. cctld DNS Workshop October 2004, Bangkok, Thailand

Welcome! Acknowledgements. Introduction to DNS. cctld DNS Workshop October 2004, Bangkok, Thailand Welcome! cctld DNS Workshop 8-11 October 2004, Bangkok, Thailand Champika Wijayatunga, APNIC Acknowledgements Bill Manning Ed Lewis Joe Abley Olaf M. Kolkman EP.NET Introduction to

More information

Deo CCITT X.500 directory service standarda Distribuirani serveri koji održavaju neku bazu sa informacijama

Deo CCITT X.500 directory service standarda Distribuirani serveri koji održavaju neku bazu sa informacijama X.509 autentikacioni servis X.509 Autentikacioni Servis Deo CCITT X.500 directory service standarda Distribuirani serveri koji održavaju neku bazu sa informacijama Definiše framework za autentikacione

More information

Scott Rose, NIST Winter JointTechs Meeting Jan 30, 2011 Clemson University

Scott Rose, NIST Winter JointTechs Meeting Jan 30, 2011 Clemson University Scott Rose, NIST scottr@nist.gov 2011 Winter JointTechs Meeting Jan 30, 2011 Clemson University Special Thanks to RIPE NCC who provided the base slides for this tutorial. DNS is not secure Known vulnerabilities

More information

S Computer Networks - Spring What and why? Structure of DNS Management of Domain Names Name Service in Practice

S Computer Networks - Spring What and why? Structure of DNS Management of Domain Names Name Service in Practice Outline What and why? Structure of DNS Management of Domain Names Name Service in Practice 188lecture12.ppt Pirkko Kuusela, Markus Peuhkuri, Jouni Karvo 1 2 Need Network addresses are numbers Addresses

More information

This time. Digging into. Networking. Protocols. Naming DNS & DHCP

This time. Digging into. Networking. Protocols. Naming DNS & DHCP This time Digging into Networking Protocols Naming DNS & DHCP Naming IP addresses allow global connectivity But they re pretty useless for humans! Can t be expected to pick their own IP address Can t be

More information

APNIC elearning: DNS Concepts

APNIC elearning: DNS Concepts APNIC elearning: DNS Concepts 27 MAY 2015 11:00 AM AEST Brisbane (UTC+10) Issue Date: Revision: Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6

More information

Manual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6

Manual Configuration Stateful Address Configuration (i.e. from servers) Stateless Autoconfiguration : IPv6 Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Auto : IPv6 최양희서울대학교컴퓨터공학부 2005 Yanghee Choi 2 RARP Hardware address ---> IP address requires direct

More information

TWNIC DNS 網路安全研討會安全問題之解決對策 (DNSSEC) Why do we need DNSSEC? Many application depend on DNS DNS is not secure. There are known vulnerabilities

TWNIC DNS 網路安全研討會安全問題之解決對策 (DNSSEC) Why do we need DNSSEC? Many application depend on DNS DNS is not secure. There are known vulnerabilities TWNIC DNS 網路安全研討會安全問題之解決對策 (DNSSEC) TWCERT/CC 陳宗裕 Why do we need DNSSEC? Many application depend on DNS DNS is not secure There are known vulnerabilities DNSSEC protect against data spoofing and corruptions

More information

Domain Name Service. DNS Overview. October 2009 Computer Networking 1

Domain Name Service. DNS Overview. October 2009 Computer Networking 1 Domain Name Service DNS Overview October 2009 Computer Networking 1 Why DNS? Addresses are used to locate objects (contain routing information) Names are easier to remember and use than numbers DNS provides

More information

Case Study Hrvatska pošta: Korisničko iskustvo iz snova. Tomislav Turk Samostalni sistem inženjer, Combis d.o.o. Zagreb,

Case Study Hrvatska pošta: Korisničko iskustvo iz snova. Tomislav Turk Samostalni sistem inženjer, Combis d.o.o. Zagreb, Case Study Hrvatska pošta: Korisničko iskustvo iz snova Tomislav Turk Samostalni sistem inženjer, Combis d.o.o. Zagreb, 27.12.2018. Sadržaj Hrvatska pošta prije projekta Izazovi projekta Tehnologije korištene

More information

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005 Firewalls Lecture 33 Security April 15, 2005 Idea: separate local network from the Internet Trusted hosts and networks Intranet Firewall DMZ Router Demilitarized Zone: publicly accessible servers and networks

More information

12. Name & Address 최양희서울대학교컴퓨터공학부

12. Name & Address 최양희서울대학교컴퓨터공학부 12. Name & Address 최양희서울대학교컴퓨터공학부 How do you get IP address? Manual Configuration Stateful Address Configuration (i.e. from servers) BOOTP DHCPv4, DHCPv6 Stateless Autoconfiguration : IPv6 2009 Yanghee

More information

DNS Security DNSSEC. *http://compsec101.antibo zo.net/papers/dnssec/dnss ec.html. IT352 Network Security Najwa AlGhamdi

DNS Security DNSSEC. *http://compsec101.antibo zo.net/papers/dnssec/dnss ec.html. IT352 Network Security Najwa AlGhamdi DNS Security DNSSEC *http://compsec101.antibo zo.net/papers/dnssec/dnss ec.html 1 IT352 Network Security Najwa AlGhamdi Introduction DNSSEC is a security extensions to the DNS protocol in response to the

More information

Sadržaj. Verzija 03/2017 Primjenjuje se od 20. novembra godine

Sadržaj. Verzija 03/2017 Primjenjuje se od 20. novembra godine Sadržaj 1 Web hosting 3 2 Registracija domena 3 3 Internet marketing 3 4 E mail paketi 4 5 Virtuoz 4 6 Internet Security servis 5 7 Kolokacija servera 6 8 Cloud usluge 6 9 Aktivni servisi koji nijesu u

More information

Izrada VI laboratorijske vježbe

Izrada VI laboratorijske vježbe Izrada VI laboratorijske vježbe 1. Programirati proceduru koja se aktivira sa Standard palete alatki klikom na button Fajlovi. Prilikom startovanja procedure prikazuje se forma koja sadrži jedan list box

More information

Jezik Baze Podataka SQL. Jennifer Widom

Jezik Baze Podataka SQL. Jennifer Widom Jezik Baze Podataka SQL SQL o Jezik koji se koristi u radu sa relacionim bazama podataka o Nije programski jezik i manje je kompleksan. o Koristi se isključivo u radu za bazama podataka. o SQL nije case

More information

PRINCIPI SOFTVERSKOG INŽENJERSTVA TIM NAZIV_TIMA

PRINCIPI SOFTVERSKOG INŽENJERSTVA TIM NAZIV_TIMA PRINCIPI SOFTVERSKOG INŽENJERSTVA TIM NAZIV_TIMA SPECIFIKACIJA BAZE PODATAKA ZA PROJEKAT NAZIV_PROJEKTA Veb knjižara - Specifikacija baze podataka 1 10.04.2017. Verzija V 1.0 Datum: 20. mart 2017. Istorija

More information

DHCP Configuration. Page 1 of 14

DHCP Configuration. Page 1 of 14 DHCP Configuration Page 1 of 14 Content Chapter 1 DHCP Configuration...1 1.1 DHCP Overview...1 1.2 DHCP IP Address Assignment... 1 1.2.1 IP Address Assignment Policy...1 1.2.2 Obtaining IP Addresses Dynamically...2

More information

ip dhcp-client network-discovery through ip nat sip-sbc

ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery through ip nat sip-sbc ip dhcp-client network-discovery, page 3 ip dhcp-client update dns, page 5 ip dhcp drop-inform, page 8 ip dhcp-relay information option server-override,

More information

RSA and ECDSA. Geoff Huston APNIC. #apricot2017

RSA and ECDSA. Geoff Huston APNIC. #apricot2017 RSA and ECDSA Geoff Huston APNIC It s all about Cryptography Why use Cryptography? Public key cryptography can be used in a number of ways: protecting a session from third party eavesdroppers Encryption

More information

Osnove programskog jezika C# Čas 5. Delegati, događaji i interfejsi

Osnove programskog jezika C# Čas 5. Delegati, događaji i interfejsi Osnove programskog jezika C# Čas 5. Delegati, događaji i interfejsi DELEGATI Bezbedni pokazivači na funkcije Jer garantuju vrednost deklarisanog tipa. Prevodilac prijavljuje grešku ako pokušate da povežete

More information

RIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC.

RIPE Network Coordination Centre. K-root and DNSSEC. Wolfgang Nagele RIPE NCC. K-root and DNSSEC Wolfgang Nagele RIPE NCC RIPE NCC One of the five Regional Internet Registries Provides IP address and AS number resources to Europe and Middle-East regions DNS related work - Parent

More information

Mašinska vizija. Dr Nenad Jovičić tnt.etf.rs/~mv

Mašinska vizija. Dr Nenad Jovičić tnt.etf.rs/~mv Mašinska vizija Dr Nenad Jovičić 2017. tnt.etf.rs/~mv Linearne 2D geometrijske transformacije 2D geometrijske transformacije Pretpostavka: Objekti u 2D prostoru se sastoje iz tačaka i linija. Svaka tačka

More information

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION 11-30-2016 USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION Transaction Signatures (TSIG) provide a secure

More information

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address

ARP, IP. Chong-Kwon Kim. Each station (or network interface) should be uniquely identified Use 6 byte long address ARP, IP Chong-Kwon Kim Routing Within a LAN MAC Address Each station (or network interface) should be uniquely identified Use 6 byte long address Broadcast & Filter Broadcast medium Signals are transmitted

More information

DHCP Overview. Introduction to DHCP

DHCP Overview. Introduction to DHCP Table of Contents DHCP Overview 1 Introduction to DHCP 1 DHCP Address Allocation 2 Allocation Mechanisms 2 Dynamic IP Address Allocation Process 2 IP Address Lease Extension 3 DHCP Message Format 3 DHCP

More information

Introduction to Network. Topics

Introduction to Network. Topics Introduction to Network Security Chapter 7 Transport Layer Protocols 1 TCP Layer Topics Responsible for reliable end-to-end transfer of application data. TCP vulnerabilities UDP UDP vulnerabilities DNS

More information

Session J9: DNSSEC and DNS Security

Session J9: DNSSEC and DNS Security Session J9 and Security InfoSec World 2008 Session J9: and Security Steve Pinkham, Maven Security Consulting What is? slide 2 Easy answer: Stands for Domain Name System System for converting names to/from

More information

More Internet Support Protocols

More Internet Support Protocols More Internet Support Protocols Domain Name System (DNS) Ch 2.5 Problem statement: Average brain can easily remember 7 digits On average, IP addresses have 10.28 digits We need an easier way to remember

More information

ECE 435 Network Engineering Lecture 7

ECE 435 Network Engineering Lecture 7 ECE 435 Network Engineering Lecture 7 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 September 2018 HW#3 was Posted Announcements 1 HW#2 Review C code will be discussed next

More information

Domain Name System - Advanced Computer Networks

Domain Name System - Advanced Computer Networks - Advanced Computer Networks Saurabh Barjatiya International Institute Of Information Technology, Hyderabad 26 August, 2011 Contents 1 Distributed database, highly volatile Domain names Top level domains

More information

VHDLPrimeri Poglavlje5.doc

VHDLPrimeri Poglavlje5.doc 5. VHDL opis kola koja obavljaju osnovne aritmetičke funkcije Sabirači Jednobitni potpuni sabirač definisan je tablicom istinitosti iz Tabele 5.1. Tabela 5.1. cin a b sum cout 0 0 0 0 0 0 0 1 1 0 0 1 0

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer

More information

DHCP Technology White Paper

DHCP Technology White Paper DHCP Technology White Paper Keywords: DHCP, DHCP server, DHCP relay agent, DHCP client, BOOTP client. Abstract: This document describes DHCP basic concepts and applications, as well as the main functions

More information

Some DNSSEC thoughts. DNSOPS.JP BOF Interop Japan Geoff Huston Chief Scientist, APNIC June 2007

Some DNSSEC thoughts. DNSOPS.JP BOF Interop Japan Geoff Huston Chief Scientist, APNIC June 2007 Some DNSSEC thoughts DNSOPS.JP BOF Interop Japan 2007 Geoff Huston Chief Scientist, APNIC June 2007 The DNS is a miracle! You send out a question into the net And an answer comes back! Somehow But WHO

More information

A paper on DNSSEC - NSEC3 with Opt-Out

A paper on DNSSEC - NSEC3 with Opt-Out A paper on DNSSEC - NSEC3 with Opt-Out DNSSEC A Way Forward for TLD Registries Method for faster adoption of DNSSEC Providing greater security with minimal impact on customers, registries and Zone Management

More information

The State and Challenges of the DNSSEC Deployment. Eric Osterweil Michael Ryan Dan Massey Lixia Zhang

The State and Challenges of the DNSSEC Deployment. Eric Osterweil Michael Ryan Dan Massey Lixia Zhang The State and Challenges of the DNSSEC Deployment Eric Osterweil Michael Ryan Dan Massey Lixia Zhang 1 Monitoring Shows What s Working and What needs Work DNS operations must already deal with widespread

More information

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific DNS/DNSSEC Workshop In Collaboration with APNIC and HKIRC Hong Kong Champika Wijayatunga Regional Security Engagement Manager Asia Pacific 22-24 January 2018 1 Agenda 1 2 3 Introduction to DNS DNS Features

More information

Cjenovnik usluga informacionog društva

Cjenovnik usluga informacionog društva Cjenovnik usluga informacionog društva Verzija: 01/2018 Sadržaj 1 Web hosting 3 2 Registracija domena 3 3 Internet marketing 3 4 E mail paketi 4 5 Virtuoz 4 6 Internet Security servis 5 7 Kolokacija servera

More information

DNS Fundamentals. Steve Conte ICANN60 October 2017

DNS Fundamentals. Steve Conte ICANN60 October 2017 DNS Fundamentals Steve Conte ICANN60 October 2017 Names and Numbers IP addresses easy for machines but hard for people IPv4: 192.0.2.7 IPv6: 2001:db8::7 People need to use names In the early days of the

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport 1 Outline Introduction Name Space concepts Domain Name Space

More information

A DNS Tutorial

A DNS Tutorial http://ntrg.cs.tcd.ie/undergrad/4ba2/multicast/ Copyright Table of Contents What is a DNS?... 3 Why do we need a DNS?... 3 Why do computers prefer addresses based on numbers?... 3 What is a Domain Name,

More information

Modbus TCP i dva PLC S7 1200

Modbus TCP i dva PLC S7 1200 Industrijski sistemi i protokoli Modbus TCP i dva PLC S7 1200 1 Modbus TCP i dva PLC S7 1200 Laboratorijski deo - obavezno: Detaljno proučiti i testirati već napravljeni projekat za PLC-ove, koji se nalazi

More information

Introduction to the Domain Name System

Introduction to the Domain Name System The Domain Name System (DNS) handles the growing number of Internet users. DNS translates names, such as www.cisco.com, into IP addresses, such as 192.168.40.0 (or the more extended IPv6 addresses), so

More information

Table of Contents. DNS security. Alternative DNS security mechanism. DNSSEC specification. The long (and winding) road to the DNSSEC specification

Table of Contents. DNS security. Alternative DNS security mechanism. DNSSEC specification. The long (and winding) road to the DNSSEC specification Table of Contents DNS security Karst Koymans Informatics Institute University of Amsterdam (version 1.19, 2011/09/27 14:18:11) Friday, September 23, 2011 The long (and winding) road to the DNSSEC specification

More information

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS : Computer Networks Lecture 6: Apr 5, 2004 Naming and DNS Any problem in computer science can be solved with another layer of indirection David Wheeler Naming is a layer of indirection What problems does

More information

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS.

Table of Contents DNS. Short history of DNS (1) DNS and BIND. Specification and implementation. A short history of DNS. Table of Contents Specification and implementation DNS dr. C. P. J. Koymans Informatics Institute University of Amsterdam September 14, 2009 A short history of DNS Root servers Basic concepts Delegation

More information

Upute za postavljanje Outlook Expressa

Upute za postavljanje Outlook Expressa Upute za postavljanje Outlook Expressa Prije postavljanja klijenata morate obavezno obaviti prvu prijavu na web mail kako bi aktivirali vaš račun na novom sustavu. Ukoliko niste obavili prvu prijavu, nećete

More information

CSCE 463/612 Networks and Distributed Processing Spring 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018 CSCE 463/612 Networks and Distributed Processing Spring 2018 Application Layer III Dmitri Loguinov Texas A&M University February 8, 2018 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

Table of Contents 1 DHCP Overview DHCP Server Configuration 2-1

Table of Contents 1 DHCP Overview DHCP Server Configuration 2-1 Table of Contents 1 DHCP Overview 1-1 Introduction to DHCP 1-1 DHCP Address Allocation 1-2 Allocation Mechanisms 1-2 Dynamic IP Address Allocation Process 1-2 IP Address Lease Extension 1-3 DHCP Message

More information

Encryption. INST 346, Section 0201 April 3, 2018

Encryption. INST 346, Section 0201 April 3, 2018 Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:

More information

X.509 autentikacioni servis

X.509 autentikacioni servis X.509 autentikacioni servis X.509 Autentikacioni Servis Deo CCITT X.500 directory service standarda Distribuirani serveri koji održavaju neku bazu sa informacijama Definiše framework za autentikacione

More information

Dynamic Host Configuration

Dynamic Host Configuration Dynamic Host Configuration ITL RFC 2131 DHCP RFC 2132 DHCP Options RFC 951 - BOOTP 1/13/2004 (c) Hans Kruse & Shawn Ostermann, 2003 1 Overview How to Configure Hosts that Cannot store configuration info

More information

Domain Name System (DNS)

Domain Name System (DNS) Domain Name System (DNS) Computer Networks Lecture 9 http://goo.gl/pze5o8 Domain Name System Naming service used in the Internet Accomplishes mapping of logical ("domain") names to IP addresses (and other

More information

Algorithm for DNSSEC Trusted Key Rollover

Algorithm for DNSSEC Trusted Key Rollover Algorithm for DNSSEC Trusted Key Rollover Gilles Guette, Bernard Cousin, and David Fort IRISA, Campus de Beaulieu, 35042 Rennes CEDEX, FRANCE {gilles.guette, bernard.cousin, david.fort}@irisa.fr Abstract.

More information

DNS security. Karst Koymans & Niels Sijm. Tuesday, September 18, Informatics Institute University of Amsterdam

DNS security. Karst Koymans & Niels Sijm. Tuesday, September 18, Informatics Institute University of Amsterdam DNS security Karst Koymans & Niels Sijm Informatics Institute University of Amsterdam Tuesday, September 18, 2012 Karst Koymans & Niels Sijm (UvA) DNS security Tuesday, September 18, 2012 1 / 38 1 Chain

More information

DNS Security. *http://compsec101.antibozo.net/pa pers/dnssec/dnssec.html. IT352 Network Security Najwa AlGhamdi

DNS Security. *http://compsec101.antibozo.net/pa pers/dnssec/dnssec.html. IT352 Network Security Najwa AlGhamdi DNS Security *http://compsec101.antibozo.net/pa pers/dnssec/dnssec.html 1 IT352 Network Security Najwa AlGhamdi Introduction The DNS provides a mechanism that resolves Internet host names into IP addresses

More information

DNS. Some advanced topics. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.2, 2017/09/25 12:41:57)

DNS. Some advanced topics. Karst Koymans. Informatics Institute University of Amsterdam. (version 17.2, 2017/09/25 12:41:57) DNS Some advanced topics Karst Koymans Informatics Institute University of Amsterdam (version 17.2, 2017/09/25 12:41:57) Friday, September 22, 2017 Karst Koymans (UvA) DNS Friday, September 22, 2017 1

More information

DNSSEC Operational HOWTO. Contents. Olaf M. Kolkman. RIPE NCC November 12, 2002 Revision : 1.3. I DNSSEC Tutorial 4

DNSSEC Operational HOWTO. Contents. Olaf M. Kolkman. RIPE NCC November 12, 2002 Revision : 1.3. I DNSSEC Tutorial 4 DNSSEC Operational HOWTO. Olaf M. RIPE NCC November 12, 2002 Revision : 1.3 Contents 1 Introduction 3 1.1 On this document.......................... 3 1.2 State of DNSSEC........................... 4 I

More information

UPUTSTVO ZA KORIŠĆENJE NOVOG SPINTER WEBMAIL-a

UPUTSTVO ZA KORIŠĆENJE NOVOG SPINTER WEBMAIL-a UPUTSTVO ZA KORIŠĆENJE NOVOG SPINTER WEBMAIL-a Webmail sistem ima podršku za SSL (HTTPS). Korištenjem ovog protokola sva komunikacija između Webmail sistema i vašeg Web čitača je kriptovana. Prilikom pristupa

More information

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers Objective A Virtual Private Network (VPN) is a private network that is used to virtually

More information