I certify that this DNS record set is correct Problem: how to certify a negative response, i.e. that a record doesn t exist?

Similar documents
Toward Unspoofable Network Identifiers. CS 585 Fall 2009

DNS Security DNSSEC. * zo.net/papers/dnssec/dnss ec.html. IT352 Network Security Najwa AlGhamdi

RSA and ECDSA. Geoff Huston APNIC. #apricot2017

3. The DNSSEC Primer. Data Integrity (hashes) Authenticated Denial of Existence (NSEC,

DNSSEC Trust tree: (A) ---dnslab.org. (DS keytag: 9247 dig (DNSKEY keytag. ---org. (DS keytag: d

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014

Network Working Group Request for Comments: 5155 Category: Standards Track Nominet D. Blacka VeriSign, Inc. March 2008

DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION

Table of Contents. DNS security. Alternative DNS security mechanism. DNSSEC specification. The long (and winding) road to the DNSSEC specification

Some DNSSEC thoughts. DNSOPS.JP BOF Interop Japan Geoff Huston Chief Scientist, APNIC June 2007

CS 356 Using Cryptographic Tools to Secure the Domain Name System (DNS) Spring 2017

DNS security. Karst Koymans & Niels Sijm. Tuesday, September 18, Informatics Institute University of Amsterdam

Network Working Group Request for Comments: 5702 Category: Standards Track October 2009

Internet Engineering Task Force (IETF) April Elliptic Curve Digital Signature Algorithm (DSA) for DNSSEC

A Security Evaluation of DNSSEC with NSEC Review

An Overview of DNSSEC. Cesar Diaz! lacnic.net!

Distributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015

SecSpider: Distributed DNSSEC Monitoring and Key Learning

Internet Engineering Task Force (IETF) Request for Comments: 6725 Category: Standards Track August 2012 ISSN:

The ISP Column A column on things Internet. Three DNS articles: 3. Helping Resolvers to help the DNS. RFC8192 Aggressive NSEC Caching

1.264 Lecture 28. Cryptography: Asymmetric keys

Cryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III

Table of Contents. DNS security basics. What DNSSEC has to offer. In what sense is DNS insecure? Why DNS needs to be secured.

Public Key Algorithms

Expires: November 15, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST May 17, 2004

Request for Comments: 4509 Category: Standards Track May Use of SHA-256 in DNSSEC Delegation Signer (DS) Resource Records (RRs)

Network Working Group. Category: Informational November 2007

12 DNS Security Extensions DNS resolution via recursive nameserver DNS request/response format Simple DNS cache poisoning The Dan Kaminsky DNS

Network Working Group

Applicability Statement: DNS Security (DNSSEC) DNSKEY Algorithm Implementation Status

DNSSEC at Scale. Dani Grant CloudFlare

CSCI 454/554 Computer and Network Security. Topic 5.2 Public Key Cryptography

Chapter 9 Public Key Cryptography. WANG YANG

Measuring the effects of DNSSEC deployment on query load

Outline. CSCI 454/554 Computer and Network Security. Introduction. Topic 5.2 Public Key Cryptography. 1. Introduction 2. RSA

Outline NET 412 NETWORK SECURITY PROTOCOLS. Reference: Lecture 7: DNS Security 3/28/2016

Encryption. INST 346, Section 0201 April 3, 2018

Outline. Public Key Cryptography. Applications of Public Key Crypto. Applications (Cont d)

Expires: June 16, 2004 VeriSign R. Austein ISC D. Massey USC/ISI S. Rose NIST December 17, 2003

Algorithm for DNSSEC Trusted Key Rollover

Deploying New DNSSEC Algorithms

MAGPI: Advanced Services IPv6, Multicast, DNSSEC

A paper on DNSSEC - NSEC3 with Opt-Out

APNIC DNSSEC APNIC DNSSEC. Policy and Practice Statement. DNSSEC Policy and Practice Statement Page 1 of 12

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

Step by step DNSSEC deployment in.se. Anne-Marie Eklund Löwinder Quality & Security

Web Security. Mahalingam Ramkumar

CSC/ECE 774 Advanced Network Security

ARIN Support for DNSSEC and RPKI. ION San Diego 11 December 2012 Pete Toscano, ARIN

DNS Mark Kosters Carlos Martínez ARIN - LACNIC

Cryptography and Network Security. Sixth Edition by William Stallings

CSC 474/574 Information Systems Security

DNSSEC All You Need To Know To Get Started

Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL

Afilias DNSSEC Practice Statement (DPS) Version

Message authentication. Why message authentication. Authentication primitives. and secure hashing. To prevent against:

NSEC5: Provably Preventing DNSSEC Zone Enumeration

DNSSEC. CS 161: Computer Security Prof. David Wagner. April 11, 2016

Implementing DNSSEC with DynDNS and GoDaddy

Encryption Details COMP620

CSE 127: Computer Security Cryptography. Kirill Levchenko

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

DNS SECurity Extensions technical overview

USING TRANSACTION SIGNATURES (TSIG) FOR SECURE DNS SERVER COMMUNICATION

Computer Security: Principles and Practice

The State and Challenges of the DNSSEC Deployment. Eric Osterweil Michael Ryan Dan Massey Lixia Zhang

Ordinary DNS: A? k.root-servers.net. com. NS a.gtld-servers.net a.gtld-servers.net A Client's Resolver

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Public Key Cryptography and the RSA Cryptosystem

Lecture 6 - Cryptography

Scott Rose, NIST Winter JointTechs Meeting Jan 30, 2011 Clemson University

Less is More Cipher-Suite Negotiation for DNSSEC

Hashes, MACs & Passwords. Tom Chothia Computer Security Lecture 5

DENIC DNSSEC Testbed Software support for DNSSEC Ralf Weber

Lecture 3.4: Public Key Cryptography IV

The Performance of ECC Algorithms in DNSSEC: A Model-based Approach

Great Theoretical Ideas in Computer Science. Lecture 27: Cryptography

DNS Resolver Software Change Planning. for Trust Anchor Key Management. Based on TAKREM

Introduction to the DANE Protocol

Encryption 2. Tom Chothia Computer Security: Lecture 3

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Kurose & Ross, Chapters (5 th ed.)

CS 161 Computer Security

Some Internet exploits target name resolution servers. DNSSEC uses cryptography to protect the name resolution

Lecture 30. Cryptography. Symmetric Key Cryptography. Key Exchange. Advanced Encryption Standard (AES) DES. Security April 11, 2005

n-bit Output Feedback

Rolling with Confidence: Managing the Complexity of DNSSEC Operations

DNS Resolver Software Change Planning. for Trust Anchor Key Management. Based on TAKREM

Public Key Cryptography

Introduction to Cryptography and Security Mechanisms. Abdul Hameed

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

COMP 250. Lecture 27. hashing. Nov. 10, 2017

Introduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption

TSIGKILL: Bypassing dynamic DNS updates authentication through signature forgery

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

DNSSEC en.mx. Network Information Center México

Computer Security 3/23/18

Transcription:

RRSIG: I certify that this DNS record set is correct Problem: how to certify a negative response, i.e. that a record doesn t exist? NSEC: I certify that there are no DNS records (of type X) whose record name lies between A and B Problem: NSEC records enable zones to be enumerated NSEC3: I certify that there are no DNS records (of type X) whose record name hash lies between A and B

Authoritative Server Authoritative Server Validating Server Attacker New record R Compute hash of R (call this R ) Insert into presorted list of record name hashes (say Q, R, S ) Sign new NSEC3 records for intervals (Q, R ) and (R, S ) Delete old NSEC3 record for interval (Q, S ) Query Q received, no match found Compute hash of Q (call this Q ) Find range (R, S ) containing Q in sorted list of precomputed NSEC3 records Return NSEC3 for (R, S ) Query record Q, receive negative response + NSEC3 for interval (R, S ) Compute hash of Q (call this Q ) Verify Q lies in interval (R, S ) Verify authenticity of (R, S ) in usual way signature checks, etc Make random queries to build a database of NSEC3 records Brute-force search for records whose hashes match the endpoints in the NSEC3 Search space for DNS is typically small

A cryptographic (one-way) hash is used, so record names cannot be computed directly from hashes. This hash is iterated to increase the computational load for an attacker. However (from RFC5155): More iterations result in greater resiliency of the hash value against dictionary attacks, but at a higher computational cost for both the server and resolver [it] affects the zone owner's cost of signing and serving the zone as well as the validator's cost of verifying responses a high number of iterations also introduces an additional denial-of-service opportunity against servers Current mitigation: Iterations are limited by RFC5155 to have similar computational cost of verifying the signature on the NSEC3 RR (e.g. max 500 SHA1 iterations for a 2048-bit RSA signature) This presentation proposes an alternative approach (patent pending)

Clifford C. Cocks, 1973 Set up Pick 2 large primes, p and q Compute N = pq Pick public key e Compute private key d such that ed =1 mod (p-1)(q-1) Encrypt: message M, cryptogram C = M e mod N Decrypt: cryptogram C, message M = C d mod N Sign: message (hash) H, signature S = H d mod N Verify: signature S, message hash H = S e mod N

Ron Rivest, 1999 Fixed effort for private key holder, arbitrarily large effort for public key holders Set up Pick p, q, N as per RSA algorithm Choose iterations t Compute private key d = 2 t mod (p-1)(q-1) Task: Compute H 2t mod N for given input H Public key holders require t mod-n squarings of H (time proportional to t) Private key holders have short-cut: H 2t mod N = H d mod N (fixed time)

Create a hash based on a time-lock puzzle: Public hash parameters t, N; private parameters p, q, d Hash input M Compute conventional hash H of M Compute H = H 2t mod N (or H = H d mod N if you have the private key) Truncate H to desired length (or apply conventional hash again)

Set up: Choose hash parameters p, q, t Compute N and d Publish N and t (e.g. as a new variant of a DNSKEY record) Use private key d to compute H when creating NSEC3 records No increase in effort over today s NSEC3 records (based on iterated hash equivalent to verifying an RSA signature) No increase in NSEC3 record size Attacker s task can be made arbitrarily difficult by increasing the value of t

Problem: Increasing t also increases computational burden on validating servers Possible solutions: Restrict t. We still have a potential gain for the authoritative server Rate-limit NSEC3 validations Off-load hash computation to the Client Requires additional logic in stub resolver, but not necessarily full DNSSEC validation Could be done selectively as part of a rate-limiting scheme