DNS and BGP. CS642: Computer Security. Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu. University of Wisconsin CS 642

Similar documents
DNS and BGP. CS642: Computer Security. Professor Ristenpart h9p:// rist at cs dot wisc dot edu. University of Wisconsin CS 642

DNS and BGP. CS642: Computer Security. Professor Ristenpart h9p:// rist at cs dot wisc dot edu. University of Wisconsin CS 642

network security cs642 computer security adam everspaugh

DNS Review Quiz. Match the term to the description: A. Transfer of authority for/to a subdomain. Domain name DNS zone Delegation C B A

Internet Security: How the Internet works and some basic vulnerabilities

Computer Security CS 426

Internet Security: How the Internet works and some basic vulnerabilities. Slides from D.Boneh, Stanford and others

Domain Name System.

CSC 574 Computer and Network Security. DNS Security

CSE 565 Computer Security Fall 2018

Network Security Part 3 Domain Name System

A Security Evaluation of DNSSEC with NSEC Review

DNS and HTTP. A High-Level Overview of how the Internet works

Computer Security. 11. Network Security. Paul Krzyzanowski. Rutgers University. Spring 2018

CS Paul Krzyzanowski

This time. Digging into. Networking. Protocols. Naming DNS & DHCP

ECE 650 Systems Programming & Engineering. Spring 2018

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008

DNS. A Massively Distributed Database. Justin Scott December 12, 2018

CS 3640: Introduction to Networks and Their Applications

Introducción al RPKI (Resource Public Key Infrastructure)

OFF-PATH ATTACKS AGAINST PUBLIC KEY INFRASTRUCTURES. Markus Brandt, Tianxiang Dai, Elias Heftrig, Amit Klein, Haya Shulman, Michael Waidner

DNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS

Domain Name System (DNS)

A Root DNS Server. Akira Kato. Brief Overview of M-Root. WIDE Project

ROOT SERVERS MANAGEMENT AND SECURITY

In the Domain Name System s language, rcode 0 stands for: no error condition.

DNS & Iodine. Christian Grothoff.

IP ADDRESSES, NAMING, AND DNS

Dan Boneh, John Mitchell, Dawn Song. Denial of Service

THE AUTHORITATIVE GUIDE TO DNS TERMINOLOGY

EECS 122: Introduction to Computer Networks DNS and WWW. Internet Names & Addresses

Life After IPv4 Depletion

Network security. CSE 127 Computer Security. TCP/IP Protocol Stack. Packet Switched Network Architecture. Protocols are structured in layers

DNS and CDNs : Fundamentals of Computer Networks Bill Nace

DOMAIN NAME SECURITY EXTENSIONS

CS 356 Using Cryptographic Tools to Secure the Domain Name System (DNS) Spring 2017

DNS Attacks. Haythem EL MIR, CISSP CTO, NACS

CSCI 1800 Cybersecurity and International Relations. Internet Naming and Routing John E. Savage Brown University

0 0& Basic Background. Now let s get into how things really work!

Secure Routing with RPKI. APNIC44 Security Workshop

ECE 435 Network Engineering Lecture 7

Security in inter-domain routing

Putting it all together

Remote DNS Cache Poisoning Attack Lab

Domain Name System (DNS) DNS Fundamentals. Computers use IP addresses. Why do we need names? hosts.txt does not scale. The old solution: HOSTS.

Domain Name System (DNS) Session-1: Fundamentals. Joe Abley AfNOG Workshop, AIS 2017, Nairobi

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

DNS Basics BUPT/QMUL

Securing Core Internet Functions Resource Certification, RPKI. Mark Kosters ARIN CTO

Chapter 2 Application Layer. Lecture 5 DNS. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

DNSSEC DNS SECURITY EXTENSIONS INTRODUCTION TO DNSSEC FOR SECURING DNS QUERIES AND INFORMATION

Computer Network 2015 Mid-Term Exam.

Internet Kill Switches Demystified

CIS 551 / TCOM 401 Computer and Network Security

Misdirection / Hijacking Incidents

Deploying RPKI An Intro to the RPKI Infrastructure

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

Lecture 10. Denial of Service Attacks (cont d) Thursday 24/12/2015

The Application Layer: Sockets, DNS

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Re-engineering the DNS One Resolver at a Time. Paul Wilson Director General APNIC channeling Geoff Huston Chief Scientist

CS Networks and Distributed Systems. Lecture 11: DNS + NAT. Revised 3/10/14

Managing Caching DNS Server

SecSpider: Distributed DNSSEC Monitoring and Key Learning

DNS. Introduction To. everything you never wanted to know about IP directory services

CNT Computer and Network Security: DNS Security

Routing and router security in an operator environment

CS514: Intermediate Course in Computer Systems

Lecture 7: Application Layer Domain Name System

Communications Software. CSE 123b. CSE 123b. Spring Lecture 11: Domain Name System (DNS) Stefan Savage. Some pictures courtesy David Wetherall

CSE 123b Communications Software. Overview for today. Names and Addresses. Goals for a naming system. Internet Hostnames

Remote DNS Cache Poisoning Attack Lab

DNSSEC All You Need To Know To Get Started

Advanced Networking. Domain Name System

Advanced Networking. Domain Name System. Purpose of DNS servers. Purpose of DNS servers. Purpose of DNS servers

Routing Security We can do better!

CS 3640: Introduction to Networks and Their Applications

Network Security: Routing security. Aapo Kalliola T Network security Aalto University, Nov-Dec 2012

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

Domain Name Service. DNS Overview. October 2009 Computer Networking 1

Domain Name System (DNS) Session-1: Fundamentals. Computers use IP addresses. Why do we need names? hosts.txt does not scale

MANRS. Mutually Agreed Norms for Routing Security. Jan Žorž

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail

CS 43: Computer Networks. 10: Naming and DNS September 24, 2018

S Computer Networks - Spring What and why? Structure of DNS Management of Domain Names Name Service in Practice

Lecture 05: Application Layer (Part 02) Domain Name System. Dr. Anis Koubaa

Introduction to Network. Topics

The Domain Name System

Domain Name System (DNS)

Application Layer Protocols

Understanding and Characterizing Hidden Interception of the DNS Resolution Path

A DNS Tutorial

Mutually Agreed Norms for Routing Security NAME

Domain Name System Security

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO

Computer Networks. Domain Name System. Jianping Pan Spring /25/17 CSC361 1

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Transcription:

DNS and BGP CS642: Computer Security Professor Ristenpart h9p://www.cs.wisc.edu/~rist/ rist at cs dot wisc dot edu University of Wisconsin CS 642

DNS and BGP University of Wisconsin CS 642

128.105.5.31 We don t want to have to remember IP addresses Early days of ARPANET: manually managed hosts.txt served from single computer at SRI

Heirarchical domain name space (unnamed) root org net edu com tv ca wisc ucsd davis Top Level domains (TLD) Second Level domains max 63 characters cs www ece ICANN (Internet CorporaXon for Assigned Names and Numbers) root nameservers and authoritaxve nameservers Zone: subtree

Resolving names From h9p://en.wikipedia.org/wiki/file:an_example_of_theorexcal_dns_recursion.svg

Example DNS query types A AAAA NS TXT MX address (get me an IPv4 address) IPv6 address name server human readable text, has been used for some encrypxon mechanisms mail exchange

Caching DNS servers will cache responses Both negaxve and posixve responses Speeds up queries periodically Xmes out. TTL set by data owner

DNS packet on wire Query ID is 16- bit random value We ll walk through the example from Friedl s document From Friedl explanaxon of DNS cache poisoning, as are following diagrams

Query from resolver to NS

Reply from NS to Resolver Response contains IP addr of next NS server (called glue ) Response ignored if unrecognized QueryID

Query to Second NS

Reply from Second NS to Resolver bailiwick checking: response is cached if it is within the same domain of query (i.e. a.com cannot set NS for b.com)

Here we go again What security checks are in place? Random query ID s to link responses to queries Bailiwick checking (sanity check on response) No authenxcaxon DNSsec is supposed to fix this but few DNS servers support it Many things trust hostname to IP mapping Browser same- origin policy URL address bar

A9acks against DNS? DNS server Web sites Clients Internet Corrupted nameservers Intercept & manipulate requests DDoS Cache poisoning Phishing / typo squagng / piggy- backing

DDoS against DNS Denial of Service take down DNS server, clients can t use Internet Feb 6, 2007 a9ack against 6 of 13 root servers: 2 suffered very badly Others experienced heavy traffic DoD purportedly has interesxng response: In the event of a massive cybera9ack against the country that was perceived as originaxng from a foreign source, the United States would consider launching a countera9ack or bombing the source of the cybera9ack, Hall said. But he noted the preferred route would be warning the source to shut down the a9ack before a military response. h9p://www.computerworld.com/s/arxcle/9010921/ RSA_U.S._cyber_countera9ack_Bomb_one_way_or_the_other

DNS cache poisoning Victm DNS server bankofsteve.com 10.1.1.1 Clients Internet goodguy.com IP = 10.9.9.9 A9acker site 10.9.9.99 How might an a9acker do this? Assume DNS server uses predictable UDP port

Another idea: - Poison cache for NS record instead - Now can take over all of second level domain How many tries does this require? - Try 256 different QIDs - Good chance of success - Repeat if needed

Does happen in the wild h9p://www.zdnet.com/blog/security/hd- moore- pwned- with- his- own- dns- exploit- vulnerable- at- t- dns- servers- to- blame/1608? tag=content;siu- container

Defenses Query ID size is fixed at 16 bits Repeat each query with fresh Query ID Doubles the space Randomize UDP ports DNSsec Cryptographically sign DNS responses, verify via chain of trust from roots on down

Phishing is common problem Typo squagng: www.qpple.com www.goggle.com www.nytmes.com Other shenanigans: www.badguy.com/(256 characters of filler)/ www.google.com Phishing a9acks These just trick users into thinking a malicious domain name is the real one

DNS piggybacking Piggy backed sites IP Main site IP From h9ps://isc.sans.edu/diary/what+s+in+a+name+/11770 A9ackers maliciously added extra lower level domain names to valid domain name This is helpful for search engine opxmizaxon

BGP and rouxng wisc.edu charter.net BGP (exterior BGP) OSPF within AS s (Open shortest- path first) defense.gov

BGP Policy- based rouxng AS can set policy about how to route economic, security, polixcal consideraxons BGP routers use TCP connecxons to transmit rouxng informaxon IteraXve announcement of routes

BGP example [D. Wetherall] 7 2 6 5 7 7 1 8 2 7 2 6 5 2 7 2 6 5 3 2 7 3 4 2 6 5 3 2 6 5 2 7 6 5 2 7 6 2 7 6 5 5 5 2, 7, 3, 6 are Transit AS 8, 1 are Stub AS 4,5 mulxhomed AS Algorithm seems to work OK in pracxce BGP does not respond well to frequent node outages

IP hijacking BGP unauthenxcated Anyone can adverxse any routes False routes will be propagated This allows IP hijacking AS announces it originates a prefix it shouldn t AS announces it has shorter path to a prefix AS announces more specific prefix

Malicious or misconfiguraxons? AS 7007 incident in 1997 Okay, so panic ensued, and we unlugged *everything* at 12:15PM almost to the second. [sic] h9p://www.merit.edu/mail.archives/nanog/ 1997-04/msg00444.html China Telecom hijacks large chunks of Internet in 2010 h9p://bgpmon.net/blog/?p=282

Youtube incident Pakistan a9empts to block Youtube youtube is 208.65.152.0/22 youtube.com = 208.65.153.238 Pakistan ISP adverxses 208.65.153.0/24 more specific, prefix hijacking Internet thinks youtube.com is in Pakistan Outage resolved in 2 hours

BGPsec [D. Wetherall] 7 2 6 5 7 7 1 8 2 7 2 6 5 2 7 2 6 5 3 2 7 3 4 2 6 5 3 2 6 5 2 7 6 5 2 7 6 2 7 6 5 5 5 Route announcements must be cryptographically signed AS can only adverxse as itself AS cannot adverxse for IP prefixes it does not own Requires a public- key infrastructure (PKI) SXll in development: h9p://tools.iez.org/html/dra{- lepinski- bgpsec- protocol- 00#ref- 7

Internet Security Recurring themes: Built without any authenxcity mechanisms in mind FuncXonality mechanisms (sequence # s) become implicit security mechanisms New a9empts at (somewhat) backwards- compaxble security mechanisms IP - > IPsec DNS - > DNSsec BGP - > BGPsec