DNS: Useful tool or just a hammer? Paul DNS-OARC 06 Oct 2013, Phoenix

Similar documents
August 14th, 2018 PRESENTED BY:

DNS Security. Ch 1: The Importance of DNS Security. Updated

Computer Security CS 426

Attacks on DNS: Risks of Caching

DNS Firewall with Response Policy Zone. Suman Kumar Saha bdcert Amber IT Limited

Protecting Against DNS Cache Poisoning Attacks

This time. Digging into. Networking. Protocols. Naming DNS & DHCP

CSE 565 Computer Security Fall 2018

DNS Cache Poisoning Looking at CERT VU#800113

(DNS, and DNSSEC and DDOS) Geoff Huston APNIC

Re-engineering the DNS One Resolver at a Time. Paul Wilson Director General APNIC channeling Geoff Huston Chief Scientist

DNS Attacks. Haythem EL MIR, CISSP CTO, NACS

2008 DNS Cache Poisoning Vulnerability Cairo, Egypt November 2008

Foundations of Network and Computer Security

Improving DNS Security and Resiliency. Carlos Vicente Network Startup Resource Center

Implementing DNSSEC with DynDNS and GoDaddy

Defeating DNS Amplification Attacks. UKNOF Manchester Central, UK January Ralf Weber Senior Infrastructure Architect

UDP-based Amplification Attacks and its Mitigations

Attacks on DNS: Risks of Caching. March 21, 2018

CSCE 463/612 Networks and Distributed Processing Spring 2018

Managing Caching DNS Server

TOP TEN DNS ATTACKS PROTECTING YOUR ORGANIZATION AGAINST TODAY S FAST-GROWING THREATS

DNS Mark Kosters Carlos Martínez {ARIN, LACNIC} CTO

BIND-USERS and Other Debugging Experiences. Mark Andrews Internet Systems Consortium

Network security (DNS caching and DoS)

Domain Name System (DNS) Session-1: Fundamentals. Joe Abley AfNOG Workshop, AIS 2017, Nairobi

DNS Review Quiz. Match the term to the description: A. Transfer of authority for/to a subdomain. Domain name DNS zone Delegation C B A

DNS. Introduction To. everything you never wanted to know about IP directory services

Domain Name System.

TCP/IP SECURITY GRAD SEC NOV

SURFnet What we re doing and what we ve found so far

Large-scale DNS. Hot Topics/An Analysis of Anomalous Queries

OFF-PATH ATTACKS AGAINST PUBLIC KEY INFRASTRUCTURES. Markus Brandt, Tianxiang Dai, Elias Heftrig, Amit Klein, Haya Shulman, Michael Waidner

DNS Mark Kosters Carlos Martínez ARIN - LACNIC

Network Attacks. CS Computer Security Profs. Vern Paxson & David Wagner

A Security Evaluation of DNSSEC with NSEC Review

Chapter 2 Application Layer. Lecture 5 DNS. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

RFC 2181 Ranking data and referrals/glue importance --- new resolver algorithm proposal ---

DNSSEC PLNOG 5. Eric Ziegast Internet Systems Consortium. Zbigniew Jasinski NASK.PL. Deck Version 0.2

CSE 127: Computer Security Network Security. Kirill Levchenko

DNS Security Strategies

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

With turing you can: Identify, locate and mitigate the effects of botnets or other malware abusing your infrastructure

BIG-IP DNS Services: Implementations. Version 12.0

Open Resolvers in COM/NET Resolution!! Duane Wessels, Aziz Mohaisen! DNS-OARC 2014 Spring Workshop! Warsaw, Poland!

Is your DNS server up-to-date? Pieter Lexis Senior PowerDNS Engineer April 22 nd 2018

DOMAIN NAME SECURITY EXTENSIONS

Are You Fully Prepared to Withstand DNS Attacks?

CSC 574 Computer and Network Security. DNS Security

BIG-IP DNS Services: Implementations. Version 12.1

Internet Engineering. DNS Message Format. Contents. Robert Elz.

IPv6 Security: Oxymoron or Oxycodone? NANOG 60 Atlanta Paul Ebersman IPv6

Packet Traces from a Simulated Signed Root

Weaver. Computer Science 161 Fall Network Security 3

An Overview of DNSSEC. Cesar Diaz! lacnic.net!

DNS Sessions. - where next? OARC 27 San Jose, Sep Sep 2017, San Jose. DNS OARC 27

Introduction to Network. Topics

Internetwork Expert s CCNA Security Bootcamp. Common Security Threats

CS 3640: Introduction to Networks and Their Applications

«On the Internet, nobody knows you are a dog» Twenty years later

Transaction oriented DNS flow analysis (WIP)

Domain Name System (DNS) Session-1: Fundamentals. Computers use IP addresses. Why do we need names? hosts.txt does not scale

Domain Name Service. DNS Overview. October 2009 Computer Networking 1

The accidental hacker DNS Amplifica7on Norid registrar seminar Registrarseminar 2013 Oslo, NO wed, december 4th, 2013 Marco Davids

The Domain Name System

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. 2.1 Install and configure the DNS server. SEED Labs Local DNS Attack Lab 1

Domain Name System (DNS) DNS Fundamentals. Computers use IP addresses. Why do we need names? hosts.txt does not scale. The old solution: HOSTS.

ECE 435 Network Engineering Lecture 7

DNS Authentication-as-a-Service Preventing Amplification Attacks

Network Attacks. CS Computer Security. Once again thanks to Vern Paxson and David Wagner

Probing Open Recursive Name Servers

Network Protocols. Domain Name System (DNS) TDC375 Autumn 2010/11 John Kristoff - DePaul University 1

DNS and HTTP. A High-Level Overview of how the Internet works

Routing Security DDoS and Route Hijacks. Merike Kaeo CEO, Double Shot Security

Lecture 7: Application Layer Domain Name System

Objectives. Upon completion you will be able to:

CS System Security Mid-Semester Review

Progress Report 1. Group RP16. All work done by Ivan Gromov and Andrew McConnell

Domain Name System Security

CS Paul Krzyzanowski

Domain Name System Security

The Interactive Guide to Protecting Your Election Website

DNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31

Hoda Rohani Anastasios Poulidis Supervisor: Jeroen Scheerder. System and Network Engineering July 2014

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Update on experimental BIND features to rate-limit recursive queries

Data Plane Protection. The googles they do nothing.

Attacks against the DNS. Dave Piscitello VP Security and ICT Coordination April 2015

Root Servers. Root hints file come in many names (db.cache, named.root, named.cache, named.ca) See root-servers.org for more detail

DNS/DNSSEC Workshop. In Collaboration with APNIC and HKIRC Hong Kong. Champika Wijayatunga Regional Security Engagement Manager Asia Pacific

Application Firewalls

CS519: Computer Networks. Lecture 6: Apr 5, 2004 Naming and DNS

DNS Survival Guide. Artyom Gavrichenkov

CSE 127 Computer Security

Agenda. Review DNS Fundamentals DNS Security Summary 1/22

DNS SECURITY BEST PRACTICES

Computer Security. 11. Network Security. Paul Krzyzanowski. Rutgers University. Spring 2018

/ \ _ \ \ / / \ \ \_/ _ / \_/..oo THE --- / CreW Oo.. ''' ''' ''''''' '''' '''' presents

DNS(SEC) client analysis

The Application Layer: Sockets, DNS

Transcription:

DNS: Useful tool or just a hammer? Paul Ebersman pebersman@infoblox.com, @paul_ipv6 DNS-OARC 06 Oct 2013, Phoenix 1

Attacking your cache 2

Recursion DNS queries are either recursive or nonrecursive recursive servername 2) Nonrecursive query for www.google.com/a 3) Referral to com name servers root name server 4) Nonrecursive query for www.google.com/a 1) Recursive query for www.google.com/a resolver 8) A records for www.google.com 7) A records for www.google.com 6) Nonrecursive query for www.google.com/a 5) Referral to google.com name servers google.com name server com name server

Cache Poisoning What is it? Inducing a name server to cache bogus records Made possible by Flaws in name server implementations Short DNS message IDs (only 16 bits, or 0-65535) Made easier on Open recursive name servers 4

Cache Poisoning Consequences A hacker can fool your name server into caching bogus records Your users might connect to the wrong web site and reveal sensitive Your users email might go to the wrong destination Man in the middle attacks 5

The Kashpureff Attack Eugene Kashpureff s cache poisoning attack used a flaw in BIND s additional data processing Evil resolver Query: xxx.alternic.net/a? Query: xxx.alternic.net/a? Owns nameserver Cache Recursive name server Reply: xxx.alternic.net/a + www.internic.net/a alternic.net name server

DNS Message IDs Message ID in a reply must match the message ID in the query The message ID is a random, 16-bit quantity Query [Msg ID 38789] Reply [Msg ID 38789] ns1 ns2

How Random - Not! Amit Klein of Trusteer found that flaws in most versions of BIND s message ID generator (PRNG) don t use sufficiently random message IDs If the current message ID is even, the next one is one of only 10 possible values Also possible, with 13-15 queries, to reproduce the state of the PRNG entirely, and guess all successive message IDs

Birthday Attacks Barring a man in the middle or a vulnerability, a hacker must guess the message ID in use Isn t that hard? As it turns out, not that hard Brute-force guessing is a birthday attack: 365 (or 366) possible birthdays, 65536 possible message IDs Chances of two people chosen at random having different birthdays: Chances of n people (n > 1) chosen at random all having different birthdays: p ( n) = 364 365 363 365 364 365 99.7%... 366 n 365 p(n) = ( 1 p ( n) )

Birthday Attacks (continued) People 10 12% 20 41% 23 50.7% 30 70% 50 97% Chances of two or more people having the same birthday 100 99.99996% Number of reply messages 200 ~20% 300 ~40% 500 ~80% 600 ~90% Chances of guessing the right message ID

The Kaminsky Vulnerability How do you get that many guesses at the right message ID? Hacker Recursive name server q00001.paypal.com/a? NXDOMAIN! paypal.com name servers

The Kaminsky Vulnerability (continued) How does a response about q00001.paypal.com poison www.paypal.com s A record? Response: " ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61718 ";; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, "ADDITIONAL: 1" ";;; QUESTION SECTION: ";q00001.paypal.com. "IN "A ";;; AUTHORITY SECTION "q00001.paypal.com. "86400 "IN "NS "www.paypal.com. ";;; ADDITIONAL SECTION "www.paypal.com. " "86400 "IN "A "10.0.0.1 ""

Initial Kaminsky fixes To make it more difficult for a hacker to spoof a response, we use a random query port In addition to a random message ID If we use 8K or 16K source ports, we increase entropy by 13 or 14 bits This increases the average time it would take to spoof a response substantially However, this is not a complete solution Spoofing is harder, but still possible Evgeniy Polyakov demonstrated that he could successfully spoof a patched BIND name server over high-speed LAN in about 10 hours

Defending your cache 14

Defenses More randomness in DNS msg IDs, source ports, etc. Better checks on glue DNSSEC ACLs 15

Attacking your authoritative servers 16

Sheer volume and persistence 10s of thousands of bots 10s of millions of open resolvers (see http://openresolverproject.org/) Gbps of traffic generated 45% of ISPs experience 1-10 DDoS/ month, 47% experience 10-500 DDoS/ month 17

High Yield Results Small queries, large responses (DNSSEC records) Using NSEC3 against you 18

Make sure they re your servers Vet your registry/registrar Think about NS TTLs 19

Defending your auth servers 20

Harden your server Perimeter ACLs Higher capacity servers Clusters or load balanced servers Response Rate limiting (RRL) http://www.iana.org/about/presentations/20130512- knight-rrl.pdf https://www.isc.org/blogs/cache-poisoning-gets-asecond-wind-from-rrl-probably-not/ 21

Spread yourself out Fatter internet pipes (but makes you more dangerous to others) More authoritative servers (up to a point) Anycast HA 22

Being a good internet citizen 23

It s not just you being attacked If you allow spoofed packets out from your network, you are part of the problem Use BCP38/BCP84 Ingress filtering Implement RFC5358 http://openresolverproject.org/ 24

Revise DNS standards? 25

Changing RFCs? Glaciers start to look speedy Source Address Validation TCP vs UDP DNS Cookies http://tools.ietf.org/html/draft-eastlake-dnsextcookies-03 26

DNS use by the bad guys 27

DNS use by bad guys Command and control DNS Amplification Fastflux single flux double flux Storm, Conficker, etc. 28

Protecting your users 29

Dealing with malware Prevent infections (antivirus) Block at the perimeter (NGFW, IDS) Block at the client (DNS) 30

Antivirus Useful but has issues: Depends on client update cycles Too many mutations Not hard to disable 31

Perimeter defenses Necessary but not complete: Limited usefulness after client is already infected Detection of infected files only after download starts Usually IP based reputation lists Limited sources of data 32

RPZ DNS Uses a reputation feed(s) (ala spam) Can be IP or DNS based ID Fast updates via AXFR/IXFR Protects infected clients, helps ID them Can isolate infected clients to walled garden 33

There is *not* only one Use all methods you can! 34

Q&A 35

Thank you! 36