dns security 1. fundamental problems of network security internet was designed without security in...
DESCRIPTION
Example Security Problems by Incorrect Resource Location DNS poisoning BGP routing vulnerabilities ARP poisoning –ARP (Address Resolution Protocol) is used to query for the MAC address associated with an IP address –Any device attached physically to a subnet can claim to be the “owner” of the IP IP Spoofing –Routers typically do not check source IP addresses –A packet can claim to be coming from any IP address Spam 3TRANSCRIPT
![Page 1: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/1.jpg)
DNS Security
1
![Page 2: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/2.jpg)
Fundamental Problems of Network Security
• Internet was designed without security in mind– Initial design focused more on how to make it work,
than on how to prevent abuses– Initial environment mostly consisted of research
institutions---assumption on the benign behaviors of users
• Fundamental security problem of current network technology:– Has no way of telling whether the resource is located
“correctly,” or the information is transferred “correctly”– Has no data authentication and confidentiality
protection2
![Page 3: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/3.jpg)
Example Security Problems by Incorrect Resource Location
• DNS poisoning• BGP routing vulnerabilities• ARP poisoning
– ARP (Address Resolution Protocol) is used to query for the MAC address associated with an IP address
– Any device attached physically to a subnet can claim to be the “owner” of the IP
• IP Spoofing– Routers typically do not check source IP addresses– A packet can claim to be coming from any IP address
• Spam email 3
![Page 4: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/4.jpg)
Fundamental Problems of TCP/IP
• No authentication for received messages
• No encryption for transmitted messages
• Applying cryptographic techniques can help– But must engineer very carefully
![Page 5: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/5.jpg)
5Borrowed from slides of Prof. Dan Massey
at Colorado State University
Basic Internet Database Maps names to IP
addresses Also stores IPv6
addresses, mail servers, service locators, Enum (phone numbers), etc.
Data organized as tree structure. Each zone is the
authority for its local data.
Root
edu com uk
ciscousf coibm
www
The Domain Name System
![Page 6: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/6.jpg)
Domain Name Service• Provides binding between URL and IP address
– Both forward and reverse mapping– Divide URL space into zones; Each name server
handles mapping in its zone
• DNS Resource Record (RR)– Can be viewed as tuples of the form <name, TTL, class, type, data>– types: A (IP address) MX (mail servers) NS (name servers) PTR (reverse look up)
6
![Page 7: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/7.jpg)
DNS Protocol
ISP
ISP’s DNS Resolver
NS Server for edu (192.41.162.30)
NS Server for usf.edu (131.247.100.1)
What is the IP address of
www.usf.edu?
What is th
e IP
address of
www.usf.edu?
Go ask 131.247.100.1What is the IP
address of www.usf.edu?
131.247.182.171
root Server
Wha
t is
the
IP
addr
ess
of
www.u
sf.ed
u?
Go as
k 192
.41.16
2.30
7
![Page 8: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/8.jpg)
Example
• Response from the .edu NS server
;; QUESTION SECTION:;www.usf.edu. IN A
;; AUTHORITY SECTION:usf.edu. 172800 IN NS mother.usf.edu.usf.edu. 172800 IN NS ziggy.usf.edu.usf.edu. 172800 IN NS clemson-ns1.usf.edu.
;; ADDITIONAL SECTION:mother.usf.edu. 172800 IN A 131.247.100.1ziggy.usf.edu. 172800 IN A 131.247.1.40clemson-ns1.usf.edu. 172800 IN A 205.186.58.129…
Delegation of authority
Glue records8
![Page 9: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/9.jpg)
DNS Security Problems• A DNS resolver has no way to determine if the
response of a query does come from the legitimate server
• It will accept a response if– The port number matches the source port of the
request– Has the correct Transaction ID (TXID).
• It will accept all RR’s that are in the queried server’s bailiwick– The bailiwick is the domain in which the server has
authority according to the referral path
9
![Page 10: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/10.jpg)
Classical DNS Poisoning
ISP
Recursive DNS resolver NS Server for usf.edu
What is the IP address of
www.usf.edu?
What is the IP address of
www.usf.edu?
131.247.182.171
DoS flooding
DNS queries
recursive query
faked
resp
onses
10
![Page 11: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/11.jpg)
Conditions for classical DNS poisoning attacks
• Must guess right the correct source-port number
• Must guess right the correct TXID (16 bits)• The fake response must arrive before the
legitimate response• If any of the above fails, the attack fails
and there will be no chance to attack again until the TTL expires
11
![Page 12: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/12.jpg)
Kaminsky Attack (2008)
ISP
Recursive DNS resolver NS Server for usf.edu
What is the IP address of
foo.usf.edu?
No such url
What is
the IP
addres
s of
foo.usf.ed
u?
usf.ed
u. N
S www.us
f.edu
www.usf.e
du A
1.1.
1.1
1.1.1.1
12
![Page 13: DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it](https://reader038.vdocuments.net/reader038/viewer/2022100419/5a4d1acc7f8b9ab05996fc6c/html5/thumbnails/13.jpg)
Implication of Kaminsky Attack
• Dramatically reduces the complexity and increases the effectiveness of DNS cache poisoning– No longer needs to wait for TTL to expire– The attacker can control when and what
queries are issued– A complete domain may be hijacked
• Even TLD’s are vulnerable– Only needs 10 secs to succeed
13