dnssec lecture 12b - computer science · 2019-08-14 · dnssec lecture 12b compsci 726 network...

15
Muhammad Rizwan Asghar August 14, 2019 DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures Source of some slides: Princeton University, Cornell University, and Stanford University

Upload: others

Post on 28-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Slide title

In CAPITALS

50 pt

Slide subtitle

32 pt

Muhammad Rizwan Asghar

August 14, 2019

DNSSEC

Lecture 12b

COMPSCI 726

Network Defence and Countermeasures

Source of some slides: Princeton University, Cornell University,

and Stanford University

Page 2: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

2

DNSSEC

Guarantees

– Authenticity of DNS answer origin

– Integrity of reply

Accomplishes this by signing DNS replies

Uses public key cryptography to sign responses

Typically use trust anchors

– Entries in the OS to bootstrap the process

DNSSEC does not provide

– Confidentiality

Page 3: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

3

DNSSEC

Cryptographically sign critical resource records

– Resolver can verify the cryptographic signature

Two new resource types

– Type = DNSKEY

Name = Zone domain name

Value = Public key for the zone

– Type = RRSIG

Name = (Type, name) tuple, i.e., the query itself

Value = Cryptographic signature on the query results

Page 4: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

4

PURPOSE OF NEW RESOURCE TYPES

DNSKEY

– Creates a hierarchy of trust within each zone

RRSIGN

– Prevents hijacking and spoofing

Page 5: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

5

DNSSEC HIERARCHY OF TRUST

dns.bofa.com

Where is

bankofamerica.com?

IP: 123.45.67.89

Key: < >

SIG: x9fnskflkalk

.com (Verisign)

Root Zone (ICANN)

User

Page 6: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

6

DNSSEC HIERARCHY OF TRUST

Where is

bankofamerica.com?

.com (Verisign)

Root Zone (ICANN)

IP: 66.66.66.93

Key: < >

SIG: 9na8x7040a3dns.evil.com

User

Page 7: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

7

DOES DNSSEC SOLVE ALL THE

PROBLEMS?

No

DNSSEC is vulnerable to

– Amplification attack

– Reflection attack

Page 8: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

8

AMPLIFICATION ATTACK

Use packet(s) directed at a legitimate DNS

Attacker creates DNS request(s) containing the

spoofed source address of the target system

Exploit DNS behaviour to convert a small request to a

much larger response (amplification)

– 60 bytes query 512 bytes answer (~8.5x)

– RFC 2671 allows larger DNS answers

Answers larger than 4000 bytes possible (>65x)

Target is flooded with amplified responses

Page 9: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

9

DNS AMPLIFICATION

Open Resolver Victim

Src: Victim

Dst: Open Resolver

DNS

Sometimes, the DNS resolver network

thinks it is under attack by the victim!

Attacker

Page 10: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

10

REFLECTION ATTACK

Attacker sends packets to a known service with a

spoofed source address of the actual target system

The response is sent to the target

“Reflects” the attack (reflector)

Goal is to generate enough volumes of packets to flood

the link to the target system

Page 11: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

11

REFLECTION ATTACK – DDOS

Page 12: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

12

SOME COUNTERMEASURES

Check your network is configured to prevent

spoofed traffic from leaving your network

Make sure that your name servers are not

answering recursive queries for random

domains for random users

Page 13: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

13

SUMMARY

DNSSEC guarantees authenticity and integrity

DNSSEC does not provide confidentiality

DNSSEC is vulnerable to DDoS

There are general countermeasures

– Check traffic leaving your network

– Do not answer recursive queries

Page 14: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

14

RESOURCES

Arends, Roy, Rob Austein, Matt Larson, Dan Massey,

and Scott Rose. DNS Security Introduction and

Requirements. RFC 4033, 2005.

Available at: https://tools.ietf.org/html/rfc4033

The Continued Rise of DDoS Attacks.

Available at:

http://www.symantec.com/content/en/us/enterprise/me

dia/security_response/whitepapers/the-continued-rise-

of-ddos-attacks.pdf

Page 15: DNSSEC Lecture 12b - Computer Science · 2019-08-14 · DNSSEC Lecture 12b COMPSCI 726 Network Defence and Countermeasures ... Slide title 40 pt Slide subtitle 24 pt Text 24 pt 5

Top right

corner for

field

customer or

partner logotypes.

See Best practice

for example.

Slide title

40 pt

Slide subtitle

24 pt

Text

24 pt

5

20 pt

15

Questions?

Thanks for your attention!