Class 21 Dns
Class 21 Dns
Class 21 Dns
Or one of his offspring does Each zone is required to have at least two name servers
This is an administrative division, one domain
Primary
Or they have it in their cache Inverse queries are satisfied from a dedicated domain in-
Or they know who to ask and they will find out the answer addr.arpa
1 2
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
DNS names, not addresses the reply we got for DNS query is:
This is not so frequent today, as they use public keys Correct
instead, but it used to be common 5-10 years ago Generated by a name server authoritative for the zone
When such an application receives the request for Therefore anyone can generate a reply?
connection it checks inverse address-to-name mapping DNS request/reply packets have an ID number that is
Only one line in in-addr.arpa holds this and, if used for matching replies to requests
changed, attacker can gain trusted access to the given Anyone who wants to spoof replies must first guess the
application appropriate ID number
Sometimes this can be very easy to do
3 4
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
Attacker machine
B
Denial of service for the client A
Redirection of traffic for the client 1. What is address of B.evil.net C
B
DoS and/or redirection for the whole network if a
cache of a server doing recursive lookup were infected
NS NS
2. What is address of B.evil.net, ID=67
Victim nameserver
Attacker nameserver
VICTIM NETWORK
victim.net
4.5.6.0/24
ATTACKER NETWORK
5 6
evil.net
1.2.3.0/24
1
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
7. It is 1.2.3.25, ID=69
NS NS NS NS
4. What is address of B.evil.net, ID=68
Victim nameserver 9 Victim nameserver
ID=6
Attacker nameserver Attacker nameserver om,
soft.c
.micro
boss
ss of
a ddre
VICTIM NETWORK hat is VICTIM NETWORK
6. W
victim.net victim.net
4.5.6.0/24 4.5.6.0/24
ATTACKER NETWORK ATTACKER NETWORK
7 8
evil.net evil.net
1.2.3.0/24 1.2.3.0/24
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
(likely inside microsoft.com domain) via zone transfer messages How is this attack different than Smurf?
Format of these messages is similar to DNS request/response
9 10
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
2
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
15 16
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
17 18
3
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
19 20
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
DNSSEC DNSSEC
A modification of DNS protocol aimed at solving two Use digital signatures to sign the data and guarantee
problems: integrity and authenticity
Data integrity – noone modified this data Authoritative name server will sign the data with his private key
Data origin authentication – this data was generated by Anyone can decrypt and verify using server’s public key
If the private key is not kept online (on the name server) then
No protection is provided against denial-of-service there is no danger even if the server is compromised
Worse, some amplification messages are added to make Let us remind ourselves how are signing and
this problem more aggravating verification done!
21 22
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
This signature will form a new record – SIG record What is address of copland.udel.edu?
udel.edu
4
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03
mail IN A 128.175.0.2
www IN A 128.175.0.3
What if someone claims that a real record does not exist?
We will sign the NXT record – this specifies which existing udel.edu. IN SOA ns.udel.edu. root.udel.edu. (99021800 1h 10m 30d 1d )
udel.edu. IN NS ns.udel.edu.
name is lexicographically after the one that does not exist udel.edu. IN A 128.175.0.1
CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03 CIS 659 – Introduction to Network Security – Fall 2003 – Class 21 – 11/18/03