CS 557 - Lecture 22 DNS Security
DNS Security Introduction and Requirements, RFC 4033, 2005
CS 557 - Lecture 22 DNS Security DNS Security Introduction and - - PowerPoint PPT Presentation
CS 557 - Lecture 22 DNS Security DNS Security Introduction and Requirements, RFC 4033, 2005 Fall 2013 The Domain Name System Virtually every application uses Root the Domain Name System (DNS). DNS database maps: edu mil ru Name to
DNS Security Introduction and Requirements, RFC 4033, 2005
– Name to IP address www.darpa.mil = 128.9.176.20 – And many other mappings (mail servers, IPv6, reverse…)
– Each zone is authoritative for its local data.
Caching DNS Server End-user
Root DNS Server
mil DNS Server darpa.mil DNS Server
– DNS zone data is replicated at multiple servers. – A DNS zone works as long as one server is available.
– Any DNS response is generally believed. – No attempt to distinguish valid data from invalid.
Caching DNS Server Joe’s Laptop
Root DNS Server mil DNS Server darpa.mil DNS Server Dan’s Laptop
ns.attacker.com Secure64 Caching Server Remote attacker Query www.attacker.com Response www.attacker.com A 128.9.128.127 attacker.com NS ns.attacker.com attacker.com NS www.google.com ns.attacker.com A 128.9.128.2 www.google.com A 128.9.128.127 Secure64 Laptop Query www.google.com www.google.com = 128.9.128.127
c.gtld-servers.net BGP monitor 192.26.92.30
192.26.92/24
ISPs announced new path for 20 minutes to 3 hours
Caching DNS Server End-user
Authoritative DNS Servers
– Recommend signing done offline in advance
– The requested resource record set. – A signature (SIG) of the requested resource record set.
– Public key is pre-configured or learned via a sequence of key records in the DNS heirarchy.
– RRSIG record identified the key name and key tag. – If you are pre-configured with key, then done.
– Configure root key and perhaps some local keys – Query zone for the desired public – Query returns DNSKEY record and a signature from the parent zone.
Note the darpa.mil DNSKEY is signed by the mil private key (We later show why this doesn’t work)
Caching DNS Server End-user
Authoritative DNS Servers
Caching DNS Server End-user
Authoritative DNS Servers
– USC/ISI led one of the first multi-administion testbeds. – Identified fundamental key management & scaling issues. – Revision now at the end of the standards process
– The DNS succeeded by de-coupling zones.
– Store a hash (copy) of the child key at the parent.
currently used for maintaining server chains.
mil DNS Server darpa.mil DNS Server
Can Change mil key without notifying darpa.mil Can Change key 2 without notifying .mil
mil DNS Server darpa.mil DNS Server
– All DS records should be sent to parent. – What if you ask ucla.edu for the ucla.edu DS?
– Server says “I’m not authoritative for this data”. – Resolver hears “Not authortitative for ucla.edu”
– Ask resolver to send DS query to each ucla.edu server. – Each server declared not authortiative for ucla.edu! – Query for www.ucla.edu now returns: cache says all ucla.edu servers are broken
– Default was to send DNSSEC data. – Verified old resolvers and servers ignore it.
– Firewalls did not ignore the extra records.
– Resolver sets this bit indicated DNSSEC data is okay.
– DNSSEC RFCs published in March 2005 – Monitoring launched in October 2005
– Continually crawl DNS looking for secure zones – Allow users to submit the names of secure zones
– Vast DNS + tiny DNSSEC => low (near 0) hit rate for crawler
– SecSpider is well publicized => high submission rate – Augment secure zones with parent/child and popular sites
– Some top level domains deploying or deployed (e.g. “se” zone) – Not yet at critical mass for DNSSEC
– Frequent Queries to Monitor Changes – Exploit DNSSEC zone walking – Still tractable due to relativley small DNSSEC deployment
– DNSSEC deployment is not simple after all – Challenge in Islands of Security – Challenge in Key Management – Challenge in Preventing Replays
– Everyone knows root public key
– Root key used to sign edu public key
– edu key used to sign colostate.edu key
– All zones deploy DNSSEC and manually configure the root key
– DNSSEC deployed in isolated subtrees and must manually configure the public key for each island of security
– Has yet to happen operationally…..
– DLV provides some service to store and report public keys
– Must ensure keys came from monitor – Must ensure monitor was not tricked… – But can rely on distributed services and checking by actual admins….
– Establish key pair and sign the zone
– Establish an Authentication Chain with a Secure Parent
– Update the key pair periodically
But many complex details
– Need to improve management tools and increase automation – Possible, but need to overcome off-line key issues
– Must have monitoring to provide external view of zone – Must have some form of correctness check – Monitoring data can aide in the automation process by checking which steps have been done
– Ex: Signature for www.colostate.edu edu expires on Oct 31.
– What if the addresses changes today?
– Server removes changed record and replaces with new copy – But attacker can still replay the old record and signature
– Vulnerable records can be replayed and resolver will authenticate the old copy
– Monitoring illustrates extent of known issues in deployment – Monitoring identifies new challenges in deployment
– Illustrates progress and documents scale of known issues – Identifies new challenges – Allows zone admins to see how others perceive them
– Monitor can be used to bootstrap public key information – Challenge is to authenticate public keys came from monitor and limit chance monitor data is subverted by attacer
– Given an external view of data, zone admins can adapt – Monitoring can verify key management is working – Monitoring can aide in automating DNS key management
practically solve existing challenges