DNSSEC aggressive cache (RFC 8198) Protection from random subdomain - - PowerPoint PPT Presentation

dnssec aggressive cache rfc 8198
SMART_READER_LITE
LIVE PREVIEW

DNSSEC aggressive cache (RFC 8198) Protection from random subdomain - - PowerPoint PPT Presentation

DNSSEC aggressive cache (RFC 8198) Protection from random subdomain attacks Petr paek petr.spacek@nic.cz 2018-05-16 Talk outline Aggressive cache theory expectations efficiency Normal traffic measurements


slide-1
SLIDE 1

DNSSEC aggressive cache (RFC 8198)

Protection from random subdomain attacks

Petr Špaček • petr.spacek@nic.cz • 2018-05-16

slide-2
SLIDE 2

Talk outline

  • Aggressive cache
  • theory
  • expectations
  • efficiency
  • Normal traffic
  • measurements
  • Random subdomain attack
  • theory
  • measurements
slide-3
SLIDE 3

Aggressive cache: Theory

$ dig +dnssec nonexistent.example.com nonexistent.example.com ;; AUTHORITY SECTION: example.com. example.com. NSEC www. w.exa xampl ple.c .com. m. NS SOA

slide-4
SLIDE 4

Aggressive cache: Expectations

  • Use of NSEC/NSEC3 RRs to
  • decrease latency
  • decrease resource utilization
  • increase privacy
  • increase resilience
slide-5
SLIDE 5

Aggressive cache: Efficiency

  • Query pattern
  • normal traffic
  • random subdomain attack
  • Distribution of names in DNS zones
  • Wildcards
  • TTL
slide-6
SLIDE 6

Aggressive cache vs. Normal traffic

slide-7
SLIDE 7

Normal traffic: Experimental setup

  • Replay query PCAP to BIND 9.12.0
  • synth-from-dnssec yes / no;
  • Record to PCAP
  • traffic to auth
  • answers
  • Analyze
  • # packets to auth
  • bandwidth to auth
  • latency for answers
slide-8
SLIDE 8

Expectations vs. normal traffic

  • Root zone
  • eliminates query leaks

– stops 50-65 % queries to root

  • ☑ privacy protection
  • Others zones
  • nothing to see here
  • negligible impact on normal traffic
  • not enough signed domains?
slide-9
SLIDE 9

Aggressive cache vs. Random subdomain attack

slide-10
SLIDE 10

R.S.A. traffic: Theory

attacker's JavaScript unknowing collaborators recursive resolver not a target collateral damage auth server target

slide-11
SLIDE 11

R.S.A. traffic: Query pattern

  • 1000 simulated clients
  • Next query right after answer
  • Pseudorandom unique query names (256 bits)
  • GCZDKQIS7F7TTHXBIBC4HHZDYTFCPH5XLR6P

GEI3WIESK7BS45WQ.test.knot-resolver.cz. A

  • GCZDKQIS7F7TTHXBIBC4HHZDYTFCPH5XLR6P

GEI3WIESK7BS45WQ.test.knot-resolver.cz. AAAA

  • OF6OVT2SNIV54B7HI77V5TJ3TFVULN5AMQ2Z6I

WQX6GBHQ254LNQ.test.knot-resolver.cz. A

slide-12
SLIDE 12

R.S.A. traffic: Experimental setup

  • Auth server with a test zone
  • signed using NSEC
  • extrapolation for NSEC 3: (size * 1.5

size * 1.5)

  • Replay random query names to Knot Resolver
  • Record traffic from resolver to auth
  • Analyze
  • # packets to auth
  • bandwidth to auth
slide-13
SLIDE 13

R.S.A. traffic: Tools

  • Knot DNS 2.6.4
  • RSASHA256 2048 b, automatic signing

– big answers

  • Knot Resolver 2.1.1
  • "unlimited" cache size (20 GiB)
  • dnsperf 2.1.0 to replay queries
  • libtrace 3.0.21 to analyze packet #, bandwidth
slide-14
SLIDE 14

R.S.A. scenarios

  • Unsigned zone (baseline)
  • Signed zone
  • SOA minimum, NSEC TTL

– 3600 s / 60 s

  • name distribution (real zones)

– small zone with wildcard (50 names + 1 wildcard) – medium size zone (14k names) – big zone (110k names) – huge zone (1M names)

slide-15
SLIDE 15

R.S.A.: unsigned zone (abs baseline)

cache size: 19.2 GB

slide-16
SLIDE 16

R.S.A.: unsigned zone (baseline %)

cache size: 100 %

slide-17
SLIDE 17

R.S.A.: 50 names + wildcard, TTL 60

cache size: 0.0006 %

slide-18
SLIDE 18

R.S.A.: 14k names, TTL 3600

cache size: 0.004 %

slide-19
SLIDE 19

R.S.A.: 110k names, TTL 3600

cache size: 0.13 %

slide-20
SLIDE 20

R.S.A.: 110k names, TTL 3600

cache size: 0.13 %

slide-21
SLIDE 21

R.S.A.: 110k names, TTL 3600

cache size: 0.13 %

slide-22
SLIDE 22

R.S.A.: 1M names, TTL 3600

cache size: 0.56 %

slide-23
SLIDE 23

R.S.A.: 1M names, TTL 3600

cache size: 0.56 %

slide-24
SLIDE 24

R.S.A.: 1M names, TTL 3600

cache size: 0.56 %

slide-25
SLIDE 25

R.S.A.: 1M names, TTL 3600

cache size: 0.56 %

slide-26
SLIDE 26

R.S.A.: 1M names, TTL 60

cache size: 0.53 %

slide-27
SLIDE 27

R.S.A.: 1M names, TTL 60

cache size: 0.53 %

slide-28
SLIDE 28

Promises & R.S.A. traffic

  • ☑ Much better cache usage
  • ☑ Significantly lower network utilization
  • Eliminates R.S.A. traffic (over time)
  • NSEC is more efficient than NSEC 3
  • RSA 2048 b NSEC 3 => 150 % size of NSEC
  • NSEC & NSEC 3 provide effective protection
  • NSEC 3 not supported by resolvers yet
slide-29
SLIDE 29

Upgrade, sign, VALIDATE

  • ☑ Privacy protection (leaked queries)
  • ☑ Protection from random subdomain attacks
  • ☑ Avoids problems with EDNS
  • EDNS workaround sunset in 2019
slide-30
SLIDE 30

Knot news for summer 2018

  • Knot DNS 2.7
  • Performance
  • ptimizations
  • Security audit
  • DNS cookies
  • Knot Resolver 2.4
  • NSEC 3 support for

aggressive cache follow @KnotDNS