SlideShare a Scribd company logo
1 of 64
Download to read offline
Security challenges in
                 DNS

                  Philippe Camacho
          Department of Computer Science
                        University of Chile



    Workshop on Formal Methods in Cryptography
             27-30 april 2009 / Campinas - Brazil
Outline

 DNS

 DNSSEC
   Basics
   Key Rollover
   Problems and Limitations

 How to improve the Security of DNS?
   Threshold Cryptography
   Identity Based Cryptography
DNS
A (brief) history
 ARPANET in the 70’s
   Small, friendly network of a few hundreds of hosts.
   A centralized HOSTS.TXT file was used to map host
   names to network adresses.
   This file was updated once or twice a week.


 BUT, with the growth of ARPANET this scheme
 became unpracticable
   Traffic Load
   Name Collision
   Consistency
DNS
Basics
 Domain Name System (DNS)

  Maps IP adresses to human friendly computer hostnames
   www.google.com        64.233.163.104

  But also manages other type of information such as the list
  of mail servers associated to a domain

  Distributed, Replicated, Fault Tolerant

  Developped by the IETF (Internet Engineering Task Force)
  at the beginning of 1980’s
DNS
Domain Namespace
                    root




        cl                 edu           mil           org



     uchile
                                      .cl DOMAIN

                                 Domain contains information called
              dcc                Resource Records (RR). For
                                 example the IP address associated to
                                 www.dcc.uchile.cl
DNS
Name servers and Zones
                             /




                cl               edu   mil           org



              uchile
                                                    NAME SERVER
                                                       of the
                                                    ZONE uchile.cl

 ingenieria     dim    dcc


                                             Delegation
DNS
Name servers and Zones
                             /




                cl               edu   com        org



              uchile
                                                NAME SERVER
                                                     of the
                                                    ZONE
                                                   uchile.cl
                                                + dcc.uchile.cl
 ingenieria     dim    dcc


                                         Delegation
DNS
Type of Resource Records (RR)


  A     Host Addresses


 PTR    Reverse address name mapping


CNAME   Aliases


  MX    Mail exchange for the domain


  NS    Authoritative Name Servers
DNS
Resolvers and Name Resolution
   Clients that access name servers



                 www.google.com?
                                                 Name
                  64.233.163.104                 Space


                                   Name server
Resolver
                                   200.1.123.4
My assigned
name server is
200.1.123.4
DNS
Resolving Algorithms
                                                                          /
        Iterative

                               Resolver                                         .cl

                                               l?
                                             .c          3.
                                                           4
                                                      .12
                                                   .1
                                                 00            ?
                                                2
                                                            cl
                                                       hile.
                                                    .uc      .70
                                                                .3
                                                                 9
www.dcc.uchile.cl ?   192.80.24.4                          0.8
                                                         20
                                                                              .uchile.cl
                                                            ile.cl ?
                                                     dcc.uch
                                                                   .2
                                                          192.80.24


                                          www.dcc.uc
                                                    hile.cl ?
                                                     192.80
                                                           .2    4.4
                                                                        .dcc.uchile.cl
              Name Server
DNS
Resolving Algorithms
        Recursive
                                                                                              ww
                                                                                                 w.
                                                                                                    go
                                                                                                           og
                                                                                                                le.
                                                                                                                    co
                            Resolver                                                                                     m
                                                                                                                             ?


                                                                                  64.233.163.147

                                                                   ?
                                                              om
                                                            .c
                                                          le




                                                                                                                         www.goog
                                                 o   og
                                              .g                                           64.233.163.147
                                          w
                                         w                                  7
                                     w                                   14
 www.google.com ?   64.233.163.147                                   63.
                                                                   .1




                                                                                                                             le.com ?
                                                                 33                ww
                                                              .2
                                                           64                           w.
                                                                                          go
                                                                                            og
                                                                                              le.
                                                                                                  co
                                                                                                       m
                                                                                                           ?
                                                                                64.233
                                                                                      .163.1
                                                                                            47




             Name Server
DNS
Caching
 DNS uses cache to improve performance
  e.g: In the case of iterative resolving
    What is the IP for www.dcc.uchile.cl?
    I know the IP for the name server of the zone
    uchile.cl.
    I can ask this server directly without starting from the
    root.
  Time To Live (TTL)
    Tradeoff between consistency and efficiency
DNS
Attacks
 Many attacks on the DNS (references)
   Man in the Middle
   Cache poisoning
   (Distributed) Denial of Service

 Major problem
   Lack of integrity / authenticity

 Consequences are HUGE
   Phishing
   Defacements
   Internet is down
DNS
Attacks
 Man in the Middle


          www.bigcompany.com? (1)

                   192.5.6.99 (True IP)

                             (3) (Too late)
          (2
            )(
                 Ev
                   il
                        ar
            1.            ri v
              2.
                3.            es
                  4                fir
                                      st
                                         )
DNS
Attacks
 Cache Poisoning (AlterNIC 1997)
       ww
          w.s
              o  me
                      site
                          .co
                              m?
             1. 2                ( 5)
    (6)           .3.4
        (Fro
            mc                           www.somesite.com? (2)
                   ach
                       e)
                                            200.3.4.5
                             1)
                           ?(
                         om                (4) Too late again…
               sit    e.c
            ome
        w.s                        ter
      ww            .3.
                       4        as
                1 .2         sf
                      E vil’
                 (3)
DNS
Attacks
 (Distributed) Denial of Service

   Such as every internet service, DNS is exposed to (D)DoS

   However the specificity of the protocol allows
   amplification attacks

   (D)DoS is really hard to avoid
     As we shall see DNSSEC do not pretend to solve this
     problem and could possibly make it worse…
DNS
Attacks
 A new attack [Kaminsky 08]

   Presented at Black Hat 2008

   Previous attack only allows to forge only one (url,ip)
   mapping.

   Kaminsky’s attack is far more devastating
     Allows to control a whole domain (.cl)

   This is scary…
     Many certificate authorities validate a user’s certificate by
     sending an email… So in this case even SSL is useless!
DNS
Attacks
    The Attack [Kaminsky 08]                                                            /
    (basic idea)

                                       Resolver                                                .cl
                                                                                    )
                                                                                  te
                                                                               la
                                                                          oo
                                                       l?              (T
                                                     .c          3.
                                                                   4
                                                              .12
                                                           .1
                                                         00            ?
                                                        2
                                                                    cl
                                                               hile.
                                                            .uc           2
                                                                       .3.
   www.dcc.uchile.cl ?       1.2.3.4                             1.2
                                                                                             .uchile.cl
                                                                    ile.cl ?
                                                             dcc.uch

                   l                                              1.2.3.3
                t.c
             xis
          ote                                     www.dcc.uc
       esn                                                  hile.cl ?
    .do
 ww
w                                                            1.2.3.4                    .dcc.uchile.cl
           1.2.3.1 (First)
DNSSEC
Basics
What it is for?
  Authenticate data exchanged between the
  participants of the protocol


What it is NOT for?
  Guarantee privacy (except for NSEC3)
  Ensure availability
DNSSEC
Basics
Core RFCs that describe DNSSEC
  DNS Security Introduction and Requirements (4033)
  Resource Records for the DNS Security Extensions (4034)
  Protocol Modifications for the DNS Security Extensions (4035)



Another important RFC
  DNSSEC Operational Practices (4641)


Web
  http://www.dnssec.net
DNSSEC
Basics
                             /




                cl           edu   mil            org


                                   • Every zone signs the public
              uchile               key of its children
                                   • The public key of the root is
                                   preinstalled in nameserver.
                                   • Every message (resource
 ingenieria     dim    dcc         record) is signed by its
                                   author.
DNSSEC
Resolution & Verification
                                                                                               /
         Iterative

                                Resolver                                                             .cl
     NS1
                                                                         .cl
                                                l?
                                              .c          3.
                                                            4
                                                       .12
                                                    .1
                                                  00            ?
                                                 2
                                                             cl
                                                        hile.
                                                     .uc      .70
                                                                9
                                                                 .3             uchile.cl
 www.dcc.uchile.cl ?   192.80.24.4                          0.8
                                                          20
                                                                                                   .uchile.cl
                                                             ile.cl ?
                                                      dcc.uch
                                                                    .2
                                                           192.80.24           dcc.uchile.cl

               /                           www.dcc.uc
                                                     hile.cl ?
                                                      192.80
                                                            .2   4.4
                                                                                            .dcc.uchile.cl
               Name Server NS1
DNSSEC
Resolution & Verification
        Recursive                                                                   NS2             NS3

                                                                                               ww
                                                                                                  w.
                                                                                                     go
                                                                                                            og
                                                                                                                 le.
                                                                                                                     co
                              Resolver                                                                                    m
                                                                                                                              ?

    NS1
                                                                                   64.233.163.147                                        NS3

                                                              ?
                                                         om
                                                      e.c
                                                                                                                                           NS4




                                                                                                                          www.goog
                                                    gl
                                                  oo
                                                .g                                          64.233.163.147
                                            w
                                           w                           7
                                       w                            14
 www.google.com ?     64.233.163.147                            63.
                                                              .1




                                                                                                                              le.com ?
                                                            33                      ww
                                                         .2
                                                      64                                 w.
                                                                                           go
                                                                                             og                                          NS4
                                                                                               le.
                                                                                                   co
                                                                                                        m
                                                                                                            ?
                                                                           NS5   64.233
                                                                                       .163.1
                                                                                             47
          NS2


                Name Server NS1                                                                         NS5
DNSSEC
Operational Practices
 Time

  Assumption: global clock.

  Every signed information has a
  limited lifetime.

  This also applies to keys.
DNSSEC
Operational Practices
 Two types of Keys
                                                       KSK
                                            Parent
   Zone Signing Keys (ZSK)
                                                     signs
     Are used to sign all the information
     of the zone                                         ZSK




   Key Signing Keys (KSK)                                ZSK

     Are used to sign the ZSK
                                            Child     signs


   ZSK are used to sign the KSK of the
   child                                               KSK
DNSSEC
Operational Practices
 Motivation of the use of KSK/ZSK

   No parent/child interaction is required when ZSKs are
   updated.

   The KSK can be made stronger.

   KSK is only used to sign a set of keys. It can be stored in a
   safer place.

   KSK have longer effectivity period.
DNSSEC
Operational Practices
 KEY ROLLOVER

  It is necesarry to change the keys
  from time to time

    As to make cryptanalysis harder
    => Scheduled Rollover


    Private keys may be stolen or cracked
    => Unscheduled Rollover
DNSSEC
Operational Practices
 Where can a keyrollover
 occur?                                      /




                                           Parent
      Resolver



                     Warn that
                  NEW PK is available
                     Get NEW PK            Child
  Name Server     Publish NEW public key
DNSSEC
Operational Practices
 Scheduled Key Rollover

   How do name servers/resolvers know this new public key?
     Pre-Publish Key Rollover
     Double Signature Rollover

   ZSK Rollover
     No interaction needed
   KSK Rollover
     Interaction needed between child and parent
DNSSEC
Operational Practices
   ZSK Prepublish Rollover

    initial        New DNSKEY       New Signatures       DNSKEY
                                                         Removal
     KSK               KSK               KSK               KSK

     ZSK1              ZSK1              ZSK1


                       ZSK2              ZSK2              ZSK2

   {ZSK1}KSK         {ZSK1}KSK         {ZSK1}KSK

                     {ZSK2}KSK         {ZSK2}KSK         {ZSK2}KSK

{ZONE_DATA}ZSK1   {ZONE_DATA}ZSK1   {ZONE_DATA}ZSK2   {ZONE_DATA}ZSK2
DNSSEC
Operational Practices
   ZSK Prepublish Rollover

    initial        New DNSKEY       New Signatures       DNSKEY
                                                         Removal
     KSK               KSK               KSK               KSK

     ZSK1              ZSK1              ZSK1


                       ZSK2              ZSK2              ZSK2

   {ZSK1}KSK         {ZSK1}KSK         {ZSK1}KSK

                     {ZSK2}KSK         {ZSK2}KSK         {ZSK2}KSK

{ZONE_DATA}ZSK1   {ZONE_DATA}ZSK1   {ZONE_DATA}ZSK2   {ZONE_DATA}ZSK2
DNSSEC
Operational Practices
   ZSK Prepublish Rollover

    initial        New DNSKEY       New Signatures       DNSKEY
                                                         Removal
     KSK               KSK               KSK               KSK

     ZSK1              ZSK1              ZSK1


                       ZSK2              ZSK2              ZSK2

   {ZSK1}KSK         {ZSK1}KSK         {ZSK1}KSK

                     {ZSK2}KSK         {ZSK2}KSK         {ZSK2}KSK

{ZONE_DATA}ZSK1   {ZONE_DATA}ZSK1   {ZONE_DATA}ZSK2   {ZONE_DATA}ZSK2
DNSSEC
Operational Practices
   ZSK Prepublish Rollover

    initial        New DNSKEY       New Signatures       DNSKEY
                                                         Removal
     KSK               KSK               KSK               KSK

     ZSK1              ZSK1              ZSK1


                       ZSK2              ZSK2              ZSK2

   {ZSK1}KSK         {ZSK1}KSK         {ZSK1}KSK

                     {ZSK2}KSK         {ZSK2}KSK         {ZSK2}KSK

{ZONE_DATA}ZSK1   {ZONE_DATA}ZSK1   {ZONE_DATA}ZSK2   {ZONE_DATA}ZSK2
DNSSEC
Operational Practices
 ZSK Double Signature Rollover
       initial        New DNSKEY       DNSKEY Removal

        KSK               KSK               KSK

        ZSK1              ZSK1


                          ZSK2              ZSK2

      {ZSK1}KSK         {ZSK1}KSK

                        {ZSK2}KSK         {ZSK2}KSK

   {ZONE_DATA}ZSK1   {ZONE_DATA}ZSK1

                     {ZONE_DATA}ZSK2   {ZONE_DATA}ZSK2
DNSSEC
Operational Practices
 ZSK Double Signature Rollover
       initial        New DNSKEY       DNSKEY Removal

        KSK               KSK               KSK

        ZSK1              ZSK1


                          ZSK2              ZSK2

      {ZSK1}KSK         {ZSK1}KSK

                        {ZSK2}KSK         {ZSK2}KSK

   {ZONE_DATA}ZSK1   {ZONE_DATA}ZSK1

                     {ZONE_DATA}ZSK2   {ZONE_DATA}ZSK2
DNSSEC
Operational Practices
 ZSK Double Signature Rollover
       initial        New DNSKEY       DNSKEY Removal

        KSK               KSK               KSK

        ZSK1              ZSK1


                          ZSK2              ZSK2

      {ZSK1}KSK         {ZSK1}KSK

                        {ZSK2}KSK         {ZSK2}KSK

   {ZONE_DATA}ZSK1   {ZONE_DATA}ZSK1

                     {ZONE_DATA}ZSK2   {ZONE_DATA}ZSK2
DNSSEC
Operational Practices
 Pros and Cons

  Prepublish Key Rollover
    + Does not involve signing all the zone data twice.
    - Process requires 4 steps.

  Double Signature
    + Process requires 3 steps.
    - The number of signatures in the zone doubles.
    Prohibitive for big zones.
DNSSEC
Operational Practices
 KSK Rollover

   Same idea
     Now the data to sign are (zone signing) keys


   However
     Double Signature Rollover seems better as the data signed
     is only a set of key
     The child needs to warn the parent securely that the keys
     have changed.
       The way to do this is left to the DNSSEC administrators.
DNSSEC
Operational Practices
 Unscheduled Key Rollover

  PANIC!

    “An authenticated out-of-band and secure
    notify mechanism to contact parent is needed
    in this case.” (RFC 4641)
DNSSEC
Operational Practices
 Unscheduled Key Rollover
  Keep the chain of trust intact
    Resign with the compromised key the new set of keys with a very
    short lifetime, then make a rollover
    Problem: DOMAIN DISPUTE
       The adversary controls the compromised key, so he can also make a
       keyrollover…
       At the end who should we believe?


  Break the chain of trust
    Say to the clients that there is a problem
    Fix the problem
    Interact with the clients to distribute the new public key
    Problem: DNSSEC is down for a while
NSEC 3
 DNSSEC
   not only provides an authenticated mapping between IP
   and domains
   but also provides proofs of non existence (membership)
     e.g: Q: www.doesnotexist.com ?
          A: this domain does not exist
 For efficiency
   As to avoid signing dynamically the response the
   consecutive pair of domains ordered in alphabetic order
   are signed. All proofs are precomputed.
   [a.com, c.com], [c.com, e.com], [e.com,g.com], [g.com,z.com]
   hello.com does not exist      g.com < hello.com < z.com
NSEC 3
 Problem: Zone Walking
  An attacker can collect all the domains of a zone,
  by asking for domain that lies inside of every
  succesive intervals.
  Is that a problem? After all the information is
  public…
  Yes but in some case knowing all the domain
  names for a given level can be a useful
  information to build an attack for example.
NSEC 3
 Solution
   Applying a hash function H to the domain names
   as to hide the information of the domain and still
   be able get nonmembership proofs.
      a.com          c.com          e.com       g.com       z.com




  H(c.com)    H(a.com)   H(z.com)    H(g.com)    H(e.com)

                                                    H(hello.com)
DNSSEC
Problems and Limitations
 First proposal 1999 (RFC 2535) but
 still no current implementation at root level 2009

 Only a few of the Top Level Domains
 (.com, .org, countries…) run DNSSEC
    Chile is working hard at this moment to implement it!

 Why?
   Who signs the root?
   Practical Experiences (Netherlands,…) have been painful
   DNSSEC is complex
   People may not see the immediate benefit
   …
DNSSEC
Problems and Limitations
    DNSSEC is a “Non End to End” Protocol



                              End to End Protocol: SSH
 The end user does NOT
know whether the chain of
  trust has been broken!




                            Non End to End Protocol: DNSSEC
DNSSEC
Problems and Limitations
 How to set the public keys life-time?

   Too big => gives more time to the Adversary

   Too short => inefficient
     Need to rollover key very often
DNSSEC
Problems and Limitations
 How to detect (automaticaly) that a private key has
 been stolen?

   Users generally don’t notice they have been victim of a
   phishing attack.

   Defacement
     When obtained by DNS cache poisoning, the owner of the
     website is not aware of it.

 So in practice can we really detect that
 a key has been compromised?
DNSSEC
Problems and Limitations
 Key Rollover/Revocation Problem

   There is no real satisfactory solution for Key Revocation

   Key Rollver is complex

   Lack of specification

     No precise procedure in case of key compromise.
     How does the child warn its parent?
How to improve the Security of
DNS?
 There is no definition for the Adversary

   What can or cannot do the adversary
    Steal private keys?
    Only forge some signatures?
    Intercept any packet?
    Control a DNS Name Server?
    Create a Zone / Domain?
        Injection attack in Registrars Databases
    …
How to improve the Security of
DNS?
 Use of Threshold Cryptography
 [Cachin, Samar 04]

   What is Threshold Cryptography (very short)?
    N participants
    T participants can jointly sign
    T-1 participant cannot do anything
       =>Adversary must control T servers to perform an attack



                                                  N=4
                                    T=2 participants required to sign
How to improve the Security of
DNS?
 Use of Threshold Cryptography
 [Cachin, Samar 04]

    Concrete proposal
       They use standard RSA signature
       Need to change the server implementation but not the client
       Benchmark

    Stealing private key is harder
       It can be effective against internal attacks.

    However
       If the servers that hold the share have got the same configuration, a same
       vulnerability can be enough to compromise all the servers.
       More Complex
How to improve the Security of
DNS?
 Identity Based Cryptography [Chan 03]

  Master Thesis work.

  Analyzes the possibilty to use IBC to improve the
  security of DNS instead of using standard public
  key cryptography.

  Original approach to solve this problem.
IBC
 Idea

  A Trusted Authority (TA) generates (SK,PK) and
  distributes securely the private keys to every
  participant.

  Then the TA publishes a public key PK

  The public key of every participant can be
  computed from PK and a public information
      Email, Name, Passport Number, Biometric data
DNS with IBC

 [Shamir, 84]
 First introduction of the concept.

 [Boneh,Franklin 01]
 First efficient scheme for IBC using bilinear maps.

 Many other works, this is a very active field.
IBC

 Advantages

  No need to store public keys

  No need to sign/verify public keys

  No need to manage certificates
DNS with IBC
 Problem: Key Escrow

  The TA knows (generates) all the private keys of
  users.

  Is that really a problem?

  ANSWER
    NO: in our setting, a parent can always create new
    children with their respective private keys.
DNS with IBC
 Key Rollover
  Add timestamp to the identity
    dcc.uchile.cl || 28-4-2009::29-4-2009


 Key Revocation
  Still hard
    We could use a database of revocated keys but we
    would loose the good properties of IBC…
DNS with IBC
 Problem of scalability
   A single authority has to generate all the private
   keys. This is not reasonable in the case of DNS.


 Solution
   Use of Hierchical Identity Based Cryptography
     The private key generation can be delegated to
     subauthorities [Gentry, Silverberg 02]
DNS with HIBC
                            ID1: root




              ID2:cl           edu       mil        org



            ID3:uchile
                               ID1      ID2     ID3       ID4
                               root      cl    uchile     dcc

  ID4:dcc      ingenieria
DNS with HIBC
 How to sign?
      ID1       ID2             ID3             ID4        ID5
      root      cl             uchile           dcc   192.4.5.7


                          PKA                SKA



             PKB                 SKB    = {192.4.5.7}SKA


                      Verification process
                      (1) R random
                      (2) C = Encrypt(PKB,R)
                      (3) R’ = Decrypt(SKB,C)
                      (4) R = R’ ?
DNS with HIBC
 Efficiency

   The size of a signature grows linearly in the
   depth of the hierarchy.

   So we do not win to much (even we may loose)
   compared to the classical DNSSEC verification
   procedure.
DNS with HIBC
 So at the end, is HIBC useful?

   HIBC has attractive properties
      No need to manage public key/certificates
      Simplifies the scheduled key rollover

   However some problems remain unsolved
      Key revocation (unscheduled key rollover)
      Verification time proportional to the depth of the domain name
      tree.
      Not clear that how to adapt the Recursive Resolving Algorithm
      In practice developping standards for pairings and HIBC takes
      time.
Conclusion
 DNS is essential for Internet

 DNS is not secure and this is a big problem

 DNSSEC adds integrity/authenticity to DNS

 DNSSEC raises some practical problems
   Key Rollover
   All or Nothing security / Not Point to Point
   Administrative problem: who signs the root?

 But DNSSEC is to the date the only concrete proposal to make
 DNS more secure. Can we do better?
have.you.got.any.question

More Related Content

What's hot

Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02gameaxt
 
Active directory domain service
Active directory domain serviceActive directory domain service
Active directory domain serviceFestus Oriaku
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name SystemPeter R. Egli
 
Credential store using HashiCorp Vault
Credential store using HashiCorp VaultCredential store using HashiCorp Vault
Credential store using HashiCorp VaultMayank Patel
 
What is active directory
What is active directoryWhat is active directory
What is active directoryAdeel Khurram
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and applicationaminpathan11
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and securityMichael Earls
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSAlex Mayrhofer
 
Docker Networking Deep Dive
Docker Networking Deep DiveDocker Networking Deep Dive
Docker Networking Deep DiveDocker, Inc.
 
Redis vs Infinispan | DevNation Tech Talk
Redis vs Infinispan | DevNation Tech TalkRedis vs Infinispan | DevNation Tech Talk
Redis vs Infinispan | DevNation Tech TalkRed Hat Developers
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDSHarsh Sethi
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptxAdiWidyanto2
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxMeriemBalhaddad
 
Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016
Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016
Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016Amazon Web Services
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptxsyedasadraza13
 
NGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX, Inc.
 

What's hot (20)

Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02
 
Active directory domain service
Active directory domain serviceActive directory domain service
Active directory domain service
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
DNS Attacks
DNS AttacksDNS Attacks
DNS Attacks
 
Credential store using HashiCorp Vault
Credential store using HashiCorp VaultCredential store using HashiCorp Vault
Credential store using HashiCorp Vault
 
What is active directory
What is active directoryWhat is active directory
What is active directory
 
Active directory and application
Active directory and applicationActive directory and application
Active directory and application
 
DNS over HTTPS
DNS over HTTPSDNS over HTTPS
DNS over HTTPS
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
Mcse 2012
Mcse 2012Mcse 2012
Mcse 2012
 
Docker Networking Deep Dive
Docker Networking Deep DiveDocker Networking Deep Dive
Docker Networking Deep Dive
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Redis vs Infinispan | DevNation Tech Talk
Redis vs Infinispan | DevNation Tech TalkRedis vs Infinispan | DevNation Tech Talk
Redis vs Infinispan | DevNation Tech Talk
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx02-Active Directory Domain Services.pptx
02-Active Directory Domain Services.pptx
 
Active-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptxActive-Directory-Domain-Services.pptx
Active-Directory-Domain-Services.pptx
 
Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016
Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016
Amazon RDS with Amazon Aurora | AWS Public Sector Summit 2016
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptx
 
NGINX: High Performance Load Balancing
NGINX: High Performance Load BalancingNGINX: High Performance Load Balancing
NGINX: High Performance Load Balancing
 

Viewers also liked

Scalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsScalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsJonas Bonér
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecuritySam Bowne
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name SystemChinmay Joshi
 
facebook architecture for 600M users
facebook architecture for 600M usersfacebook architecture for 600M users
facebook architecture for 600M usersJongyoon Choi
 
From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.Taras Matyashovsky
 
LinkedIn - A Professional Network built with Java Technologies and Agile Prac...
LinkedIn - A Professional Network built with Java Technologies and Agile Prac...LinkedIn - A Professional Network built with Java Technologies and Agile Prac...
LinkedIn - A Professional Network built with Java Technologies and Agile Prac...LinkedIn
 
Etsy Activity Feeds Architecture
Etsy Activity Feeds ArchitectureEtsy Activity Feeds Architecture
Etsy Activity Feeds ArchitectureDan McKinley
 
Big Data in Real-Time at Twitter
Big Data in Real-Time at TwitterBig Data in Real-Time at Twitter
Big Data in Real-Time at Twitternkallen
 
Dns security overview
Dns security overviewDns security overview
Dns security overviewVladimir2003
 
Hazelcast
HazelcastHazelcast
Hazelcastoztalip
 
From distributed caches to in-memory data grids
From distributed caches to in-memory data gridsFrom distributed caches to in-memory data grids
From distributed caches to in-memory data gridsMax Alexejev
 
Domain Name Server
Domain Name ServerDomain Name Server
Domain Name Servervipulvaid
 
Presentation on dns
Presentation on dnsPresentation on dns
Presentation on dnsAnand Grewal
 

Viewers also liked (15)

Scalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsScalability, Availability & Stability Patterns
Scalability, Availability & Stability Patterns
 
Morning at Lohika
Morning at LohikaMorning at Lohika
Morning at Lohika
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS Security
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
facebook architecture for 600M users
facebook architecture for 600M usersfacebook architecture for 600M users
facebook architecture for 600M users
 
From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.
 
LinkedIn - A Professional Network built with Java Technologies and Agile Prac...
LinkedIn - A Professional Network built with Java Technologies and Agile Prac...LinkedIn - A Professional Network built with Java Technologies and Agile Prac...
LinkedIn - A Professional Network built with Java Technologies and Agile Prac...
 
Etsy Activity Feeds Architecture
Etsy Activity Feeds ArchitectureEtsy Activity Feeds Architecture
Etsy Activity Feeds Architecture
 
Big Data in Real-Time at Twitter
Big Data in Real-Time at TwitterBig Data in Real-Time at Twitter
Big Data in Real-Time at Twitter
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
Dns security overview
Dns security overviewDns security overview
Dns security overview
 
Hazelcast
HazelcastHazelcast
Hazelcast
 
From distributed caches to in-memory data grids
From distributed caches to in-memory data gridsFrom distributed caches to in-memory data grids
From distributed caches to in-memory data grids
 
Domain Name Server
Domain Name ServerDomain Name Server
Domain Name Server
 
Presentation on dns
Presentation on dnsPresentation on dns
Presentation on dns
 

Similar to Security of DNS

Similar to Security of DNS (12)

Introduction
IntroductionIntroduction
Introduction
 
Chapter 9 slides
Chapter 9 slidesChapter 9 slides
Chapter 9 slides
 
Hands-on DNSSEC Deployment
Hands-on DNSSEC DeploymentHands-on DNSSEC Deployment
Hands-on DNSSEC Deployment
 
DNS.pptx
DNS.pptxDNS.pptx
DNS.pptx
 
Dns
DnsDns
Dns
 
6065165.ppt
6065165.ppt6065165.ppt
6065165.ppt
 
6425 b 10
6425 b 106425 b 10
6425 b 10
 
Dns
DnsDns
Dns
 
Network and System Administration chapter 2
Network and System Administration chapter 2Network and System Administration chapter 2
Network and System Administration chapter 2
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)
 
Domain name system(dns)
Domain name system(dns)Domain name system(dns)
Domain name system(dns)
 

More from Philippe Camacho, Ph.D.

Blockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new worldBlockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new worldPhilippe Camacho, Ph.D.
 
Bitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y OportunidadesBitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y OportunidadesPhilippe Camacho, Ph.D.
 
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...Philippe Camacho, Ph.D.
 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant HashingPhilippe Camacho, Ph.D.
 
Fair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyFair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyPhilippe Camacho, Ph.D.
 
On the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic AccumulatorsOn the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic AccumulatorsPhilippe Camacho, Ph.D.
 
Short Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed TreesShort Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed TreesPhilippe Camacho, Ph.D.
 
Strong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant HashingStrong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant HashingPhilippe Camacho, Ph.D.
 

More from Philippe Camacho, Ph.D. (20)

Blockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new worldBlockchain: 12 predictions for a new world
Blockchain: 12 predictions for a new world
 
Bitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y OportunidadesBitcoin, Blockchain y más allá: Riesgos y Oportunidades
Bitcoin, Blockchain y más allá: Riesgos y Oportunidades
 
Analyzing Bitcoin Security
Analyzing Bitcoin SecurityAnalyzing Bitcoin Security
Analyzing Bitcoin Security
 
Smart contracts
Smart contractsSmart contracts
Smart contracts
 
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
Cuando las maquinas deciden por nosotros: introducción a los contratos inteli...
 
Bitcoin y (in)seguridad: 5 paradojas
Bitcoin y (in)seguridad: 5 paradojasBitcoin y (in)seguridad: 5 paradojas
Bitcoin y (in)seguridad: 5 paradojas
 
No más Madoff: Satoshi al rescate
No más Madoff: Satoshi al rescateNo más Madoff: Satoshi al rescate
No más Madoff: Satoshi al rescate
 
Protocols for Provable Solvency
Protocols for Provable SolvencyProtocols for Provable Solvency
Protocols for Provable Solvency
 
Más allá del dinero: Bitcoin
Más allá del dinero: BitcoinMás allá del dinero: Bitcoin
Más allá del dinero: Bitcoin
 
Introducción a Bitcoin
Introducción a BitcoinIntroducción a Bitcoin
Introducción a Bitcoin
 
How to explain bitcoin to your mother
How to explain bitcoin to your motherHow to explain bitcoin to your mother
How to explain bitcoin to your mother
 
Predicate-Preserving Collision-Resistant Hashing
Predicate-Preserving  Collision-Resistant HashingPredicate-Preserving  Collision-Resistant Hashing
Predicate-Preserving Collision-Resistant Hashing
 
Cuidatusbitcoins
CuidatusbitcoinsCuidatusbitcoins
Cuidatusbitcoins
 
Fair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyFair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third Party
 
Foaf+ssl
Foaf+sslFoaf+ssl
Foaf+ssl
 
Agilidad al rescate
Agilidad al rescateAgilidad al rescate
Agilidad al rescate
 
XPDay2009: Nameaction
XPDay2009: NameactionXPDay2009: Nameaction
XPDay2009: Nameaction
 
On the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic AccumulatorsOn the Impossibility of Batch Update for Cryptographic Accumulators
On the Impossibility of Batch Update for Cryptographic Accumulators
 
Short Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed TreesShort Transitive Signatures For Directed Trees
Short Transitive Signatures For Directed Trees
 
Strong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant HashingStrong Accumulators From Collision-Resistant Hashing
Strong Accumulators From Collision-Resistant Hashing
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Security of DNS

  • 1. Security challenges in DNS Philippe Camacho Department of Computer Science University of Chile Workshop on Formal Methods in Cryptography 27-30 april 2009 / Campinas - Brazil
  • 2. Outline DNS DNSSEC Basics Key Rollover Problems and Limitations How to improve the Security of DNS? Threshold Cryptography Identity Based Cryptography
  • 3. DNS A (brief) history ARPANET in the 70’s Small, friendly network of a few hundreds of hosts. A centralized HOSTS.TXT file was used to map host names to network adresses. This file was updated once or twice a week. BUT, with the growth of ARPANET this scheme became unpracticable Traffic Load Name Collision Consistency
  • 4. DNS Basics Domain Name System (DNS) Maps IP adresses to human friendly computer hostnames www.google.com 64.233.163.104 But also manages other type of information such as the list of mail servers associated to a domain Distributed, Replicated, Fault Tolerant Developped by the IETF (Internet Engineering Task Force) at the beginning of 1980’s
  • 5. DNS Domain Namespace root cl edu mil org uchile .cl DOMAIN Domain contains information called dcc Resource Records (RR). For example the IP address associated to www.dcc.uchile.cl
  • 6. DNS Name servers and Zones / cl edu mil org uchile NAME SERVER of the ZONE uchile.cl ingenieria dim dcc Delegation
  • 7. DNS Name servers and Zones / cl edu com org uchile NAME SERVER of the ZONE uchile.cl + dcc.uchile.cl ingenieria dim dcc Delegation
  • 8. DNS Type of Resource Records (RR) A Host Addresses PTR Reverse address name mapping CNAME Aliases MX Mail exchange for the domain NS Authoritative Name Servers
  • 9. DNS Resolvers and Name Resolution Clients that access name servers www.google.com? Name 64.233.163.104 Space Name server Resolver 200.1.123.4 My assigned name server is 200.1.123.4
  • 10. DNS Resolving Algorithms / Iterative Resolver .cl l? .c 3. 4 .12 .1 00 ? 2 cl hile. .uc .70 .3 9 www.dcc.uchile.cl ? 192.80.24.4 0.8 20 .uchile.cl ile.cl ? dcc.uch .2 192.80.24 www.dcc.uc hile.cl ? 192.80 .2 4.4 .dcc.uchile.cl Name Server
  • 11. DNS Resolving Algorithms Recursive ww w. go og le. co Resolver m ? 64.233.163.147 ? om .c le www.goog o og .g 64.233.163.147 w w 7 w 14 www.google.com ? 64.233.163.147 63. .1 le.com ? 33 ww .2 64 w. go og le. co m ? 64.233 .163.1 47 Name Server
  • 12. DNS Caching DNS uses cache to improve performance e.g: In the case of iterative resolving What is the IP for www.dcc.uchile.cl? I know the IP for the name server of the zone uchile.cl. I can ask this server directly without starting from the root. Time To Live (TTL) Tradeoff between consistency and efficiency
  • 13. DNS Attacks Many attacks on the DNS (references) Man in the Middle Cache poisoning (Distributed) Denial of Service Major problem Lack of integrity / authenticity Consequences are HUGE Phishing Defacements Internet is down
  • 14. DNS Attacks Man in the Middle www.bigcompany.com? (1) 192.5.6.99 (True IP) (3) (Too late) (2 )( Ev il ar 1. ri v 2. 3. es 4 fir st )
  • 15. DNS Attacks Cache Poisoning (AlterNIC 1997) ww w.s o me site .co m? 1. 2 ( 5) (6) .3.4 (Fro mc www.somesite.com? (2) ach e) 200.3.4.5 1) ?( om (4) Too late again… sit e.c ome w.s ter ww .3. 4 as 1 .2 sf E vil’ (3)
  • 16. DNS Attacks (Distributed) Denial of Service Such as every internet service, DNS is exposed to (D)DoS However the specificity of the protocol allows amplification attacks (D)DoS is really hard to avoid As we shall see DNSSEC do not pretend to solve this problem and could possibly make it worse…
  • 17. DNS Attacks A new attack [Kaminsky 08] Presented at Black Hat 2008 Previous attack only allows to forge only one (url,ip) mapping. Kaminsky’s attack is far more devastating Allows to control a whole domain (.cl) This is scary… Many certificate authorities validate a user’s certificate by sending an email… So in this case even SSL is useless!
  • 18. DNS Attacks The Attack [Kaminsky 08] / (basic idea) Resolver .cl ) te la oo l? (T .c 3. 4 .12 .1 00 ? 2 cl hile. .uc 2 .3. www.dcc.uchile.cl ? 1.2.3.4 1.2 .uchile.cl ile.cl ? dcc.uch l 1.2.3.3 t.c xis ote www.dcc.uc esn hile.cl ? .do ww w 1.2.3.4 .dcc.uchile.cl 1.2.3.1 (First)
  • 19. DNSSEC Basics What it is for? Authenticate data exchanged between the participants of the protocol What it is NOT for? Guarantee privacy (except for NSEC3) Ensure availability
  • 20. DNSSEC Basics Core RFCs that describe DNSSEC DNS Security Introduction and Requirements (4033) Resource Records for the DNS Security Extensions (4034) Protocol Modifications for the DNS Security Extensions (4035) Another important RFC DNSSEC Operational Practices (4641) Web http://www.dnssec.net
  • 21. DNSSEC Basics / cl edu mil org • Every zone signs the public uchile key of its children • The public key of the root is preinstalled in nameserver. • Every message (resource ingenieria dim dcc record) is signed by its author.
  • 22. DNSSEC Resolution & Verification / Iterative Resolver .cl NS1 .cl l? .c 3. 4 .12 .1 00 ? 2 cl hile. .uc .70 9 .3 uchile.cl www.dcc.uchile.cl ? 192.80.24.4 0.8 20 .uchile.cl ile.cl ? dcc.uch .2 192.80.24 dcc.uchile.cl / www.dcc.uc hile.cl ? 192.80 .2 4.4 .dcc.uchile.cl Name Server NS1
  • 23. DNSSEC Resolution & Verification Recursive NS2 NS3 ww w. go og le. co Resolver m ? NS1 64.233.163.147 NS3 ? om e.c NS4 www.goog gl oo .g 64.233.163.147 w w 7 w 14 www.google.com ? 64.233.163.147 63. .1 le.com ? 33 ww .2 64 w. go og NS4 le. co m ? NS5 64.233 .163.1 47 NS2 Name Server NS1 NS5
  • 24. DNSSEC Operational Practices Time Assumption: global clock. Every signed information has a limited lifetime. This also applies to keys.
  • 25. DNSSEC Operational Practices Two types of Keys KSK Parent Zone Signing Keys (ZSK) signs Are used to sign all the information of the zone ZSK Key Signing Keys (KSK) ZSK Are used to sign the ZSK Child signs ZSK are used to sign the KSK of the child KSK
  • 26. DNSSEC Operational Practices Motivation of the use of KSK/ZSK No parent/child interaction is required when ZSKs are updated. The KSK can be made stronger. KSK is only used to sign a set of keys. It can be stored in a safer place. KSK have longer effectivity period.
  • 27. DNSSEC Operational Practices KEY ROLLOVER It is necesarry to change the keys from time to time As to make cryptanalysis harder => Scheduled Rollover Private keys may be stolen or cracked => Unscheduled Rollover
  • 28. DNSSEC Operational Practices Where can a keyrollover occur? / Parent Resolver Warn that NEW PK is available Get NEW PK Child Name Server Publish NEW public key
  • 29. DNSSEC Operational Practices Scheduled Key Rollover How do name servers/resolvers know this new public key? Pre-Publish Key Rollover Double Signature Rollover ZSK Rollover No interaction needed KSK Rollover Interaction needed between child and parent
  • 30. DNSSEC Operational Practices ZSK Prepublish Rollover initial New DNSKEY New Signatures DNSKEY Removal KSK KSK KSK KSK ZSK1 ZSK1 ZSK1 ZSK2 ZSK2 ZSK2 {ZSK1}KSK {ZSK1}KSK {ZSK1}KSK {ZSK2}KSK {ZSK2}KSK {ZSK2}KSK {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK2 {ZONE_DATA}ZSK2
  • 31. DNSSEC Operational Practices ZSK Prepublish Rollover initial New DNSKEY New Signatures DNSKEY Removal KSK KSK KSK KSK ZSK1 ZSK1 ZSK1 ZSK2 ZSK2 ZSK2 {ZSK1}KSK {ZSK1}KSK {ZSK1}KSK {ZSK2}KSK {ZSK2}KSK {ZSK2}KSK {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK2 {ZONE_DATA}ZSK2
  • 32. DNSSEC Operational Practices ZSK Prepublish Rollover initial New DNSKEY New Signatures DNSKEY Removal KSK KSK KSK KSK ZSK1 ZSK1 ZSK1 ZSK2 ZSK2 ZSK2 {ZSK1}KSK {ZSK1}KSK {ZSK1}KSK {ZSK2}KSK {ZSK2}KSK {ZSK2}KSK {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK2 {ZONE_DATA}ZSK2
  • 33. DNSSEC Operational Practices ZSK Prepublish Rollover initial New DNSKEY New Signatures DNSKEY Removal KSK KSK KSK KSK ZSK1 ZSK1 ZSK1 ZSK2 ZSK2 ZSK2 {ZSK1}KSK {ZSK1}KSK {ZSK1}KSK {ZSK2}KSK {ZSK2}KSK {ZSK2}KSK {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK2 {ZONE_DATA}ZSK2
  • 34. DNSSEC Operational Practices ZSK Double Signature Rollover initial New DNSKEY DNSKEY Removal KSK KSK KSK ZSK1 ZSK1 ZSK2 ZSK2 {ZSK1}KSK {ZSK1}KSK {ZSK2}KSK {ZSK2}KSK {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK2 {ZONE_DATA}ZSK2
  • 35. DNSSEC Operational Practices ZSK Double Signature Rollover initial New DNSKEY DNSKEY Removal KSK KSK KSK ZSK1 ZSK1 ZSK2 ZSK2 {ZSK1}KSK {ZSK1}KSK {ZSK2}KSK {ZSK2}KSK {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK2 {ZONE_DATA}ZSK2
  • 36. DNSSEC Operational Practices ZSK Double Signature Rollover initial New DNSKEY DNSKEY Removal KSK KSK KSK ZSK1 ZSK1 ZSK2 ZSK2 {ZSK1}KSK {ZSK1}KSK {ZSK2}KSK {ZSK2}KSK {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK1 {ZONE_DATA}ZSK2 {ZONE_DATA}ZSK2
  • 37. DNSSEC Operational Practices Pros and Cons Prepublish Key Rollover + Does not involve signing all the zone data twice. - Process requires 4 steps. Double Signature + Process requires 3 steps. - The number of signatures in the zone doubles. Prohibitive for big zones.
  • 38. DNSSEC Operational Practices KSK Rollover Same idea Now the data to sign are (zone signing) keys However Double Signature Rollover seems better as the data signed is only a set of key The child needs to warn the parent securely that the keys have changed. The way to do this is left to the DNSSEC administrators.
  • 39. DNSSEC Operational Practices Unscheduled Key Rollover PANIC! “An authenticated out-of-band and secure notify mechanism to contact parent is needed in this case.” (RFC 4641)
  • 40. DNSSEC Operational Practices Unscheduled Key Rollover Keep the chain of trust intact Resign with the compromised key the new set of keys with a very short lifetime, then make a rollover Problem: DOMAIN DISPUTE The adversary controls the compromised key, so he can also make a keyrollover… At the end who should we believe? Break the chain of trust Say to the clients that there is a problem Fix the problem Interact with the clients to distribute the new public key Problem: DNSSEC is down for a while
  • 41. NSEC 3 DNSSEC not only provides an authenticated mapping between IP and domains but also provides proofs of non existence (membership) e.g: Q: www.doesnotexist.com ? A: this domain does not exist For efficiency As to avoid signing dynamically the response the consecutive pair of domains ordered in alphabetic order are signed. All proofs are precomputed. [a.com, c.com], [c.com, e.com], [e.com,g.com], [g.com,z.com] hello.com does not exist g.com < hello.com < z.com
  • 42. NSEC 3 Problem: Zone Walking An attacker can collect all the domains of a zone, by asking for domain that lies inside of every succesive intervals. Is that a problem? After all the information is public… Yes but in some case knowing all the domain names for a given level can be a useful information to build an attack for example.
  • 43. NSEC 3 Solution Applying a hash function H to the domain names as to hide the information of the domain and still be able get nonmembership proofs. a.com c.com e.com g.com z.com H(c.com) H(a.com) H(z.com) H(g.com) H(e.com) H(hello.com)
  • 44. DNSSEC Problems and Limitations First proposal 1999 (RFC 2535) but still no current implementation at root level 2009 Only a few of the Top Level Domains (.com, .org, countries…) run DNSSEC Chile is working hard at this moment to implement it! Why? Who signs the root? Practical Experiences (Netherlands,…) have been painful DNSSEC is complex People may not see the immediate benefit …
  • 45. DNSSEC Problems and Limitations DNSSEC is a “Non End to End” Protocol End to End Protocol: SSH The end user does NOT know whether the chain of trust has been broken! Non End to End Protocol: DNSSEC
  • 46. DNSSEC Problems and Limitations How to set the public keys life-time? Too big => gives more time to the Adversary Too short => inefficient Need to rollover key very often
  • 47. DNSSEC Problems and Limitations How to detect (automaticaly) that a private key has been stolen? Users generally don’t notice they have been victim of a phishing attack. Defacement When obtained by DNS cache poisoning, the owner of the website is not aware of it. So in practice can we really detect that a key has been compromised?
  • 48. DNSSEC Problems and Limitations Key Rollover/Revocation Problem There is no real satisfactory solution for Key Revocation Key Rollver is complex Lack of specification No precise procedure in case of key compromise. How does the child warn its parent?
  • 49. How to improve the Security of DNS? There is no definition for the Adversary What can or cannot do the adversary Steal private keys? Only forge some signatures? Intercept any packet? Control a DNS Name Server? Create a Zone / Domain? Injection attack in Registrars Databases …
  • 50. How to improve the Security of DNS? Use of Threshold Cryptography [Cachin, Samar 04] What is Threshold Cryptography (very short)? N participants T participants can jointly sign T-1 participant cannot do anything =>Adversary must control T servers to perform an attack N=4 T=2 participants required to sign
  • 51. How to improve the Security of DNS? Use of Threshold Cryptography [Cachin, Samar 04] Concrete proposal They use standard RSA signature Need to change the server implementation but not the client Benchmark Stealing private key is harder It can be effective against internal attacks. However If the servers that hold the share have got the same configuration, a same vulnerability can be enough to compromise all the servers. More Complex
  • 52. How to improve the Security of DNS? Identity Based Cryptography [Chan 03] Master Thesis work. Analyzes the possibilty to use IBC to improve the security of DNS instead of using standard public key cryptography. Original approach to solve this problem.
  • 53. IBC Idea A Trusted Authority (TA) generates (SK,PK) and distributes securely the private keys to every participant. Then the TA publishes a public key PK The public key of every participant can be computed from PK and a public information Email, Name, Passport Number, Biometric data
  • 54. DNS with IBC [Shamir, 84] First introduction of the concept. [Boneh,Franklin 01] First efficient scheme for IBC using bilinear maps. Many other works, this is a very active field.
  • 55. IBC Advantages No need to store public keys No need to sign/verify public keys No need to manage certificates
  • 56. DNS with IBC Problem: Key Escrow The TA knows (generates) all the private keys of users. Is that really a problem? ANSWER NO: in our setting, a parent can always create new children with their respective private keys.
  • 57. DNS with IBC Key Rollover Add timestamp to the identity dcc.uchile.cl || 28-4-2009::29-4-2009 Key Revocation Still hard We could use a database of revocated keys but we would loose the good properties of IBC…
  • 58. DNS with IBC Problem of scalability A single authority has to generate all the private keys. This is not reasonable in the case of DNS. Solution Use of Hierchical Identity Based Cryptography The private key generation can be delegated to subauthorities [Gentry, Silverberg 02]
  • 59. DNS with HIBC ID1: root ID2:cl edu mil org ID3:uchile ID1 ID2 ID3 ID4 root cl uchile dcc ID4:dcc ingenieria
  • 60. DNS with HIBC How to sign? ID1 ID2 ID3 ID4 ID5 root cl uchile dcc 192.4.5.7 PKA SKA PKB SKB = {192.4.5.7}SKA Verification process (1) R random (2) C = Encrypt(PKB,R) (3) R’ = Decrypt(SKB,C) (4) R = R’ ?
  • 61. DNS with HIBC Efficiency The size of a signature grows linearly in the depth of the hierarchy. So we do not win to much (even we may loose) compared to the classical DNSSEC verification procedure.
  • 62. DNS with HIBC So at the end, is HIBC useful? HIBC has attractive properties No need to manage public key/certificates Simplifies the scheduled key rollover However some problems remain unsolved Key revocation (unscheduled key rollover) Verification time proportional to the depth of the domain name tree. Not clear that how to adapt the Recursive Resolving Algorithm In practice developping standards for pairings and HIBC takes time.
  • 63. Conclusion DNS is essential for Internet DNS is not secure and this is a big problem DNSSEC adds integrity/authenticity to DNS DNSSEC raises some practical problems Key Rollover All or Nothing security / Not Point to Point Administrative problem: who signs the root? But DNSSEC is to the date the only concrete proposal to make DNS more secure. Can we do better?