SlideShare a Scribd company logo
Ch 5: Prevention, Protection and
Mitigation of DNS Service Disruption
Updated 11-1-16
Prevention of DNS Service
Disruption
Architecture to Resist DoS
• Authoritative servers typically need to
accept queries from every device on the
Internet
• A network distributed system places
authoritative servers in multiple networks
– Small scale: different subnets with different
gateways
– Large scale: different Autonomous Systems (AS)
• Geographically distributed systems are in
different regions or countries
Types of DoS Protection
• Host authoritative DNS servers at an ISP or
Content Distribution Network (CDN)
• Purchase caching acceleration service and
delegate DNS resolution with a CNAME record
– Risky because the authoritative server is still
needed to provide the CNAME record
• Direct delegation from the TLD to the ISP's or
CDN's authoritative servers
• Better, like Cloudflare
Caching Acceleration
Client
SOA
DNS Server
Where is example.com?
example.com is a CNAME for x99.cache.com
Where is x99.cache.com?
x99.cache.com is at 1.2.3.4
Caching
Acceleration
DNS Server
Project 6x
• Protecting a domain with Cloudflare
Anycast
• Multiple geographically separated servers
use the same IP address
• This spreads attacks over the whole
network
• Used by the root DNS servers and
Cloudflare
NS Delegation
Partially Hidden Authoritative Servers
• Some of the authoritative servers are
placed behind the firewalls of large ISPs
or other organizations
• They act as SOA for only the users of the
private network (using BGP)
• They are slave servers, updated from the
master servers
• This is how UltraDNS works
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
UltraDNS DNS Shield
• Link Ch 5a
Software
• Whatever you use, keep it updated
• Bind
– The standard
• djbdns
– Intended to be more secure than bind, but no
longer centrally maintained (links Ch 5b)
• There are many others (link Ch 5c)
DNS Security Extensions

DNSSEC
Purpose of DNSSEC
• Ensure authenticity of data origin
• And integrity of data received by a
resolver from an authoritative DNS server
• Done by signing Resource Record (RR) sets
– With a private key
– And including the signature (RRSIG) with the
record
Chain of Trust
• Resolver can verify the RRSIG with the
server's Public Key
– Published by the server in its zone file
(DNSKEY)
– Vouched for by the parent zone
– Vouched for by its parent...
– Unbroken chain of trust up to the root zone
• Only works if all higher-level zones are
signed
DNSSEC Chain of Trust
Root
key self-signed
.org
key signed by
root
ietf.org
key signed
by .org
Detailed Chain of Trust
• Root (.) now also has RRSIG
• Link Ch 5d
Root Signed in 2010
• Link Ch 5e
Demonstration
• dig any .
– Shows RRSIG and DNSKEY records for the root
• dig ds org.
• dig dnskey org.
• dig rrsig org.
• dig any ietf.org
Root
Top-Level Domain: org.
ietf.org
DNSSEC of Top-Level Domains
Nov. 2013 Nov. 2016
• Link Ch 5f
DNSSEC Validator

Browser Extension
• Link Ch 5j
DNS-based Authentication of Named Entities
(DANE)
• Uses DNSSEC to validate SSL certificates,
not Certificate Authorities
• Link Ch 5k
DNSSEC Issues
• Protocol still changing
• Only secures record to resolver, not traffic
from resolver to client
• Another reason to disallow external DNS
servers like 8.8.8.8
– To keep all resolver traffic local
Authenticated Denial of Existence
• There is no fred.ccsf.edu
– Three systems to prove that
• NXT record (1999); insecure & replaced by
• NSEC record (2005); insecure & replaced
by
• NSEC3 record (2008)
• All incompatible with one another
Transaction Signatures: TSIG
• Maintains integrity of DNS messages between
two severs
• Cryptographically signs messages with TSIG
– Calculates a Message Authentication Code
– Encrypts it with a secret key
– Key shared by the two end-nodes
– Includes the time, to prevent replay attacks
– TSIG expires after the "time fudge factor"
• You must generate secret key and securely
transmit it to the other server
Transaction Signatures: SIG(0)
• Alternative signature method using public
key cryptography
• Public key stored in a KEY record
Transaction Keys (TKEY)
• Establishes a shared secret using
– Diffie-Hellman key exchange, or
– General Security Service API (based on
Kerberos)
• TKEY record contains the keying material
required
• Vulnerable to man-in-the-middle attacks
– Should be secured with SIG(0) (shared secret)
Software Diversification
• Most root servers use Bind
• K and H servers use NSD from NLnetlabs
Master-Slave Setup
• Changes are
made at the
master
• Replicate to the
slaves
• Slaves can be
masters of lower-
level slaves
Configuring a Slave Server in Bind
Limitation of 512 Bytes
• Running many slave servers is good for
fault-tolerance
– But they all need to be listed as authoritative
servers in DNS responses
– Limited to 512 bytes in legacy systems
• Failover via multiple NS records is slow
– Requires several seconds for timeout of a bad
server
CCSF.EDU has 4 NS Records

on 4-28-15
Automatic
Failover
• Use a load
balancer
• Appears to be a
single server to
external nodes
Protection of DNS Service
Firewalls, IDS/IPS
• Run on hardened systems
• Port 53 UDP/TCP open
• Management ports only open to internal hosts
• IDS/IPS blocks known attacks by signatures
• Firewalls limit traffic with Access Control
Lists (ACLs)
• Older firewalls limit DNS packets to 512 bytes
– Now obsolete; EDNS allows UDP packets up to
4096 bytes (link Ch 5i)
Scrubbers
• DDoS attacks look like many legitimate
customers
• Scrubbers block packets that meet DDoS
criteria
– Not usually fully automated
• When under attack, BGP updates are sent
to redirect traffic to the scrubbers
Normal Networking
Using Scrubbers
Service Monitoring and
Restoration
Monitoring
• Send periodic probes from multiple ISPs
and geographic regions
– Such as DNS requests
– Send directly to monitored servers
– Verify that responses are accurate
Backups
• Regular backups of the DNS servers are
essential
• Can be full or incremental
• Could back up whole OS, or just DNS
configuration files
• Cloud DNS servers must be backed up too
– Using backup tools appropriate for the cloud
service
• MUST TEST YOUR BACKUPS
Slow DNS Response
• If a DNS server is down, it slows responses
• Because the dead server must time out
before another server is queries
• Remove NS and A records for failed server
to avoid this

More Related Content

PDF
CNIT 40: 3: DNS vulnerabilities
PDF
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
PDF
CNIT 40: 1: The Importance of DNS Security
PDF
CNIT 40: 6: DNSSEC and beyond
PDF
CNIT 40: 4: Monitoring and detecting security breaches
PDF
CNIT 40: 2: DNS Protocol and Architecture
PDF
CNIT 40: 4: Monitoring and detecting security breaches
PPTX
DNS Vulnerabilities
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 6: DNSSEC and beyond
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 4: Monitoring and detecting security breaches
DNS Vulnerabilities

What's hot (20)

PPTX
Understanding DNS Security
PDF
8 technical-dns-workshop-day4
PDF
Domain Name System (DNS)
PDF
DNS Attacks
PDF
7 technical-dns-workshop-day3
PDF
Encrypted DNS - DNS over TLS / DNS over HTTPS
PDF
2 technical-dns-workshop-day1
PDF
23rd PITA AGM and Conference: DNS Security - A holistic view
PDF
1 technical-dns-workshop-day1
ZIP
DNS Cache Poisoning
PDF
4 technical-dns-workshop-day2
PDF
Introduction DNSSec
PDF
DNS Cache White Paper
PDF
Lets talk dns
ODP
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
PDF
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
PPTX
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
PDF
DNSSEC - Domain Name System Security Extensions
PDF
Drilling Down Into DNS DDoS
Understanding DNS Security
8 technical-dns-workshop-day4
Domain Name System (DNS)
DNS Attacks
7 technical-dns-workshop-day3
Encrypted DNS - DNS over TLS / DNS over HTTPS
2 technical-dns-workshop-day1
23rd PITA AGM and Conference: DNS Security - A holistic view
1 technical-dns-workshop-day1
DNS Cache Poisoning
4 technical-dns-workshop-day2
Introduction DNSSec
DNS Cache White Paper
Lets talk dns
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
Understanding and Deploying DNSSEC, by Champika Wijayatunga [APRICOT 2015]
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
DNSSEC - Domain Name System Security Extensions
Drilling Down Into DNS DDoS
Ad

Viewers also liked (20)

PPT
Magalhaes
PDF
DHCP - Cisco I
PDF
CNIT 121: 14 Investigating Applications
PDF
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
PDF
CNIT 121: 9 Network Evidence
PDF
CNIT 121: 17 Remediation Introduction (Part 1)
PDF
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
PDF
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
PDF
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
PDF
Ch 4: Footprinting and Social Engineering
PDF
Practical Malware Analysis: Ch 8: Debugging
PDF
CNIT 121: 10 Enterprise Services
PDF
CNIT 127 Ch 6: The Wild World of Windows
PDF
CNIT 129S: Ch 4: Mapping the Application
PDF
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
PDF
CNIT 121: 11 Analysis Methodology
PDF
CNIT 121: 12 Investigating Windows Systems (Part 3)
PDF
CNIT 121: 2 IR Management Handbook
PDF
CNIT 129S: Securing Web Applications Ch 1-2
Magalhaes
DHCP - Cisco I
CNIT 121: 14 Investigating Applications
CNIT 129S: 9: Attacking Data Stores (Part 2 of 2)
CNIT 121: 9 Network Evidence
CNIT 121: 17 Remediation Introduction (Part 1)
iOS Threats - Malicious Configuration Profiles, Threat, Detection & Mitigation
CNIT 129S: 13: Attacking Users: Other Techniques (Part 2 of 2)
CNIT 129S: 12: Attacking Users: Cross-Site Scripting (Part 2 of 3)
Ch 4: Footprinting and Social Engineering
Practical Malware Analysis: Ch 8: Debugging
CNIT 121: 10 Enterprise Services
CNIT 127 Ch 6: The Wild World of Windows
CNIT 129S: Ch 4: Mapping the Application
CNIT 129S: 9: Attacking Data Stores (Part 1 of 2)
CNIT 121: 11 Analysis Methodology
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 2 IR Management Handbook
CNIT 129S: Securing Web Applications Ch 1-2
Ad

Similar to CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption (20)

PDF
DNS Over HTTPS by Michael Casadevall
PDF
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
PDF
ION Hangzhou - Why Deploy DNSSEC?
PDF
DNSSEC: What a Registrar Needs to Know
PPT
Dns protocol design attacks and security
PPTX
dnssec_networking_improvement_for_security.pptx
PPTX
DNS Security
PPTX
DNSandDNSSecurity (1).pptx
PDF
Denial of Service - Service Provider Overview
PDF
An Overview of DNSSEC
PPTX
How DNS works and How to secure it: An Introduction
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
PDF
3: DNS vulnerabilities
PPTX
2_Chapter 2_DNS.pptx
PDF
08 tcp-dns
PDF
Mens jan piet_dnssec-in-practice
PDF
DNSSEC signing Tutorial
PPTX
The History of DNS
PPTX
DNSSEC for Registrars by .ORG & Afilias
DNS Over HTTPS by Michael Casadevall
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks
ION Hangzhou - Why Deploy DNSSEC?
DNSSEC: What a Registrar Needs to Know
Dns protocol design attacks and security
dnssec_networking_improvement_for_security.pptx
DNS Security
DNSandDNSSecurity (1).pptx
Denial of Service - Service Provider Overview
An Overview of DNSSEC
How DNS works and How to secure it: An Introduction
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
DNS & DNSSEC operational best practices - Sleep better at night with KINDNS i...
3: DNS vulnerabilities
2_Chapter 2_DNS.pptx
08 tcp-dns
Mens jan piet_dnssec-in-practice
DNSSEC signing Tutorial
The History of DNS
DNSSEC for Registrars by .ORG & Afilias

More from Sam Bowne (20)

PDF
Introduction to the Class & CISSP Certification
PDF
Cyberwar
PDF
8. Software Development Security
PDF
4 Mapping the Application
PDF
3. Attacking iOS Applications (Part 2)
PDF
12 Elliptic Curves
PDF
11. Diffie-Hellman
PDF
2a Analyzing iOS Apps Part 1
PDF
9 Writing Secure Android Applications
PDF
12 Investigating Windows Systems (Part 2 of 3)
PDF
10 RSA
PDF
12 Investigating Windows Systems (Part 1 of 3
PDF
9. Hard Problems
PDF
8 Android Implementation Issues (Part 1)
PDF
11 Analysis Methodology
PDF
8. Authenticated Encryption
PDF
7. Attacking Android Applications (Part 2)
PDF
7. Attacking Android Applications (Part 1)
PDF
5. Stream Ciphers
PDF
6 Scope & 7 Live Data Collection
Introduction to the Class & CISSP Certification
Cyberwar
8. Software Development Security
4 Mapping the Application
3. Attacking iOS Applications (Part 2)
12 Elliptic Curves
11. Diffie-Hellman
2a Analyzing iOS Apps Part 1
9 Writing Secure Android Applications
12 Investigating Windows Systems (Part 2 of 3)
10 RSA
12 Investigating Windows Systems (Part 1 of 3
9. Hard Problems
8 Android Implementation Issues (Part 1)
11 Analysis Methodology
8. Authenticated Encryption
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 1)
5. Stream Ciphers
6 Scope & 7 Live Data Collection

Recently uploaded (20)

PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Pre independence Education in Inndia.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Basic Mud Logging Guide for educational purpose
PPTX
master seminar digital applications in india
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Business Ethics Teaching Materials for college
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pre independence Education in Inndia.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
O7-L3 Supply Chain Operations - ICLT Program
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
VCE English Exam - Section C Student Revision Booklet
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Complications of Minimal Access Surgery at WLH
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Basic Mud Logging Guide for educational purpose
master seminar digital applications in india
Week 4 Term 3 Study Techniques revisited.pptx
Cell Structure & Organelles in detailed.
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Business Ethics Teaching Materials for college
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES

CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption

  • 1. Ch 5: Prevention, Protection and Mitigation of DNS Service Disruption Updated 11-1-16
  • 2. Prevention of DNS Service Disruption
  • 3. Architecture to Resist DoS • Authoritative servers typically need to accept queries from every device on the Internet • A network distributed system places authoritative servers in multiple networks – Small scale: different subnets with different gateways – Large scale: different Autonomous Systems (AS) • Geographically distributed systems are in different regions or countries
  • 4. Types of DoS Protection • Host authoritative DNS servers at an ISP or Content Distribution Network (CDN) • Purchase caching acceleration service and delegate DNS resolution with a CNAME record – Risky because the authoritative server is still needed to provide the CNAME record • Direct delegation from the TLD to the ISP's or CDN's authoritative servers • Better, like Cloudflare
  • 5. Caching Acceleration Client SOA DNS Server Where is example.com? example.com is a CNAME for x99.cache.com Where is x99.cache.com? x99.cache.com is at 1.2.3.4 Caching Acceleration DNS Server
  • 6. Project 6x • Protecting a domain with Cloudflare
  • 7. Anycast • Multiple geographically separated servers use the same IP address • This spreads attacks over the whole network • Used by the root DNS servers and Cloudflare
  • 9. Partially Hidden Authoritative Servers • Some of the authoritative servers are placed behind the firewalls of large ISPs or other organizations • They act as SOA for only the users of the private network (using BGP) • They are slave servers, updated from the master servers • This is how UltraDNS works
  • 12. Software • Whatever you use, keep it updated • Bind – The standard • djbdns – Intended to be more secure than bind, but no longer centrally maintained (links Ch 5b) • There are many others (link Ch 5c)
  • 14. Purpose of DNSSEC • Ensure authenticity of data origin • And integrity of data received by a resolver from an authoritative DNS server • Done by signing Resource Record (RR) sets – With a private key – And including the signature (RRSIG) with the record
  • 15. Chain of Trust • Resolver can verify the RRSIG with the server's Public Key – Published by the server in its zone file (DNSKEY) – Vouched for by the parent zone – Vouched for by its parent... – Unbroken chain of trust up to the root zone • Only works if all higher-level zones are signed
  • 16. DNSSEC Chain of Trust Root key self-signed .org key signed by root ietf.org key signed by .org
  • 17. Detailed Chain of Trust • Root (.) now also has RRSIG • Link Ch 5d
  • 18. Root Signed in 2010 • Link Ch 5e
  • 19. Demonstration • dig any . – Shows RRSIG and DNSKEY records for the root • dig ds org. • dig dnskey org. • dig rrsig org. • dig any ietf.org
  • 20. Root
  • 23. DNSSEC of Top-Level Domains Nov. 2013 Nov. 2016 • Link Ch 5f
  • 25. DNS-based Authentication of Named Entities (DANE) • Uses DNSSEC to validate SSL certificates, not Certificate Authorities • Link Ch 5k
  • 26. DNSSEC Issues • Protocol still changing • Only secures record to resolver, not traffic from resolver to client • Another reason to disallow external DNS servers like 8.8.8.8 – To keep all resolver traffic local
  • 27. Authenticated Denial of Existence • There is no fred.ccsf.edu – Three systems to prove that • NXT record (1999); insecure & replaced by • NSEC record (2005); insecure & replaced by • NSEC3 record (2008) • All incompatible with one another
  • 28. Transaction Signatures: TSIG • Maintains integrity of DNS messages between two severs • Cryptographically signs messages with TSIG – Calculates a Message Authentication Code – Encrypts it with a secret key – Key shared by the two end-nodes – Includes the time, to prevent replay attacks – TSIG expires after the "time fudge factor" • You must generate secret key and securely transmit it to the other server
  • 29. Transaction Signatures: SIG(0) • Alternative signature method using public key cryptography • Public key stored in a KEY record
  • 30. Transaction Keys (TKEY) • Establishes a shared secret using – Diffie-Hellman key exchange, or – General Security Service API (based on Kerberos) • TKEY record contains the keying material required • Vulnerable to man-in-the-middle attacks – Should be secured with SIG(0) (shared secret)
  • 31. Software Diversification • Most root servers use Bind • K and H servers use NSD from NLnetlabs
  • 32. Master-Slave Setup • Changes are made at the master • Replicate to the slaves • Slaves can be masters of lower- level slaves
  • 33. Configuring a Slave Server in Bind
  • 34. Limitation of 512 Bytes • Running many slave servers is good for fault-tolerance – But they all need to be listed as authoritative servers in DNS responses – Limited to 512 bytes in legacy systems • Failover via multiple NS records is slow – Requires several seconds for timeout of a bad server
  • 35. CCSF.EDU has 4 NS Records
 on 4-28-15
  • 36. Automatic Failover • Use a load balancer • Appears to be a single server to external nodes
  • 37. Protection of DNS Service
  • 38. Firewalls, IDS/IPS • Run on hardened systems • Port 53 UDP/TCP open • Management ports only open to internal hosts • IDS/IPS blocks known attacks by signatures • Firewalls limit traffic with Access Control Lists (ACLs) • Older firewalls limit DNS packets to 512 bytes – Now obsolete; EDNS allows UDP packets up to 4096 bytes (link Ch 5i)
  • 39. Scrubbers • DDoS attacks look like many legitimate customers • Scrubbers block packets that meet DDoS criteria – Not usually fully automated • When under attack, BGP updates are sent to redirect traffic to the scrubbers
  • 43. Monitoring • Send periodic probes from multiple ISPs and geographic regions – Such as DNS requests – Send directly to monitored servers – Verify that responses are accurate
  • 44. Backups • Regular backups of the DNS servers are essential • Can be full or incremental • Could back up whole OS, or just DNS configuration files • Cloud DNS servers must be backed up too – Using backup tools appropriate for the cloud service • MUST TEST YOUR BACKUPS
  • 45. Slow DNS Response • If a DNS server is down, it slows responses • Because the dead server must time out before another server is queries • Remove NS and A records for failed server to avoid this