SlideShare a Scribd company logo
1 of 10
Download to read offline
F5 Technical Brief




DNSSEC: The Antidote to DNS
Cache Poisoning and Other
DNS Attacks
Domain Name System (DNS) provides one of the most basic
but critical functions on the Internet. If DNS isn’t working,
then your business likely isn’t either. Secure your business
and web presence with Domain Name System Security
Extensions (DNSSEC).

by Peter Silva
Technical Marketing Manager


With contributions from
Nathan Meyer, Product Manager
Michael Falkenrath, Senior Field Systems Engineer
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




Contents
Introduction                                                        3

Challenges                                                          4
  DNS in the Wild: Bad Things Can Happen                            4

  Taming the Wild                                                   5


Solutions                                                           6
  BIG‑IP v10.1 and DNSSEC: The Keys to Success                      6


Conclusion                                                          9
  Resources                                                         10




                                                                         2
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




Introduction
Humans have always had difficulty remembering number sequences. Back in 1956,
George Miller did some research on digit span recall tasks and found that humans
are only able to hold seven plus or minus two items in memory.1 He concluded that
even when more information is offered, the human memory system has the capacity
to remember between five and nine chunks of information. Most people have a
vocabulary of 10,000 to 30,000 words and some suggest that 500 to 1,000 of
those are names. We’ve experienced words in place of numbers for years with the
telephone system, especially 800 numbers, when a company spells out its product,
name, or industry—like 1-800-EAT-SOUP.

It should come as no surprise that when the Internet was invented with all its
numbered Internet Protocol addresses, humans needed a way to translate those
numbers into understandable names. The Domain Name System (DNS) was created
in 1983 to enable humans to identify all the computers, services, and resources
connected to the Internet by name. DNS translates human readable names into the
unique binary information of devices so Internet users are able to find the machines
they need. Think of it as the Internet’s phone book.

Now what would happen if someone changed your business name and matching
phone book entry to his or her own? The phone book now lists “A. Crook,” an
imposter who receives all of your calls and controls your number. Or, what if
someone completely deleted your entry and no one could find you? That would
really hurt business. What if that same situation happened to the domain name tied
to your public website? An e-commerce site, at that! Either your customers won’t
be able to find you at all or they will be redirected to another site that might look
exactly like yours, but it is really A. Crook’s site. A. Crook happily takes their orders
and money, leaving you with lost revenue, downtime, or any of the other myriad of
issues organizations face when their web property is hijacked.

Security was not included in the original DNS design since at the time scalability—
rather than malicious behavior—was the primary concern. Many feel that securing
DNS would go a long way to securing the Internet at large. Domain Name System
Security Extensions (DNSSEC) attempts to add security to DNS while maintaining the
backward compatibility needed to scale with the Internet as a whole. In essence,
DNSSEC adds a digital signature to ensure the authenticity of certain types of DNS
transactions and, therefore, the integrity of the information.




                                                                                            3
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




DNSSEC provides:
  •   Origin authentication of DNS data.
  •   Data integrity.
  •   Authenticated denial of existence.



Challenges
DNS in the Wild: Bad Things Can Happen
DNS has worked just great since its inception, but as with almost everything
Internet-related, the bad guys have found ways to exploit the protocol. One such
way is called DNS cache poisoning. When you type a URL into your browser, a DNS
resolver checks the Internet for the proper name/number translation and location.
Typically, DNS will accept the first response or answer without question and send
you to that site. It will also cache that information for a period of time until it
expires, so upon the next request for that name/number, the site is immediately
delivered. DNS won’t need to query the Internet again and uses that address until
that entry expires. Since users assume they are getting the correct information,
it can get ugly when a malicious system responds to the DNS query first with
modified, false information, as it does with DNS cache poisoning. The DNS servers
first send the user to the bad link but also cache that fake address until it expires.
Not only does that single computer get sent to the wrong place, but if the malicious
server is answering for a service provider, then thousands of users can get sent to
a rogue system. This can last for hours to days, depending on how long the server
stores the information, and all the other DNS servers that propagate the information
can also be affected. The imminent dangers posed by a rogue site include delivering
malware, committing fraud, and stealing personal or sensitive information.

In 2009, the main DNS registrar in Puerto Rico was hacked by a DNS attack.2 Local
versions of the websites for Google, Microsoft, Coca-Cola, Yahoo, and others
such as PayPal, Nike, and Dell were redirected to defaced sites or blank pages
that told users that the requested site had been hacked. In this instance, the users
were aware that they were not visiting the real site since the group who claimed
responsibility gave notice. In a more sinister incident, one of Brazil’s largest banks
suffered an attack that redirected users to a malicious site that attempted to install
malware and steal passwords.3 In this situation, the users were not aware that they
were on a fake site since the delivered page looked just like the original. These types
of attacks are very hard to detect since the users had actually typed the correct
domain name in their browsers.
                                                                                          4
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




Taming the Wild
DNSSEC is a series of DNS protocol extensions, defined in Request for Comments
(RFCs) 4033, 4034, and 4035, that ensures the integrity of data returned by domain
name lookups by incorporating a chain of trust into the DNS hierarchy. The chain is
built using public key infrastructure (PKI), with each link in the chain consisting of a
public/private key pair. DNSSEC does not encrypt or provide confidentiality of the
data, but it does authenticate that data.

DNSSEC provides the following:
  •   Origin authentication of DNS data: Resolvers can verify that data has
      originated from authoritative sources.
  •   Data integrity: Resolvers can verify that responses are not modified in flight.
  •   Authenticated denial of existence: When there is no data for a query,
      authoritative servers can provide a response that proves no data exists.

Deploying DNSSEC involves signing zones with public/private key encryption and
returning DNS responses with signatures. (See Figure 1.) A client’s trust in those signatures
is based on a chain of trust established across administrative boundaries, from parent
to child zone, using a new DNSKEY and delegation signer (DS) resource records. Any
DNSSEC deployment must manage cryptographic keys: multiple key generation, zone
signing, key swapping, key rollover and timing, and recovery from compromised keys.

                What IP address is                   I don’t know, let me ask                   Who owns the records
                www.example.com?                     someone who does.                          for example.com?




End user        example.com is 1.1.1.2               example.com is 1.1.1.2                      Ask .com DNS Server
                                         Local DNS                                 ISP DNS                               Root DNS
                                           server                                   server                                server


                                                                                         Who owns the records
Figure 1: How DNSSEC works                                               Ask 1.1.1.1     for example.com?
                                                                                                                              Top Level Domains

                                                                                                        Chain of trust


                                                       What IP address
                                                       is example.com?

                                                       example.com                           .com DNS                    .org DNS     .net DNS
                                                       is 1.1.1.2                              server                      server       server




                                                                                        DNS server for
                                                                                        example.com
                                                                                          (1.1.1.1)
                                                                                                                                                  5
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




To accomplish DNSSEC:

  1. Each DNSSEC zone creates one or more pairs of public/private key(s) with the
     public portion put in DNSSEC record type DNSKEY.

  2. The zones sign all resource record sets (RRsets) and define the order in which
     multiple records of the same type are returned with private key(s).

  3. Resolvers use DNSKEY(s) to verify RRsets; each RRset also has a signature
     attached to it that is called RRSIG.

If a resolver has a zone’s DNSKEY(s), it can verify that RRsets are intact by verifying
their RRSIGs. The chain of trust is important to DNSSEC since an unbroken chain of
trust needs to be established from the root at the top through the top-level domain
(TLD) and down to individual registrants. All zones need to be authenticated by
“signing,” in that the publisher of a zone signs that zone prior to publication, and
the parent of that zone publishes the keys of that zone. With many zones, it is likely
that the signatures will expire before the DNS records are updated. Zone operators
therefore require a means to automatically re-sign DNS records before these
signatures expire. This functionality is called “continuous signing” or “automated key
rollover” and is not yet a feature of common name server implementations.



Solutions
BIG‑IP v10.1 and DNSSEC: The Keys to Success
F5® BIG-IP® v10.1 supports DNSSEC as an add-on feature to BIG-IP® Global Traffic
Manager™ (available as a standalone device or as a module on BIG-IP® Local Traffic
Manager™). BIG-IP Global Traffic Manager (GTM) is a global load balancer that
provides high availability, maximum performance, and centralized management
for applications running across multiple and globally dispersed data centers.
BIG-IP GTM distributes end-user application requests according to business policies
and data center and network conditions to ensure the highest possible availability.
The BIG-IP GTM DNSSEC feature signs DNS responses in real time and provides the
means to deploy DNSSEC quickly and easily in an existing environment.

If client requests a website that sits behind a BIG-IP device but does not request an
authenticated answer, the BIG-IP GTM DNSSEC feature does nothing and BIG-IP
GTM responds normally—passing through the BIG-IP device’s virtual IP address to
the DNS server pool and returning directly to the client. When authentication is


                                                                                          6
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




requested, the BIG-IP GTM DNSSEC feature intercepts the response and signs the
response before sending it to the client computer. (See Figure 2.) In this instance, the
DNSSEC request passes through BIG-IP GTM to the DNS servers. When the response
is returned, BIG-IP GTM signs the response in real time to ensure continuous signing.
The potential attacker cannot forge this response without the corresponding private
key. The internal communication between BIG-IP GTM and the DNS server is normal
and the external client communication is secure.




                                                                                    example.com

         example.com                example.com



Client   123.123.123.123   LDNS     123.123.123.123    BIG-IP GTM +
         + public key               + public key      DNSSEC feature             DNS servers




                           Hacker

Figure 2: BIG‑IP GTM DNSSEC feature interaction



This real-time signing is critical in dynamic content environments where both objects
and users might be coming from various locations around the globe. There are
other devices claiming DNSSEC for static DNS and DNSSEC compliance in general,
but none of them has good solutions for dynamic content and none, so far, has
any solutions for global server load balancing (GSLB)-type DNS responses in which
the IP answer can change depending on the requesting client. Since GSLB can
provide different answers to different clients for the same fully qualified domain
name (FQDN), GSLB and DNSSEC are fundamentally at odds in the original design
specifications. DNSSEC, as originally conceived, was focused solely on traditional
static DNS and never considered the requirements of GSLB, or intelligent DNS. It’s
relatively easy to use BIND to provide DNSSEC for static DNS. It’s more difficult
to provide DNSSEC for dynamic DNS, and it’s very difficult to provide DNSSEC for
GSLB-type DNS responses, especially in cloud deployments. F5’s general purpose
DNSSEC feature provides DNSSEC covering all three scenarios and is simple to
implement and maintain while keeping management costs low.

F5’s unique, patent-pending solution to the GSLB DNSSEC problem addresses this
by signing answers at the time the GSLB device decides what the answer should be.


                                                                                                  7
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




This is a real-time DNSSEC solution, and, with it, F5 is the only GSLB provider to
have a true DNSSEC solution that works. While others have proposed a system in
which every possible response is pre-signed, most have concluded that this isn’t a
feasible approach.

Assuming BIG-IP GTM is already up, configured, and functioning—including DCs,                 The BIG‑IP GTM DNSSEC
                                                                                              feature’s default settings
servers, listeners, WIPS, and so on—the DNSSEC key list (see Figure 3) is where the
                                                                                              are modeled on the National
administrator configures zone signing keys (ZSKs) and key signing keys (KSKs). KSKs           Institute of Standards and
are used to sign other DNSKEY records and the DS records, while ZSKs are used to              Technology (NIST) guidelines,
                                                                                              offering an easy, turnkey
sign RRSIG. It is best practice to name the keys with the zone name and either zsk            means to deploy this powerful
or ksk at the end in order to easily identify them. The KSK can be made stronger by           solution.
using more bits in the key material. It has little operational impact since it is only used
to sign a small fraction of the zone data and to verify the zone’s key set, not for other
RRsets in the zone. The KSK should be rotated every 12 months and the ZSK every
one to two months. No parent/child interaction is required when ZSKs are updated.




       Required options include:
                          Name
                      Algorithm
                       Bit width
                            FIPS
        Type (zone signing keys)


         Optional items include:
                 Rollover period
               Expiration period


         Note: The default is no
             automatic rollover


Figure 3: The GUI on the F5 BIG‑IP system makes it simple to quickly configure and
          secure your DNS infrastructure.



Since the KSK is only used to sign a key set, which is most probably updated less
frequently than other data in the zone, it can be stored separately from and in a
safer location than the ZSK. A KSK can have a longer key effectivity period. For
almost any method of key management and zone signing, the KSK is used less
frequently than the ZSK. Once a key set is signed with the KSK, all the keys in the
key set can be used as ZSKs. If a ZSK is compromised, it can be simply dropped from
the key set and the new key set is then re-signed with the KSK.

                                                                                                                              8
Technical Brief
DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




If a KSK is to be rolled over, there will be interactions with parties other than
the zone administrator. These can include the registry of the parent zone or
administrators of verifying resolvers that have the particular key configured as
secure entry points. Hence, the key effectivity period of these keys can and should
be made much longer.
                                                                                       1
The public key enables a client to validate the integrity of something signed with
the private key and the hashing enables the client to validate that the content was
not tampered with. Since the private key of the public/private key pair could be       2
used to impersonate a valid signer, it is critical to keep those keys secure. F5
employs two industry-leading techniques to accomplish this security task. First,       3
for non-FIPS requirements, F5 employs Secure Vault, a super-secure SSL-encrypted
storage system used by BIG-IP devices. Even if the hard disk was removed from
the system and painstakingly searched, it would be nearly impossible to recover
                                                                                           When creating DNSSEC zones, use
the contents of Secure Vault.
                                                                                           the most specific FQDN as its name.
                                                                                           BIG‑IP GTM will search the set of
For military-level security, F5 supports FIPS storage of the private keys, and this        DNSSEC zones to find the most
is a unique differentiator from many of the DNSSEC providers on the market.                specific one to use when signing,
Also unique to F5 is the ability to securely synchronize the keys between multiple         even if multiple candidates exist.

FIPS devices. Additionally, multiple models of F5 hardware (BIG-IP 1500, 3400,             (1) Name the DNSSEC zone.
                                                                                           (2) Choose the signing key.
6400, 6800, 8400, and 8800) take a further step by using the crypto storage chip
                                                                                           (3) Choose the key signing key.
on the motherboard to secure a unique hardware key as part of the multi-layer
encryption process.



Conclusion
DNSSEC ensures that the answer you receive when asking for name resolution
comes from a trusted name server. Since DNSSEC is still far from being globally
deployed and many resolvers either haven’t been updated or don’t support DNSSEC,
implementing the BIG-IP GTM DNSSEC feature can greatly enhance your DNS
security right away. It can help you comply with federal DNSSEC mandates and help
protect your valuable domain name and web properties from rogue servers sending
invalid responses.

F5 BIG-IP v10.1 now provides DNSSEC signing for DNS records and real-time DNSSEC
signing as requested by clients. The combination of BIG-IP Local Traffic Manager
+ BIG-IP GTM + DNSSEC on one box provides a drop-in DNSSEC solution for any
existing DNS deployment, instantly giving you greater control and security over your
DNS infrastructure while meeting U.S. Government mandates for DNSSEC compliance.



                                                                                                                                 9
Technical Brief
      DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks




      Rather than ripping and replacing your current DNS infrastructure, you can simply drop
      BIG-IP GTM in front of your existing DNS servers and reduce your management costs
      with implementation and maintenance all on the same appliance.


      Resources
      DNSSEC.net
      DNSSEC Resource Center
      National Institute of Standards and Technology
      Tech Republic
      Public Interest Registry




      1
          Miller, G. A. (1956). The magical number seven plus or minus two: Some limitations on our capacity for processing
          information. Psychological Review, 63, 81‑97.
      2
          Puerto Rico sites redirected in DNS attack, CNET News, Apr. 27, 2009.
      3
          Cache‑poisoning attack snares top Brazilian bank, The Register, Apr. 22, 2009.




F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119                         888‑882‑4447         www.f5.com


F5 Networks, Inc.                     F5 Networks                 F5 Networks Ltd.                        F5 Networks
Corporate Headquarters                Asia‑Pacific                Europe/Middle‑East/Africa               Japan K.K.
info@f5.com                           info.asia@f5.com            emeainfo@f5.com                         f5j‑info@f5.com



© 2009 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG‑IP, FirePass, iControl, TMOS, and VIPRION are trademarks
  or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries.                                CS10073 1109

More Related Content

What's hot

DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013Shumon Huque
 
Understanding the DNS & DNSSEC
Understanding the DNS & DNSSECUnderstanding the DNS & DNSSEC
Understanding the DNS & DNSSECICANN
 
DNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul IslamDNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul IslamMyNOG
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Dan York
 
Build Dynamic DNS server from scratch in C (Part1)
Build Dynamic DNS server from scratch in C (Part1)Build Dynamic DNS server from scratch in C (Part1)
Build Dynamic DNS server from scratch in C (Part1)Yen-Kuan Wu
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSAlex Mayrhofer
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...Felipe Prado
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Osecarrow
 
DNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security ExtensionsDNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security ExtensionsPeter R. Egli
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPAPNIC
 
Re-Engineering the Root of the DNS
Re-Engineering the Root of the DNSRe-Engineering the Root of the DNS
Re-Engineering the Root of the DNSAPNIC
 

What's hot (20)

Dns
DnsDns
Dns
 
DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013DNSSEC Tutorial; USENIX LISA 2013
DNSSEC Tutorial; USENIX LISA 2013
 
Dns
DnsDns
Dns
 
Understanding the DNS & DNSSEC
Understanding the DNS & DNSSECUnderstanding the DNS & DNSSEC
Understanding the DNS & DNSSEC
 
DNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul IslamDNS/DNSSEC by Nurul Islam
DNS/DNSSEC by Nurul Islam
 
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
Deploying New DNSSEC Algorithms (IEPG@IETF93 - July 2015)
 
Build Dynamic DNS server from scratch in C (Part1)
Build Dynamic DNS server from scratch in C (Part1)Build Dynamic DNS server from scratch in C (Part1)
Build Dynamic DNS server from scratch in C (Part1)
 
Hands-on DNSSEC Deployment
Hands-on DNSSEC DeploymentHands-on DNSSEC Deployment
Hands-on DNSSEC Deployment
 
The History of DNS
The History of DNSThe History of DNS
The History of DNS
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
 
Introduction to DNS
Introduction to DNSIntroduction to DNS
Introduction to DNS
 
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAILDNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
DNSSEC - WHAT IS IT ? INSTALL AND CONFIGURE IN CHROOT JAIL
 
Dns Hardening Linux Os
Dns Hardening   Linux OsDns Hardening   Linux Os
Dns Hardening Linux Os
 
DNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security ExtensionsDNSSEC - Domain Name System Security Extensions
DNSSEC - Domain Name System Security Extensions
 
DNS Cache Poisoning
DNS Cache PoisoningDNS Cache Poisoning
DNS Cache Poisoning
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
 
Re-Engineering the Root of the DNS
Re-Engineering the Root of the DNSRe-Engineering the Root of the DNS
Re-Engineering the Root of the DNS
 
Re-Engineering the DNS – One Resolver at a Time
Re-Engineering the DNS – One Resolver at a Time Re-Engineering the DNS – One Resolver at a Time
Re-Engineering the DNS – One Resolver at a Time
 

Viewers also liked

Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches
Pseudo Random DNS Query Attacks and Resolver Mitigation ApproachesPseudo Random DNS Query Attacks and Resolver Mitigation Approaches
Pseudo Random DNS Query Attacks and Resolver Mitigation ApproachesAPNIC
 
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...APNIC
 
The DNS Tunneling Blindspot
The DNS Tunneling BlindspotThe DNS Tunneling Blindspot
The DNS Tunneling BlindspotBrian A. McHenry
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniquesinbroker
 
tìm hiểu các lỗ hổng bảo mật
tìm hiểu các lỗ hổng bảo mậttìm hiểu các lỗ hổng bảo mật
tìm hiểu các lỗ hổng bảo mậtanhkhoa2222
 

Viewers also liked (7)

Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches
Pseudo Random DNS Query Attacks and Resolver Mitigation ApproachesPseudo Random DNS Query Attacks and Resolver Mitigation Approaches
Pseudo Random DNS Query Attacks and Resolver Mitigation Approaches
 
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
Water Torture: A Slow Drip DNS DDoS Attack on QTNet by Kei Nishida [APRICOT 2...
 
The DNS Tunneling Blindspot
The DNS Tunneling BlindspotThe DNS Tunneling Blindspot
The DNS Tunneling Blindspot
 
Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
Network tunneling techniques
Network tunneling techniquesNetwork tunneling techniques
Network tunneling techniques
 
tìm hiểu các lỗ hổng bảo mật
tìm hiểu các lỗ hổng bảo mậttìm hiểu các lỗ hổng bảo mật
tìm hiểu các lỗ hổng bảo mật
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 

Similar to DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks

understanding-dns-essential
understanding-dns-essentialunderstanding-dns-essential
understanding-dns-essentialwael eshag eshag
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name SystemWhoisXML API
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introductionyasithbagya1
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS SecurityThousandEyes
 
Presentation
PresentationPresentation
PresentationKen Wong
 
Domain name server
Domain name serverDomain name server
Domain name serverMobile88
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemInfoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemJennifer Nichols
 

Similar to DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks (20)

understanding-dns-essential
understanding-dns-essentialunderstanding-dns-essential
understanding-dns-essential
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introduction
 
DNS.pptx
DNS.pptxDNS.pptx
DNS.pptx
 
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan YorkION Tokyo: The Business Case for DNSSEC and DANE, Dan York
ION Tokyo: The Business Case for DNSSEC and DANE, Dan York
 
Dns
DnsDns
Dns
 
Monitoring for DNS Security
Monitoring for DNS SecurityMonitoring for DNS Security
Monitoring for DNS Security
 
Grey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache PoisoningGrey H@t - DNS Cache Poisoning
Grey H@t - DNS Cache Poisoning
 
ION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSECION Bucharest - Deploying DNSSEC
ION Bucharest - Deploying DNSSEC
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Domain name server
Domain name serverDomain name server
Domain name server
 
The domain name system
The domain name systemThe domain name system
The domain name system
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemInfoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
 
Dns server
Dns serverDns server
Dns server
 
Week3 lec 2
Week3 lec 2Week3 lec 2
Week3 lec 2
 
Dns and irc
Dns and ircDns and irc
Dns and irc
 
ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC
ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSECION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC
ION Mumbai - Shailesh Gupta: Business Case for IPv6 and DNSSEC
 

More from FindWhitePapers

The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security complianceFindWhitePapers
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersFindWhitePapers
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionFindWhitePapers
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsFindWhitePapers
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...FindWhitePapers
 
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...FindWhitePapers
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File VirtualizationFindWhitePapers
 
Geolocation and Application Delivery
Geolocation and Application DeliveryGeolocation and Application Delivery
Geolocation and Application DeliveryFindWhitePapers
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...FindWhitePapers
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsFindWhitePapers
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceFindWhitePapers
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementFindWhitePapers
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseFindWhitePapers
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsFindWhitePapers
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesFindWhitePapers
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...FindWhitePapers
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...FindWhitePapers
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachFindWhitePapers
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchFindWhitePapers
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...FindWhitePapers
 

More from FindWhitePapers (20)

The state of privacy and data security compliance
The state of privacy and data security complianceThe state of privacy and data security compliance
The state of privacy and data security compliance
 
Is your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computersIs your data at risk? Why physical security is insufficient for laptop computers
Is your data at risk? Why physical security is insufficient for laptop computers
 
Closing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protectionClosing the gaps in enterprise data security: A model for 360 degrees protection
Closing the gaps in enterprise data security: A model for 360 degrees protection
 
Buyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection PlatformsBuyers Guide to Endpoint Protection Platforms
Buyers Guide to Endpoint Protection Platforms
 
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...VMware DRS: Why You Still Need Assured Application Delivery and Application D...
VMware DRS: Why You Still Need Assured Application Delivery and Application D...
 
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...The ROI of Application Delivery Controllers in Traditional and Virtualized En...
The ROI of Application Delivery Controllers in Traditional and Virtualized En...
 
The Economic Impact of File Virtualization
The Economic Impact of File VirtualizationThe Economic Impact of File Virtualization
The Economic Impact of File Virtualization
 
Geolocation and Application Delivery
Geolocation and Application DeliveryGeolocation and Application Delivery
Geolocation and Application Delivery
 
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
Lean Business Intelligence - How and Why Organizations Are Moving to Self-Ser...
 
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory TargetsInventory Optimization: A Technique for Improving Operational-Inventory Targets
Inventory Optimization: A Technique for Improving Operational-Inventory Targets
 
Improving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business IntelligenceImproving Organizational Performance Through Pervasive Business Intelligence
Improving Organizational Performance Through Pervasive Business Intelligence
 
IDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk ManagementIDC Energy Insights - Enterprise Risk Management
IDC Energy Insights - Enterprise Risk Management
 
How to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean EnterpriseHow to Use Technology to Support the Lean Enterprise
How to Use Technology to Support the Lean Enterprise
 
High Efficiency in Manufacturing Operations
High Efficiency in Manufacturing OperationsHigh Efficiency in Manufacturing Operations
High Efficiency in Manufacturing Operations
 
Enterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and OpportunitiesEnterprise Knowledge Workers: Understanding Risks and Opportunities
Enterprise Knowledge Workers: Understanding Risks and Opportunities
 
Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...Enterprise Information Management: In Support of Operational, Analytic, and G...
Enterprise Information Management: In Support of Operational, Analytic, and G...
 
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
Enabling Strategy and Innovation: Achieving Optimized Outcomes from Planning ...
 
Data Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step ApproachData Quality Strategy: A Step-by-Step Approach
Data Quality Strategy: A Step-by-Step Approach
 
Data Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor ResearchData Migration: A White Paper by Bloor Research
Data Migration: A White Paper by Bloor Research
 
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
Automating Stimulus Fund Reporting: How New Technologies Simplify Federal Rep...
 

Recently uploaded

FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiMalviyaNagarCallGirl
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 

Recently uploaded (20)

FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | DelhiFULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
FULL ENJOY - 9953040155 Call Girls in Chhatarpur | Delhi
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 

DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks

  • 1. F5 Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn’t working, then your business likely isn’t either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC). by Peter Silva Technical Marketing Manager With contributions from Nathan Meyer, Product Manager Michael Falkenrath, Senior Field Systems Engineer
  • 2. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Contents Introduction 3 Challenges 4 DNS in the Wild: Bad Things Can Happen 4 Taming the Wild 5 Solutions 6 BIG‑IP v10.1 and DNSSEC: The Keys to Success 6 Conclusion 9 Resources 10 2
  • 3. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Introduction Humans have always had difficulty remembering number sequences. Back in 1956, George Miller did some research on digit span recall tasks and found that humans are only able to hold seven plus or minus two items in memory.1 He concluded that even when more information is offered, the human memory system has the capacity to remember between five and nine chunks of information. Most people have a vocabulary of 10,000 to 30,000 words and some suggest that 500 to 1,000 of those are names. We’ve experienced words in place of numbers for years with the telephone system, especially 800 numbers, when a company spells out its product, name, or industry—like 1-800-EAT-SOUP. It should come as no surprise that when the Internet was invented with all its numbered Internet Protocol addresses, humans needed a way to translate those numbers into understandable names. The Domain Name System (DNS) was created in 1983 to enable humans to identify all the computers, services, and resources connected to the Internet by name. DNS translates human readable names into the unique binary information of devices so Internet users are able to find the machines they need. Think of it as the Internet’s phone book. Now what would happen if someone changed your business name and matching phone book entry to his or her own? The phone book now lists “A. Crook,” an imposter who receives all of your calls and controls your number. Or, what if someone completely deleted your entry and no one could find you? That would really hurt business. What if that same situation happened to the domain name tied to your public website? An e-commerce site, at that! Either your customers won’t be able to find you at all or they will be redirected to another site that might look exactly like yours, but it is really A. Crook’s site. A. Crook happily takes their orders and money, leaving you with lost revenue, downtime, or any of the other myriad of issues organizations face when their web property is hijacked. Security was not included in the original DNS design since at the time scalability— rather than malicious behavior—was the primary concern. Many feel that securing DNS would go a long way to securing the Internet at large. Domain Name System Security Extensions (DNSSEC) attempts to add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole. In essence, DNSSEC adds a digital signature to ensure the authenticity of certain types of DNS transactions and, therefore, the integrity of the information. 3
  • 4. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks DNSSEC provides: • Origin authentication of DNS data. • Data integrity. • Authenticated denial of existence. Challenges DNS in the Wild: Bad Things Can Happen DNS has worked just great since its inception, but as with almost everything Internet-related, the bad guys have found ways to exploit the protocol. One such way is called DNS cache poisoning. When you type a URL into your browser, a DNS resolver checks the Internet for the proper name/number translation and location. Typically, DNS will accept the first response or answer without question and send you to that site. It will also cache that information for a period of time until it expires, so upon the next request for that name/number, the site is immediately delivered. DNS won’t need to query the Internet again and uses that address until that entry expires. Since users assume they are getting the correct information, it can get ugly when a malicious system responds to the DNS query first with modified, false information, as it does with DNS cache poisoning. The DNS servers first send the user to the bad link but also cache that fake address until it expires. Not only does that single computer get sent to the wrong place, but if the malicious server is answering for a service provider, then thousands of users can get sent to a rogue system. This can last for hours to days, depending on how long the server stores the information, and all the other DNS servers that propagate the information can also be affected. The imminent dangers posed by a rogue site include delivering malware, committing fraud, and stealing personal or sensitive information. In 2009, the main DNS registrar in Puerto Rico was hacked by a DNS attack.2 Local versions of the websites for Google, Microsoft, Coca-Cola, Yahoo, and others such as PayPal, Nike, and Dell were redirected to defaced sites or blank pages that told users that the requested site had been hacked. In this instance, the users were aware that they were not visiting the real site since the group who claimed responsibility gave notice. In a more sinister incident, one of Brazil’s largest banks suffered an attack that redirected users to a malicious site that attempted to install malware and steal passwords.3 In this situation, the users were not aware that they were on a fake site since the delivered page looked just like the original. These types of attacks are very hard to detect since the users had actually typed the correct domain name in their browsers. 4
  • 5. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Taming the Wild DNSSEC is a series of DNS protocol extensions, defined in Request for Comments (RFCs) 4033, 4034, and 4035, that ensures the integrity of data returned by domain name lookups by incorporating a chain of trust into the DNS hierarchy. The chain is built using public key infrastructure (PKI), with each link in the chain consisting of a public/private key pair. DNSSEC does not encrypt or provide confidentiality of the data, but it does authenticate that data. DNSSEC provides the following: • Origin authentication of DNS data: Resolvers can verify that data has originated from authoritative sources. • Data integrity: Resolvers can verify that responses are not modified in flight. • Authenticated denial of existence: When there is no data for a query, authoritative servers can provide a response that proves no data exists. Deploying DNSSEC involves signing zones with public/private key encryption and returning DNS responses with signatures. (See Figure 1.) A client’s trust in those signatures is based on a chain of trust established across administrative boundaries, from parent to child zone, using a new DNSKEY and delegation signer (DS) resource records. Any DNSSEC deployment must manage cryptographic keys: multiple key generation, zone signing, key swapping, key rollover and timing, and recovery from compromised keys. What IP address is I don’t know, let me ask Who owns the records www.example.com? someone who does. for example.com? End user example.com is 1.1.1.2 example.com is 1.1.1.2 Ask .com DNS Server Local DNS ISP DNS Root DNS server server server Who owns the records Figure 1: How DNSSEC works Ask 1.1.1.1 for example.com? Top Level Domains Chain of trust What IP address is example.com? example.com .com DNS .org DNS .net DNS is 1.1.1.2 server server server DNS server for example.com (1.1.1.1) 5
  • 6. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks To accomplish DNSSEC: 1. Each DNSSEC zone creates one or more pairs of public/private key(s) with the public portion put in DNSSEC record type DNSKEY. 2. The zones sign all resource record sets (RRsets) and define the order in which multiple records of the same type are returned with private key(s). 3. Resolvers use DNSKEY(s) to verify RRsets; each RRset also has a signature attached to it that is called RRSIG. If a resolver has a zone’s DNSKEY(s), it can verify that RRsets are intact by verifying their RRSIGs. The chain of trust is important to DNSSEC since an unbroken chain of trust needs to be established from the root at the top through the top-level domain (TLD) and down to individual registrants. All zones need to be authenticated by “signing,” in that the publisher of a zone signs that zone prior to publication, and the parent of that zone publishes the keys of that zone. With many zones, it is likely that the signatures will expire before the DNS records are updated. Zone operators therefore require a means to automatically re-sign DNS records before these signatures expire. This functionality is called “continuous signing” or “automated key rollover” and is not yet a feature of common name server implementations. Solutions BIG‑IP v10.1 and DNSSEC: The Keys to Success F5® BIG-IP® v10.1 supports DNSSEC as an add-on feature to BIG-IP® Global Traffic Manager™ (available as a standalone device or as a module on BIG-IP® Local Traffic Manager™). BIG-IP Global Traffic Manager (GTM) is a global load balancer that provides high availability, maximum performance, and centralized management for applications running across multiple and globally dispersed data centers. BIG-IP GTM distributes end-user application requests according to business policies and data center and network conditions to ensure the highest possible availability. The BIG-IP GTM DNSSEC feature signs DNS responses in real time and provides the means to deploy DNSSEC quickly and easily in an existing environment. If client requests a website that sits behind a BIG-IP device but does not request an authenticated answer, the BIG-IP GTM DNSSEC feature does nothing and BIG-IP GTM responds normally—passing through the BIG-IP device’s virtual IP address to the DNS server pool and returning directly to the client. When authentication is 6
  • 7. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks requested, the BIG-IP GTM DNSSEC feature intercepts the response and signs the response before sending it to the client computer. (See Figure 2.) In this instance, the DNSSEC request passes through BIG-IP GTM to the DNS servers. When the response is returned, BIG-IP GTM signs the response in real time to ensure continuous signing. The potential attacker cannot forge this response without the corresponding private key. The internal communication between BIG-IP GTM and the DNS server is normal and the external client communication is secure. example.com example.com example.com Client 123.123.123.123 LDNS 123.123.123.123 BIG-IP GTM + + public key + public key DNSSEC feature DNS servers Hacker Figure 2: BIG‑IP GTM DNSSEC feature interaction This real-time signing is critical in dynamic content environments where both objects and users might be coming from various locations around the globe. There are other devices claiming DNSSEC for static DNS and DNSSEC compliance in general, but none of them has good solutions for dynamic content and none, so far, has any solutions for global server load balancing (GSLB)-type DNS responses in which the IP answer can change depending on the requesting client. Since GSLB can provide different answers to different clients for the same fully qualified domain name (FQDN), GSLB and DNSSEC are fundamentally at odds in the original design specifications. DNSSEC, as originally conceived, was focused solely on traditional static DNS and never considered the requirements of GSLB, or intelligent DNS. It’s relatively easy to use BIND to provide DNSSEC for static DNS. It’s more difficult to provide DNSSEC for dynamic DNS, and it’s very difficult to provide DNSSEC for GSLB-type DNS responses, especially in cloud deployments. F5’s general purpose DNSSEC feature provides DNSSEC covering all three scenarios and is simple to implement and maintain while keeping management costs low. F5’s unique, patent-pending solution to the GSLB DNSSEC problem addresses this by signing answers at the time the GSLB device decides what the answer should be. 7
  • 8. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks This is a real-time DNSSEC solution, and, with it, F5 is the only GSLB provider to have a true DNSSEC solution that works. While others have proposed a system in which every possible response is pre-signed, most have concluded that this isn’t a feasible approach. Assuming BIG-IP GTM is already up, configured, and functioning—including DCs, The BIG‑IP GTM DNSSEC feature’s default settings servers, listeners, WIPS, and so on—the DNSSEC key list (see Figure 3) is where the are modeled on the National administrator configures zone signing keys (ZSKs) and key signing keys (KSKs). KSKs Institute of Standards and are used to sign other DNSKEY records and the DS records, while ZSKs are used to Technology (NIST) guidelines, offering an easy, turnkey sign RRSIG. It is best practice to name the keys with the zone name and either zsk means to deploy this powerful or ksk at the end in order to easily identify them. The KSK can be made stronger by solution. using more bits in the key material. It has little operational impact since it is only used to sign a small fraction of the zone data and to verify the zone’s key set, not for other RRsets in the zone. The KSK should be rotated every 12 months and the ZSK every one to two months. No parent/child interaction is required when ZSKs are updated. Required options include: Name Algorithm Bit width FIPS Type (zone signing keys) Optional items include: Rollover period Expiration period Note: The default is no automatic rollover Figure 3: The GUI on the F5 BIG‑IP system makes it simple to quickly configure and secure your DNS infrastructure. Since the KSK is only used to sign a key set, which is most probably updated less frequently than other data in the zone, it can be stored separately from and in a safer location than the ZSK. A KSK can have a longer key effectivity period. For almost any method of key management and zone signing, the KSK is used less frequently than the ZSK. Once a key set is signed with the KSK, all the keys in the key set can be used as ZSKs. If a ZSK is compromised, it can be simply dropped from the key set and the new key set is then re-signed with the KSK. 8
  • 9. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks If a KSK is to be rolled over, there will be interactions with parties other than the zone administrator. These can include the registry of the parent zone or administrators of verifying resolvers that have the particular key configured as secure entry points. Hence, the key effectivity period of these keys can and should be made much longer. 1 The public key enables a client to validate the integrity of something signed with the private key and the hashing enables the client to validate that the content was not tampered with. Since the private key of the public/private key pair could be 2 used to impersonate a valid signer, it is critical to keep those keys secure. F5 employs two industry-leading techniques to accomplish this security task. First, 3 for non-FIPS requirements, F5 employs Secure Vault, a super-secure SSL-encrypted storage system used by BIG-IP devices. Even if the hard disk was removed from the system and painstakingly searched, it would be nearly impossible to recover When creating DNSSEC zones, use the contents of Secure Vault. the most specific FQDN as its name. BIG‑IP GTM will search the set of For military-level security, F5 supports FIPS storage of the private keys, and this DNSSEC zones to find the most is a unique differentiator from many of the DNSSEC providers on the market. specific one to use when signing, Also unique to F5 is the ability to securely synchronize the keys between multiple even if multiple candidates exist. FIPS devices. Additionally, multiple models of F5 hardware (BIG-IP 1500, 3400, (1) Name the DNSSEC zone. (2) Choose the signing key. 6400, 6800, 8400, and 8800) take a further step by using the crypto storage chip (3) Choose the key signing key. on the motherboard to secure a unique hardware key as part of the multi-layer encryption process. Conclusion DNSSEC ensures that the answer you receive when asking for name resolution comes from a trusted name server. Since DNSSEC is still far from being globally deployed and many resolvers either haven’t been updated or don’t support DNSSEC, implementing the BIG-IP GTM DNSSEC feature can greatly enhance your DNS security right away. It can help you comply with federal DNSSEC mandates and help protect your valuable domain name and web properties from rogue servers sending invalid responses. F5 BIG-IP v10.1 now provides DNSSEC signing for DNS records and real-time DNSSEC signing as requested by clients. The combination of BIG-IP Local Traffic Manager + BIG-IP GTM + DNSSEC on one box provides a drop-in DNSSEC solution for any existing DNS deployment, instantly giving you greater control and security over your DNS infrastructure while meeting U.S. Government mandates for DNSSEC compliance. 9
  • 10. Technical Brief DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks Rather than ripping and replacing your current DNS infrastructure, you can simply drop BIG-IP GTM in front of your existing DNS servers and reduce your management costs with implementation and maintenance all on the same appliance. Resources DNSSEC.net DNSSEC Resource Center National Institute of Standards and Technology Tech Republic Public Interest Registry 1 Miller, G. A. (1956). The magical number seven plus or minus two: Some limitations on our capacity for processing information. Psychological Review, 63, 81‑97. 2 Puerto Rico sites redirected in DNS attack, CNET News, Apr. 27, 2009. 3 Cache‑poisoning attack snares top Brazilian bank, The Register, Apr. 22, 2009. F5 Networks, Inc. 401 Elliott Avenue West, Seattle, WA 98119 888‑882‑4447 www.f5.com F5 Networks, Inc. F5 Networks F5 Networks Ltd. F5 Networks Corporate Headquarters Asia‑Pacific Europe/Middle‑East/Africa Japan K.K. info@f5.com info.asia@f5.com emeainfo@f5.com f5j‑info@f5.com © 2009 F5 Networks, Inc. All rights reserved. F5, F5 Networks, the F5 logo, BIG‑IP, FirePass, iControl, TMOS, and VIPRION are trademarks or registered trademarks of F5 Networks, Inc. in the U.S. and in certain other countries. CS10073 1109