SlideShare a Scribd company logo
1 | © 2015 All Rights Reserved.
DNS - Co nowego w świecie DNS-o-zaurów?
Adam Obszyński
CCIE, CISSP
2 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
3 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja KJU aka „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
4 | © 2015 All Rights Reserved.
History – a very short one
• 1971 - /etc/hosts & FTP…
• 1983 – DNS has been introduced
• 1996 – DNS NOTIFY & IXFR – The Second Generation
• 1997 - Dynamic Updates in the DNS – 3rd Generation
• Google.com registered!
• Then DNSSEC era begins…
5 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
6 | © 2015 All Rights Reserved.
Cookies
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
7 | © 2015 All Rights Reserved.
DNS Cookies
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
https://tools.ietf.org/html/draft-eastlake-dnsext-cookies-00 od Listopad 2006
8 | © 2015 All Rights Reserved.
DNS Cookies
• Provides weak authentication of queries and responses. Weak brother
of TSIG.
• No protection against “in-line” attackers. No protection against anyone
who can see the plain text queries and responses.
• Requires no setup or configuration, just protocol behavior.
• Intended to great reduce
̶ Forged source IP address traffic amplification DOS attacks.
̶ Forged source IP address recursive server work load DOS attacks.
̶ Forged source IP address reply cache poisoning attacks.
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
9 | © 2015 All Rights Reserved.
DNS COOKIE Option
• A new Option to the OPT-RR
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION-CODE TBD | OPTION-LENGTH = 18 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Resolver Cookie upper half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Resolver Cookie lower half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Server Cookie upper half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Server Cookie lower half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Error Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
10 | © 2015 All Rights Reserved.
Resolver & Server views
Resolver:
̶ Resolver puts a COOKIE in queries with
- A Resolver Cookie that varies with server
– Truncated HMAC(server-IP-address, resolver secret)
- The resolver cached Server Cookie for that Cookie if it has one
̶ Resolver ignores all replies that do not have the correct Resolver Cookie
̶ Caches new Server Cookie and retries query if it gets a Bad Cookie error
with a correct Resolver Cookie
Server:
̶ Server puts a COOKIE in replies with
- A Server Cookie that varies with resolver
– Truncated HMAC(resolver-IP-address, server secret)
- The Resolver Cookie if there was one in the corresponding query
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
11 | © 2015 All Rights Reserved.
Example
Resolver Server
Query: RC:123, SC:???,E:0
ErrReply: RC:123, SC:789, E:BadC
Query: RC:123, SC:789,E:0
AnsReply: RC:123, SC:789,E:0
SC:789
RC:123
RC:123
ForgedReply: RC:???, SC:???,E:0
ForgedQuery: RC:XYZ, SC:???,E:0
ErrReply: RC:XYZ, SC:789, E:BadC RC:XYZ
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
12 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
https://tools.ietf.org/html/draft-ietf-dane-smime-07
Given that the DNS administrator for a domain name is authorized to give
identifying information about the zone, it makes sense to allow that administrator
to also make an authoritative binding between email messages purporting to
come from the domain name and a certificate that might be used by someone
authorized to send mail from those servers. The easiest way to do this is to use
the DNS.
The SMIMEA DNS resource record (RR) is used to associate an end entity
certificate or public key with the associated email address, thus forming a
"SMIMEA certificate association".
13 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
ICANN 51
14 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
15 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
16 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
Testy:
DANE / TLS:
https://www.had-pilot.com/dane/danelaw.html
SMIME & DANE:
https://dane.sys4.de/smtp/mail.unitybox.de
17 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja KJU aka „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
18 | © 2015 All Rights Reserved.
Evolution of DNS DDoS Attacks
• DNS based DDoS attacks are constantly evolving
• Get registrar
account access
• Change NS + add
nice TTL ;-)
• “Phantom”
domains don’t
respond
• Servers keeps
waiting
• Misbehaving domains
lock-up DNS resolvers
with open connections
• Resource exhaustion
• Botnets launch
attacks on one
specific target
• Target domain
DDoS’d, resolver
resources
exhausted
• Uses randomly
generated strings
• Exhausts limit on
outstanding DNS
queries
Registrar / NIC
Phantom Domain
Random Sub-
domain / NXD
CPE Botnet
Based
Domain Lock-up
19 | © 2015 All Rights Reserved.
.MYNIC Registrar case
By Hasnul Hasan
ICANN 49
+
MonitorYOUR
delegations
….
fromoutside;-)
20 | © 2015 All Rights Reserved.
Basic NXDOMAIN Attack
• The attacker sends a flood of queries to
a DNS server to resolve a non-existent
domain/domain name.
• The recursive server tries to locate this
non-existing domain by carrying out
multiple domain name queries but does
not find it.
• In the process, its cache is filled up with
NXDOMAIN results.
Impact:
• Slower DNS server response time for
legitimate requests
• DNS server also spends valuable
resources as it keeps trying to repeat
the recursive query to get a resolution
result.
21 | © 2015 All Rights Reserved.
Random Subdomain Attack (Slow Drip)
• Infected clients create queries by
prepending randomly generated
subdomain strings to the victim’s
domain. E.g. xyz4433.plnog.pl
• Each client may only send a
small volume of these queries to
the DNS recursive server1
• Harder to detect
• Multiple of these infected clients
send such requests
Impact
• Responses may never come
back from these non-existing
subdomains2
• DNS recursive server waits for
responses, outstanding query
limit exhausted
• Target domain’s auth server
experiences DDoS
How the attack works
Victim Domain
e.g. plnog.pl
Bot/bad clients
Queries with random
strings prefixed to victim's
domain
e.g. xyz4433.plnog.pl
Flood of queries
for non-existent
subdomains
DNS recursive
Servers (ISP)
DDoS on
target victim
Resource
exhaustion
on recursive
servers
22 | © 2015 All Rights Reserved.
Domain Lock-up Attack
• Resolvers and domains are setup by attackers to establish TCP-based
connections with DNS resolvers
• When DNS resolver requests a response, these domains send “junk”
or random packets to keep them engaged
• They also are deliberately slow to respond to requests keeping the
resolvers engaged. This effectively locks up the DNS server resources.
Impact
• DNS resolver establishing these connections with the misbehaving
domains exhausts its resources
23 | © 2015 All Rights Reserved.
Botnet Based Attacks from CPE Devices
• Random Subdomain attacks that use botnets to target all traffic to
one site or domain
• Attack involves compromised devices like CPE switches, routers
• Supplied by ISPs
• Supplied by Customer
• These malware infected CPE devices form botnet to send multiple
DDoS traffic to say xyz123.plnog.pl
Impact
• Victim domain experiences DDoS
• DNS resolver resources exhausted
• When CPE devices are compromised,
many other bad things can happen like
• SSL proxy – login credentials theft etc.
• Launch point for attacks against Customer PCs
and environments, i.e. expanding the compromise
24 | © 2015 All Rights Reserved.
Phantom Domain Attack
• “Phantom” domains are setup as part of
attack
• DNS resolver tries to resolve multiple
domains that are phantom domains
• These phantom domains may not send
responses or they will be slow
Impact
• Server consumes resources while waiting
for responses, eventually leading to
degraded performance or failure
• Too many outstanding queries
25 | © 2015 All Rights Reserved.
Newest Attacks – What You can do?
#1 Upstream delays
• For traffic to “slow” servers and zones (NS)
 Any server that exceeded the limit of responsiveness should
sent fewer queries
#2 Recursive timeout
• Timeout for recursive name lookup should be lowered to free up
DNS resolver resources
• Prevents maxing out on the number of outstanding DNS queries
#3 Dynamic Limiting of Bad Clients
• If a client generates too many costly responses (NXDOMAIN,
NXRRset, ServFail)
 Drop or limit it’s traffic
#4 Block or Blacklist
• You have to wait for user call or observe syslog
26 | © 2015 All Rights Reserved.
Eliminate open resolvers ;-)
https://dnsscan.shadowserver.org/
27 | © 2015 All Rights Reserved.
Eliminate broken software…
28 | © 2015 All Rights Reserved.
SPAM/Attacks with Domains less then 24h old
Henry Stern, Farsight | ICANN50 | London
29 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja KJU aka „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
30 | © 2015 All Rights Reserved.
DNS - Collision with Roaming Leak
Search List or Split Brain DNS + New TLD == Leak Issue
www.firma.exampleInternal DNS,
AD, etc.
New TLDs
!!!
collision
!!!
collision
New & nice Loopback address: 127.0.53.53
Encourages to “look this up”
https://icann.org/namecollision
https://newgtlds.icann.org/newgtlds.csv
31 | © 2015 All Rights Reserved.
Q?
32 | © 2015 All Rights Reserved.
THE END
of
“DNS…”
TOPIC WILL* RETURN IN
PLNOG 2015 KRAKÓW
* - maybe ;-)

More Related Content

What's hot

CNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and ArchitectureCNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and Architecture
Sam Bowne
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
Men and Mice
 
Dnssec
DnssecDnssec
Dnssec
guest3131f85
 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoS
APNIC
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
Alex Mayrhofer
 
RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS Evolution
APNIC
 
DNS Cache White Paper
DNS Cache White PaperDNS Cache White Paper
DNS Cache White Paper
Ryan Ellingson
 
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
Amazon Web Services
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
APNIC
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
Men and Mice
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
Men and Mice
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
Sam Bowne
 
DNS-SD Extentions
DNS-SD ExtentionsDNS-SD Extentions
DNS-SD Extentions
Nina Buchina
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS Security
Sam Bowne
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
Men and Mice
 
DNS Vulnerabilities
DNS VulnerabilitiesDNS Vulnerabilities
DNS Vulnerabilities
Mike Spaulding
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Men and Mice
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breaches
Sam Bowne
 
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesCNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilities
Sam Bowne
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSEC
APNIC
 

What's hot (20)

CNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and ArchitectureCNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and Architecture
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
Dnssec
DnssecDnssec
Dnssec
 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoS
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS Evolution
 
DNS Cache White Paper
DNS Cache White PaperDNS Cache White Paper
DNS Cache White Paper
 
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
DNS-SD Extentions
DNS-SD ExtentionsDNS-SD Extentions
DNS-SD Extentions
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS Security
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
DNS Vulnerabilities
DNS VulnerabilitiesDNS Vulnerabilities
DNS Vulnerabilities
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breaches
 
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesCNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilities
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSEC
 

Viewers also liked

4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
PROIDEA
 
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
PROIDEA
 
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PROIDEA
 
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
PROIDEA
 
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PROIDEA
 
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PROIDEA
 
PLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services PlatformPLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services Platform
PROIDEA
 
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
PROIDEA
 
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek MoskalPLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PROIDEA
 
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PROIDEA
 
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile networkPLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PROIDEA
 
JDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub MarchwickiJDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub Marchwicki
PROIDEA
 
JDD2014: What you won't read in books about implementing REST services - Jak...
JDD2014:  What you won't read in books about implementing REST services - Jak...JDD2014:  What you won't read in books about implementing REST services - Jak...
JDD2014: What you won't read in books about implementing REST services - Jak...
PROIDEA
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PROIDEA
 
4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr Pasich4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr Pasich
PROIDEA
 
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PROIDEA
 
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
SIANI
 
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
SIANI
 
Cathy april 5th_2011_key_points
Cathy april 5th_2011_key_pointsCathy april 5th_2011_key_points
Cathy april 5th_2011_key_points
SIANI
 
Perennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem securityPerennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem security
SIANI
 

Viewers also liked (20)

4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
 
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
 
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
 
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
 
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
 
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
 
PLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services PlatformPLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services Platform
 
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
 
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek MoskalPLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
 
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
 
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile networkPLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
 
JDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub MarchwickiJDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub Marchwicki
 
JDD2014: What you won't read in books about implementing REST services - Jak...
JDD2014:  What you won't read in books about implementing REST services - Jak...JDD2014:  What you won't read in books about implementing REST services - Jak...
JDD2014: What you won't read in books about implementing REST services - Jak...
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
 
4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr Pasich4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr Pasich
 
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
 
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
 
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
 
Cathy april 5th_2011_key_points
Cathy april 5th_2011_key_pointsCathy april 5th_2011_key_points
Cathy april 5th_2011_key_points
 
Perennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem securityPerennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem security
 

Similar to PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński

8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
DNS Entrepreneurship Center
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
Deploy360 Programme (Internet Society)
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
APNIC
 
ION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSECION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSEC
Deploy360 Programme (Internet Society)
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
APNIC
 
DNS Survival Guide
DNS Survival GuideDNS Survival Guide
DNS Survival Guide
APNIC
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
Qrator Labs
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
Deploy360 Programme (Internet Society)
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
APNIC
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
Jisc
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
APNIC
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
Nihal Pasham, CISSP
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
Felipe Prado
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
APNIC
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
OpenDNS
 
ION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLSION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLS
Deploy360 Programme (Internet Society)
 
DNS - MCSE 2019
DNS - MCSE 2019DNS - MCSE 2019
DNS - MCSE 2019
Milad Es'Haghi
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
APNIC
 
No more ARP : Another MiTm Attacks
No more ARP : Another MiTm AttacksNo more ARP : Another MiTm Attacks
No more ARP : Another MiTm Attacks
Khajornchol Puwarang
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
Dryden Geary
 

Similar to PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński (20)

8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
ION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSECION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSEC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
DNS Survival Guide
DNS Survival GuideDNS Survival Guide
DNS Survival Guide
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
 
ION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLSION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLS
 
DNS - MCSE 2019
DNS - MCSE 2019DNS - MCSE 2019
DNS - MCSE 2019
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
 
No more ARP : Another MiTm Attacks
No more ARP : Another MiTm AttacksNo more ARP : Another MiTm Attacks
No more ARP : Another MiTm Attacks
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
 

Recently uploaded

Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
Emre Gündoğdu
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
Infosec train
 

Recently uploaded (12)

Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
KubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial IntelligentKubeCon & CloudNative Con 2024 Artificial Intelligent
KubeCon & CloudNative Con 2024 Artificial Intelligent
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
How to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdfHow to make a complaint to the police for Social Media Fraud.pdf
How to make a complaint to the police for Social Media Fraud.pdf
 

PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński

  • 1. 1 | © 2015 All Rights Reserved. DNS - Co nowego w świecie DNS-o-zaurów? Adam Obszyński CCIE, CISSP
  • 2. 2 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 3. 3 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja KJU aka „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 4. 4 | © 2015 All Rights Reserved. History – a very short one • 1971 - /etc/hosts & FTP… • 1983 – DNS has been introduced • 1996 – DNS NOTIFY & IXFR – The Second Generation • 1997 - Dynamic Updates in the DNS – 3rd Generation • Google.com registered! • Then DNSSEC era begins…
  • 5. 5 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 6. 6 | © 2015 All Rights Reserved. Cookies http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 7. 7 | © 2015 All Rights Reserved. DNS Cookies http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html https://tools.ietf.org/html/draft-eastlake-dnsext-cookies-00 od Listopad 2006
  • 8. 8 | © 2015 All Rights Reserved. DNS Cookies • Provides weak authentication of queries and responses. Weak brother of TSIG. • No protection against “in-line” attackers. No protection against anyone who can see the plain text queries and responses. • Requires no setup or configuration, just protocol behavior. • Intended to great reduce ̶ Forged source IP address traffic amplification DOS attacks. ̶ Forged source IP address recursive server work load DOS attacks. ̶ Forged source IP address reply cache poisoning attacks. http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 9. 9 | © 2015 All Rights Reserved. DNS COOKIE Option • A new Option to the OPT-RR 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OPTION-CODE TBD | OPTION-LENGTH = 18 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Resolver Cookie upper half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Resolver Cookie lower half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Server Cookie upper half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Server Cookie lower half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Error Code | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 10. 10 | © 2015 All Rights Reserved. Resolver & Server views Resolver: ̶ Resolver puts a COOKIE in queries with - A Resolver Cookie that varies with server – Truncated HMAC(server-IP-address, resolver secret) - The resolver cached Server Cookie for that Cookie if it has one ̶ Resolver ignores all replies that do not have the correct Resolver Cookie ̶ Caches new Server Cookie and retries query if it gets a Bad Cookie error with a correct Resolver Cookie Server: ̶ Server puts a COOKIE in replies with - A Server Cookie that varies with resolver – Truncated HMAC(resolver-IP-address, server secret) - The Resolver Cookie if there was one in the corresponding query http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 11. 11 | © 2015 All Rights Reserved. Example Resolver Server Query: RC:123, SC:???,E:0 ErrReply: RC:123, SC:789, E:BadC Query: RC:123, SC:789,E:0 AnsReply: RC:123, SC:789,E:0 SC:789 RC:123 RC:123 ForgedReply: RC:???, SC:???,E:0 ForgedQuery: RC:XYZ, SC:???,E:0 ErrReply: RC:XYZ, SC:789, E:BadC RC:XYZ http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 12. 12 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME https://tools.ietf.org/html/draft-ietf-dane-smime-07 Given that the DNS administrator for a domain name is authorized to give identifying information about the zone, it makes sense to allow that administrator to also make an authoritative binding between email messages purporting to come from the domain name and a certificate that might be used by someone authorized to send mail from those servers. The easiest way to do this is to use the DNS. The SMIMEA DNS resource record (RR) is used to associate an end entity certificate or public key with the associated email address, thus forming a "SMIMEA certificate association".
  • 13. 13 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME ICANN 51
  • 14. 14 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME
  • 15. 15 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME
  • 16. 16 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME Testy: DANE / TLS: https://www.had-pilot.com/dane/danelaw.html SMIME & DANE: https://dane.sys4.de/smtp/mail.unitybox.de
  • 17. 17 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja KJU aka „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 18. 18 | © 2015 All Rights Reserved. Evolution of DNS DDoS Attacks • DNS based DDoS attacks are constantly evolving • Get registrar account access • Change NS + add nice TTL ;-) • “Phantom” domains don’t respond • Servers keeps waiting • Misbehaving domains lock-up DNS resolvers with open connections • Resource exhaustion • Botnets launch attacks on one specific target • Target domain DDoS’d, resolver resources exhausted • Uses randomly generated strings • Exhausts limit on outstanding DNS queries Registrar / NIC Phantom Domain Random Sub- domain / NXD CPE Botnet Based Domain Lock-up
  • 19. 19 | © 2015 All Rights Reserved. .MYNIC Registrar case By Hasnul Hasan ICANN 49 + MonitorYOUR delegations …. fromoutside;-)
  • 20. 20 | © 2015 All Rights Reserved. Basic NXDOMAIN Attack • The attacker sends a flood of queries to a DNS server to resolve a non-existent domain/domain name. • The recursive server tries to locate this non-existing domain by carrying out multiple domain name queries but does not find it. • In the process, its cache is filled up with NXDOMAIN results. Impact: • Slower DNS server response time for legitimate requests • DNS server also spends valuable resources as it keeps trying to repeat the recursive query to get a resolution result.
  • 21. 21 | © 2015 All Rights Reserved. Random Subdomain Attack (Slow Drip) • Infected clients create queries by prepending randomly generated subdomain strings to the victim’s domain. E.g. xyz4433.plnog.pl • Each client may only send a small volume of these queries to the DNS recursive server1 • Harder to detect • Multiple of these infected clients send such requests Impact • Responses may never come back from these non-existing subdomains2 • DNS recursive server waits for responses, outstanding query limit exhausted • Target domain’s auth server experiences DDoS How the attack works Victim Domain e.g. plnog.pl Bot/bad clients Queries with random strings prefixed to victim's domain e.g. xyz4433.plnog.pl Flood of queries for non-existent subdomains DNS recursive Servers (ISP) DDoS on target victim Resource exhaustion on recursive servers
  • 22. 22 | © 2015 All Rights Reserved. Domain Lock-up Attack • Resolvers and domains are setup by attackers to establish TCP-based connections with DNS resolvers • When DNS resolver requests a response, these domains send “junk” or random packets to keep them engaged • They also are deliberately slow to respond to requests keeping the resolvers engaged. This effectively locks up the DNS server resources. Impact • DNS resolver establishing these connections with the misbehaving domains exhausts its resources
  • 23. 23 | © 2015 All Rights Reserved. Botnet Based Attacks from CPE Devices • Random Subdomain attacks that use botnets to target all traffic to one site or domain • Attack involves compromised devices like CPE switches, routers • Supplied by ISPs • Supplied by Customer • These malware infected CPE devices form botnet to send multiple DDoS traffic to say xyz123.plnog.pl Impact • Victim domain experiences DDoS • DNS resolver resources exhausted • When CPE devices are compromised, many other bad things can happen like • SSL proxy – login credentials theft etc. • Launch point for attacks against Customer PCs and environments, i.e. expanding the compromise
  • 24. 24 | © 2015 All Rights Reserved. Phantom Domain Attack • “Phantom” domains are setup as part of attack • DNS resolver tries to resolve multiple domains that are phantom domains • These phantom domains may not send responses or they will be slow Impact • Server consumes resources while waiting for responses, eventually leading to degraded performance or failure • Too many outstanding queries
  • 25. 25 | © 2015 All Rights Reserved. Newest Attacks – What You can do? #1 Upstream delays • For traffic to “slow” servers and zones (NS)  Any server that exceeded the limit of responsiveness should sent fewer queries #2 Recursive timeout • Timeout for recursive name lookup should be lowered to free up DNS resolver resources • Prevents maxing out on the number of outstanding DNS queries #3 Dynamic Limiting of Bad Clients • If a client generates too many costly responses (NXDOMAIN, NXRRset, ServFail)  Drop or limit it’s traffic #4 Block or Blacklist • You have to wait for user call or observe syslog
  • 26. 26 | © 2015 All Rights Reserved. Eliminate open resolvers ;-) https://dnsscan.shadowserver.org/
  • 27. 27 | © 2015 All Rights Reserved. Eliminate broken software…
  • 28. 28 | © 2015 All Rights Reserved. SPAM/Attacks with Domains less then 24h old Henry Stern, Farsight | ICANN50 | London
  • 29. 29 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja KJU aka „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 30. 30 | © 2015 All Rights Reserved. DNS - Collision with Roaming Leak Search List or Split Brain DNS + New TLD == Leak Issue www.firma.exampleInternal DNS, AD, etc. New TLDs !!! collision !!! collision New & nice Loopback address: 127.0.53.53 Encourages to “look this up” https://icann.org/namecollision https://newgtlds.icann.org/newgtlds.csv
  • 31. 31 | © 2015 All Rights Reserved. Q?
  • 32. 32 | © 2015 All Rights Reserved. THE END of “DNS…” TOPIC WILL* RETURN IN PLNOG 2015 KRAKÓW * - maybe ;-)

Editor's Notes

  1. Certyfikowany PL Kierowca, Tata, Obywatel, Podatnik DNS - Co nowego w świecie (D)i(N)o(S)aurów. DNS Dobrze znany i szeroko wykorzystywany protokół w sieciach i Internecie. Czy wydarzyło się coś nowego? Czy coś pozmieniało się w standardach? Może pojawiła się nowa forma ataku? Postaram się opowiedzieć co sieci piszczy w temacie DNS. Jeżeli czas i jakość Internetu w trakcie konferencji pozwoli może uda się zademonstrować bardzo modne ostatnio zjawisko ;-) Co dokładnie? Nie powiem. Zapraszam na Sesje! Prowadzący     Adam Obszyński (Infoblox)
  2. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  3. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  4. Paul Mockapetris Notify Poul Vixie
  5. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  6. If query received with bad or no Server Cookie, send back short error message
  7. Bad guy Resolver behind a NAT Could get Server Cookie and attack other resolvers behind the NAT Solution: Mix Resolver Cookie into Server Cookie hash so multiple resolvers that appear to be at the same IP address are distinguished Anycast Servers Need to use the same server secret or assure that queries from the same resolver usually go to the same server
  8. dig +dnssec type52 _443._tcp.www.freebsd.org
  9. Icann51
  10. dig +dnssec type52 _443._tcp.www.freebsd.org
  11. dig +dnssec type52 _443._tcp.www.freebsd.org
  12. dig +dnssec type52 _443._tcp.www.freebsd.org
  13. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  14. ICAN 49 CHECK YOUR NS records…. Deployment of myTAC 2-Factor (2FA) authentication modules. SMS – Computer authentication with verification using SMS Smart – Smartphone application-based (IOS & Android) Points of Protection – Authentication Process – Password Recovery
  15. It may be a faster rate as well…1000s of packets per second is possible and we have seen it Responses start with NXDOMAIN , gradually more to ServFail as the load increase and then non-responsive as the target vitcim’s DNS fails Target could be the internal recursive server in which case the volume of these queries from each client will be higher. If the target is a website (maybe a gaming site or govt site), then the volume is slower from each client to avoid detection but more number of clients will originate these queries to DDoS the target victim.
  16. Phantom domain mitigation - Automatic black-holing of non-responsive and misbehaving servers, and the zones they serve A list of known dead servers and zones is created ADP drops all queries to these servers on the non-responsive list For traffic to flaky servers and zones, rate limiting is applied Any server that exceeded the limit of responsiveness will be sent fewer queries for a configurable of time Limits configured through CLI 2. Adjustable recursive timeout Timeout for recursive name lookup can be lowered to quickly free up DNS resolver resources under attack Prevents maxing out on the number of outstanding DNS queries What is the default now?? Are we changing the default?? Configured through CLI we had given this to some customers who were experiencing NXD attack. We are now productizing this. A misbehaving server can pretend to be authoritative for lots of domains . So blackhole these servers. We have learnt through the customer experiences and the pcap files, there are multiple flavor of attacks that need different ways of mitigation.
  17. Henry Stern, Farsight | ICANN50 | London How to get data? False positivies
  18. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD