DNS Security Tutorial
DNS Security Tutorial
|1
DNS Concepts
|2
DNS in a nutshell
|3
DNS Hierarchy
The root
Top-level
fj nodes
Second-level
nodes
Third-level Root
nodes
Top-level
Second level
|4
DNS Components at a Glance
Root Server
TLD Server
SLD Server
|5
DNS Servers
¤ Authoritative Servers
¡ Root Servers
¡ Primary
¡ Secondary
¤ Recursive Servers
¡ Or Recursive Resolvers
¡ Or Caching Servers
|6
Zone Files
$TTL 86400 ; 24 hours could have been written as 24h or 1d
$ORIGIN example.com.
@ IN SOA ns1.example.com. hostmaster.example.com. (
2017092701 ; serial number
3H ; refresh
15 ; retry
1w ; expire
3h ; nxdomain TTL )
|7
Root Zone Data
|8
Top Level Domain (TLD) Zone Data
|9
Reverse Mapping
host.example.com. A 192.0.2.7
| 10
Reverse Mapping
A: 192.0.2.7
PTR:host.example.com.
| 11
DNS Security
12 | 12
Common Uses for Maliciously Registered Domains
| 13
13
Misused Domain Registrations
| 14
14
Domain name registrations are attractive targets for attacks
| 15
Potential Target Points of the DNS Infrastructure/Ecosystem
| 16
Cache Poisoning Attacks
● Attacks that maliciously alter DNS data that a resolver has stored locally
(cached)
● The malicious data will send victims to a phishing site for the lifetime of the
cached entry
| 17
IDN Based Attacks
| 18
DNS Hijacks
| 19
DNS: Data Flow
Zone administrator
1
4
Zone file Primary Caching
Servers
2
3 5
Dynamic
updates
Secondaries Resolvers
20
| 20
DNS Vulnerabilities
Dynamic
updates
Secondaries Resolver
Cache pollution by
Data spoofing
Unauthorized updates
Altered zone data
| 22
Name Server Considerations
• Authoritative vs Recursive
| 23
Know Your SLAs
• Consider your service level targets and how you will meet them
| 24
When It All Goes Wrong
| 25
DNSSEC
26 | 26
Digital Signatures in Theory
| 27
DNS's Data Organization
root KEYs
The Root
tld KEYs
TLD
sld KEYs
SLD
data data records
| 29
Making A Chain
| 30
Resource Records
| 31
RR: DNSKEY
PROTOCOL
OWNER TYPE FLAGS ALGORITHM
example.com. 43200 DNSKEY 256 3 8 (
| 32
DNSKEY: Two Keys, not one…
| 33
RR: RRSIG (Resource Record Signature)
SIGNATURE
CoYkYPqE8Jv6UaVJgRrh7u16m/cEFGtFM8TArbJdaiPu
W77wZhrvonoBEyqYbhQ1yDaS74u9whECEe08gfoe1FGg
. . .
)
| 34
RR: RRSIG
| 35
RR: DS (Delegation Signer)
• The DS record for the child zone is signed together with the rest of the
parent zone data
myzone. DS 61138 5 1
F6CD025B3F5D0304089505354A0115584B56D683
myzone. DS 61138 5 2
CCBC0B557510E4256E88C01B0B1336AC4ED6FE08C8268CC1AA5FBF00 5DCE3210
| 36
Key Rollovers
| 37
DNSSEC Validation
38 | 38
Verification In Theory
| 39
Verification In Theory
| 40
Verification In Theory
| 41
Verification In Theory
| 42
Signing Chain in Practice
root KEY KSK
The Root root KEY ZSK
com. DS
| 45
Validation
| 46
Start with the "final" response
www.example.com. A 192.0.2.2
www.example.com. RRSIG A 8 3 3600 20190228002508
20190201120009 42694 example.com. aSignature
| 47
Engage with ICANN – Thank You and Questions
| 48