24 research outputs found
Can NSEC5 be practical for DNSSEC deployments?
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible for responding to DNS queries for the zone. This paper redesigns NSEC5 to make it both practical and performant. Our NSEC5 redesign features a new fast verifiable random function (VRF) based on elliptic curve cryptography (ECC), along with a cryptographic proof of its security. This VRF is also of independent interest, as it is being standardized by the IETF and being used by several other projects. We show how to integrate NSEC5 using our ECC-based VRF into the DNSSEC protocol, leveraging precomputation to improve performance and DNS protocol-level optimizations to shorten responses. Next, we present the first full-fledged implementation of NSEC5âextending widely-used DNS software to present a nameserver and recursive resolver that support NSEC5âand evaluate their performance under aggressive DNS query loads. Our performance results
indicate that our redesigned NSEC5 can be viable even for high-throughput scenarioshttps://eprint.iacr.org/2017/099.pdfFirst author draf
TI-DNS: A Trusted and Incentive DNS Resolution Architecture based on Blockchain
Domain Name System (DNS) is a critical component of the Internet
infrastructure, responsible for translating domain names into IP addresses.
However, DNS is vulnerable to some malicious attacks, including DNS cache
poisoning, which redirects users to malicious websites displaying offensive or
illegal content. Existing countermeasures often suffer from at least one of the
following weakness: weak attack resistance, high overhead, or complex
implementation. To address these challenges, this paper presents TI-DNS, a
blockchain-based DNS resolution architecture designed to detect and correct the
forged DNS records caused by the cache poisoning attacks in the DNS resolution
process. TI-DNS leverages a multi-resolver Query Vote mechanism to ensure the
credibility of verified records on the blockchain ledger and a stake-based
incentive mechanism to promote well-behaved participation. Importantly, TI-DNS
is easy to be adopted as it only requires modifications to the resolver side of
current DNS infrastructure. Finally, we develop a prototype and evaluate it
against alternative solutions. The result demonstrates that TI-DNS effectively
and efficiently solves DNS cache poisoning
Retrofitting Post-Quantum Cryptography in Internet Protocols:A Case Study of DNSSEC
Quantum computing is threatening current cryptography, especially the asymmetric algorithms used in many Internet protocols. More secure algorithms, colloquially referred to as Post-Quantum Cryptography (PQC), are under active development. These new algorithms differ significantly from current ones. They can have larger signatures or keys, and often require more computational power. This means we cannot just replace existing algorithms by PQC alternatives, but need to evaluate if they meet the requirements of the Internet protocols that rely on them. In this paper we provide a case study, analyzing the impact of PQC on the Domain Name System (DNS) and its Security Extensions (DNSSEC). In its main role, DNS translates human-readable domain names to IP addresses and DNSSEC guarantees message integrity and authenticity. DNSSEC is particularly challenging to transition to PQC, since DNSSEC and its underlying transport protocols require small signatures and keys and efficient validation. We evaluate current candidate PQC signature algorithms in the third round of the NIST competition on their suitability for use in DNSSEC. We show that three algorithms, partially, meet DNSSECâs requirements but also show where and how we would still need to adapt DNSSEC. Thus, our research lays the foundation for making DNSSEC, and protocols with similar constraints ready for PQC
RPKI vs ROVER: Comparing the Risks of BGP Security Solutions
Route Origin Verification (ROVER), a mechanism for securing interdomain routing with BGP, is a proposed alternative to the Resource Public Key Infrastructure (RPKI). While the RPKI requires the design and deployment of a completely new security infrastructure, ROVER leverages existing reverse DNS and DNSSEC deployments. Both ROVER and RPKI are based on a hierarchy of authorities that are trusted to provide information about the routing system.
It has been argued recently that misconfigurations or compromises of the RPKI\u27s trusted authorities can present new risks to the routing system. Meanwhile, the advocates of ROVER claim that it provides a fail-safe approach, where the Internet will continue to work as it is even when ROVER fails. This poster therefore compares the impact of ROVER failures to those of the RPKI
Measuring DNS over TCP in the Era of Increasing DNS Response Sizes: A View from the Edge
The Domain Name System (DNS) is one of the most crucial parts of the
Internet. Although the original standard defined the usage of DNS over UDP
(DoUDP) as well as DNS over TCP (DoTCP), UDP has become the predominant
protocol used in the DNS. With the introduction of new Resource Records (RRs),
the sizes of DNS responses have increased considerably. Since this can lead to
truncation or IP fragmentation, the fallback to DoTCP as required by the
standard ensures successful DNS responses by overcoming the size limitations of
DoUDP. However, the effects of the usage of DoTCP by stub resolvers are not
extensively studied to this date. We close this gap by presenting a view at
DoTCP from the Edge, issuing 12.1M DNS requests from 2,500 probes toward Public
as well as Probe DNS recursive resolvers. In our measurement study, we observe
that DoTCP is generally slower than DoUDP, where the relative increase in
Response Time is less than 37% for most resolvers. While optimizations to DoTCP
can be leveraged to further reduce the response times, we show that support on
Public resolvers is still missing, hence leaving room for optimizations in the
future. Moreover, we also find that Public resolvers generally have comparable
reliability for DoTCP and DoUDP. However, Probe resolvers show a significantly
different behavior: DoTCP queries targeting Probe resolvers fail in 3 out of 4
cases, and, therefore, do not comply with the standard. This problem will only
aggravate in the future: As DNS response sizes will continue to grow, the need
for DoTCP will solidify.Comment: Published in ACM SIGCOMM Computer Communication Review Volume 52
Issue 2, April 202
Roll, Roll, Roll your Root:A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover
The DNS Security Extensions (DNSSEC) add authenticity and integrity to the naming system of the Internet. Resolvers that validate information in the DNS need to know the cryptographic public key used to sign the root zone of the DNS. Eight years after its introduction and one year after the originally scheduled date, this key was replaced by ICANN for the first time in October 2018. ICANN considered this event, called a rollover, "an overwhelming success" and during the rollover they detected "no significant outages". In this paper, we independently follow the process of the rollover starting from the events that led to its postponement in 2017 until the removal of the old key in 2019. We collected data from multiple vantage points in the DNS ecosystem for the entire duration of the rollover process. Using this data, we study key events of the rollover. These events include telemetry signals that led to the rollover being postponed, a near real-time view of the actual rollover in resolvers and a significant increase in queries to the root of the DNS once the old key was revoked. Our analysis contributes significantly to identifying the causes of challenges observed during the rollover. We show that while from an end-user perspective, the roll indeed passed without major problems, there are many opportunities for improvement and important lessons to be learned from events that occurred over the entire duration of the rollover. Based on these lessons, we propose improvements to the process for future rollovers
Towards Adoption of DNSSEC: Availability and Security Challenges
DNSSEC deployment is long overdue; however, it
seems to be finally taking off. Recent cache poisoning attacks
motivate protecting DNS, with strong cryptography, rather than
with challenge-response âdefensesâ.
Our goal is to motivate and help correct DNSSEC deployment.
We discuss the state of DNSSEC deployment, obstacles to
adoption and potential ways to increase adoption. We then
present a comprehensive overview of challenges and potential
pitfalls of DNSSEC, well known and less known, including:DNSSEC deployment is long overdue; however, it
seems to be finally taking off. Recent cache poisoning attacks
motivate protecting DNS, with strong cryptography, rather than
with challenge-response âdefensesâ.
Our goal is to motivate and help correct DNSSEC deployment.
We discuss the state of DNSSEC deployment, obstacles to
adoption and potential ways to increase adoption. We then
present a comprehensive overview of challenges and potential
pitfalls of DNSSEC, well known and less known, including:
- Vulnerable configurations: we present several DNSSEC configurations,
which are natural and, based on the limited
deployment so far, expected to be popular, yet are vulnerable
to attack. This includes NSEC3 opt-out records and interdomain
referrals (in NS, MX and CNAME records).
- Incremental Deployment: we discuss potential for increased
vulnerability due to popular practices of incremental deployment,
and recommend secure practice.
- Super-sized Response Challenges: DNSSEC responses include
cryptographic keys and hence are relatively long; we
explain how this extra-long responses cause interoperability
challenges, and can be abused for DoS and even DNS
poisoning. We discuss potential solutions.
- Vulnerable configurations: we present several DNSSEC configurations,
which are natural and, based on the limited
deployment so far, expected to be popular, yet are vulnerable
to attack. This includes NSEC3 opt-out records and interdomain
referrals (in NS, MX and CNAME records).
- Incremental Deployment: we discuss potential for increased
vulnerability due to popular practices of incremental deployment,
and recommend secure practice.
- Super-sized Response Challenges: DNSSEC responses include
cryptographic keys and hence are relatively long; we
explain how this extra-long responses cause interoperability
challenges, and can be abused for DoS and even DNS
poisoning. We discuss potential solutions
Loopholes for Circumventing the Constitution: Unrestrained Bulk Surveillance on Americans by Collecting Network Traffic Abroad
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert Americanâs traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some of the techniques we describe, we cannot establish the extent to which these loopholes are exploited in practice. An actionable short-term remedy to these loopholes involves updating the antiquated legal definition of âelectronic surveillanceâ in the Foreign Intelligence Surveillance Act (FISA), that has remained largely intact since 1978. In the long term, however, a fundamental reconsideration of established principles in US surveillance law is required, since these loopholes cannot be closed by technology alone. Legal issues that require reconsideration include the determination of applicable law by the geographical point of collection of network traffic, the lack of general constitutional or statutory protection for network-traffic collection before users are âintentionally targeted,â and the fact that constitutional protection under the Fourth Amendment is limited to âUS personsâ only. The combination of these three principles results in high vulnerability for Americans when the US intelligence community collects Americansâ network traffic abroad
Library and Tools for Server-Side DNSSEC Implementation
Tato prĂĄce se zabĂœvĂĄ analĂœzou souÄasnĂœch open source ĆeĆĄenĂ pro zabezpeÄenĂ DNS zĂłn pomocĂ technologie DNSSEC. Na zĂĄkladÄ provedenĂ© reĆĄerĆĄe je navrĆŸena a implementovĂĄna novĂĄ knihovna pro pouĆŸitĂ na autoritativnĂch DNS serverech. CĂlem knihovny je zachovat vĂœhody stĂĄvajĂcĂch ĆeĆĄenĂ a vyĆeĆĄit jejich nedostatky. SouÄĂĄstĂ nĂĄvrhu je i sada nĂĄstrojĆŻ pro sprĂĄvu politiky a klĂÄĆŻ. FunkÄnost vytvoĆenĂ© knihovny je ukĂĄzĂĄna na jejĂm pouĆŸitĂ v serveru Knot DNS.This thesis deals with currently available open-source solutions for securing DNS zones using the DNSSEC mechanism. Based on the findings, a new DNSSEC library for an authoritative name server is designed and implemented. The aim of the library is to keep the benefits of existing solutions and to eliminate their drawbacks. Also a set of utilities to manage keys and signing policy is proposed. The functionality of the library is demonstrated by it's use in the Knot DNS server.
Le programme MORECOWBELL de la NSA sonne le glas du DNS
Traduit de l'anglais. Titre original : « NSA's MORECOWBELL: Knell for DNS ».Cet article dĂ©crit le programme « MORECOWBELL » de l'agence d'espionnage Ă©tasunienne NSA et montre les dĂ©fauts du protocole DNS qu'il exploite. Un Ă©tat de l'art des alternatives Ă DNS est ensuite donnĂ©, en Ă©valuant l'efficiacitĂ© contre les attaques telles que celles perpĂ©trĂ©es par la NSASur le net, presque tout commence par une requĂȘte au Domain Name System (DNS, pour « systĂšme de noms de domaine »), un protocole au cĆur d'Internet qui permet aux usagers d'accĂ©der Ă des services par un nom tel que www.example.com, plutĂŽt que par une adresse IP numĂ©rique comme 2001:DB8:4145::4242. DĂ©veloppĂ© au « bon vieux temps », le DNS contemporain ressemble Ă un tableau de bord de l'activitĂ© du rĂ©seau pour malvoyants. Par consĂ©quent, il attire non seulement toutes sortes de surveillances Ă des fins commerciales, mais aussi la National Security Agency (NSA), comme le montrent de nouveaux documents sur son programme MORECOWBELL. Ătant donnĂ©es les faiblesses de conception du DNS, on peut se demander si le DNS peut ĂȘtre sĂ©curisĂ© et sauvĂ© ou bien si il doit ĂȘtre remplacĂ©---tout du moins pour certains cas d'utilisation