DNS Flashcards
Difference Authoritative and Cache/Recursive Resolver
Slide 07-27
DNS Hierarchy
Root: .
TLD: com, de, net
SLD: google, ethz
DNS Protocol
client server protocol operating on TCP/UDP port 53, no encryption, auth, or integritiy
–> DNSSec
Name Server
Server that maps names to objects
- authoritative: server is authoritative for specific zone (ethz)
- caching/resolver: server resolves domains recursively, caches results
DNS resolution process
- client stub asks its resolver (typically ns of ISP)
- resolver asks root server –> gives ns for top level domain (.ch)
- resolver asks ns for TLD –> authoritative ns
- resolver asks auth. ns –> ip, or error
- resolver caches result.
Domain name registrar
organization that manages reservation of second level domain names SLD, below a given TLD
Distributed reflection
–>DDos on victim
DNS over UDP (fire and forget) generate DNS query with spoofed IP of the victim.
ANY request generates much larger answer than request
Mitigation: Source IP verification, response rate limiting, close open resolvers
DNS Spoofing
- DNS request only auth. with TXID that is not encrypted and can be predictable
- attacker sniffs or predicts TXID and replies before leg. DNS resolves request
- A is first: no resolution necessary, can slow down leg. DNS
Cache poisoning
Bad auth. name server adds resolution entries for other domain not originally asked for in additional section. resolver caches entries
Domain Hijacking
compromise domain registrar and change registration entries
Network attack
- Local host: compromise local host file of machine -> eg. disable anti virus systems
- WAN: attack poorly protected client router
- Attack DHCP exchange in local network: after client broadcasts DHCP discover, answer before the leg. DHCP server with compromised DNS
Botnet control
- IP Flux: The FQDN of the CnC host has multiple IP addresses assigned
- Domain Flux: frequent change of multiple FQDN, domains registered with domain generation algorithm
DNS tunneling
use DNS as a communication channel to bypass firewalls
-> data exfiltration and hidden communication
Phantom domain attack
phantom domains are setup as part of attack, these deomains do not resolve or replies are very slow
-> degradation of server performance due to number of outstanding queries
DNSSec
RRSig: signature for record set. Resolvers verify signature with public key stored in DNSKEY record.
DS: glues the chain to parent server
ISSUES:
- Amplification attacks easier
- je nachdem wo geprüft wird, ist die Verbindung bis da trotzdem nicht sicher.
- technical and political worries of how to manage master keys