Lecture 15: DNS Cache Poisoning and DNSSEC Flashcards

1
Q

What is DNS cache poisoning?

A

Attacker spoofs a DNS response and the results are stored in an upstream DNS cache

The poisoned records may redirqect clients to malicious servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does it mean that cache poisoning is self-cleaning?

A

Poisoned DNS records will go stale when their TTL expires and the DNS resolver or cache re-fetches them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why can you not count on the TTL to handle DNS cache posioning?

A

DNS TTL can be very long

Up to 68 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the goals of cache posioning?

A

Redirect users

  • Send them to a website that tries to execute malware
  • Send users to non-existent servers or joke/advertisement pages
  • Use look a like web pages to steal login or other user info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How could an attack install malicious DNS resolver onto a client machine?

A
  • Use a bot or remote access to set the DNS resolver of the machine remotely
  • Physically have access to the machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you mitigate cache posioning and bad resolvers?

A

Compare records returned from different DNS sources (resovlers)

Make DNS call twice to 2 different DNS resolvers, if they dont match you may have a poisoned cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DNSSEC or Domain Name System Security Extensions?

A

A DNS protocol that provides authentication for DNS responses via message signing and chains of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does DNSSEC prevent cache poisoning?

A

Uses public key cryptography to sign DNS responses to prevent spoofing by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the DNS Chain?

A

The DNS servers we follow when making a request

  • Root DNS Server
  • TLD DNS Server
  • Authoritative DNS Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does DNSSEC work with the DNS chain?

A

Passes along verification information along each step in the DNS chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does signing DNS requests work in DNSSEC?

A

When you request records from a DNS server, it will sign it using a private key from a public/private key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are DNSSEC signatures stored?

A

RRSIG

Resource Record SIGnature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What key signing algorithms are considered obsolete?

A
  • RSA
  • MD5
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What key signing algorithms are used today?

A
  • RSA/SHA-1
  • SHA-256
  • SHA-512
  • ECDSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the DNSKEY record?

A

Matching public key of the private key used to generate the RRSIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the benefit of using a public key when providing a signature?

A

User can verify that the signature provided in RRSIG is legitimate

17
Q

How does the chain of trust that DNSSEC uses for verification work?

A

Has of signing key is stored in a DS record in the DNS record of the next server up in the hierarchy

18
Q

What does the TLD server do in the chain of trust?

A

Returns DS records that prove the authoritative DNS server key is legit

19
Q

What does the root server do in the chain of trust?

A

Returns DS records that prove the TLD server key is legit

20
Q

The chain of trust ultimately bubbles up to __ server

A

root

21
Q

What is the advantage of being able to work backwards up the chain of trust until you hit the publicaly known root DNS key

A

Ensures that each signed record from the root server on down can be authenticated using the DS records

22
Q

DNSKEY of the __ level DNS server are published and well known

A

root

23
Q

What are the root DNS keys also known as?

A

Trust anchors

24
Q

What is the only anchor you technically need?

A

The root key

25
Q

What is the small hole in protection in the DNSSEC system?

A

When a request doesnt return records in the response and has nothing to sign

26
Q

What is the NXDOMAN or NODATA problem in DNSSEC?

A

DNS server return a NXDOMAIN or NODATE error if there are no records for a domain

Since they are empty theres no signatures

Theres no good way of authenticating records with no records so they can be forged

27
Q

What record type was created as a work around for requests that don’t return any records?

A

NSEC

28
Q

How do NSEC records work?

A

They explicitly state which domains exist on a given DNS server

If a client requests a domain that doesn’t exist, the NSEC records are returned and signed

29
Q

What is the problem with NSEC and data leakage?

A

NSEC records explicitly tell users whether domains exist or not

30
Q

What record type was created in order to fix the problem with NSEC and data leakage? How does it fix the problem?

A

NSEC3

Replaces the explicit domain reference with a has of the domain

31
Q

What are the drawbacks to DNSSEC?

A
  • No privacy for DNS, only provides authentication
  • Increases size of DNS responses due to hashes and signatures being exchanges
  • Clients must be ready to switch to non-DNSSEC if it isn’t being used- breaking the chain of trust