180 likes | 344 Views
19 th NDSS (February 2012). 江健 , Tsinghua University 梁锦津, Tsinghua University 李 康 , University of Georgia 李 军 , University of Oregon 段海新, Tsinghua University 吴建平, Tsinghua University. Ghost Domain Names: Revoked Yet Still Resolvable. Outline. Introduction Background
E N D
19th NDSS (February 2012) 江健,Tsinghua University 梁锦津,Tsinghua University 李康,University of Georgia 李军,University of Oregon 段海新,Tsinghua University 吴建平, Tsinghua University Ghost Domain Names: Revoked Yet Still Resolvable
Outline • Introduction • Background • The DNS Name Revocation Vulnerability • Experiments • Possible Defense Approaches • Response from Industries A Seminar at Advanced Defense Lab
Introduction • While primarily used for legitimate purposes, domain names have also been heavily leveraged by malicious activities • Ex: botnet • A major endeavour in stopping these malicious activities has thus been identifying and deleting malicious domain names. • Ex: Waledacand Rustock A Seminar at Advanced Defense Lab
DNS Mechanism .com Recursive Resolver Cache: NS of .phishing.com TTL: 86400 sec .phishing.com client A Seminar at Advanced Defense Lab
Background ;; ANSWERSECTION ;; AUTHORITY SECTION phishing.com. 86400 IN NS ns.phishing.com. ;; ADDITIONAL SECTION ns.phishing.com. 86400 IN A 10.0.0.1 • DNS response DNS Delegation A Seminar at Advanced Defense Lab
DNS Cache Update Policy • The bailiwick rule • The credibility rule • Ex: Trust levels in BIND 9.4.1 A Seminar at Advanced Defense Lab
The DNS Name Revocation Vulnerability ;; AUTHORITY SECTION phishing.com. NS ns.phishing.com. TTL: 100 .com Recursive Resolver .phishing.com ;; AUTHORITY SECTION phishing.com. NS ns2.phishing.com. TTL: 200 OK!! A Seminar at Advanced Defense Lab
Ghost Domain Names ;; AUTHORITY SECTION phishing.com. NS ns.phishing.com. TTL: 100 .com Recursive Resolver .phishing.com ;; AUTHORITY SECTION phishing.com. NS ns2.phishing.com. TTL: 86400 Attacker A Seminar at Advanced Defense Lab
Experiments • Vulnerability testing of popular DNS implementations A Seminar at Advanced Defense Lab
Experiments • Vulnerability testing of public DNS servers A Seminar at Advanced Defense Lab
Measurement • 19,045 open DNS resolvers A Seminar at Advanced Defense Lab
Measurement TTL: 1800, 3600, 14400 Refresh rate: TTL/2, TTL/4, TTL/8 A Seminar at Advanced Defense Lab
Results 70% 10% A Seminar at Advanced Defense Lab
Geographic View A Seminar at Advanced Defense Lab
Refresh Rate A Seminar at Advanced Defense Lab
Possible Defense Approaches • Strengthening the bailiwick rule • Accept authority records only from the parent • Ex: MaraDNS • Refining the credibility rule • Accept authority records from child on the first reply • TTL constraints • update the records EXCEPT TTL • Ex: Unbound 1.4.11 A Seminar at Advanced Defense Lab
Response from Industries • Some new CVE entries • ISC (vendor of BIND) published an advisory for the vulnerability about Ghost Domain [link] • Security team of Microsoft has been aware of the problem, and a case has been created to track it A Seminar at Advanced Defense Lab
Q & A A Seminar at Advanced Defense Lab