Securing Dns

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Securing Dns as PDF for free.

More details

  • Words: 1,917
  • Pages: 25
Strategies & Techniques for Simplifying and Securing Your DNS, DHCP, & IP Infrastructure

Securing Your DNS Infrastructure Presented By Alex Drescher, Director, Software Product Planning Tim Rooney, Director, Software Product Management

INS Background ‹

Vendor-independent, global provider of IT infrastructure consulting services and software

‹

„

13 years of business-centric technology consulting

„

Scalable software solutions for complex IP networks

„

30+ offices across North America, Europe & SE Asia

Focus on Fortune 1000 enterprises and major service providers

2

„

Experience with >75% of Fortune 500

„

Conducting business with >50% of the Fortune 100

„

Conducting business with all major voice and data SPs

The knowledge behind the network.®

January 2005

You Mean My DNS Isn’t Secure?

3

The knowledge behind the network.®

January 2005

Importance of DNS Security ‹ ‹ ‹

IP applications usability DNS ubiquity DNS attack impacts „

„

„

4

Attacker access to host and IP address information on your network Attacker can modify zone data, pointing web or email servers elsewhere Denial of service attacks can prevent web server and email access

The knowledge behind the network.®

January 2005

Man in the Middle or Spoofing Attacks ‹

Attacker name server “intercepts” DNS query

‹

Attacker name server responds with a misleading response „ „

‹

Packet Interception ID Guessing – ID field 16 bits + 16 bit server UDP port – 232 possibilities

Resolver caches this false information

Intended Name Server What is the address for www.ins.com?

The address is 168.77.23.15

? s.com n i . w w fo r w s s e r dd th e a s i t a Wh The

5

The knowledge behind the network.®

addr

January 2005

e ss i s 16 8.77 .2

3.15

Attacker Name Server

DNS Spoofing/Cache Poisoning ‹

Resolver queries a local DNS server

‹

The local DNS server issues recursive query to obtain the information if not authoritative or cached

‹

Attacker spoofs intended name server response

‹

Local DNS server caches this information

‹

Resolver caches this information

What is the address for www.ins.com?

The address is 168.77.23.15

ww fo r w s s e r dd th e a w o n uk Do yo Sure it’

6

The knowledge behind the network.®

s 16 8.77 .23.1 5

January 2005

.ins.

Intended Name Server com?

Attacker Name Server

Name Chaining ‹

‹

‹

Attacker’s response includes one or more RRs with DNS names in their RDATA Attacker introduces DNS names or the attacker’s choosing Attacker can provoke a query for such names „

E.g., graphic link in email – victim’s email program resolves link Intended Name Server What is the address for www.ins.com?

The address is 198.134.150.150

? s.com n i . w w fo r w s s e r dd th e a s i t a Wh The addr e ss i And s 19 h ere 8.13 is so 4.15 me a 0.15 0 dd’l info

7

The knowledge behind the network.®

January 2005

Attacker Name Server

DNS Buffer Overflow ‹ ‹

‹

‹

‹

8

“Smashing the Stack” Can result in attacker gaining root user access to the name server Attacker can obtain zone information from the master server to identify hosts and IP addresses for subsequent attack Attacker can also modify resource records to hijack certain applications or resources Attacker can also, as a root user, access and modify other applications on that server

The knowledge behind the network.®

January 2005

Client Resolver Configuration Attack ‹

Attacker modifies the DNS server IP addresses configured on the client and/or hosts.txt file „ „

‹ ‹

Web plug-in DHCP or PPP configuration

Client issues DNS queries to the attacker’s DNS servers Attack can arise in the form of trojan horse web download

Control Channel Access ‹

9

Attacker utilizes ndc or rndc commands to stop or start the name server, reload a zone and other critical functions

The knowledge behind the network.®

January 2005

Vulnerability Summary ‹

DNS Server Integrity „ „

‹

DNS Service Availability „ „

‹

„ „

Footprinting or viewing zone data Man in the middle, spoofing, cache poisoning, name chaining Client resolver attack

DNS Communications Integrity „ „

10

Name server deployment Denial of Service

DNS Information Integrity „

‹

Buffer overflows OS vulnerabilities

Communications interception, disruption, and unauthorized updates Control Channel access

The knowledge behind the network.®

January 2005

Securing DNS Server Integrity ‹

Run DNS on dedicated hardware „ „

‹

Run latest version of DNS software „

‹

„

„

If attacker gains access, limits root and file system access named –u user –g group –t chroot_directory chroot_subdirectory below file system root

Hardened OS and/or OS platform diversity „ „ „

11

Reduce buffer overflow and other vulnerabilities

Jailed environment – chroot (Unix/Linux) „

‹

If attacker gains access, limits exposure to other apps Appliance or general purpose hardware

Run only necessary OS services Restrict open TCP/UDP ports Limit users and permissions as much as possible

The knowledge behind the network.®

January 2005

Securing DNS Service Availability ‹ ‹ ‹

Deploy multiple authoritative servers for high availability Deploy servers on multiple networks and/or ISPs Deploy external name space on external servers separate from internal servers „

„

„

„

‹

Consider running internal roots „

12

Minimize open ports on external servers in particular Minimize open ports on internal gateway between internal and external name servers Deploy appropriate ACLs and security options on all servers If multiple servers not possible implement BIND 9 Views Internal servers hints file modification

The knowledge behind the network.®

January 2005

Securing DNS Information Integrity ‹ ‹

‹

Maintain currency of DNS server releases Configure logging on each server and monitor for exceptions Lock down controls on access to DNS information „

‹ ‹

13

Implement ACLs for query, transfer, update, notify

“Hide” your master DNS servers Keep up to latest releases of OS/IP stack (resolver) to minimize resolver vulnerabilities

The knowledge behind the network.®

January 2005

Securing DNS Communications Integrity ‹

Restrict zone transfers and updates via ACLs „

‹

Digitally sign transfers and updates „

‹

controls statement

Disallow recursive queries on “delegation point” servers „

Resolvers should not “point” to these servers

‹

Separate network for zone transfers and control channels

‹

Secure the management interface to the server „ „

14

TSIG, GSS-TSIG

Control channel access control „

‹

allow-transfer, allow-update, allow-notify

User definable port Data encryption

The knowledge behind the network.®

January 2005

DNS Communications Integrity Example TSIG Configuration

15

1.

Create pairwise key

2.

Deploy the key to each server

The knowledge behind the network.®

January 2005

DNS Communications Integrity Example TSIG Configuration

16

3.

Inform the servers of the key

4.

Instruct the servers to apply the key

5.

Apply on ACLs as well

The knowledge behind the network.®

January 2005

Summary of Major DNS Options Impacting Security ‹

ACLs „

‹

allow-transfer

z

allow-recursion

z

allow-notify

z

allow-query

z

allow-update

z

blackhole

view “viewname” { options and zone blocks };

IP address/port specifications

„

query-source address addr port port; recursive query source notify-source IP-addr [port port];

„

listen-on { IP-addr port port; ... ; };

„

„

17

z

DNS views – multiple servers on one server „

‹

acl “aclname” { addresses }

use-id-pool yes; randomize query message IDs – standard for BIND 9

The knowledge behind the network.®

January 2005

Summary of Major DNS Options Impacting Security ‹

Logging „ „

‹

‹

18

logging { channel channel-name channel-specs }; category name { channel-name ; ... ; };

Control channel access „

controls ( inet * allow { ACL; } keys {“rndc-key”;};

„

rndc.conf

Miscellaneous „

recursion no;

„

version “faux version text”

„

pidfile “pathname to named.pid”

„

directory “pathname to zone data files”

„

fetch-glue no

Standard on BIND 9 (no)

The knowledge behind the network.®

January 2005

What About DNSSEC? ‹

Services Provided „

‹

„

Authenticated public key process for accessing signed zones

„

Security of DNS data (not communications)

New Resource Record Types „

RRSIG – stores the zone’s digital signature(s)

„

DNSKEY – stores the zone’s public key

„

„

19

Provides integrity and origin authentication to resolvers via digital signatures

DS – stores the public key(s) used in the process of determining a delegated zone’s key(s) NSEC – canonically links existing names in a zone to enable a security aware resolver to authenticate a negative reply for name or type non-existence

The knowledge behind the network.®

January 2005

DNSSEC Pros and Cons ‹

Pros „ „ „

‹

Cons „

„ „

20

End to end integrity checks Better protects resolver Provides protection of DNS information integrity z Origin authentication z Information integrity protection Not widely implemented or deployed as yet z Intervening non-security-aware devices such as NATs, DNS proxies or recursive name servers may invalidate security Resolver performance Key rollover

The knowledge behind the network.®

January 2005

Microsoft Recommendations for DNS Security ‹ ‹ ‹ ‹ ‹ ‹

Deploy external name space on external servers separate from internal servers Deploy servers on multiple networks and/or ISPs Encrypt zone replication traffic Configure firewalls to enforce packet filtering for UDP and TCP port 53. Restrict which DNS servers are allowed to initiate a zone transfer for each zone Prevent unauthorized access to your servers „ „

‹ ‹

Monitor the DNS logs Implement Active Directory™ for internal servers „

21

Allow only secure dynamic update for your zones Limit the list of DNS servers that are allowed to obtain a zone transfer.

Integrated zones with secure dynamic update.

The knowledge behind the network.®

January 2005

INS IPControl Software Simplifying DNS Security Configuration

Graphical web interface ‹ DNS option dictionaries ‹ Address match lists facilitate ACL creation ‹ Auto TSIG key generation ‹ Pairwise server TSIG assignment ‹ Simple internal root server designation and hints file customization ‹ Easy definition of logging channels and association with categories ‹ Auto rndc.conf creation ‹ Much more… Contact us at [email protected] or +1-800-390-6295 ‹

22

The knowledge behind the network.®

January 2005

Resources ‹

White Papers

http://www.ins.com/knowledge/whitepapers.asp „ „

‹

Best Practices for Next Generation IP Address Management INS IPControl™ Return on Investment Analysis

NetKnowledge Webinars

http://www.ins.com/knowledge/webseminar_archives.asp „

‹

Websites „ „ „ „

‹

ISC BIND Site - www.isc.org/sw/bind CERT® – www.cert.org (advisories) or www.us-cert.gov DNSSEC – www.dnssec.net Microsoft DNS Resources – www.microsoft.com/windowsserversystem/default.mspx

IETF Working Groups „ „

23

IP Management Best Practices – Facing the New Reality

DNS Extensions - www.ietf.org/html.charters/dnsext-charter.html DNS Operations - www.ietf.org/html.charters/dnsop-charter.html

The knowledge behind the network.®

January 2005

Question and Answer ‹

Tell us what you think about this webinar http://www.ins.com/knowledge/surveys/feedback.asp

‹

Upcoming webinars „

Understanding End-to-End Performance to Optimize Business Solutions, Feb. 16th

„

‹

Adaptable IP Inventory, Feb. 24th

For more information „

Call 1-888-767-2988 in the U.S., 44 (0) 1628 503000 in Europe, or 1-408-330-2700 worldwide

24

The knowledge behind the network.®

January 2005

Glossary ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹ ‹

25

ACL – Access Control List BIND – Berkeley Internet Name Domain DMZ – Demilitarized Zone DNS – Domain Name System DNSSEC – DNS Security Extensions GSS-TSIG – Generic Security Specification – Transaction Signature NAT – Network Address Translation NDC – Name Daemon Controller PPP – Point-to-Point Protocol RNDC – Remote Name Daemon Controller RDATA – Record Data field within each resource record RR – Resource Record TCP – Transmission Control Protocol TSIG – Transaction Signature UDP – User Data Protocol

The knowledge behind the network.®

January 2005

Related Documents