Perils of DNS at RIPE-52 71
An anonymous reader wrote in to say that "
The RIPE meeting got off to a good
start yesterday (for those of you outside Europe, RIPE is the European
counterpart to ARIN). Emin Sirer from Cornell presented his study of
DNS vulnerabilities. The results are staggering: the average name
depends on four dozen nameservers, 30% of domains are vulnerable to
domain hijacks by simple script kiddies, 85% of domains are vulnerable
to hijacks by attackers that can DoS two hosts. The lesson: DNS must
be managed by professionals, and the pros have to pay attention to
the DNS delegation graph when they set up name servers."
Associated paper with more details. (Score:4, Informative)
Re:Associated paper with more details. (Score:4, Interesting)
1. Nameservers give correct version information. This is not correct, some intentionally mislead.
2. Nameservers of a certain version string all have certain vulnerabilities. This is not correct, there are dependencies on platform/OS. Also see 1.
3. DNS Clients are dumb. What I mean here is that no credit is given to the DNS client for discarding incorrect information. Some clients will bypass certain cache poisoning.
I appreciate what the paper is trying to say. Security vs usability is always a direct tradeoff. In the case of DNS, its biggest strength (massively distributed) is also its biggest security weakness.
Re:Associated paper with more details. (Score:4, Insightful)
Re:Associated paper with more details. (Score:3)
Meaning, if I as an attacker need to choose between two domains to attack, I would prefer the one that would give the biggest payoff for the least work. More namerservers means the attacker has to do more work for the same number of victims (redirected queries).
Re:Associated paper with more details. (Score:1)
Re:Associated paper with more details. (Score:3)
- Little analysis is given to the effect (in practice) of glue records. A footnote mentions that glue is not authoritative, but does not elaborate on how glue is actually used in the chain.
- TCB is a poor metric for assessing the attack profile with respect to a name. You talk in your comment about the vulnerabilities depending on the shape of the graph, and assert "In practice, DNS dependence graphs tend to be long and narrow." (not supported by
Re:Associated paper with more details. (Score:3)
From the talk: "It is a well-accepted axiom of computer security that a small trusted computing base is highly desirable: it is easier to secure, audit and manage."
The followup would be that a small TCB is also at more risk for failure.
Security, resilience or usability, pick two.
Re:Associated paper with more details. (Score:3)
Having more nameservers in the DNS chain means more of those servers need to be compromised to redirect the same number of requesters. Even better if those nameservers are diverse, so that one exploit wouldn't work on all of them.
Note from the author. (Score:5, Informative)
This survey was a lot of fun. It's sort of like a "how to 0wn the Internet via DNS" survey. In fact, that was the subtitle of my talk and was the most fun academic paper I ever wrote. It's all based on public information, by the way. The findings were quite surprising, at least to us.
First, the average DNS name depends on a large number of nameservers. Not just the two or three nameservers that you designate when you register the name, but also the nameservers those servers are served by, and so on. This set includes a few dozen hosts for the average .COM domain. If you are in the Ukraine, Malaysia, Poland, or Italy, this set includes more than 400 hosts! In contrast, Japan (.jp) is run very well, and names in .jp depend on very few hosts.
Second, some names are incredibly vulnerable. The most vulnerable name in our survey, the Roman Catholic Church web site in the Ukraine, depends on servers in Berkeley, NYU, UCLA, Russia, Poland, Sweden, Norway, Germany, Austria, France , England, Canada, Israel, and Australia. It's possible to take over that Ukrainian website (and announce a new pope, perhaps?) by compromising a host in Monash, Australia. DNS makes a small world after all.
Typically, you can find some compromised hosts in the dependence graph, DoS the non-vulnerable hosts for a very short time when DNS glue is about to expire, and poison caches. Repeat and rinse until you have hijacked the name of your choice.
Finally, some nameservers are very valuable, they control a large percentage of names. Some of these valuable nameservers are in educational institutions, which have no fiduciary responsibility to the names they serve. In fact, folks at NYU may not be aware that they can control the entire namespace for Baltic countries under the right circumstances.
Interestingly, the FBI.GOV site was vulnerable. We reported this to the DHS and someone upgraded the nameserver involved. We suspect the vulnerability we found was a real one, though we did not attempt to take advantage of it so we can't tell for sure.
Our website has an active webserver [cornell.edu] where you can type in your favorite sitename, see its dependencies and vulnerabilities. The data is a snapshot we took when we performed this study; do not be surprised if it does not reflect changes you made in the last few months.
The takeaway from this study is that the conventional wisdom about DNS servers, which says "the more DNS servers you have, the merrier as you increase fault tolerance" is wrong. You increase fault tolerance at the cost of increasing your trusted computing base. If you don't pay attention, someone from Monash Australia can hijack your site, and you might not even notice.
My research group generally looks at how to build more resilient infrastructure services. We built a safety net for DNS [cornell.edu], a system for monitoring updates on the web [cornell.edu], and a system for avoiding SPAM on P2P filesharing networks [cornell.edu]. Check them out if you are interested in new distributed services for the Internet.
Re:Note from the author. (Score:1)
Re:Associated paper with more details. (Score:1)
* inability to notice that dns server is visible under many different ips (thats very often the case in Europe, and that leaded to false assumption about average of 100 hosts used blah blah blah)
* glue records attached to dns reply doesnot increase average of 100 hosts used blah blah
It's important, but far lesser than stated in paper.
Re:This also just in (Score:4, Informative)
Re:This also just in (Score:1)
You are, of course, correct, but it has always been like this. Emin Sirer's report strikes me as either:
1) Chicken Little - "The sky is falling! The sky is falling!"
or
2) A graduate student who needed something to write a paper about.
What's next? A hysterical report about how (gasp!) a root server could be compromised and we'd all be hosed? Duh! Talk about stating the obvious.
Re:This also just in (Score:3, Interesting)
It really isn't the same at all. You sort of hope/expect a root server to be very closely monitoring and controlled by a professional team, but once you start adding multiple links in the chain of varying security and on top of that throw in broken DNS resolvers (like the ones SBC/AT&T use that only cache one nameserver for a given domain... even if the name
More information -- paper (Score:3, Informative)
Re:More information -- paper (Score:2)
Unfortunately, transitive trust is dangerous anywhere. The first example that comes to mind is handing your card over to a retailer to swipe; while it's something that's attempting to be addressed, with chip and pin readers, people equipped in the right way (whether script kiddies in the original example or someone in store with a second or tapped cardswiper (or, presumably next wave, same for chip and pin readers) in mine) have the ability to abuse that trust an
BIND false versions (Score:4, Interesting)
Re: (Score:1)
Re:BIND false versions (Score:1)
1. I would expect the FBI to have a completely seperate infrastructure for their computing needs that have nothing to do with fbi.gov.
2. You really think the FBI is going to depend on Sprint for anything?
Re: (Score:1)
Re: (Score:2, Funny)
Re:BIND false versions (Score:1)
dig is your friend. (Score:4, Interesting)
Re:dig is your friend. (Score:4, Informative)
Re:dig is your friend. (Score:2)
Whois shows it's Pegasus Web Technologies, in Parsippany, NJ.
Re:dig is your friend. (Score:1)
Also , for those outside (and inside) of Europe (Score:4, Informative)
Established in December 1997, the American Registry for Internet Numbers (ARIN) is a Regional Internet Registry (RIR) incorporated in the Commonwealth of Virginia, USA. ARIN is one of five (5) RIRs. Like the other RIRs, ARIN:
* Provides services related to the technical coordination and management of Internet number resources in its respective service region. The ARIN service region includes Canada, the United States, and several islands in the Caribbean Sea and North Atlantic Ocean;
* Facilitates the development of policy decisions made by its members and the stakeholders in its region;
* Is a nonprofit, membership organization;
* Is governed by an executive board elected by its membership.
Ripe and ARIN (Score:1, Offtopic)
Re:Ripe and ARIN (Score:1, Informative)
American Registry for Internet Numbers (ARIN) - Home Page
http://www.arin.net/ [arin.net]
Re:Ripe and ARIN (Score:3, Funny)
A small sample (Score:2)
How many lookups to get to the center? (Score:4, Insightful)
Ask one of the 13 root servers who is nameserver for
Get back (A-M).GTLD-SERVERS.NET, they thoughtfully include IPs
Now ask a GTLD who has futurequest.net
Get back (ns1-ns3).futurequest.net, includes IPs
Now ask ns1 who www is
It provides IP for www is 69.5.6.116
So I guess there were 30 IP addresses involved, but I don't see the arcane resolution problems that this paper talked about. Maybe
Is it a problem or just redundant systems (good)? (Score:4, Insightful)
If you (correctly) configure your systems, you'll have 3 different DNS boxes on 3 different networks so any single problem won't take all of them out.
Okay, that does mean that you've just increased your attack visibility by 3x, but
And yes, if an attacker can get control of 1 of those boxes and DDoS the other 2 then he can redirect those queries to whatever box he wants to.
Re:Is it a problem or just redundant systems (good (Score:2)
While more servers may increase the number of exploits (I question this), that does not mean suddenly the attacker can get more overall exploit value out of those servers.
I suppose you would argue all the DNS eggs should be in one basket?
Re:Is it a problem or just redundant systems (good (Score:2)
You disregard that as the number of servers increases, the exploit value of each server is less. Meaning, with more servers it is more work to get the same exploit value.
Not really. The unhacked DNS servers can be DOSed. The attacker probably can't force all lookups to the hacked box, but if he can shut down the other DNS servers enough to get most of the lookups, that's almost as good.
Re:Is it a problem or just redundant systems (good (Score:1)
I consider a DOS'ed DNS server the same as exploited.
Further, DOSing sends up a red flag, the last thing an attacker wants is more attention.
Re:Is it a problem or just redundant systems (good (Score:2)
I consider a DOS'ed DNS server the same as exploited.
It is a form of exploit, but a simple DOS attack just makes the service unavailable. Coupling the hacking of a vulnerable server with a DOS on the other servers allows the attacker to redirect users and do some real damage.
Further, DOSing sends up a red flag, the last thing an attacker wants is more attention.
But the red flag is visible to the sysadmins managing the DNS servers, not to the poor schmuck who's getting sent to the attacker's copy of
Re:How many lookups to get to the center? (Score:1)
Not news, RIPE itself also to blame (Score:1)
And (not RIPE related) why the hell is
.pl - one of most vulnerable? (Score:3, Informative)
The part which I have emphasized gives us a hint: in Poland there is a tradition of unreliable telecommunications network. The biggest operator is a post-communistic ineffective giant delivering low quality of service. Therefore most businesses have developed a workaround - redundancy. Many registrars (DNS operators) are also Tier-2 ISPs and have links to most polish Tier-1 ISPs. When in reality they have 1 DNS server it can show up as many IP addresses, one for every Tier-1 ISP. And this is not taken into account by this survey, as far as I have gathered from a quick glance.
slashdot.org is vulnerable? (Score:2)
Re:slashdot.org is vulnerable? (Score:1)
Don't worry! Anyone stealing the slashdot.org name to redirect users to his own server will surely be slashdotted at once.
Someone just needs to want change bad enough. (Score:3, Interesting)
The bigger problem is clearly TRUST and can be alleviated if the DNS system was simply reimplemented. Easier said that done, yes, but a p2p with a trust metric system applied isn't overtly complicated and would scale. For instance, lets say you want example.com. It would be delegated when you register, propogated by it's trust amongst the root servers and the two or more namservers you've added when you've signed up. You then setup the trust system algo to prevent large attacks or changes.
The benefits are numerous, the roots are still the roots but are less taxed; their main purpose? The ultimate in trust so that subsequent nameservers always follow the trust metric and should a rogue amount decide to disobey trust metric they are flagged and dropped.
The only problem is actually doing it and setting up some sort of migration path.
Re:Someone just needs to want change bad enough. (Score:2, Informative)
Interestingly, the same research group cited in the story has built precisely such a system, a P2P replacement for DNS [cornell.edu]. It even has a migration path from the current DNS, supports the legacy namespace, and wo
Re:Someone just needs to want change bad enough. (Score:2)
real threats (Score:2)
Attacker could use DNS to relay virus payload to host, thus entirely bypassing NIDS systems.
Any command that resolves hostname could be used to exploit this concept.
It's not commonly used because the limited length of hostnames would require several
queries to transfer larger payloads.
But with some time and effort, attacker could hide the transfer almost completely.
There was an article about this on phrack? around 199x so
Counting ALL root servers? (Score:2)
It seems to me that it would be more accurate to only count 1 server at each level of the hierarchy as Dependent, and all the peers at that level as Redundant (co-dependent?).
The lesson (Score:3, Funny)
That's why I go with Network Solutions!
Well then... (Score:2)
That's nice to know. Then what is ARIN?
Re:Well then... (Score:1)
People who hand out blocks of IP addresses and keep track who has what.
Known to most of people through situations like whois -h whois.arin.net 11.22.33.44
RIPE != RIPE-NCC (Score:3, Informative)
Re:RIPE != RIPE-NCC (Score:2)
DNSSEC, anyone? (Score:1, Interesting)