considered harmful dns resolvers - sigcommconferences.sigcomm.org/hotnets/2014/slides/... ·...

34
DNS Resolvers Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich

Upload: others

Post on 03-Jun-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

DNS Resolvers Considered HarmfulKyle Schomp, Mark Allman, and Michael Rabinovich

Page 2: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

DNS resolvers abstract complexity and offer the possibility of improved performance and better scalability.

Why are they harmful?

2

Page 3: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Resolvers Are Vulnerable to Cache Injection● Kaminsky vulnerability discovered in 2008, 16% of resolvers

vulnerable to Kaminsky attack in 2012[1]

● Preplay attack discovered in 2014, millions of wifi routers acting as resolvers are vulnerable[1]

● Shulman attack discovered in 2013, 79% of resolvers vulnerable[2]

[1] Schomp, Kyle, Tom Callahan, Michael Rabinovich, and Mark Allman. "Assessing DNS Vulnerability to Record Injection." PAM (2014).

[2] Herzberg, Amir and Haya Shulman. “FragmentationConsidered Poisonous, or: One-domain-to-rule-them- all.org.” CNS (2013).

3

Page 4: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Resolvers Should Not Be Trusted● Resolvers rewrite responses for non-existent domains,

effects 24% of clients[1]

● Others intentionally participate in hijacking domains (e.g., Paxfire in 2011[3])

● Many countries use resolvers to enable censorship[4]

● ...yet we give them access to sensitive user information

[4] Verkamp, John-Paul, and Minaxi Gupta. "Inferring mechanics of web censorship around the world." 2nd FOCI (2012).

[3] Weaver, Nicholas, Christian Kreibich, and Vern Paxson. "Redirecting DNS for ads and profit." FOCI (2011).

4

Page 5: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Resolvers Obscure Clients

● Client-resolver location mismatch, 7.5-15% of clients suffer reduced performance due to wrong CDN edge server[5]

● Resolvers hide client population reducing the effectiveness of DNS-based load balancing

[5] Huang, Cheng, Ivan Batanov, and Jin Li. "A practical solution to the client-LDNS mismatch problem." SIGCOMM (2012).

5

Page 6: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

[6] http://openresolverproject.org/

Resolvers Used In Amplification Attacks● 24 million open resolvers on the Internet today[6]

● DNS amplification attacks are massive[7] and growing in popularity[8]

[7] http://www.zdnet.com/the-largest-ddos-attack-didnt-break-the-internet-but-it-did-try-7000013225/

[8] NSFOCUS 2014 Mid-Year DDoS Threat Report.http://en.nsfocus.com/2014/SecurityReport_0922/190.html

6

Page 7: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Existing SolutionsSolutions to some of these issues, e.g.,

○ Random transaction IDs and source ports mitigate guessing attacks such as Kaminsky

○ Closing open resolvers thwarts amplification attacks and preplay○ EDNS-client-subnet (ECS) reveals more information about clients

behind a resolver○ DNSSEC provides data integrity and protects against all fraudulent

records

7

Page 8: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Existing Solutions Aren’t Working

● Resolvers are still vulnerable to Kaminsky 6 years after its publication

● Millions of open resolvers on the Internet● Current DNSSEC standard released 10

years ago, but deployment is still low● Vulnerabilities still being discovered

8

Page 9: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

● Many security issues that are not being addressed currently

● Much of the attack surface lies on the resolvers

Why don’t we just get rid of resolvers?

Looking In Another Direction9

Page 10: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

ADNS servers (e.g., a.root-servers.net, a.gtld-servers.net, ns1.google.com)

Current Situation

You (on your laptop)

?10

Page 11: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Client Resolution

You (on your laptop)

11

ADNS servers (e.g., a.root-servers.net, a.gtld-servers.net, ns1.google.com)

Page 12: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

What do we gain? Reduces system complexity

Removes the target of cache injection attacks

Client resolution not vulnerable to same attacks

Benefits CDN load balancing and server selection

12

Page 13: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

What do we lose? Resolver caches provide performance to the clients

...and scalability to the system

Resolvers anonymize clients

13

Page 14: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

But how much scalability and performance do we lose?

We use trace driven simulations to estimate client resolutions negative impact.Measuring The Impact● Trace driven simulations to estimate client

resolution’s negative impact● The data

○ Network of approximately 100 residences○ 2 recursive resolvers○ 4 months of observations○ Recursive resolutions of each domain name in the

data

14

Page 15: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Effect on PerformanceDNS resolvers can reduce resolution time due to shared caching.

Resolution times in trace vs. in simulated client resolution

15

Page 16: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Simulated Resolution TimeResolutions take a bit longer.

16

Page 17: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Simulated Resolution TimeResolutions take a bit longer.

16

Page 18: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Simulated Resolution TimeResolutions take a bit longer.

16

Page 19: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

DNS responses are not used immediately.

...But there’s some slack17

Page 20: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

DNS responses are not used immediately.

...But there’s some slack17

Page 21: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

DNS responses are not used immediately.

...But there’s some slack17

Page 22: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Only a small % of connections are delayed at all!

Delay On Connections

(more details in the paper)

18

Page 23: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Only a small % of connections are delayed at all!

Delay On Connections

(more details in the paper)

18

Page 24: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Only a small % of connections are delayed at all!

Delay On Connections

(more details in the paper)

18

Page 25: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Finding #1:Performance impact of

client resolution is small

19

Page 26: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Effect on ScalabilityDNS resolvers reduce number of resolutions reaching authoritative servers

Resolutions per authoritative domain in trace vs. in client resolution

20

Page 27: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Load on Auth. Domains93% of authoritative domains will not see an increase in load

~but~popular domains (e.g., com, google.com) will

○ use com as exemplar

21

Page 28: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

com Domain Load● Average load increases by 3.41 times!● Peak load only increases by 1.14 times● Which is more representative of impact on

com domain?○ Uncertain, let’s make both manageable

22

Page 29: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Increase Record Time-to-Live● SLD records normally have 2 days TTLs● Roughly 1.1% of those records change

during a week● What happens when the TTL is 1 week?

23

Average Load 3.41 => 2.13 times trace load

Peak Load 1.14 => 1.03 times trace load

Page 30: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

● Currently 1 question per DNS query● Protocol can support multiple questions● What happens when we ask 2 questions per

query?Average Load 3.41 => 1.61 times trace load

Peak Load 1.14 => 1.06 times trace load

Increase Questions Per Query

(reduces number of packets, not number of queries)

24

Page 31: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

● What happens when TTL is 1 week and we ask 2 questions per query?

Increase TTL And Questions25

Average Load 3.41 => 1.33 times trace load

Peak Load 1.14 => 1.06 times trace load

Page 32: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

Finding #2:Scalability impact of client resolution is manageable

26

Page 33: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

● Removing resolvers offers many advantages● ...and small loses

○ Loss of anonymity in queries○ Increase in authoritative domain load

● DNS prefetching has reduced reliance upon shared caches

Final Thoughts27

Page 34: Considered Harmful DNS Resolvers - SIGCOMMconferences.sigcomm.org/hotnets/2014/slides/... · Considered Harmful Kyle Schomp, Mark Allman, and Michael Rabinovich. ... Many security

?Thank you!email me at [email protected]