SlideShare uma empresa Scribd logo
1 de 32
1 | © 2015 All Rights Reserved.
DNS - Co nowego w świecie DNS-o-zaurów?
Adam Obszyński
CCIE, CISSP
2 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
3 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja KJU aka „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
4 | © 2015 All Rights Reserved.
History – a very short one
• 1971 - /etc/hosts & FTP…
• 1983 – DNS has been introduced
• 1996 – DNS NOTIFY & IXFR – The Second Generation
• 1997 - Dynamic Updates in the DNS – 3rd Generation
• Google.com registered!
• Then DNSSEC era begins…
5 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
6 | © 2015 All Rights Reserved.
Cookies
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
7 | © 2015 All Rights Reserved.
DNS Cookies
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
https://tools.ietf.org/html/draft-eastlake-dnsext-cookies-00 od Listopad 2006
8 | © 2015 All Rights Reserved.
DNS Cookies
• Provides weak authentication of queries and responses. Weak brother
of TSIG.
• No protection against “in-line” attackers. No protection against anyone
who can see the plain text queries and responses.
• Requires no setup or configuration, just protocol behavior.
• Intended to great reduce
̶ Forged source IP address traffic amplification DOS attacks.
̶ Forged source IP address recursive server work load DOS attacks.
̶ Forged source IP address reply cache poisoning attacks.
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
9 | © 2015 All Rights Reserved.
DNS COOKIE Option
• A new Option to the OPT-RR
1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| OPTION-CODE TBD | OPTION-LENGTH = 18 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Resolver Cookie upper half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Resolver Cookie lower half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Server Cookie upper half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Server Cookie lower half |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Error Code |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
10 | © 2015 All Rights Reserved.
Resolver & Server views
Resolver:
̶ Resolver puts a COOKIE in queries with
- A Resolver Cookie that varies with server
– Truncated HMAC(server-IP-address, resolver secret)
- The resolver cached Server Cookie for that Cookie if it has one
̶ Resolver ignores all replies that do not have the correct Resolver Cookie
̶ Caches new Server Cookie and retries query if it gets a Bad Cookie error
with a correct Resolver Cookie
Server:
̶ Server puts a COOKIE in replies with
- A Server Cookie that varies with resolver
– Truncated HMAC(resolver-IP-address, server secret)
- The Resolver Cookie if there was one in the corresponding query
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
11 | © 2015 All Rights Reserved.
Example
Resolver Server
Query: RC:123, SC:???,E:0
ErrReply: RC:123, SC:789, E:BadC
Query: RC:123, SC:789,E:0
AnsReply: RC:123, SC:789,E:0
SC:789
RC:123
RC:123
ForgedReply: RC:???, SC:???,E:0
ForgedQuery: RC:XYZ, SC:???,E:0
ErrReply: RC:XYZ, SC:789, E:BadC RC:XYZ
http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
12 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
https://tools.ietf.org/html/draft-ietf-dane-smime-07
Given that the DNS administrator for a domain name is authorized to give
identifying information about the zone, it makes sense to allow that administrator
to also make an authoritative binding between email messages purporting to
come from the domain name and a certificate that might be used by someone
authorized to send mail from those servers. The easiest way to do this is to use
the DNS.
The SMIMEA DNS resource record (RR) is used to associate an end entity
certificate or public key with the associated email address, thus forming a
"SMIMEA certificate association".
13 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
ICANN 51
14 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
15 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
16 | © 2015 All Rights Reserved.
DNSSEC & DANE::SMIME
Testy:
DANE / TLS:
https://www.had-pilot.com/dane/danelaw.html
SMIME & DANE:
https://dane.sys4.de/smtp/mail.unitybox.de
17 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja KJU aka „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
18 | © 2015 All Rights Reserved.
Evolution of DNS DDoS Attacks
• DNS based DDoS attacks are constantly evolving
• Get registrar
account access
• Change NS + add
nice TTL ;-)
• “Phantom”
domains don’t
respond
• Servers keeps
waiting
• Misbehaving domains
lock-up DNS resolvers
with open connections
• Resource exhaustion
• Botnets launch
attacks on one
specific target
• Target domain
DDoS’d, resolver
resources
exhausted
• Uses randomly
generated strings
• Exhausts limit on
outstanding DNS
queries
Registrar / NIC
Phantom Domain
Random Sub-
domain / NXD
CPE Botnet
Based
Domain Lock-up
19 | © 2015 All Rights Reserved.
.MYNIC Registrar case
By Hasnul Hasan
ICANN 49
+
MonitorYOUR
delegations
….
fromoutside;-)
20 | © 2015 All Rights Reserved.
Basic NXDOMAIN Attack
• The attacker sends a flood of queries to
a DNS server to resolve a non-existent
domain/domain name.
• The recursive server tries to locate this
non-existing domain by carrying out
multiple domain name queries but does
not find it.
• In the process, its cache is filled up with
NXDOMAIN results.
Impact:
• Slower DNS server response time for
legitimate requests
• DNS server also spends valuable
resources as it keeps trying to repeat
the recursive query to get a resolution
result.
21 | © 2015 All Rights Reserved.
Random Subdomain Attack (Slow Drip)
• Infected clients create queries by
prepending randomly generated
subdomain strings to the victim’s
domain. E.g. xyz4433.plnog.pl
• Each client may only send a
small volume of these queries to
the DNS recursive server1
• Harder to detect
• Multiple of these infected clients
send such requests
Impact
• Responses may never come
back from these non-existing
subdomains2
• DNS recursive server waits for
responses, outstanding query
limit exhausted
• Target domain’s auth server
experiences DDoS
How the attack works
Victim Domain
e.g. plnog.pl
Bot/bad clients
Queries with random
strings prefixed to victim's
domain
e.g. xyz4433.plnog.pl
Flood of queries
for non-existent
subdomains
DNS recursive
Servers (ISP)
DDoS on
target victim
Resource
exhaustion
on recursive
servers
22 | © 2015 All Rights Reserved.
Domain Lock-up Attack
• Resolvers and domains are setup by attackers to establish TCP-based
connections with DNS resolvers
• When DNS resolver requests a response, these domains send “junk”
or random packets to keep them engaged
• They also are deliberately slow to respond to requests keeping the
resolvers engaged. This effectively locks up the DNS server resources.
Impact
• DNS resolver establishing these connections with the misbehaving
domains exhausts its resources
23 | © 2015 All Rights Reserved.
Botnet Based Attacks from CPE Devices
• Random Subdomain attacks that use botnets to target all traffic to
one site or domain
• Attack involves compromised devices like CPE switches, routers
• Supplied by ISPs
• Supplied by Customer
• These malware infected CPE devices form botnet to send multiple
DDoS traffic to say xyz123.plnog.pl
Impact
• Victim domain experiences DDoS
• DNS resolver resources exhausted
• When CPE devices are compromised,
many other bad things can happen like
• SSL proxy – login credentials theft etc.
• Launch point for attacks against Customer PCs
and environments, i.e. expanding the compromise
24 | © 2015 All Rights Reserved.
Phantom Domain Attack
• “Phantom” domains are setup as part of
attack
• DNS resolver tries to resolve multiple
domains that are phantom domains
• These phantom domains may not send
responses or they will be slow
Impact
• Server consumes resources while waiting
for responses, eventually leading to
degraded performance or failure
• Too many outstanding queries
25 | © 2015 All Rights Reserved.
Newest Attacks – What You can do?
#1 Upstream delays
• For traffic to “slow” servers and zones (NS)
 Any server that exceeded the limit of responsiveness should
sent fewer queries
#2 Recursive timeout
• Timeout for recursive name lookup should be lowered to free up
DNS resolver resources
• Prevents maxing out on the number of outstanding DNS queries
#3 Dynamic Limiting of Bad Clients
• If a client generates too many costly responses (NXDOMAIN,
NXRRset, ServFail)
 Drop or limit it’s traffic
#4 Block or Blacklist
• You have to wait for user call or observe syslog
26 | © 2015 All Rights Reserved.
Eliminate open resolvers ;-)
https://dnsscan.shadowserver.org/
27 | © 2015 All Rights Reserved.
Eliminate broken software…
28 | © 2015 All Rights Reserved.
SPAM/Attacks with Domains less then 24h old
Henry Stern, Farsight | ICANN50 | London
29 | © 2015 All Rights Reserved.
Agent’a
W poprzednich odcinkach.
Czyli jak to dawniej bywało.
Sekcja KJU aka „Q”.
Czy będą jakieś nowe zabawki lub ciasteczka?
Licencja na zabijanie.
Nowożytne bakterie i wirusy.
Jej wysokość popularność.
Nowe domeny i ciekawe kolizje.
30 | © 2015 All Rights Reserved.
DNS - Collision with Roaming Leak
Search List or Split Brain DNS + New TLD == Leak Issue
www.firma.exampleInternal DNS,
AD, etc.
New TLDs
!!!
collision
!!!
collision
New & nice Loopback address: 127.0.53.53
Encourages to “look this up”
https://icann.org/namecollision
https://newgtlds.icann.org/newgtlds.csv
31 | © 2015 All Rights Reserved.
Q?
32 | © 2015 All Rights Reserved.
THE END
of
“DNS…”
TOPIC WILL* RETURN IN
PLNOG 2015 KRAKÓW
* - maybe ;-)

Mais conteúdo relacionado

Mais procurados

CNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and ArchitectureCNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and ArchitectureSam Bowne
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNSMen and Mice
 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoSAPNIC
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSAlex Mayrhofer
 
RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS EvolutionAPNIC
 
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53Amazon Web Services
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksMen and Mice
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local NetworksMen and Mice
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionSam Bowne
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecuritySam Bowne
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsMen and Mice
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSMen and Mice
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesSam Bowne
 
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesCNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesSam Bowne
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECAPNIC
 

Mais procurados (20)

CNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and ArchitectureCNIT 40: 2: DNS Protocol and Architecture
CNIT 40: 2: DNS Protocol and Architecture
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
Dnssec
DnssecDnssec
Dnssec
 
Thoughts about DNS for DDoS
Thoughts about DNS for DDoSThoughts about DNS for DDoS
Thoughts about DNS for DDoS
 
Encrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPSEncrypted DNS - DNS over TLS / DNS over HTTPS
Encrypted DNS - DNS over TLS / DNS over HTTPS
 
RIPE 82: DNS Evolution
RIPE 82: DNS EvolutionRIPE 82: DNS Evolution
RIPE 82: DNS Evolution
 
DNS Cache White Paper
DNS Cache White PaperDNS Cache White Paper
DNS Cache White Paper
 
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
(NET308) Consolidating DNS Data in the Cloud with Amazon Route 53
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
DNS-SD Extentions
DNS-SD ExtentionsDNS-SD Extentions
DNS-SD Extentions
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS Security
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
DNS Vulnerabilities
DNS VulnerabilitiesDNS Vulnerabilities
DNS Vulnerabilities
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
CNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breachesCNIT 40: 4: Monitoring and detecting security breaches
CNIT 40: 4: Monitoring and detecting security breaches
 
CNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilitiesCNIT 40: 3: DNS vulnerabilities
CNIT 40: 3: DNS vulnerabilities
 
NZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSECNZNOG 2013 - Experiments in DNSSEC
NZNOG 2013 - Experiments in DNSSEC
 

Destaque

4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz OlejarkaPROIDEA
 
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...PROIDEA
 
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...PROIDEA
 
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...PROIDEA
 
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...PROIDEA
 
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...PROIDEA
 
PLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services PlatformPLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services PlatformPROIDEA
 
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna ŻmudaPROIDEA
 
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek MoskalPLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek MoskalPROIDEA
 
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...PROIDEA
 
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile networkPLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile networkPROIDEA
 
JDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub MarchwickiJDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub MarchwickiPROIDEA
 
JDD2014: What you won't read in books about implementing REST services - Jak...
JDD2014:  What you won't read in books about implementing REST services - Jak...JDD2014:  What you won't read in books about implementing REST services - Jak...
JDD2014: What you won't read in books about implementing REST services - Jak...PROIDEA
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPROIDEA
 
4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr Pasich4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr PasichPROIDEA
 
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...PROIDEA
 
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...SIANI
 
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...SIANI
 
Cathy april 5th_2011_key_points
Cathy april 5th_2011_key_pointsCathy april 5th_2011_key_points
Cathy april 5th_2011_key_pointsSIANI
 
Perennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem securityPerennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem securitySIANI
 

Destaque (20)

4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
4Developers 2015: Procesy biznesowe z perspektywy atakującego - Mateusz Olejarka
 
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
JDD2014: Using ASCII art to analyzeyour source code with NEO4J and OSS tools ...
 
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
PLNOG14: DNS jako niedoceniana broń ISP w walce ze złośliwym oprogramowaniem ...
 
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
4Developers 2015: Clean JavaScript code - only dream or reality - Sebastian Ł...
 
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
PLNOG14: Darmowe narzędzia wspomagające proces zabezpieczania Twojej firmy - ...
 
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
 
PLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services PlatformPLNOG 13: Krystian Baniak: Value Added Services Platform
PLNOG 13: Krystian Baniak: Value Added Services Platform
 
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
4Developers 2015: Legacy Code, szkoła przetrwania - Katarzyna Żmuda
 
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek MoskalPLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
PLNOG14: Zastosowanie NFV, symulacja sieci VIRL/CML - Marek Moskal
 
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
PLNOG14: Security Operations Center, wyższy poziom bezpieczeństwa - Tomasz Ta...
 
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile networkPLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
PLNOG 13: M. Czerwonka, T. Kossut: IPv6 in mobile network
 
JDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub MarchwickiJDD2014: JEE'ish development without hassle - Jakub Marchwicki
JDD2014: JEE'ish development without hassle - Jakub Marchwicki
 
JDD2014: What you won't read in books about implementing REST services - Jak...
JDD2014:  What you won't read in books about implementing REST services - Jak...JDD2014:  What you won't read in books about implementing REST services - Jak...
JDD2014: What you won't read in books about implementing REST services - Jak...
 
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data CenterPLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
PLNOG 13: Emil Gągała: EVPN – rozwiązanie nie tylko dla Data Center
 
4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr Pasich4Developers 2015: Varnish tips & tricks - Piotr Pasich
4Developers 2015: Varnish tips & tricks - Piotr Pasich
 
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
PLNOG14: Zupa internetowa - jak przyrządzić smaczne danie z IXów, Data Center...
 
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
Vikten av jämställdhet för en globalt hållbar tryggad livsmedelsförsörjning o...
 
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
Katarina Eriksson, Senior Project & Partnership Development Manager at Tetra ...
 
Cathy april 5th_2011_key_points
Cathy april 5th_2011_key_pointsCathy april 5th_2011_key_points
Cathy april 5th_2011_key_points
 
Perennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem securityPerennial possibilities for increasing food and ecosystem security
Perennial possibilities for increasing food and ecosystem security
 

Semelhante a PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński

KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionAPNIC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsAPNIC
 
DNS Survival Guide
DNS Survival GuideDNS Survival Guide
DNS Survival GuideAPNIC
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.Qrator Labs
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?APNIC
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolJisc
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS PrivacyAPNIC
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...Felipe Prado
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff HustonAPNIC
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsOpenDNS
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS EvolutionAPNIC
 
No more ARP : Another MiTm Attacks
No more ARP : Another MiTm AttacksNo more ARP : Another MiTm Attacks
No more ARP : Another MiTm AttacksKhajornchol Puwarang
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware Dryden Geary
 

Semelhante a PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński (20)

8 technical-dns-workshop-day4
8 technical-dns-workshop-day48 technical-dns-workshop-day4
8 technical-dns-workshop-day4
 
ION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSECION Islamabad - Deploying DNSSEC
ION Islamabad - Deploying DNSSEC
 
KHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack PreventionKHNOG 3: DDoS Attack Prevention
KHNOG 3: DDoS Attack Prevention
 
ION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSECION Trinidad and Tobago - The Business Case for DNSSEC
ION Trinidad and Tobago - The Business Case for DNSSEC
 
Signing DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutionsSigning DNSSEC answers on the fly at the edge: challenges and solutions
Signing DNSSEC answers on the fly at the edge: challenges and solutions
 
DNS Survival Guide
DNS Survival GuideDNS Survival Guide
DNS Survival Guide
 
DNS Survival Guide.
DNS Survival Guide.DNS Survival Guide.
DNS Survival Guide.
 
ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?ION Hangzhou - Why Deploy DNSSEC?
ION Hangzhou - Why Deploy DNSSEC?
 
RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?RIPE 86: DNSSEC — Yes or No?
RIPE 86: DNSSEC — Yes or No?
 
Infoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security toolInfoblox - turning DNS from security target to security tool
Infoblox - turning DNS from security target to security tool
 
IGF 2023: DNS Privacy
IGF 2023: DNS PrivacyIGF 2023: DNS Privacy
IGF 2023: DNS Privacy
 
Understanding DNS Security
Understanding DNS SecurityUnderstanding DNS Security
Understanding DNS Security
 
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...DEF CON 27 - GERALD DOUSSOT  AND ROGER MEYER - state of dns rebinding attack ...
DEF CON 27 - GERALD DOUSSOT AND ROGER MEYER - state of dns rebinding attack ...
 
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
Presentation on 'The Path to Resolverless DNS'  by Geoff HustonPresentation on 'The Path to Resolverless DNS'  by Geoff Huston
Presentation on 'The Path to Resolverless DNS' by Geoff Huston
 
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet ThreatsNew DNS Traffic Analysis Techniques to Identify Global Internet Threats
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
 
ION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLSION Bucharest - DANE-DNSSEC-TLS
ION Bucharest - DANE-DNSSEC-TLS
 
DNS - MCSE 2019
DNS - MCSE 2019DNS - MCSE 2019
DNS - MCSE 2019
 
NANOG 82: DNS Evolution
NANOG 82: DNS EvolutionNANOG 82: DNS Evolution
NANOG 82: DNS Evolution
 
No more ARP : Another MiTm Attacks
No more ARP : Another MiTm AttacksNo more ARP : Another MiTm Attacks
No more ARP : Another MiTm Attacks
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
 

Último

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 

Último (20)

Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 

PLNOG14: DNS, czyli co nowego w świecie DNS-ozaurów - Adam Obszyński

  • 1. 1 | © 2015 All Rights Reserved. DNS - Co nowego w świecie DNS-o-zaurów? Adam Obszyński CCIE, CISSP
  • 2. 2 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 3. 3 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja KJU aka „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 4. 4 | © 2015 All Rights Reserved. History – a very short one • 1971 - /etc/hosts & FTP… • 1983 – DNS has been introduced • 1996 – DNS NOTIFY & IXFR – The Second Generation • 1997 - Dynamic Updates in the DNS – 3rd Generation • Google.com registered! • Then DNSSEC era begins…
  • 5. 5 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 6. 6 | © 2015 All Rights Reserved. Cookies http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 7. 7 | © 2015 All Rights Reserved. DNS Cookies http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html https://tools.ietf.org/html/draft-eastlake-dnsext-cookies-00 od Listopad 2006
  • 8. 8 | © 2015 All Rights Reserved. DNS Cookies • Provides weak authentication of queries and responses. Weak brother of TSIG. • No protection against “in-line” attackers. No protection against anyone who can see the plain text queries and responses. • Requires no setup or configuration, just protocol behavior. • Intended to great reduce ̶ Forged source IP address traffic amplification DOS attacks. ̶ Forged source IP address recursive server work load DOS attacks. ̶ Forged source IP address reply cache poisoning attacks. http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 9. 9 | © 2015 All Rights Reserved. DNS COOKIE Option • A new Option to the OPT-RR 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 3 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | OPTION-CODE TBD | OPTION-LENGTH = 18 | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Resolver Cookie upper half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Resolver Cookie lower half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Server Cookie upper half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Server Cookie lower half | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Error Code | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 10. 10 | © 2015 All Rights Reserved. Resolver & Server views Resolver: ̶ Resolver puts a COOKIE in queries with - A Resolver Cookie that varies with server – Truncated HMAC(server-IP-address, resolver secret) - The resolver cached Server Cookie for that Cookie if it has one ̶ Resolver ignores all replies that do not have the correct Resolver Cookie ̶ Caches new Server Cookie and retries query if it gets a Bad Cookie error with a correct Resolver Cookie Server: ̶ Server puts a COOKIE in replies with - A Server Cookie that varies with resolver – Truncated HMAC(resolver-IP-address, server secret) - The Resolver Cookie if there was one in the corresponding query http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 11. 11 | © 2015 All Rights Reserved. Example Resolver Server Query: RC:123, SC:???,E:0 ErrReply: RC:123, SC:789, E:BadC Query: RC:123, SC:789,E:0 AnsReply: RC:123, SC:789,E:0 SC:789 RC:123 RC:123 ForgedReply: RC:???, SC:???,E:0 ForgedQuery: RC:XYZ, SC:???,E:0 ErrReply: RC:XYZ, SC:789, E:BadC RC:XYZ http://crafty-christie.blogspot.com/2009/03/james-bond-cookies.html
  • 12. 12 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME https://tools.ietf.org/html/draft-ietf-dane-smime-07 Given that the DNS administrator for a domain name is authorized to give identifying information about the zone, it makes sense to allow that administrator to also make an authoritative binding between email messages purporting to come from the domain name and a certificate that might be used by someone authorized to send mail from those servers. The easiest way to do this is to use the DNS. The SMIMEA DNS resource record (RR) is used to associate an end entity certificate or public key with the associated email address, thus forming a "SMIMEA certificate association".
  • 13. 13 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME ICANN 51
  • 14. 14 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME
  • 15. 15 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME
  • 16. 16 | © 2015 All Rights Reserved. DNSSEC & DANE::SMIME Testy: DANE / TLS: https://www.had-pilot.com/dane/danelaw.html SMIME & DANE: https://dane.sys4.de/smtp/mail.unitybox.de
  • 17. 17 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja KJU aka „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 18. 18 | © 2015 All Rights Reserved. Evolution of DNS DDoS Attacks • DNS based DDoS attacks are constantly evolving • Get registrar account access • Change NS + add nice TTL ;-) • “Phantom” domains don’t respond • Servers keeps waiting • Misbehaving domains lock-up DNS resolvers with open connections • Resource exhaustion • Botnets launch attacks on one specific target • Target domain DDoS’d, resolver resources exhausted • Uses randomly generated strings • Exhausts limit on outstanding DNS queries Registrar / NIC Phantom Domain Random Sub- domain / NXD CPE Botnet Based Domain Lock-up
  • 19. 19 | © 2015 All Rights Reserved. .MYNIC Registrar case By Hasnul Hasan ICANN 49 + MonitorYOUR delegations …. fromoutside;-)
  • 20. 20 | © 2015 All Rights Reserved. Basic NXDOMAIN Attack • The attacker sends a flood of queries to a DNS server to resolve a non-existent domain/domain name. • The recursive server tries to locate this non-existing domain by carrying out multiple domain name queries but does not find it. • In the process, its cache is filled up with NXDOMAIN results. Impact: • Slower DNS server response time for legitimate requests • DNS server also spends valuable resources as it keeps trying to repeat the recursive query to get a resolution result.
  • 21. 21 | © 2015 All Rights Reserved. Random Subdomain Attack (Slow Drip) • Infected clients create queries by prepending randomly generated subdomain strings to the victim’s domain. E.g. xyz4433.plnog.pl • Each client may only send a small volume of these queries to the DNS recursive server1 • Harder to detect • Multiple of these infected clients send such requests Impact • Responses may never come back from these non-existing subdomains2 • DNS recursive server waits for responses, outstanding query limit exhausted • Target domain’s auth server experiences DDoS How the attack works Victim Domain e.g. plnog.pl Bot/bad clients Queries with random strings prefixed to victim's domain e.g. xyz4433.plnog.pl Flood of queries for non-existent subdomains DNS recursive Servers (ISP) DDoS on target victim Resource exhaustion on recursive servers
  • 22. 22 | © 2015 All Rights Reserved. Domain Lock-up Attack • Resolvers and domains are setup by attackers to establish TCP-based connections with DNS resolvers • When DNS resolver requests a response, these domains send “junk” or random packets to keep them engaged • They also are deliberately slow to respond to requests keeping the resolvers engaged. This effectively locks up the DNS server resources. Impact • DNS resolver establishing these connections with the misbehaving domains exhausts its resources
  • 23. 23 | © 2015 All Rights Reserved. Botnet Based Attacks from CPE Devices • Random Subdomain attacks that use botnets to target all traffic to one site or domain • Attack involves compromised devices like CPE switches, routers • Supplied by ISPs • Supplied by Customer • These malware infected CPE devices form botnet to send multiple DDoS traffic to say xyz123.plnog.pl Impact • Victim domain experiences DDoS • DNS resolver resources exhausted • When CPE devices are compromised, many other bad things can happen like • SSL proxy – login credentials theft etc. • Launch point for attacks against Customer PCs and environments, i.e. expanding the compromise
  • 24. 24 | © 2015 All Rights Reserved. Phantom Domain Attack • “Phantom” domains are setup as part of attack • DNS resolver tries to resolve multiple domains that are phantom domains • These phantom domains may not send responses or they will be slow Impact • Server consumes resources while waiting for responses, eventually leading to degraded performance or failure • Too many outstanding queries
  • 25. 25 | © 2015 All Rights Reserved. Newest Attacks – What You can do? #1 Upstream delays • For traffic to “slow” servers and zones (NS)  Any server that exceeded the limit of responsiveness should sent fewer queries #2 Recursive timeout • Timeout for recursive name lookup should be lowered to free up DNS resolver resources • Prevents maxing out on the number of outstanding DNS queries #3 Dynamic Limiting of Bad Clients • If a client generates too many costly responses (NXDOMAIN, NXRRset, ServFail)  Drop or limit it’s traffic #4 Block or Blacklist • You have to wait for user call or observe syslog
  • 26. 26 | © 2015 All Rights Reserved. Eliminate open resolvers ;-) https://dnsscan.shadowserver.org/
  • 27. 27 | © 2015 All Rights Reserved. Eliminate broken software…
  • 28. 28 | © 2015 All Rights Reserved. SPAM/Attacks with Domains less then 24h old Henry Stern, Farsight | ICANN50 | London
  • 29. 29 | © 2015 All Rights Reserved. Agent’a W poprzednich odcinkach. Czyli jak to dawniej bywało. Sekcja KJU aka „Q”. Czy będą jakieś nowe zabawki lub ciasteczka? Licencja na zabijanie. Nowożytne bakterie i wirusy. Jej wysokość popularność. Nowe domeny i ciekawe kolizje.
  • 30. 30 | © 2015 All Rights Reserved. DNS - Collision with Roaming Leak Search List or Split Brain DNS + New TLD == Leak Issue www.firma.exampleInternal DNS, AD, etc. New TLDs !!! collision !!! collision New & nice Loopback address: 127.0.53.53 Encourages to “look this up” https://icann.org/namecollision https://newgtlds.icann.org/newgtlds.csv
  • 31. 31 | © 2015 All Rights Reserved. Q?
  • 32. 32 | © 2015 All Rights Reserved. THE END of “DNS…” TOPIC WILL* RETURN IN PLNOG 2015 KRAKÓW * - maybe ;-)

Notas do Editor

  1. Certyfikowany PL Kierowca, Tata, Obywatel, Podatnik DNS - Co nowego w świecie (D)i(N)o(S)aurów. DNS Dobrze znany i szeroko wykorzystywany protokół w sieciach i Internecie. Czy wydarzyło się coś nowego? Czy coś pozmieniało się w standardach? Może pojawiła się nowa forma ataku? Postaram się opowiedzieć co sieci piszczy w temacie DNS. Jeżeli czas i jakość Internetu w trakcie konferencji pozwoli może uda się zademonstrować bardzo modne ostatnio zjawisko ;-) Co dokładnie? Nie powiem. Zapraszam na Sesje! Prowadzący     Adam Obszyński (Infoblox)
  2. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  3. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  4. Paul Mockapetris Notify Poul Vixie
  5. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  6. If query received with bad or no Server Cookie, send back short error message
  7. Bad guy Resolver behind a NAT Could get Server Cookie and attack other resolvers behind the NAT Solution: Mix Resolver Cookie into Server Cookie hash so multiple resolvers that appear to be at the same IP address are distinguished Anycast Servers Need to use the same server secret or assure that queries from the same resolver usually go to the same server
  8. dig +dnssec type52 _443._tcp.www.freebsd.org
  9. Icann51
  10. dig +dnssec type52 _443._tcp.www.freebsd.org
  11. dig +dnssec type52 _443._tcp.www.freebsd.org
  12. dig +dnssec type52 _443._tcp.www.freebsd.org
  13. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD
  14. ICAN 49 CHECK YOUR NS records…. Deployment of myTAC 2-Factor (2FA) authentication modules. SMS – Computer authentication with verification using SMS Smart – Smartphone application-based (IOS & Android) Points of Protection – Authentication Process – Password Recovery
  15. It may be a faster rate as well…1000s of packets per second is possible and we have seen it Responses start with NXDOMAIN , gradually more to ServFail as the load increase and then non-responsive as the target vitcim’s DNS fails Target could be the internal recursive server in which case the volume of these queries from each client will be higher. If the target is a website (maybe a gaming site or govt site), then the volume is slower from each client to avoid detection but more number of clients will originate these queries to DDoS the target victim.
  16. Phantom domain mitigation - Automatic black-holing of non-responsive and misbehaving servers, and the zones they serve A list of known dead servers and zones is created ADP drops all queries to these servers on the non-responsive list For traffic to flaky servers and zones, rate limiting is applied Any server that exceeded the limit of responsiveness will be sent fewer queries for a configurable of time Limits configured through CLI 2. Adjustable recursive timeout Timeout for recursive name lookup can be lowered to quickly free up DNS resolver resources under attack Prevents maxing out on the number of outstanding DNS queries What is the default now?? Are we changing the default?? Configured through CLI we had given this to some customers who were experiencing NXD attack. We are now productizing this. A misbehaving server can pretend to be authoritative for lots of domains . So blackhole these servers. We have learnt through the customer experiences and the pcap files, there are multiple flavor of attacks that need different ways of mitigation.
  17. Henry Stern, Farsight | ICANN50 | London How to get data? False positivies
  18. Historia DNS – 2/3 slajdy Q – DNS Cookies + DANE??? DDOS – Ataki + ochrona np. fetches albo foresight Pupularnosc – konflikty w ggTLD