Top Banner
Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)
31

Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

Dec 13, 2015

Download

Documents

Gabriel Holt
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

Zone State Revocation (ZSR) for DNSSEC

Eric Osterweil (UCLA)

Vasileios Pappas (IBM Research)

Dan Massey (Colorado State Univ.)

Lixia Zhang (UCLA)

Page 2: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

2

Outline What are DNS & DNSSEC Key Revocation Problem Threat Model ZSR Approach ZSR design Conclusion

Page 3: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

3

DNS Global hierarchical

namespaces (zones) ucla.edu is a zone

www is a record Largest globally distributed database

Too large for standard management approaches Zones use SOA serial numbers to indicate

changes Nameservers serve zone data

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 4: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

4

Caching in DNS 10’s of millions of zones Caching needed to scale Caching resolvers are

between clients and nameservers

Caching resolvers walk DNS tree, not client machines 3 types of machines

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 5: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

5

Why DNSSEC? Caching is vulnerable Eve can insert her own

answer if she responds first

DNS has no way to know what data is authentic

Clients will get values from their cache and believe them

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 6: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

6

DNSSEC DNSSEC is a PKI

Public/private keys Parents vouch for

children DNSKEY records

Public keys Uses pre-generated signatures

No “online signing” Signatures valid for definitive period

(inception to expiration)

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 7: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

7

Problem DNS is one of the largest-scale systems The zones in DNS are all independently

run This mandates a very simple protocol Coordination is very difficult DNS can tolerate slight

misconfigurations and slow coordination DNSSEC has stricter requirements

Page 8: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

8

Problem(2) Normally, to

change keys one must transition Due to caching,

zones must serve old and new keys

What about an unplanned emergency? i.e. a private key has been compromised!

Need a way to flush millions of remote caches

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 9: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

9

Example

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

If Eve can create records and insert them, caching resolvers will use valid keys to “verify” her records.

Page 10: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

10

Attack Vectors Spoofing attack

Eve replies before the real nameserver does

Poisoning attack Eve tricks caches into

taking data ahead of time Man in the Middle (1)

Eve intercepts traffic to a n of m nameservers

Man in the Middle (2) Eve intercepts traffic to m

of m nameservers

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.QuickTime™ and a

TIFF (Uncompressed) decompressorare needed to see this picture.

Page 11: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

11

ZSR’s Approach Signature lifetimes are temporal But emergencies are unplanned

Orthogonal to temporal lifetimes In ZSR, zones can override lifetimes ZSR can notify millions of caches to

flush compromised records

Page 12: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

12

ZSR Requirements Designed to be incrementally

deployable ZSR must be able to perform 3

operations to be robust against Eve:1. Prove a key is compromised

2. Revoke data

3. Notify resolvers of revocations

Page 13: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

13

ZSR’s Mechanism ZSR augments signatures with lease periods

Lease: uses zones’ state (serial number) + lease period

Signatures are valid while zone’s serial number is less than a lease

Leases are broken by increasing serial numbers

ZSR introduces a highly-scalable cache update protocol into modern DNS

Page 14: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

14

Proving Key Compromise After suspecting a zone state change, key

revocation must be proven

REVKEY is a self-certified revocation certificate of a DNSKEY

Page 15: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

15

Revoking Data RRSIGs include current

inception/expiration dates + zone lease Lease is serial # that invalidates sig Lease is current serial number + L 231 based on evaluation

<Various Data>Inception Time: 20070101000000Expiration Time: 20070108000000

Signature Body

<Various Data>Inception Time: 20070101000000Expiration Time: 20070108000000

Lease: 2007010101 + 231

Signature Body

Lease: 2007010101 + 231

Page 16: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

16

Example

Just changing the zone’s state breaks leases, automatically

Page 17: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

17

Notifying Resolvers After data is cached zones may need to

revoke Zones notify by embedding the serial

number in every DNS response <Zone name, Serial #, timestamp, signature>

Once a zone has broken leases, all cached records are flushed

Page 18: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

18

Example

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

•Any query to the zone allows caches to flush revoked signatures•Even for different records

Page 19: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

19

Evaluation DNSSEC data taken from http://secspider.cs.ucla.

edu/ From 2.5 million zones 50,000 were randomly chosen

and monitored DNS data observed during May, 2006 Query patterns taken from North American

University 821 unique stub-resolvers 117,540 DNS names 55,632 unique zones

Page 20: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

20

Feasibility DNSSEC data shows vulnerability

period is a significant concern Our evaluation shows overloading the

SOA serial number is unlikely to impair its current usage

Sample usage pattern shows ZSR can significantly reduce zone vulnerability

Page 21: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

21

Conclusion Emergencies will happen Lack of a revocation mechanism is a

serious liability in DNSSEC ZSR is a scalable protocol to flush

revoked keys at Internet scales ZSR uses existing mechanisms and can

be incrementally deployed

Page 22: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

22

Thank You

Questions?

Page 23: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

23

Backup

Page 24: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

24

Spoofing Eve can spoof data,

but she needs: To get the DNS

query sequence # Spoof src/dst IP/port

info Be faster than the

real nameserver And must (likely) be

on the local subnet

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 25: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

25

Poisoning Eve can poison caches If a cache asks Eve’s zone

for anything, it may store everything she responds with

She can add www.target.sec data with her own zone’s data

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 26: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

26

Man in the Middle (1) If Eve can intercept

all traffic to some of target.sec’s nameservers

She can snoop, reply to, drop, etc.

However, this will not be true for traffic to other nameservers

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 27: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

27

Man in the Middle (2) Eve has the same

capacity as in the Man in the Middle (1) vector, but for all nameservers

This does not imply that Eve can intercept all Internet traffic for C

QuickTime™ and aTIFF (Uncompressed) decompressor

are needed to see this picture.

Page 28: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

28

DNSSEC Signature Lifetimes DS records (secure delegation records)

3 - 30 signature lifetimes Average 17.03 days

DNSKEY signature lifetimes 3 - 30 days Average 26.45 days

Without ZSR, zones must (potentially) wait this long for caching effects

Page 29: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

29

SOA Serial Number

80% of monitored zones did not change their serial number

Of remaining 20%, the period was 13.5 hours

99.2% seem to mishandle serial numbers

Incorrect padding leads to ± 2.28 oscillations

ZSR can choose 231 as its lease-breaking value and stand out

Page 30: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

30

Zone Access Patterns Window of vulnerability

defined by query patterns

Without ZSR, vulnerability independent of attack

ZSR reduces window

But unpopular zones skew results Only queried once during sample period

Page 31: Zone State Revocation (ZSR) for DNSSEC Eric Osterweil (UCLA) Vasileios Pappas (IBM Research) Dan Massey (Colorado State Univ.) Lixia Zhang (UCLA)

31

Query-Based Performance Using query rates

Zone is only vulnerable if users are querying for its data

This figure shows the number of queries vulnerable to each type of attack