DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor...

11
DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor [email protected] Craig Shue [email protected]

Transcript of DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor...

Page 1: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

DNS as a Gatekeeper: Creating Lightweight

Capabilities for Server DefenseCurtis Taylor

[email protected]

Craig Shue

[email protected]

Page 2: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Outline

• Automated Attacking• Costs to Organizations• Some Observations• Our Approach

– Lightweight Capabilities– Fast Flux Defense

• Future Directions

2

Page 3: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Automated Attacking

• Attackers use others in attacks– Compromised machines form botnets

• “Attacks” vary in goal, methodology– Reconnaissance– Footholds– Exfiltration– Exploitation

• But most attacks are automated– Success rates may be low, but they make up

for it in volume3

Page 4: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Example Attacks

• SQL Injection• Harvesting email addresses for spam• Phishing

– The use of deception in electronic communication to obtain unauthorized access

– A symptom of system and network security improvements

4

Page 5: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Organization Costs

• Decreased credibility• Information exposure• Financial consequences

– Billions lost a year– Identity theft

• Business failure– Example: HBGary Federal

5

Page 6: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Some Observations

• Automated clients do not need host names– Mnemonic names for human convenience

• Automated clients can skip DNS queries– Directly scan IP address space– Cache records beyond what is allowed– Share with other machines in a botnet

• Humans likely play by the rules– Their browsers are standards compliant– “Illegal” caching does not really help them

6

Page 7: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Associating Clients and Resolvers is Non-Trivial

7

ORNL DNS

Server

ORNL Web

Server

ISP DNS Resolver

End User

System

ISP Network

DNS Query

DNS Reply

Web Query

Page 8: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

What does this motivate?

• Some attackers are clearly skipping DNS, but a few still use it

• Good users are unlikely to skip DNS steps• Can we use this knowledge to protect

servers?– Make DNS a gatekeeper to the network– Failures to use DNS prevents access

• But it still looks successful

– Allow network providers know there is something awry with malicious clients

8

Page 9: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Fast Flux Defense

9

End User

System

ISP DNS Resolver

DNS Server

Real Web

Server

DNS Query

DNS Reply

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Web Query

Page 10: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Fast Flux Defense

10

End User

System

ISP DNS Resolver

DNS Server

Real Web

Server

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Honey Pot Web Server

Web Query

Page 11: DNS as a Gatekeeper: Creating Lightweight Capabilities for Server Defense Curtis Taylor taylorcr@ornl.gov Craig Shue cshue@ornl.gov.

Future Directions

• We are ready to test– Works with BIND9, Linux’s iptables, and uses

libpcap to intercept DNS requests

• Limited deployment on ORNL’s network

11