Lecture 15: DNS Cache Poisoning and DNSSEC Flashcards

1
Q

What is DNS cache poisoning?

A

Attacker spoofs a DNS response and the results are stored in an upstream DNS cache

The poisoned records may redirqect clients to malicious servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does it mean that cache poisoning is self-cleaning?

A

Poisoned DNS records will go stale when their TTL expires and the DNS resolver or cache re-fetches them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why can you not count on the TTL to handle DNS cache posioning?

A

DNS TTL can be very long

Up to 68 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the goals of cache posioning?

A

Redirect users

  • Send them to a website that tries to execute malware
  • Send users to non-existent servers or joke/advertisement pages
  • Use look a like web pages to steal login or other user info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How could an attack install malicious DNS resolver onto a client machine?

A
  • Use a bot or remote access to set the DNS resolver of the machine remotely
  • Physically have access to the machine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can you mitigate cache posioning and bad resolvers?

A

Compare records returned from different DNS sources (resovlers)

Make DNS call twice to 2 different DNS resolvers, if they dont match you may have a poisoned cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DNSSEC or Domain Name System Security Extensions?

A

A DNS protocol that provides authentication for DNS responses via message signing and chains of trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does DNSSEC prevent cache poisoning?

A

Uses public key cryptography to sign DNS responses to prevent spoofing by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the DNS Chain?

A

The DNS servers we follow when making a request

  • Root DNS Server
  • TLD DNS Server
  • Authoritative DNS Server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does DNSSEC work with the DNS chain?

A

Passes along verification information along each step in the DNS chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does signing DNS requests work in DNSSEC?

A

When you request records from a DNS server, it will sign it using a private key from a public/private key pair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are DNSSEC signatures stored?

A

RRSIG

Resource Record SIGnature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What key signing algorithms are considered obsolete?

A
  • RSA
  • MD5
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What key signing algorithms are used today?

A
  • RSA/SHA-1
  • SHA-256
  • SHA-512
  • ECDSA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the DNSKEY record?

A

Matching public key of the private key used to generate the RRSIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the benefit of using a public key when providing a signature?

A

User can verify that the signature provided in RRSIG is legitimate

17
Q

How does the chain of trust that DNSSEC uses for verification work?

A

Has of signing key is stored in a DS record in the DNS record of the next server up in the hierarchy

18
Q

What does the TLD server do in the chain of trust?

A

Returns DS records that prove the authoritative DNS server key is legit

19
Q

What does the root server do in the chain of trust?

A

Returns DS records that prove the TLD server key is legit

20
Q

The chain of trust ultimately bubbles up to __ server

21
Q

What is the advantage of being able to work backwards up the chain of trust until you hit the publicaly known root DNS key

A

Ensures that each signed record from the root server on down can be authenticated using the DS records

22
Q

DNSKEY of the __ level DNS server are published and well known

23
Q

What are the root DNS keys also known as?

A

Trust anchors

24
Q

What is the only anchor you technically need?

A

The root key

25
What is the small hole in protection in the DNSSEC system?
When a request doesnt return records in the response and has nothing to sign
26
What is the NXDOMAN or NODATA problem in DNSSEC?
DNS server return a NXDOMAIN or NODATE error if there are no records for a domain Since they are empty theres no signatures Theres no good way of authenticating records with no records so they can be forged
27
What record type was created as a work around for requests that don't return any records?
NSEC
28
How do NSEC records work?
They explicitly state which domains exist on a given DNS server If a client requests a domain that doesn't exist, the NSEC records are returned and signed
29
What is the problem with NSEC and data leakage?
NSEC records explicitly tell users whether domains exist or not
30
What record type was created in order to fix the problem with NSEC and data leakage? How does it fix the problem?
NSEC3 Replaces the explicit domain reference with a has of the domain
31
What are the drawbacks to DNSSEC?
- No privacy for DNS, only provides authentication - Increases size of DNS responses due to hashes and signatures being exchanges - Clients must be ready to switch to non-DNSSEC if it isn't being used- breaking the chain of trust