30
1 Current Counter-measures and Responses by the Domain Name System Community Paul Twomey President and CEO 22 April 2007 APEC-OECD Malware Workshop Manila, The Philippines

Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

1

Current Counter-measures and Responsesby the Domain Name System Community

Paul TwomeyPresident and CEO

22 April 2007

APEC-OECD Malware WorkshopManila, The Philippines

Page 2: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

2

What I want to do today in 15 Minutes:• Outline ICANN and its role in security and

stability in the Internet’s system of uniqueidentifiers

• Illustrate how malware is affecting RootServer, TLD and DNS servers

• Explain some initiatives in the domainname arena and ways through the ICANNprocess for you to input

Page 3: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

3

ICANN mission statement

• To coordinate, overall, the global Internet's system ofunique identifiers, and to ensure stable and secureoperation of the Internet's unique identifier systems. Inparticular, ICANN coordinates:1. Allocation and assignment of the three sets of unique identifiers

for the Internet:• Domain names (forming a system called the DNS)• Internet protocol (IP) addresses and autonomous system

(AS) numbers• Protocol port and parameter numbers

2. Operation and evolution of the DNS root name server system3. Policy development reasonably and appropriately related to

these technical functions

Page 4: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

4

Architecture1

Protocols2

Implementation3

Products/Networks4

Operations5

Response6

7

Policy & Laws8

Asia -Pacific

AfricaEuropeSouthAmer

NorthAmer

ICANN

Advisory role across multiple levels andcountries (DNS and addressing only)

IAB

IETF

KrCERT

Law Enforcement FBI

Root Server OperatorsNANOGCERT

Illustrative

ItalianPCPS

OECD/APEC OECD/EU OECD/APECAPEC

Governments

Intel,Microsoftetc

APRICOT

Security must be a multi-stakeholder andlayered responsibility

Page 5: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

5

ICANN’s community

BOARD OF DIRECTORS

ASO GNSO CCNSO

Governmental Advisory

Committee (GAC)

Root Server System Advisory

Committee (GAC)

Security & Stability Advisory

Committee (SSAC)

At Large Advisory

Committee (ALAC)

Technical Liaison

Group (TLG)

Regional InternetRegistries• ARIN• RIPE NCC• LACNIC• APNIC• AfriNIC

• gTLD Registriesand Registrars• IntellectualProperty• ISPs• Businesses• Universities• Consumers

ccTLD registries(e.g., .us, .uk, .au,.it, .be, .nl, etc.)

17 voting delegates+ 6 non-votingdelegates

Nominating CommitteeICANN Staff

President and CEO

Page 6: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

6

Internet infrastructure threats

1. Physical disruption of major lines and switchingcenters

2. Loss of routing infrastructure continuity and/orfidelity

3. Loss of DNS service continuity and/or fidelity4. Flooding of network or specific sites, i.e., denial

of service attack

Not all Internet-based systems areInternet infrastructure…

Page 7: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

7

Routing infrastructure• Status

– Routing information is maintained in routing registries• These are reasonably well protected against

physical attack– Inputs to the routing registries can be compromised– False routing information can be inserted

• Potential protection– Secure BGP has been defined and implemented

Does not look feasible – too much hardware required

Routing security requires a multi-stakeholder engagement.

Page 8: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

8

DNS infrastructure root servers – status

• Root servers point to top level domains– 20 generic TLDs (gTLDs) – .com, .org, etc.

• U.S. Government has .gov and .mil– 243 country codes (ccTLDs) – .de, .jp, .uk, etc.

• Root servers are heavily replicated– 13 independent businesses– Many-fold replication and distribution

Page 9: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

9

DNS infrastructure servers – threats

Threats• Loss of Service

– Network outage– Machine or site failures– Overwhelming traffic

(denial of service attack)– Business failure

• Hijacking– Cache poisoning– False registration– Fake zone transfer– Fake registrar-registry interaction– Private roots

• Loss of coherence– Unauthorized roots and TLDs– Private character set extensions

Countermeasures– Excess capacity– Distribution, replication– Strong connectivity– Multiplicity of businesses– DDoS counters (long term)

– Protocol changes, DNSSEC– Tight registrar controls– TSIG (crypto)– Crypto authentication– DNSSEC

– DNSSEC; policy/political pressure– DNSSEC; policy/political pressure

Lots of work is under way. But threats are growingand this will take more time and money than many expect

Page 10: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

10

System threats

• Denial of service attacks target high-value sites– DNS servers are among the obvious targets– These will get more sophisticated– Action is required – see later slides

• Domain and address theft is growing– Spammers like to hide their identity– The legal framework doesn’t provide protection

Address theft, per se, is not actionable(!)

Page 11: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

11

The denial of service problem

• Denial of service attacks are increasing– This will get worse – probably much worse

• Law enforcement is important butnecessarily at the wrong end of theproblem

• Technical changes in the Internet wouldhelp a lot

Page 12: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

12

Distributed denial of service on RootServers• On 6 February 2007 – most visible since 2002 attack but not as

comprehensive as amplified DDoS attack on TLDs of 2006• Six of the 13 root servers that form building blocks of the Internet

were affected – two badly• The attack highlighted the effectiveness of Anycast load balancing

technology• More analysis is needed before a full report on what happened can

be drawn up – reasons behind the attack are unclear – a wake-upcall

• Root server operators worked together in a fast, effective, andcoordinated effort

• Recent SSAC recommendations for improving the security of thedomain name system still need to be followed through – othermeasures should also be considered

• Coordination and preparation were key• Did you notice?

Page 13: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

13

Amplified DNS Distributed Denial of Service(DDOS) Attack January - February, 2006

• Authoritative TLD DNS servers attacked• Variant of a well-known DDoS attack• Exploited some of the 500,000+ innocent but

vulnerable recursive servers• Attacks generated from 2 - 8 Gbps of traffic at

targeted Authoritative DNS Servers• Failures occurred in networks in the path as well as

transit providers to the authoritative TLD DNSservers

• Resulted in disruption of DNS services in everycase

• Included many TLDs without any apparent motivein most cases

Page 14: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

14

...Attacker

Target nameserver at IP = 10.10.1.1

...

Open recursive servers

Name serverbar.<tld>

(3) Open resolversask bar.<tld> for

record “foo”

(4) bar.<tld> respondswith record “foo”

(4000 byte DNS TXT RR)

(5) Open resolvers sendDNS response with

(4000 byte DNS TXT RR)to target name server

(1) Attacker directszombies to

begin attack(2) All zombies send

DNS query for record “foo” in domain “bar.<tld>”

to open recursive servers and set source IP=10.10.1.1

Zombies

Anatomy of the Attack

Page 15: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

15

Detailed analysis of one attackGraph of responses tomonitoring probes by theauthoritative nameservers for aTLD before, during, and afteran attack in February 2005.

Vertical Axis shows the sixTLD Server IP addresses. Redshows complete failure toanswer, yellow indicates slowanswers. For reference,Servers 1 and 4 show lesserimpact than Servers 2, 3, 5,and 6. The horizontal axisshows actual time. This attacklasted 14 minutes.

Graphs courtesy of RIPE NCC.

Page 16: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

16

Attack Metrics:

• 51,000 open recursive servers were involved• 55 byte query resulted in a 4,200 byte response, for a

1:76 amplification• 8gbps attack requires a total of 108mbps of queries.• Each recursive server saw 2,100 bytes of queries, or 38

qps, and responded with 160kbps in answers• Assuming compromised hosts have minimum 512kb

DSL modem, only 200 compromised hosts were required• Source networks would see no effect• Recursive servers saw minimal traffic or query increase• Victim network providers had catastrophic experience• Victim DNS provider was sent the equivalent of 150

million queries per second• At best, 1 in 100 real queries were answered

Page 17: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

17

Enabling Vectors• The following specific vectors that allowed the

Reflective Recursive DNS DDoS attacks against theAuthoritative TLD DNS servers have been identifiedby the ICANN SSAC:

• Network Providers (ISPs)– Failure to prohibit forging or spoofing of IP addresses by

hosts– Failure to prohibit traffic from IP addresses they are not

authorized to originate from exiting their networks• Recursive Server Operators

– Accepting and responding to DNS queries from IP addressesnot under their control

– Running nameserver versions with known vulnerabilities thatallow destructive records to be configured by unauthorizedparties

Page 18: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

18

Recommendations

• ICANN’s Security and Stability Committee:http://www.icann.org/committees/security/

• http://www.icann.org/committees/security/dns-ddos-advisory-31mar06.pdf

• Non-technical fact sheet:http://www.icann.org/announcements/announcement-08mar07.htm

Page 19: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

19

DDoS –technical approaches raised bysome• Identification of sources of traffic

– Tighten the routing security• Refashion the protocols to know the identity of senders

of traffic• Distinguish between well managed computers on well

managed networks vs others– “Well managed” means they aren’t zombies and their

configuration is checked regularly• Well managed networks quarantine computers which

appear to be infected or misbehaving• Well managed networks report misbehaviors and accept

reports of misbehaviors• Traffic among well managed networks gets preference

Page 20: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

20

DDoS – customer approaches

• Pressure on the vendor to supply machines that are safeout of the box

• Establishment of an ethic that machines should be safe– it’s the vendor’s problem, not the user’s

Page 21: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

21

Recommendations: implementation of DNSSecurity Protocol (DNSSEC)

• Sweden and Bulgaria have moved ccTLD toDNSSEC- importance of government, business, banking aswell as registry involvement to launch successfully

• See presentations at:http://www.icann.org/meetings/lisbon/agenda-dnssec-28mar07.htm

Page 22: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

22

– Normal DNS traffic continues to rise at about 100%every 16 months.

– Bandwidth required for attack vectors as a multiple ofaverage daily traffic

– In 2000 it was 2 times normal bandwidth in 2006 itwas 150 times

Bandwidth demands for defense from DNS attacks are spiraling

Page 23: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

23

• New DNS Update Service for .com and .net• Whois policy• New gTLD policy• Review of Registrar Accreditation Agreements

Responses and Opportunities in the generic Domain Name arena

Page 24: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

24

– Registries used to publish updated data twice aday.

– This data includes domain names, nameservers,IP address additions, deletions andmodifications.

– The approved service would enable registrarsand others who currently obtain zone file accessin the .COM and .NET TLDs twice daily, toreceive updated zone information every fiveminutes for a fee.

On 11 April 2007, ICANN approved a “DNS Update Service” for the.COM and .NET Registries

Page 25: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

25

– The service would shed light on the activity of thoseengaged in domain tasting and expose bad actors. (Notemost domain tasting is completely legal)

– Phishers and others currently make nameserver changesto conduct fraudulent activity immediately after onepublication and make the change back prior to the nextpublication - there has been a twelve-hour window toconduct this activity, this will now be 5 minutes.

– The service would advantage law enforcement to thwartphishing. (One opinion was that the additional extra noticeperiod might not be a significant advantage.)

Registrar responses have included:

Page 26: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

26

Whois policy process

• Whois issues are being addressed throughthe General Names Supporting Organization's(GNSO’s) policy development process (PDP)

• Numerous opportunities for public review andcomment

• Important input from the GovernmentalAdvisory Committee

• Still open for input.

Page 27: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

27

New generic top-level domain timetable

• Potentially GNSO Policy Development Processmay be completed by June meeting in PuertoRico

• Governmental Advisory Committee principlesdeveloped in March

• Policy may be concluded by the end of the 4thQuarter 2007

• Next round of new gTLDs in early 2008?

Page 28: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

28

Consider the impact of –

• Unique industry TLDs• Industry cross-certified• DNSSEC• Other anti-phishing tools?

Page 29: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

29

Opportunity now to review the gTLDRegistrar Accreditation Agreement• Call for review:

http://www.icann.org/announcements/announcement-21mar07.htm

• Workshops and ongoing review• Opportunity for input both directly, but also

through the Governmental AdvisoryCommittee - June meeting in Puerto Rico

Page 30: Current Counter-measures and Responses by the …search.oecd.org/sti/ieconomy/38653402.pdf3 ICANN mission statement •To coordinate, overall, the global Internet's system of unique

30

Thank You

www.icann.org