/
CS590/690 Detecting network interference CS590/690 Detecting network interference

CS590/690 Detecting network interference - PowerPoint Presentation

valerie
valerie . @valerie
Follow
27 views
Uploaded On 2024-02-09

CS590/690 Detecting network interference - PPT Presentation

Spring 2018 Lecture 04 Phillipa Gill ACKs Slides based on material from Nick weavers presentation at the connaught summer institute 2013 Also from Kurose Ross Computer Networking a Top Down approach featuring the Internet 6 ID: 1045636

server dns rrs application dns server application rrs sites layer2 variable hold path additional servers authority type info tcp

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "CS590/690 Detecting network interference" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

1. CS590/690Detecting network interference (Spring 2018)Lecture 04Phillipa GillACKs: Slides based on material from Nick weaver’s presentation at the connaught summer institute 2013Also from: Kurose + Ross; Computer Networking a Top Down approach featuring the Internet (6th edition)

2. Administrative noteAssignment 1 warm upDownload/play with WiresharkInvestigate Bro www.bro-ids.orgLots of tutorials here: https://www.bro.org/documentation/index.htmlProject + A1 info coming after today.

3. Where we areLast time:TCP Resets for censorshipFingerprinting Reset Injectors (NDSS 2009 paper)On path vs. In path censorshipQuestions?

4. Test your understandingWhat is the difference between an in-path and on-path censor?What are the pros of each approach?Cons?What are the two race conditions that can occur with reset injectors?What headers would you look at to ID a reset injector?How would you localize an injector to a specific location in the network?If the TCP reset occurs before the HTTP GET what can you say about the trigger?After?

5. OverviewBlock IP addressesIP layerDisrupt TCP flowsTCP (transport layer)Many possible triggersBlock hostnamesDNS (application layer)Disrupt HTTP transfersHTTP (application layer)Today

6. Domain name system (dns)

7. Application Layer2-7requesting hostcis.poly.edugaia.cs.umass.eduroot DNS serverlocal DNS serverdns.poly.edu123456authoritative DNS serverdns.cs.umass.edu78TLD DNS serverDNS name resolution examplehost at cis.poly.edu wants IP address for gaia.cs.umass.eduiterated query:contacted server replies with name of server to contact“I don’t know this name, but ask this server”

8. Application Layer2-8Root DNS Serverscom DNS serversorg DNS serversedu DNS serverspoly.eduDNS serversumass.eduDNS serversyahoo.comDNS serversamazon.comDNS serverspbs.orgDNS serversDNS: a distributed, hierarchical database……

9. Application Layer2-9DNS: root name serverscontacted by local name server that can not resolve nameroot name server:contacts authoritative name server if name mapping not knowngets mappingreturns mapping to local name server 13 root name “servers” worldwidea. Verisign, Los Angeles CA (5 other sites)b. USC-ISI Marina del Rey, CAl. ICANN Los Angeles, CA (41 other sites)e. NASA Mt View, CAf. Internet Software C.Palo Alto, CA (and 48 other sites)i. Netnod, Stockholm (37 other sites)k. RIPE London (17 other sites)m. WIDE Tokyo(5 other sites)c. Cogent, Herndon, VA (5 other sites)d. U Maryland College Park, MDh. ARL Aberdeen, MDj. Verisign, Dulles VA (69 other sites )g. US DoD Columbus, OH (5 other sites)

10. Application Layer2-10TLD, authoritative serverstop-level domain (TLD) servers:responsible for com, org, net, edu, aero, jobs, museums, and all top-level country domains, e.g.: uk, fr, ca, jpNetwork Solutions maintains servers for .com TLDEducause for .edu TLDauthoritative DNS servers: organization’s own DNS server(s), providing authoritative hostname to IP mappings for organization’s named hosts can be maintained by organization or service provider

11. Application Layer2-11DNS recordsDNS: distributed db storing resource records (RR)type=NSname is domain (e.g., foo.com)value is hostname of authoritative name server for this domainRR format: (name, value, type, ttl)type=Aname is hostnamevalue is IP addresstype=CNAMEname is alias name for some “canonical” (the real) namewww.ibm.com is really servereast.backup2.ibm.comvalue is canonical nametype=MXvalue is name of mailserver associated with name

12. Application Layer2-12DNS protocol, messagesquery and reply messages, both with same message formatmsg headeridentification: 16 bit # for query, reply to query uses same #flags:query or replyrecursion desired recursion availablereply is authoritativeidentificationflags# questionsquestions (variable # of questions)# additional RRs# authority RRs# answer RRsanswers (variable # of RRs)authority (variable # of RRs)additional info (variable # of RRs)2 bytes2 bytes

13. Application Layer2-13name, type fields for a queryRRs in responseto queryrecords forauthoritative serversadditional “helpful”info that may be usedidentificationflags# questionsquestions (variable # of questions)# additional RRs# authority RRs# answer RRsanswers (variable # of RRs)authority (variable # of RRs)additional info (variable # of RRs)2 bytes2 bytesDNS protocol, messages

14. Application Layer2-14DNS: caching, updating recordsonce (any) name server learns mapping, it caches mappingcache entries timeout (disappear) after some time (TTL)TLD servers typically cached in local name serversthus root name servers not often visitedcached entries may be out-of-date (best effort name-to-address translation!)if name host changes IP address, may not be known Internet-wide until all TTLs expireupdate/notify mechanisms proposed IETF standardRFC 2136

15. Ok … so now we know about DNS… how can we block it!A few things to keep in mind …No cryptographic integrity of DNS messagesDNSSEC proposed but not widely implementedCaching of replies means leakage of bad DNS data can persist

16. Blocking dns names

17. Blocking dns names

18. This diagram assumes ISP DNS Server is complicit.DNS Server(2.1.2.3)Types of false DNS responsesHome connection(2.1.2.4)3rd Party DNS Server(8.8.8.8)DNS QTYPE Awww.censored.comNXDOMAINDNS RESPONSE A127.0.0.1DNS RESPONSE A192.168.5.2DNS RESPONSE A159.106.121.75Block page server(192.168.5.2)DNS RESPONSE A1.2.3.5(correct IP)

19. Blocking DNS namesOption A: get ISP resolver on board(Previous slide)Option B: On-path packet injection similar to TCP ResetsCan be mostly countered with DNS-hold-open:Don’t take the first answer but instead wait for up to a secondGenerally reliable when using an out of country recursive resolveE.g., 8.8.8.8Can be completely countered by DNS-hold-open + DNSSECAccept the first DNS reply which validates

20. Reading from Web … Hold-On: Protecting Against On-Path DNS PoisoningH. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson.Idea: Once you receive a DNS packet, wait for a predefined “hold-on” period before accepting the result.DNSSEC is still vulnerable to these injected packets and does not make hold-on unneccessaryInject a reply with an invalid signature: client will rejectUse active measurements to determine the expected TTL and RTT to the server.

21. Hold-on in action

22. Link to FOCI2014 Talk videohttps://www.usenix.org/conference/foci14/workshop-program/presentation/anonymous ^^^ This talk does a good job of overviewing the reading by anonymous.

23. Next time …Filtering of Web requests at application layer.

24. Additional SLIDES