Reliable Strong Cache and Security for the Domain Name System

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 4 - Mar 2014
Reliable Strong Cache and Security for the
Domain Name System
S. Pari Elavarasan#1 , K. Sampath Kumar*2
# Department of Computer Science and Engineering, PGP College of Engineering and Technology, Namakkal,
Tamil nadu, India.
* Professor and head of Computer Science and Engineering, PGP College of Engineering and Technology, Namakkal
Tamil nadu, India.
Abstract— Effective caching in the Domain Name System
(DNS) is critical to its performance and scalability to overcome
the sudden and dramatic Internet failures, natural and human
disasters, frequent changes of Internet Protocol (IP) addresses
and fine-grain controls for balance load distributions. The
strong DNS cache consistency improves the availability and
reliability of Internet services. We introduce a new strategy to
build chains of trust from root servers to authoritative servers.
The techniques we employ are based on symmetric-key
cryptography.
Then, In propose system a DNS Security Extensions
(DNSsec), running as middleware in DNS, to provide string
authentication and integrity to the DNS. It compare
cryptographic algorithm with other existing lease schemes.
Based on this process, build a DNSsec with minor
modifications to the current DNS implementation. The system
might be designed and keep track of the DNS name servers
such that it suppose to keep only the frequently used IP
addresses and may required regularly and at the same
instance it should involved in deletion of IP address which are
fake one. Our system prototype demonstrates the effectiveness
of DNSsec and its easy and incremental deployment on the
internet.
Keywords— Domain name system, cache consistency,
middleware, cryptograpy.
I.INTRODUCTION
The Domain Name System (DNS) is a
distributed database that provides a directory service
to translate domain names to Internet Protocol (IP)
addresses. DNS consists of a hierarchy of name
servers. For such a hierarchical system, caching is
critical to its performance and scalability. To
determine the IP address of a domain name, the DNS
resolver residing at a client sends a recursive query to
its local DNS name server. If no valid cached
ISSN: 2231-5381
mapping exists, then the local DNS name server will
resolve the query by iteratively communicating with
a root name server, a Top-Level Domain (TLD) name
server, and a series of authoritative DNS name
servers. All the replied DNS messages including
referrals and answers are cached at the local DNS
name server so that subsequent queries for the same
domain name will be answered directly from the
cache. Therefore, DNS caching significantly reduces
the workload of root and TLD name servers, lookup
latencies, and DNS traffic over the Internet [1].
A zone administrator deciding whether to deploy
DNSSEC must weigh the costs and benefits of:


The fraction of clients whose resolvers validate
DNSSEC records and therefore would be able to
detect tampering if it were occurring and
DNSSEC were deployed.
The fraction of clients which fail with valid
DNSSEC records and therefore will be unable to
reach the server whether or not tampering is
occurring.
The Domain Name System(DNS) has become a
critical operational part of the Internet Infrastructure,
yet it has no strong security mechanisms to assure
Data Integrity or Authentication. Extensions to the
DNS are described that provide these services to
security aware resolves are applications through the
use of Cryptographic Digital Signatures. These
Digital Signatures are included zones as resource
records [11].
http://www.ijettjournal.org
Page 182
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 4 - Mar 2014
The extensions also provide for the storage of
Authenticated Public keys in the DNS. This storage
of keys can support general Public key distribution
services as well as DNS security. These stored keys
enables security aware resolvers to learn the
authenticating key of zones, in addition to those for
which they are initially configured. Keys associated
with DNS names can be retrieved to support other
protocols. In addition, the security extensions provide
for the Authentication of DNS protocol transactions.
The DNS Security is designed to provide security by
combining the concept of both the Digital Signature
and Asymmetric key (Public key) Cryptography.
Here the Public key is send instead of Private key.
The DNS security uses Message Digest Algorithm to
compress the Message(text file) and PRNG(Pseudo
Random Number Generator) Algorithm for
generating Public and Private key. The message
combines with the Private key to form a Signature
using DSA Algorithm, which is send along with the
Public key. The receiver uses the Public key and
DSA Algorithm to form a Signature. If this Signature
matches with the Signature of the message received,
the message is Decrypted and read else discarded.
Authenticity is based on the identity of some entity.
This entity has to prove that it is genuine. In many
Network applications the identity of participating
entities is simply determined by their names or
addresses. High level applications use mainly names
for authentication purposes, because address lists are
much harder to create, understand, and maintain than
name lists [11].
II.RELATED WORKS
DNS performance at either root name servers or
local DNS name servers and their caching
effectiveness have been studied in the past decade. In
first conduct extensive Internet measurements to
quantitatively characterize DNS dynamics; then
propose a proactive DNS cache update protocol,
called DNScup, running as middleware in DNS
nameservers, to provide strong cache consistency for
DNS. The core of DNScup is an optimal lease
scheme, called dynamic lease, to keep track of the
local DNS nameservers. We compare dynamic lease
ISSN: 2231-5381
with other existing lease schemes through theoretical
analysis and trace-driven simulations. Based on the
DNS Dynamic Update protocol, we build a DNScup
prototype with minor modifications to the current
DNS implementation. Our system prototype
demonstrates the effectiveness of DNScup and its
easy and incremental deployment on the Internet [1].
Motivated by our ongoing work exploring an
alternative Internet architecture, we wish to make use
of naming services in order to support functionality
such as: host and network mobility; application
and/or virtual machine migration; and various forms
of traffic control (e.g. multi-homing). Currently, the
Domain Name System (DNS) is used to resolve
names to DNS records, with relatively large time-tolive (TTL) values (several thousands of seconds) for
caching the results. To support new agile services and
systems, cached results may need to have much lower
TTL values, so that cached DNS values do not
become stale as system changes occur, e.g. changes
to end-system location information to support new
methods of mobility. However, current conventions
for DNS configuration normally use conservatively
high TTL values. We have conducted an empirical
study of a live DNS deployment where we have
reduced to zero the TTL values of records for the
entire School of Computer Science at the University
of St Andrews. Our results show that the increase in
DNS load is much lower than might be expected,
following a highly non-linear decrease with respect to
the TTL value of the DNS records [5].
The mapping service provided by the Domain
Name System (DNS) is fundamental not only to the
health of the Internet but also to the protection and
integrity of the data. Recently, the DNS infrastructure
has suffered several malicious attacks including DNS
cache poisoning, which causes the DNS to return
false name-to-IP mappings and can be used as a
foothold for more insidious attacks. I propose a peerto-peer based scheme to quickly detect and correct
inaccurate DNS records caused by cache poisoning
attacks. This scheme also helps DNS servers to
improve cache consistency by detecting and
removing stale cached records. This scheme does not
require modifications to the current infrastructure and
http://www.ijettjournal.org
Page 183
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 4 - Mar 2014
can be deployed quickly. In addition, it does not use
cryptographic techniques and thus does not suffer
from the key management and processing overhead
issues of those techniques [4].
Recursive DNS (RDNS) resolvers on new attack
for poisoning the cache was discovered in DNS. DNS
software only partially protected the DNS poisoning
in servers. I discuss two type of DNS poisoning
prevention methods 1) wildcard secure DNS
(WSECDNS) and 2) Start of authority (SOA) in
without changing protocol. In wild-card given in the
RFC 1034, RFC 4592 and TXT resource records in
order to increase the flow of DNS queries to the point
that cache poisoning attack infeasible. The stubresolvers depend on the RDNS for the IP address. It
is responsible for the direct contraction authoritative
name servers on stub-resolvers and the cache
responses for a given TTL (Time to Live) and then
forwarded it back to stubresolvers. Now the
poisoning attack works by forcing an RDNS to look
up a domain name and then sending a forged before
RDNS gives back the domain to the server. As per in
this paper the RDNS sends authoritative name to the
server it provides and recommends a TLD(Top Level
Domain) server as we don’t give any knowledge of
the IP address to the RDNS. Now RDNS will ask for
the TLD servers for the IP of authoritative name
server. TLD will response with the recommend to
SOA (Start of Authority) for the domain and finally
gives record to stubresolvers through the path of
RDNS. So the attack over the cache is not possible as
the domain is sent from the SOA [2].
The mapping or binding of IP addresses to host
names became a major problem in the rapidly
growing Internet and the higher level binding effort
went through different stages of development up to
the currently used Domain Name System (DNS) [11].
The DNS Security is designed to provide security by
combining the concept of both the Digital Signature
and Asymmetric key (Public key) Cryptography.
Here the Public key is send instead of Private key.
The DNS security uses Message Digest Algorithm to
compress the Message (text file) and PRNG (Pseudo
Random Number Generator) Algorithm for
generating Public and Private key. The message
ISSN: 2231-5381
combines with the Private key to form a Signature
using DSA Algorithm, which is send along with the
Public key. The receiver uses the Public key and
DSA Algorithm to form a Signature If this Signature
matches with the Signature of the message received,
the message is Decrypted and read else discarded.
III.PROPOSED METHODOLOGY
The scope of the security extensions to the DNS
can be summarized into three services: key
distribution, data origin authentication, and
transaction and request authentication [6].
A. Key distribution
The key distribution service not only allows for the
retrieval of the public key of a DNS name to verify
the authenticity of the DNS zone data, but it also
provides a mechanism through which any key
associated with a DNS name can be used for
purposes other than DNS. The public key distribution
service supports several different types of keys and
several different types of key algorithms [8].
B. Data origin authentication
Data origin authentication is the crux of the design of
DNSSEC. It mitigates such threats as cache
poisoning and zone data compromise on a DNS
server. The RRSets within a zone are
cryptographically signed thereby giving a high level
of assuredness to resolvers and servers that the data
just received can be trusted [8].
DNSSEC makes use of digital signature technology
to sign DNS RRSet. The digital signature contains
the encrypted hash of the RRSet. The hash is a
cryptographic checksum of the data contained in the
RRSet. The hash is signed (i.e., digitally encrypted)
using a private key usually belonging to the
originator of the information, known as the signer or
the signing authority. The recipient of the RRSet can
then check the digital signature against the data in the
RRSet just received. The recipient does this by first
decrypting the digital signature using the public key
of the signer to obtain the original hash of the data.
http://www.ijettjournal.org
Page 184
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 4 - Mar 2014
Then the recipient computes its own hash on the
RRSet data using the same cryptographic checksum
algorithm, and compares the results of the hash found
in the digital signature against the hash just
computed. If the two hash values match, the data has
integrity and the origin of the data is authentic.
C. DNS transaction and request authentication
DNS transaction and request authentication provides
the ability to authenticate DNS requests and DNS
message headers. This guarantees that the answer is
in response to the original query and that the response
came from the server for which the query was
intended. Providing the assurance for both is done in
one step. Part of the information, returned in a
response to a query from a security aware server, is a
signature. This signature is produced from the
concatenation of the query and the response. This
allows a security aware resolver to perform any
necessary verification concerning the transaction.
Another use of transaction and request authentication
is for DNS Dynamic Updates. Without DNSSEC,
DNS Dynamic Update does not provide a mechanism
that prohibits any system with access to a DNS
authoritative server from updating zone information.
In order to provide security for such modifications,
Secure DNS Dynamic Update incorporates DNSSEC
to provide strong authentication for systems allowed
to dynamically manipulate DNS zone information on
the primary server [7].
DNSSEC works by signing domains (including root
and top level) and zones using public/private key
cryptography, thereby creating a chain of trust. Note
that to be backwards compatible with non-DNSSEC
enabled servers and clients, queries are completed
using standard DNS when DNSSEC is not available.
In other words, when DNSSEC is not available
throughout the entire chain - from requestor client to
resolver/caching nameserver
to authoritative
nameservers - the system reverts to regular DNS [6].
However, if DNSSEC is available throughout the
chain, the client has a level of assurance that the DNS
query response is signed and trustworthy starting
ISSN: 2231-5381
from the root and chaining all the way down to the
domain and subdomains. The following illustration
provides a high-level overview of DNSSEC in action.
D. Caveats
DNSSEC is one way to improve the overall security
of DNS. But before you going running off and
planning for full implementation of DNSSEC at your
organization, note that there are some criticisms and
caveats. Because DNSSEC was designed to respond
with complete, signed, authoritative information
about a domain or sub-domain, it does not work well
with traditional split (or split-horizon) DNS
architectures. In split DNS architecture, some
machine information is available to all requestors
while other information, such as servers with highly
sensitive data that should be accessible only from the
trusted internal network and not from the Internet, is
kept private. Since DNSSEC makes previously
private information public, it opens zones up to
enumeration/walking exposures which allows
attackers to use DNSSEC information to determine a
definitive list and map of hosts in a zone. To mitigate
this issue, the extension DNSSEC Hashed
Authenticated Denial of Existence (a.k.a. NSEC3)
was introduced in 2008, but is not yet in wide use [6].
IV.IMPLEMENTATION MECHANISM
DNSSEC purely to address the risk. One of the
most common ways of “defacing” a web server is to
redirect its domain name to the address of a host
controlled by the attacker through manipulation of
the DNS. DNSSEC eliminates some of these
problems by providing end-to-end authenticity and
data integrity through transaction signatures and zone
signing.
Transaction signatures are computed by clients and
servers over requests and responses. DNSSEC allows
the two parties either to use a message authentication
code (MAC) with a shared secret key or public-key
signatures for authenticating and authorizing DNS
messages between them. The usefulness of
transaction signatures is limited since they guarantee
integrity only if a client engages in a transaction with
http://www.ijettjournal.org
Page 185
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 4 - Mar 2014
the server who is authoritative for the returned data,
but do not protect against a corrupted server acting as
a resolver. For zone signing, a public-key for a digital
signature scheme, called a zone key, is associated
with every zone. Every resource record (it is the basic
data unit in the DNS database) is complemented with
an additional SIG resource record containing a digital
signature, computed over the resource record and can
implement DNSSEC on an end-to-end basis, signing
and validating internal zone data. Finally, conclude
Encryption and Decryption, Signature Creation, and
Signature Verification [11].
A. The chain of trust
In order for DNSSEC to be fully deployed, an
unbroken chain of trust needs to be established, down
from the root at the top, through the TLD, down to
individual registrants. All zones need to be
authenticated by “signing”, i.e. the publisher of a
zone signs that zone prior to publication and the
parent of that zone publishes the keys of that zone.
To achieve this we need the root signed and
procedures in place at each step to enable the secure
transmission of keys between parties.
B. Secure key management
Currently registries only make minimal use of keys
within DNS transactions as part of the ordinary
operations of the registry. Managing DNSSEC keys
requires a registry to implement a new infrastructure
for the secure storage and transmission of keys,
including both suitable equipment and procedures.
C. Signing changes
In common with a few of the larger TLD registries,
Nominet currently provides near synchronous zone
file publication. This means that new domain name
registrations are entered into the DNS within minutes
and can work almost immediately. Signing a large
zone, like co.uk which has over 6 million
registrations, would be a highly involved and
maintenance intensive task. Given the frequency of
updates to the records within co.uk, which can peak
at 300,000 per day, signing a large, fast-changing
ISSN: 2231-5381
zone in real time will require significant
cryptographic processing power and reliability.
D. Automated re-signing
With any zone it is likely that the signatures will
expire before the DNS records are updated. Zone
operators therefore require a means to automatically
re-sign DNS records before these signatures expire.
This functionality is dubbed ‘continuous signing’ and
is not yet a feature of common nameserver
implementations. Nominet is therefore providing
financial assistance to the Internet Standards
Consortium (ISC) to fund the development of
continuous signing within BIND, one of the most
popular nameserver implementations in deployment.
E. Managing resource usage
Signed DNS records are considerably larger than
unsigned records, with a fully signed zone being an
order of magnitude greater in size than an unsigned
zone. Some registries have expressed concern at the
impact this will have on their infrastructure and
possibly limit their involvement with DNSSEC as a
consequence. However a solution for this exists with
NSEC3, the enhancements to DNSSEC that are close
to becoming an RFC. This solution is called ‘opt-out’
and enables a zone operator to only sign those
delegations that need DNSSEC. A registry that uses
this can manage the increase in resources in line with
the gradual uptake of DNSSEC, rather than being
forced into an all-or-nothing upgrade. Traditional
capacity management for registries has been based
around the number of domains within the zone.
However, future capacity planning will need to
incorporate the additional factor of the number of
signed zones to ensure that a true picture of resource
requirements is developed.
V.CONCLUSION
Our replicated name service provides fault
tolerance and security guarantees to secure DNS
against an attacker that compromises a fraction of
name servers in a zone, while supporting dynamic
updates. The results show that such a system can be
used in practice. DNSsec provide string
http://www.ijettjournal.org
Page 186
International Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 4 - Mar 2014
authentication and integrity to the DNS and compare
cryptographic algorithm with other existing lease
schemes. Based on this process, build a DNSsec with
minor modifications to the current DNS
implementation. The DNS as an Internet standard to
solve the issues of scalability surrounding the
hosts.txt file. Since then, the widespread use of the
DNS and its ability to resolve host names into IP
addresses for both users and applications alike in a
timely and fairly reliable manner, makes it a critical
component of the Internet. The distributed
management of the DNS and support for redundancy
of DNS zones across multiple servers promotes its
robust characteristics. The system might be designed
and keep track of the DNS name servers such that it
suppose to keep only the frequently used IP addresses
and may required regularly and at the same instance
it should involved in deletion of IP address which are
fake one. Our system achieves the reliable strong
cache in DNS and significantly improves its
availability, performance and scalability.
[3] Vinton Cerf, Paul Twomey, “https://www.icann.
org/en/about/staff/.../ssr/dnssec-paper-15jul08-en.pdf,” ICANN, 12
June 2007.
[4] Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-Nee
Chuah, “DoX: A Peer-to-Peer Antidote for DNS Cache Poisoning
Attacks” Communications, June 2006. ICC '06. IEEE International
Conference on (Vol:5).
[5] Saleem N. Bhatti, Randall Atkinson, “Reducing DNS Caching”
Computer Communications Workshops (INFOCOM WKSHPS),
2011 IEEE Conference on, 10-15 April 2011.
[6] Diana Kelley, “http://www.esecurityplanet.com/vi
ews/article.php/3923021/What-the-Heck-is-DNSSEC
.htm” February 01, 2011.
[7] IETF DNSSEC
WG,
"DNS
Security
(dnssec)
Charter",IETF,1994.”http://www.ietf.cnri.reston.va.us/proceedings
/94dec/charters/dnssec-charter.html”.
[8] Diane Davidowicz, “http://compsec101.antibozo.
net/papers/dnssec/dnssec.html” 1999.
[9] D. Eastlake, C. Kaufman Iris,“http://www.freesoft
.org/CIE/RFC/2065/index.htm, Jan 1997.
[10]
R
Chandramouli,
“http://static-71-166-250129.washdc.east.verizon.net/eLibrary/TECH/US_DOC/N100400C.
pdf” Oct 2009.
[11] Sachin Kumar Sinha, Avinash Kant Singh, Amaresh Sharma,
“Security System for DNS using Cryptography” (IJERT)ISSN:
2278-0181) Vol. 2 Issue 2, February- 2013.
REFERENCES
AUTHORS PROFILE
[1] Xin Chen, Haining Wang, Shansi Ren, Xiaodong Zhang,
“Maintaining Strong Cache Consistency for the Domain Name
System” IEEE August 2007 (vol. 19 no. 8).
[2] K. Sampath Kumar, Dr.G.K.D.Prasanna Venkatesa, “Effective
Method of Prevention of Cache Poisoning for Wild Card Secure
DNS – A Novel Approach” IRACST – Engineering Science and
Technology: An International Journal (ESTIJ), ISSN: 2250-3498,
Vol.3, No.2, April 2013.
ISSN: 2231-5381
1) S.Pari Elavarasan, Department of Computer Science and
Engineering at PGP College of Engineering and Technology,
Namakkal, Tamilnadu, India..
2) K.Sampath Kumar, Professor and head / Computer Science and
Engineering Department at PGP College of Engineering and
Technology, Namakkal, Tamilnadu, India. Presently Research
Scholar at Anna University, Chennai, India.
http://www.ijettjournal.org
Page 187
Download