SlideShare a Scribd company logo
1 of 44
Download to read offline
©!Men!&!Mice!!http://menandmice.com!
Mirror!-!Mirror
The!dangers!of!DNS!reflection!attacks
1
©!Men!&!Mice!!http://menandmice.com!
DNS
www.menandmice.com
2001:4bd8::5501:2
Service!locator
Trust-System
Reputation-System
2
©!Men!&!Mice!!http://menandmice.com!
Problem,!in!DNS?
DNS!has!a!problem
A!small!problem!growing
not!new!(since!1983)
but!getting!popular!with!troublemakers
3
©!Men!&!Mice!!http://menandmice.com!
DNS!operation
http://www.strotmann.de.
“”
de.
strotmann.de.
Observation:!DNS!answers!are!larger!than!queries
4
©!Men!&!Mice!!http://menandmice.com!
DNS!response!sizes
17:23:19.306630 IP 192.168.1.27.49252 > 192.168.1.2.domain: 7395+ [1au] AAAA? www.strotmann.de. (45)
17:23:19.308328 IP 192.168.1.2.domain > 192.168.1.27.49252: 7395 1/2/1 AAAA 2001:470:1f08:f1d::2 (159)
Answer:!
159!Byte
Query:!
45!Byte
Answer!is!3.5!times!bigger
5
©!Men!&!Mice!!http://menandmice.com!
DNS!response!sizes
; <<>> DiG 9.9.2-vjs287.12 <<>> www.strotmann.de aaaa +qr @192.168.1.2
;; global options: +cmd
;; Sending:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60154
;; flags: rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.strotmann.de. IN AAAA
Answer:!
159!Byte
Query:!
45!Byte
; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60154
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.strotmann.de. IN AAAA
;; ANSWER SECTION:
www.strotmann.de. 71645 IN AAAA 2001:470:1f08:f1d::2
;; AUTHORITY SECTION:
strotmann.de. 56293 IN NS ns.norplex-communications.com.
strotmann.de. 56293 IN NS ns.norplex-communications.net.
;; Query time: 2 msec
;; SERVER: 192.168.1.2#53(192.168.1.2)
;; WHEN: Thu Jan 17 17:35:24 2013
;; MSG SIZE rcvd: 159
6
©!Men!&!Mice!!http://menandmice.com!
DNS!response!sizes
17:28:15.035136 IP 192.168.1.27.65533 > 192.168.1.2.domain: 42995+ [1au] ANY? isc.org. (36)
17:28:15.036408 IP 192.168.1.2.domain > 192.168.1.27.65533: 42995$ 27/0/6 SOA,
RRSIG,
NS sfba.sns-pb.isc.org.,
NS ord.sns-pb.isc.org.,
NS ns.isc.afilias-nst.info.,
NS ams.sns-pb.isc.org.,
RRSIG,
A 149.20.64.42,
RRSIG,
MX mx.ams1.isc.org. 10,
MX mx.pao1.isc.org. 10,
RRSIG,
TXT "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32
ip6:2001:500:60::65/128 ~all",
TXT "$Id: isc.org,v 1.1760 2013-01-17 01:51:59 jdaniels Exp $",
RRSIG,
AAAA 2001:4f8:0:2::d,
RRSIG,
NAPTR[|domain] (3169)
Answer:!
3169!Byte
Query:!
36!Byte
88!times!bigger!
7
©!Men!&!Mice!!http://menandmice.com!
Where!is!the!problem?
DNS!is!UDP!"stateless"!
communication
source!IP!addresses!can!be!
spoofed
some!DNS
Server!in!the!Internet
Source!IP!
Address!
"spoofed"
Answer!is!
delivered!to!the!
owner!of!the!
"spoofed"!IP!
Address
8
©!Men!&!Mice!!http://menandmice.com!
Where!is!the!problem?
There!are!many!many!DNS
servers!to!be!found!in!the!Internet
9
©!Men!&!Mice!!http://menandmice.com!
Is!it!a!DNSSEC!problem?
DNSSEC!deployment!
brought!this!issue!into!
the!light
but!the!problem!existed!
before!DNSSEC,!and!it!
was!exploited!before
DNSSEC!is!not!the!problem! but!it!doesn't!help!either
10
©!Men!&!Mice!!http://menandmice.com!
Dramatis!personae
There!are!3!parties:
1)!the!sender!(attacker)
2)!the!mirror!DNS!server!(the!weapon)
3)!the!recipient!(victim)!
if!you!operate!a!DNS!server,!you!might!provide!the!weapon!for!this!attack
11
©!Men!&!Mice!!http://menandmice.com!
What!can!we!do?
easy!slope
advanced!track
expert!level
12
©!Men!&!Mice!!http://menandmice.com!
DNS!monitoring advanced!track
Do!you!know!who!is!
using!your!DNS?
What!questions!are!
asked?
What!answers!are!
given?
DNS!Monitoring!can!
reveal!interesting!facts!
about!networks
13
©!Men!&!Mice!!http://menandmice.com!
DNS!monitoring advanced!track
open!source!and!
commercial!tools!are!
available
DNSwittness
DNSTOP
DNS!Statistics!
Collector!(dsc)
PacketQ
Men!&!Mice
DNS!Traffic
Monitor
14
©!Men!&!Mice!!http://menandmice.com!
Firewall? expert!level
First!instinct!
lets!block!the!
source!
address!
But!wait!
It!ain't!that!
easy!
15
©!Men!&!Mice!!http://menandmice.com!
Firewall? expert!level
Manual!blocking!is!too!
much!work
Automatic!blocking!could!harm!
the!victim!
Remember:!the!source!IP!we!
see!is!the!victims!address!
You!don't!want!to!block!IP's!
like!8.8.8.8
16
©!Men!&!Mice!!http://menandmice.com!
Firewall? expert!level
Fighting!the!reflection!
attack!on!the!firewall!
level!is!not!impossible
but!don't!forget!your!
helmet!and!avalanche!
gear!
interview!the!daredevils!
that!have!taken!this!track!
before!you
17
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers
BIND!9.4!and!older!and!all!
Windows!DNS!are!open!
resolvers!by!default
open!resolver!=!a!DNS!
server!that!does!DNS!
recursive!lookups!for!
ALL!IP!addresses
An!easy!target!for!
attackers!to!launch!a!
reflection!attack
easy!slope
18
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers
For!BIND!9,!use!
"allow-recursion"!
to!limit!recursion!to!your!client!
networks!
easy!slope
options {
allow-recursion { localnets; };
};
19
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers
For!authoritative!Windows!
DNS,!disable!recursion
Don't!operate!a!caching!
server!open!in!the!Internet
easy!slope
20
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers easy!slope
http://www.team-cymru.org/Services/Resolvers/
21
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers easy!slope
RFC!5358!(BCP!140)
Preventing!Use!of!Recursive!
Nameservers!in!Reflector!
Attacks
22
©!Men!&!Mice!!http://menandmice.com!
Minimal!responses
DNS!servers!are!very!
helpful!by!nature
they!deliver!data!not!
explicitly!asked!for
they!try!to!be!nice!and!
help!other!DNS!servers!
out!there
easy!slope
% dig @ns2.xb.nl. mx ncsc.nl
; <<>> DiG 9.9.2-vjs287.12 <<>> @ns2.xb.nl. mx ncsc.nl
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60070
;; flags: qr aa rd; QUERY: 1, ANSWER: 6, AUTHORITY: 2, ADDITIONAL: 10
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;ncsc.nl. IN MX
;; ANSWER SECTION:
ncsc.nl. 60 IN MX 20 min3.govcert.nl.
ncsc.nl. 60 IN MX 20 min4.govcert.nl.
ncsc.nl. 60 IN MX 30 min5.govcert.nl.
ncsc.nl. 60 IN MX 40 smtp.espritxb.nl.
ncsc.nl. 60 IN MX 10 min1.govcert.nl.
ncsc.nl. 60 IN MX 10 min2.govcert.nl.
;; AUTHORITY SECTION:
ncsc.nl. 60 IN NS ns1.xb.nl.
ncsc.nl. 60 IN NS ns2.xb.nl.
;; ADDITIONAL SECTION:
min1.govcert.nl. 60 IN A 193.172.9.50
min2.govcert.nl. 60 IN A 193.172.9.51
min3.govcert.nl. 60 IN A 31.161.17.13
min4.govcert.nl. 60 IN A 31.161.17.14
min5.govcert.nl. 60 IN A 217.169.231.54
smtp.espritxb.nl. 60 IN A 80.248.34.142
smtp.espritxb.nl. 60 IN A 80.248.34.141
ns1.xb.nl. 300 IN A 80.248.34.15
ns2.xb.nl. 300 IN A 212.67.179.100
;; Query time: 39 msec
;; SERVER: 212.67.179.100#53(212.67.179.100)
;; WHEN: Fri Jan 18 13:02:08 2013
;; MSG SIZE rcvd: 362
23
©!Men!&!Mice!!http://menandmice.com!
Minimal!responses
using!the!"minimal-responses"!you!can!configure!
a!BIND!9!to!be!less!helpful!(to!strangers)
this!reduces!the!"ammo"!
available!to!attackers
easy!slope
24
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
three!rules!of!good!DNS
advanced!track
1
Clients!never!send!queries!to!
authoritative!DNS!Server
2
authoritative!DNS!Server!answer!
to!caching!servers
3
caching!DNS!server!cache!responses
25
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
all!good!DNS!answers!are!
cacheable
advanced!track
1
good!positive!
(NOERROR+DATA)!answers
2
domain!does!not!exist!
(NXDOMAIN)!answers
3
record-type!does!not!exist!
(NOERROR+NODATA)!answer
26
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
as!all!DNS!queries!should!go!
through!a!caching!server!...
advanced!track
...!identical!queries!should!not!be!
seen!from!the!same!source!inside!
the!TTL!(Time!to!Live)!...
...!if!we!see!recurring!queries,!
it!is!likely!an!attack!...
...!or!crappy!
software!:(
27
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
response!rate!limiting!counts!the!
number!of!identical!responses!sent!
to!a!given!network
advanced!track
will!throttle!outgoing!responses!if!
too!much!identical!responses!are!
sent
allows!legit!clients!in!the!victims!
network!to!still!resolve!DNS!data
28
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
in!case!an!attack!is!detected,!
(almost)!empty!answers!are!sent!
with!"TC"!flag!set
advanced!track
"TC"!flag!=!answer!truncated,!retry!
over!TCP
real!caching!DNS!server!will!repeat!
the!query!over!TCP!
(slow,!but!harder!to!spoof)
29
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
advanced!track
RRL!enabled!on!an!authoritative!server
30
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
Response!Rate!Limiting!is!available!
in!some!Unix!DNS!servers
advanced!track
BIND!9!patch!by!Vernon!Schryver!
and!Paul!Vixie
(will!be!in!BIND!9.10!in!Summer)
NSD!3!and!NSD!4!from!NLnet!Labs
31
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
BIND!9.9.2-P2!installation!
packages!with!RRL!are!available!
free!of!charge!from!Men!&!Mice
advanced!track
RedHat!5.x!and!6.x Debian!(Ubuntu)
Solaris!10/11!for!i86pc!
and!SPARC
MacOS!X!10.4-10.8
http://support.menandmice.com/download/bind
32
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
the!Men!&!Mice!Suite!
supports!BIND!RRL!as!
does!the!Men!&!Mice!
DNS!Appliance
advanced!track
33
©!Men!&!Mice!!http://menandmice.com!
DNS
dampening
Lutz!Donnerhacke!is!working!on!a!
different!idea!called!
"DNS!dampening"
advanced!track
BIND!9!patch!is!available
34
©!Men!&!Mice!!http://menandmice.com!
BCP!38
Network!Ingress!Filtering:!
"Defeating!Denial!of!Service!
Attacks!which!employ!IP!Source!
Address!Spoofing"
RFC!2827!-!May!2000
would!be!the!real!fix:
stop!IP!spoofing
expert!level
35
©!Men!&!Mice!!http://menandmice.com!
BCP!38
network!operators!find!many!
many!reasons!not!to!implement!
BCP!38
time,!knowledge,!money,!
"not!my!department",!...
expert!level
36
©!Men!&!Mice!!http://menandmice.com!
BCP!38
if!you!operate!a!network:!
implement!it
if!you!are!a!customer:!
ask!your!ISP!to!
implement!it
expert!level
37
©!Men!&!Mice!!http://menandmice.com!
Preparing!for!denial!of!service!
attacks
38
©!Men!&!Mice!!http://menandmice.com!
Help,!I'm!under!attack
•surviving!a!DDoS!attack!is!a!matter!of!preparation
•there!is!often!not!much!you!can!do!once!the!attack!is!
under!way
•the!problem:!network!link!saturation!(not!server!load)
•your!network!connection(s)!to!the!outside!world!are!
blocked
•talk!to!your!provider:!are!they!prepared!for!a!DDoS?
39
©!Men!&!Mice!!http://menandmice.com!
Authoritative!DNS!server
• global!DNS!anycast!can!help!fighting!a!DDoS
• Anycast:!multiple!server!with!the!same!IP!address!and!DNS!content!
are!available
• routing!decides!which!one!is!visible!from!a!certain!place!in!the!net
• we!will!cover!DNS!anycast!in!details!in!an!upcoming!webinar
• commercial!DNS!secondary!provider!offer!anycasted!DNS!server
• the!Men!&!Mice!Service!team!helps!implementing!DNS!anycast
40
©!Men!&!Mice!!http://menandmice.com!
Summary
41
©!Men!&!Mice!!http://menandmice.com!
Checklist
make!sure!not!to!run!an!open!DNS!
resolver
consider!"minimal-responses"
implement!Response!Rate!Limiting
turn!on!ingress!filtering
know!your!DNS!traffic
42
©!Men!&!Mice!!http://menandmice.com!
Questions!
43
©!Men!&!Mice!!http://menandmice.com!
Thank!you!
44

More Related Content

Viewers also liked

MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?Memoori
 
How IoT Is Breaking The Internet
How IoT Is Breaking The InternetHow IoT Is Breaking The Internet
How IoT Is Breaking The InternetCarl J. Levine
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsRahul Neel Mani
 
DNS Security
DNS SecurityDNS Security
DNS Securityinbroker
 
Dns security overview
Dns security overviewDns security overview
Dns security overviewVladimir2003
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecuritySam Bowne
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS AttacksAmazon Web Services
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSASrikrupa Srivatsan
 
From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.Taras Matyashovsky
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 

Viewers also liked (15)

Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
 
Advanced DNS Protection
Advanced DNS ProtectionAdvanced DNS Protection
Advanced DNS Protection
 
How IoT Is Breaking The Internet
How IoT Is Breaking The InternetHow IoT Is Breaking The Internet
How IoT Is Breaking The Internet
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Dns security overview
Dns security overviewDns security overview
Dns security overview
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS Security
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSA
 
From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.
 
Spamhaus DDoS - FR
Spamhaus DDoS - FRSpamhaus DDoS - FR
Spamhaus DDoS - FR
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 

Similar to Dns reflection attacks webinar slides

RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report WebinarMen and Mice
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices WebinarMen and Mice
 
Report from IETF 89 in London - DNS, DHCP and IPv6
Report from IETF 89 in London - DNS, DHCP and IPv6Report from IETF 89 in London - DNS, DHCP and IPv6
Report from IETF 89 in London - DNS, DHCP and IPv6Men and Mice
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedMen and Mice
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)Men and Mice
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEMen and Mice
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review WebinarMen and Mice
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS ServerMen and Mice
 
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE
 
Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteMen and Mice
 
DNS fragmentation attacks - the dangers of not validating DNSSEC
DNS fragmentation attacks - the dangers of not validating DNSSEC DNS fragmentation attacks - the dangers of not validating DNSSEC
DNS fragmentation attacks - the dangers of not validating DNSSEC Men and Mice
 
What happens when firefox crashes?
What happens when firefox crashes?What happens when firefox crashes?
What happens when firefox crashes?Erik Rose
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECShumon Huque
 
A DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMFA DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMFMapMyFitness
 
Hacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades shortHacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades shortVincent Ohprecio
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonOpenDNS
 
Speech-Enabling Web Apps
Speech-Enabling Web AppsSpeech-Enabling Web Apps
Speech-Enabling Web AppsMojo Lingo
 

Similar to Dns reflection attacks webinar slides (20)

RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
 
Report from IETF 89 in London - DNS, DHCP and IPv6
Report from IETF 89 in London - DNS, DHCP and IPv6Report from IETF 89 in London - DNS, DHCP and IPv6
Report from IETF 89 in London - DNS, DHCP and IPv6
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloaded
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANE
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
 
RIPE 68 Webinar
RIPE 68 WebinarRIPE 68 Webinar
RIPE 68 Webinar
 
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
 
Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
 
DNS fragmentation attacks - the dangers of not validating DNSSEC
DNS fragmentation attacks - the dangers of not validating DNSSEC DNS fragmentation attacks - the dangers of not validating DNSSEC
DNS fragmentation attacks - the dangers of not validating DNSSEC
 
What happens when firefox crashes?
What happens when firefox crashes?What happens when firefox crashes?
What happens when firefox crashes?
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
A DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMFA DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMF
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
 
Hacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades shortHacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades short
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
 
Speech-Enabling Web Apps
Speech-Enabling Web AppsSpeech-Enabling Web Apps
Speech-Enabling Web Apps
 

More from Men and Mice

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesMen and Mice
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSMen and Mice
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksMen and Mice
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local NetworksMen and Mice
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encryptedMen and Mice
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsMen and Mice
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption securityMen and Mice
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANEMen and Mice
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial Men and Mice
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practicesMen and Mice
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsMen and Mice
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNSMen and Mice
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?Men and Mice
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootMen and Mice
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 WebinarMen and Mice
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCMen and Mice
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarMen and Mice
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitMen and Mice
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2Men and Mice
 

More from Men and Mice (20)

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Dns reflection attacks webinar slides