Measuring the Performance Impact of NSEC5 (Abstract)
نویسندگان
چکیده
While DNSSEC provides authenticity and integrity to the domain name system (DNS), it also introduces a new vulnerability—zone enumeration [12, 5, 4, 19]—which allows an adversary that asks a small number of targeted DNS queries (one per record in the zone) to discover the full contents of a zone. An enumerated zone can be used as “a source of probable e-mail addresses for spam, or as a key for multiple WHOIS queries to reveal registrant data that many registries may have legal obligations to protect” [12] (e.g., EU data protection laws [13],[3, pg. 37]), or to create a toehold for more complex attacks. As the Internet of things becomes increasingly ubiquitous, it also becomes increasingly important to keep the names and addresses of these “things” (e.g., thermostats, fridges, baby monitors) away from remote attackers. NSEC5 was introduced in [8] as an extension to DNSSEC that solves the zone enumeration problem while still remaining secure even if the authoritative nameserver is compromised. (This is in contrast to (1) NSEC3 [12], which is vulnerable to zone enumeration via offline dictionary attacks [5, 19], and (2) “NSEC3 White Lies ”[6], and “NSEC3 Black Lies” [16], which solve DNSSEC’s zone enumeration problem but assume the authoritative nameserver is trusted to hold the secret DNSSEC zone-signing key (ZSK); thus, if the authoritative is compromised, the security of the zone is compromised as well.) In this work we revisit NSEC5 proposing a modified version based on a custom-made elliptic curve cryptography construction that produces much shorter responses than the originally proposed version. Moreover, we provide the first working implementation of NSEC5-ready authoritative and recursive nameservers, and discuss their performance.
منابع مشابه
Can NSEC5 be practical for DNSSEC deployments?
NSEC5 is a new proposal for providing authenticated denial of existence for DNSSEC, i.e., for securely responding to DNS queries for names that do not exist in a zone. NSEC5 simultaneously guarantees two security properties: (1) privacy against zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible for responding to DNS qu...
متن کاملMeasuring Liquidity Risk Management and Impact on Bank Performance in Iran
A bank as a business units needs to have liquid assets which can be easily converted into cash at short notice. Thus the concept of liquidity risk management is important for any commercial banks. The impact of liquidity position in management of banks have remained significant, though very elusive in the process of investment analysis vis-à-vis bank portfolio management. In addition, liquidity...
متن کاملNSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses
While DNSSEC securely provides authenticity and integrity to the domain name system (DNS), it also creates a new security vulnerability called zone enumeration [27, 10, 7, 42] that allows an adversary that asks a small number of targeted DNS queries to learn the IP addresses of all domain names in a zone. An enumerated zone can be used as “a source of probable e-mail addresses for spam, or as a...
متن کاملNSEC5: Provably Preventing DNSSEC Zone Enumeration
We use cryptographic techniques to study zone enumeration in DNSSEC. DNSSEC is designed to prevent attackers from tampering with domain name system (DNS) messages. The cryptographic machinery used in DNSSEC, however, also creates a new vulnerability, zone enumeration, enabling an adversary to use a small number of online DNSSEC queries combined with offline dictionary attacks to learn which dom...
متن کاملThe Impact of Explicit Instruction of Metadiscourse Markers on EFL Learners' Writing Performance
The current study is an attempt to investigate the impact of explicit instruction of metadiscourse markers on advanced, intermediate, and elementary EFL learners’ writing performance. The participants of the study were 94 undergraduate students majoring in English Literature at the University of Isfahan. To elicit the relevant data, participants were given a pretest of writing ability to check ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016