<div dir="ltr"><br><br><div class="gmail_quote">---------- Forwarded message ----------<br>From: <b class="gmail_sendername">Rachel Kolodny</b> <span dir="ltr"><<a href="mailto:trachel@cs.haifa.ac.il">trachel@cs.haifa.ac.il</a>></span><br>
Date: Mon, Jun 17, 2013 at 3:04 PM<br>Subject: [CS Colloquium] June 19th@14:15 Haya Shulman on DNS Cache-Poisoning: New Attacks and Defenses<br>To: colloq <<a href="mailto:Colloq@cs.haifa.ac.il">Colloq@cs.haifa.ac.il</a>><br>
<br><br>June 19th, Wednesday 14:15, Room 303, Jacobs Building<br>
<br>
Title: DNS Cache-Poisoning: New Attacks and Defenses<br>
<br>
Lecturer: Haya Shulman<br>
<br>
Lecturer homepage : <a href="http://scholar.google.com/citations?user=IyGJlV8AAAAJ&hl=en" target="_blank">http://scholar.google.com/citations?user=IyGJlV8AAAAJ&hl=en</a><br>
<br>
Affiliation :Department of Computer Science, Bar Ilan University<br>
<br>
The Domain Name System (DNS) is key to the availability and correct<br>
operation of the Internet. Due to its significance it is also a<br>
lucrative target for attacks, most notably for cache poisoning. DNS<br>
cache-poisoning enables attackers to redirect clients to malicious<br>
hosts, allowing distribution of malware, credentials theft, phishing<br>
and spam, web sites defacement, and more.<br>
<br>
Cryptographic defenses were designed (DNSSEC), but are not widely<br>
deployed; instead, multiple challenge-response defenses are used.<br>
However, we show how attackers may be able to circumvent those<br>
defenses and poison in spite of them; specifically:<br>
<br>
<br>
<br>
- Circumvent source port randomisation, in the (common) case where the<br>
resolver connects to the Internet via different NAT devices.<br>
<br>
- Circumvent IP address randomisation supported by standard-conforming<br>
resolvers.<br>
<br>
- Circumvent query randomisation, including both randomisation by<br>
prepending a random nonce and case randomisation (0x20 encoding).<br>
<br>
We present countermeasures preventing our attacks; however, we<br>
advocate that only correct adoption of cryptographic security such as<br>
DNSSEC, can prevent the cache-poisoning attacks, and discuss the<br>
challenges and status of DNSSEC deployment.<br>
<br>
<br>
<br>
Joint work with Amir Herzberg.<br>
_______________________________________________<br>
Colloq mailing list<br>
<a href="mailto:Colloq@cs.haifa.ac.il">Colloq@cs.haifa.ac.il</a><br>
<a href="https://cs.haifa.ac.il/mailman/listinfo/colloq" target="_blank">https://cs.haifa.ac.il/mailman/listinfo/colloq</a><br>
<br>
The material posted is under the full responsibility of whoever posted it and under their sole responsibility and liability. The University takes no responsibility whatsoever for any material or other damage, direct or indirect, that may incur from publications in the forum and/or distribution list. Nor is it responsible for the authenticity of any data and material posted in the forum and/or distribution list, their legality, accuracy, credibility or their completeness<br>
<br>
</div><br><br clear="all"><div><br></div>-- <br>Orna Agmon Ben-Yehuda.<br><a href="http://ladypine.org">http://ladypine.org</a>
</div>