SlideShare a Scribd company logo
1 of 44
Download to read offline
©!Men!&!Mice!!http://menandmice.com!
Mirror!-!Mirror
The!dangers!of!DNS!reflection!attacks
1
©!Men!&!Mice!!http://menandmice.com!
DNS
www.menandmice.com
2001:4bd8::5501:2
Service!locator
Trust-System
Reputation-System
2
©!Men!&!Mice!!http://menandmice.com!
Problem,!in!DNS?
DNS!has!a!problem
A!small!problem!growing
not!new!(since!1983)
but!getting!popular!with!troublemakers
3
©!Men!&!Mice!!http://menandmice.com!
DNS!operation
http://www.strotmann.de.
“”
de.
strotmann.de.
Observation:!DNS!answers!are!larger!than!queries
4
©!Men!&!Mice!!http://menandmice.com!
DNS!response!sizes
17:23:19.306630 IP 192.168.1.27.49252 > 192.168.1.2.domain: 7395+ [1au] AAAA? www.strotmann.de. (45)
17:23:19.308328 IP 192.168.1.2.domain > 192.168.1.27.49252: 7395 1/2/1 AAAA 2001:470:1f08:f1d::2 (159)
Answer:!
159!Byte
Query:!
45!Byte
Answer!is!3.5!times!bigger
5
©!Men!&!Mice!!http://menandmice.com!
DNS!response!sizes
; <<>> DiG 9.9.2-vjs287.12 <<>> www.strotmann.de aaaa +qr @192.168.1.2
;; global options: +cmd
;; Sending:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60154
;; flags: rd ad; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.strotmann.de. IN AAAA
Answer:!
159!Byte
Query:!
45!Byte
; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60154
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;www.strotmann.de. IN AAAA
;; ANSWER SECTION:
www.strotmann.de. 71645 IN AAAA 2001:470:1f08:f1d::2
;; AUTHORITY SECTION:
strotmann.de. 56293 IN NS ns.norplex-communications.com.
strotmann.de. 56293 IN NS ns.norplex-communications.net.
;; Query time: 2 msec
;; SERVER: 192.168.1.2#53(192.168.1.2)
;; WHEN: Thu Jan 17 17:35:24 2013
;; MSG SIZE rcvd: 159
6
©!Men!&!Mice!!http://menandmice.com!
DNS!response!sizes
17:28:15.035136 IP 192.168.1.27.65533 > 192.168.1.2.domain: 42995+ [1au] ANY? isc.org. (36)
17:28:15.036408 IP 192.168.1.2.domain > 192.168.1.27.65533: 42995$ 27/0/6 SOA,
RRSIG,
NS sfba.sns-pb.isc.org.,
NS ord.sns-pb.isc.org.,
NS ns.isc.afilias-nst.info.,
NS ams.sns-pb.isc.org.,
RRSIG,
A 149.20.64.42,
RRSIG,
MX mx.ams1.isc.org. 10,
MX mx.pao1.isc.org. 10,
RRSIG,
TXT "v=spf1 a mx ip4:204.152.184.0/21 ip4:149.20.0.0/16 ip6:2001:04F8::0/32
ip6:2001:500:60::65/128 ~all",
TXT "$Id: isc.org,v 1.1760 2013-01-17 01:51:59 jdaniels Exp $",
RRSIG,
AAAA 2001:4f8:0:2::d,
RRSIG,
NAPTR[|domain] (3169)
Answer:!
3169!Byte
Query:!
36!Byte
88!times!bigger!
7
©!Men!&!Mice!!http://menandmice.com!
Where!is!the!problem?
DNS!is!UDP!"stateless"!
communication
source!IP!addresses!can!be!
spoofed
some!DNS
Server!in!the!Internet
Source!IP!
Address!
"spoofed"
Answer!is!
delivered!to!the!
owner!of!the!
"spoofed"!IP!
Address
8
©!Men!&!Mice!!http://menandmice.com!
Where!is!the!problem?
There!are!many!many!DNS
servers!to!be!found!in!the!Internet
9
©!Men!&!Mice!!http://menandmice.com!
Is!it!a!DNSSEC!problem?
DNSSEC!deployment!
brought!this!issue!into!
the!light
but!the!problem!existed!
before!DNSSEC,!and!it!
was!exploited!before
DNSSEC!is!not!the!problem! but!it!doesn't!help!either
10
©!Men!&!Mice!!http://menandmice.com!
Dramatis!personae
There!are!3!parties:
1)!the!sender!(attacker)
2)!the!mirror!DNS!server!(the!weapon)
3)!the!recipient!(victim)!
if!you!operate!a!DNS!server,!you!might!provide!the!weapon!for!this!attack
11
©!Men!&!Mice!!http://menandmice.com!
What!can!we!do?
easy!slope
advanced!track
expert!level
12
©!Men!&!Mice!!http://menandmice.com!
DNS!monitoring advanced!track
Do!you!know!who!is!
using!your!DNS?
What!questions!are!
asked?
What!answers!are!
given?
DNS!Monitoring!can!
reveal!interesting!facts!
about!networks
13
©!Men!&!Mice!!http://menandmice.com!
DNS!monitoring advanced!track
open!source!and!
commercial!tools!are!
available
DNSwittness
DNSTOP
DNS!Statistics!
Collector!(dsc)
PacketQ
Men!&!Mice
DNS!Traffic
Monitor
14
©!Men!&!Mice!!http://menandmice.com!
Firewall? expert!level
First!instinct!
lets!block!the!
source!
address!
But!wait!
It!ain't!that!
easy!
15
©!Men!&!Mice!!http://menandmice.com!
Firewall? expert!level
Manual!blocking!is!too!
much!work
Automatic!blocking!could!harm!
the!victim!
Remember:!the!source!IP!we!
see!is!the!victims!address!
You!don't!want!to!block!IP's!
like!8.8.8.8
16
©!Men!&!Mice!!http://menandmice.com!
Firewall? expert!level
Fighting!the!reflection!
attack!on!the!firewall!
level!is!not!impossible
but!don't!forget!your!
helmet!and!avalanche!
gear!
interview!the!daredevils!
that!have!taken!this!track!
before!you
17
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers
BIND!9.4!and!older!and!all!
Windows!DNS!are!open!
resolvers!by!default
open!resolver!=!a!DNS!
server!that!does!DNS!
recursive!lookups!for!
ALL!IP!addresses
An!easy!target!for!
attackers!to!launch!a!
reflection!attack
easy!slope
18
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers
For!BIND!9,!use!
"allow-recursion"!
to!limit!recursion!to!your!client!
networks!
easy!slope
options {
allow-recursion { localnets; };
};
19
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers
For!authoritative!Windows!
DNS,!disable!recursion
Don't!operate!a!caching!
server!open!in!the!Internet
easy!slope
20
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers easy!slope
http://www.team-cymru.org/Services/Resolvers/
21
©!Men!&!Mice!!http://menandmice.com!
Open!resolvers easy!slope
RFC!5358!(BCP!140)
Preventing!Use!of!Recursive!
Nameservers!in!Reflector!
Attacks
22
©!Men!&!Mice!!http://menandmice.com!
Minimal!responses
DNS!servers!are!very!
helpful!by!nature
they!deliver!data!not!
explicitly!asked!for
they!try!to!be!nice!and!
help!other!DNS!servers!
out!there
easy!slope
% dig @ns2.xb.nl. mx ncsc.nl
; <<>> DiG 9.9.2-vjs287.12 <<>> @ns2.xb.nl. mx ncsc.nl
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 60070
;; flags: qr aa rd; QUERY: 1, ANSWER: 6, AUTHORITY: 2, ADDITIONAL: 10
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;ncsc.nl. IN MX
;; ANSWER SECTION:
ncsc.nl. 60 IN MX 20 min3.govcert.nl.
ncsc.nl. 60 IN MX 20 min4.govcert.nl.
ncsc.nl. 60 IN MX 30 min5.govcert.nl.
ncsc.nl. 60 IN MX 40 smtp.espritxb.nl.
ncsc.nl. 60 IN MX 10 min1.govcert.nl.
ncsc.nl. 60 IN MX 10 min2.govcert.nl.
;; AUTHORITY SECTION:
ncsc.nl. 60 IN NS ns1.xb.nl.
ncsc.nl. 60 IN NS ns2.xb.nl.
;; ADDITIONAL SECTION:
min1.govcert.nl. 60 IN A 193.172.9.50
min2.govcert.nl. 60 IN A 193.172.9.51
min3.govcert.nl. 60 IN A 31.161.17.13
min4.govcert.nl. 60 IN A 31.161.17.14
min5.govcert.nl. 60 IN A 217.169.231.54
smtp.espritxb.nl. 60 IN A 80.248.34.142
smtp.espritxb.nl. 60 IN A 80.248.34.141
ns1.xb.nl. 300 IN A 80.248.34.15
ns2.xb.nl. 300 IN A 212.67.179.100
;; Query time: 39 msec
;; SERVER: 212.67.179.100#53(212.67.179.100)
;; WHEN: Fri Jan 18 13:02:08 2013
;; MSG SIZE rcvd: 362
23
©!Men!&!Mice!!http://menandmice.com!
Minimal!responses
using!the!"minimal-responses"!you!can!configure!
a!BIND!9!to!be!less!helpful!(to!strangers)
this!reduces!the!"ammo"!
available!to!attackers
easy!slope
24
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
three!rules!of!good!DNS
advanced!track
1
Clients!never!send!queries!to!
authoritative!DNS!Server
2
authoritative!DNS!Server!answer!
to!caching!servers
3
caching!DNS!server!cache!responses
25
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
all!good!DNS!answers!are!
cacheable
advanced!track
1
good!positive!
(NOERROR+DATA)!answers
2
domain!does!not!exist!
(NXDOMAIN)!answers
3
record-type!does!not!exist!
(NOERROR+NODATA)!answer
26
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
as!all!DNS!queries!should!go!
through!a!caching!server!...
advanced!track
...!identical!queries!should!not!be!
seen!from!the!same!source!inside!
the!TTL!(Time!to!Live)!...
...!if!we!see!recurring!queries,!
it!is!likely!an!attack!...
...!or!crappy!
software!:(
27
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
response!rate!limiting!counts!the!
number!of!identical!responses!sent!
to!a!given!network
advanced!track
will!throttle!outgoing!responses!if!
too!much!identical!responses!are!
sent
allows!legit!clients!in!the!victims!
network!to!still!resolve!DNS!data
28
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
in!case!an!attack!is!detected,!
(almost)!empty!answers!are!sent!
with!"TC"!flag!set
advanced!track
"TC"!flag!=!answer!truncated,!retry!
over!TCP
real!caching!DNS!server!will!repeat!
the!query!over!TCP!
(slow,!but!harder!to!spoof)
29
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
advanced!track
RRL!enabled!on!an!authoritative!server
30
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
Response!Rate!Limiting!is!available!
in!some!Unix!DNS!servers
advanced!track
BIND!9!patch!by!Vernon!Schryver!
and!Paul!Vixie
(will!be!in!BIND!9.10!in!Summer)
NSD!3!and!NSD!4!from!NLnet!Labs
31
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
BIND!9.9.2-P2!installation!
packages!with!RRL!are!available!
free!of!charge!from!Men!&!Mice
advanced!track
RedHat!5.x!and!6.x Debian!(Ubuntu)
Solaris!10/11!for!i86pc!
and!SPARC
MacOS!X!10.4-10.8
http://support.menandmice.com/download/bind
32
©!Men!&!Mice!!http://menandmice.com!
Response!Rate!
Limiting
the!Men!&!Mice!Suite!
supports!BIND!RRL!as!
does!the!Men!&!Mice!
DNS!Appliance
advanced!track
33
©!Men!&!Mice!!http://menandmice.com!
DNS
dampening
Lutz!Donnerhacke!is!working!on!a!
different!idea!called!
"DNS!dampening"
advanced!track
BIND!9!patch!is!available
34
©!Men!&!Mice!!http://menandmice.com!
BCP!38
Network!Ingress!Filtering:!
"Defeating!Denial!of!Service!
Attacks!which!employ!IP!Source!
Address!Spoofing"
RFC!2827!-!May!2000
would!be!the!real!fix:
stop!IP!spoofing
expert!level
35
©!Men!&!Mice!!http://menandmice.com!
BCP!38
network!operators!find!many!
many!reasons!not!to!implement!
BCP!38
time,!knowledge,!money,!
"not!my!department",!...
expert!level
36
©!Men!&!Mice!!http://menandmice.com!
BCP!38
if!you!operate!a!network:!
implement!it
if!you!are!a!customer:!
ask!your!ISP!to!
implement!it
expert!level
37
©!Men!&!Mice!!http://menandmice.com!
Preparing!for!denial!of!service!
attacks
38
©!Men!&!Mice!!http://menandmice.com!
Help,!I'm!under!attack
•surviving!a!DDoS!attack!is!a!matter!of!preparation
•there!is!often!not!much!you!can!do!once!the!attack!is!
under!way
•the!problem:!network!link!saturation!(not!server!load)
•your!network!connection(s)!to!the!outside!world!are!
blocked
•talk!to!your!provider:!are!they!prepared!for!a!DDoS?
39
©!Men!&!Mice!!http://menandmice.com!
Authoritative!DNS!server
• global!DNS!anycast!can!help!fighting!a!DDoS
• Anycast:!multiple!server!with!the!same!IP!address!and!DNS!content!
are!available
• routing!decides!which!one!is!visible!from!a!certain!place!in!the!net
• we!will!cover!DNS!anycast!in!details!in!an!upcoming!webinar
• commercial!DNS!secondary!provider!offer!anycasted!DNS!server
• the!Men!&!Mice!Service!team!helps!implementing!DNS!anycast
40
©!Men!&!Mice!!http://menandmice.com!
Summary
41
©!Men!&!Mice!!http://menandmice.com!
Checklist
make!sure!not!to!run!an!open!DNS!
resolver
consider!"minimal-responses"
implement!Response!Rate!Limiting
turn!on!ingress!filtering
know!your!DNS!traffic
42
©!Men!&!Mice!!http://menandmice.com!
Questions!
43
©!Men!&!Mice!!http://menandmice.com!
Thank!you!
44

More Related Content

Viewers also liked

Viewers also liked (15)

Dns tunnelling its all in the name
Dns tunnelling its all in the nameDns tunnelling its all in the name
Dns tunnelling its all in the name
 
MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?MIRAI: What is It, How Does it Work and Why Should I Care?
MIRAI: What is It, How Does it Work and Why Should I Care?
 
Advanced DNS Protection
Advanced DNS ProtectionAdvanced DNS Protection
Advanced DNS Protection
 
How IoT Is Breaking The Internet
How IoT Is Breaking The InternetHow IoT Is Breaking The Internet
How IoT Is Breaking The Internet
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
DNS Security
DNS SecurityDNS Security
DNS Security
 
Dns security overview
Dns security overviewDns security overview
Dns security overview
 
Security of DNS
Security of DNSSecurity of DNS
Security of DNS
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
CNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS SecurityCNIT 40: 1: The Importance of DNS Security
CNIT 40: 1: The Importance of DNS Security
 
(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks(SEC306) Defending Against DDoS Attacks
(SEC306) Defending Against DDoS Attacks
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSA
 
From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.
 
Spamhaus DDoS - FR
Spamhaus DDoS - FRSpamhaus DDoS - FR
Spamhaus DDoS - FR
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 

Similar to Dns reflection attacks webinar slides

CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE
 
A DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMFA DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMF
MapMyFitness
 

Similar to Dns reflection attacks webinar slides (20)

RIPE 70 Report Webinar
RIPE 70 Report WebinarRIPE 70 Report Webinar
RIPE 70 Report Webinar
 
DNSSEC best practices Webinar
DNSSEC best practices WebinarDNSSEC best practices Webinar
DNSSEC best practices Webinar
 
Report from IETF 89 in London - DNS, DHCP and IPv6
Report from IETF 89 in London - DNS, DHCP and IPv6Report from IETF 89 in London - DNS, DHCP and IPv6
Report from IETF 89 in London - DNS, DHCP and IPv6
 
DNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloadedDNSSEC and DANE – E-Mail security reloaded
DNSSEC and DANE – E-Mail security reloaded
 
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
RIPE 69 & IETF 91 Webinar - DNS-Privacy, IPv6, DANE and DHCP(v6)
 
IETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANEIETF 90 Report – DNS, DHCP, IPv6 and DANE
IETF 90 Report – DNS, DHCP, IPv6 and DANE
 
IETF 93 Review Webinar
IETF 93 Review WebinarIETF 93 Review Webinar
IETF 93 Review Webinar
 
The KNOT DNS Server
The KNOT DNS ServerThe KNOT DNS Server
The KNOT DNS Server
 
RIPE 68 Webinar
RIPE 68 WebinarRIPE 68 Webinar
RIPE 68 Webinar
 
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
CODE BLUE 2014 : マイクロソフトの脆弱性調査 : ベンダーでありながら発見者となるために by デイヴィッド・シードマン David Se...
 
Scripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice SuiteScripting and automation with the Men & Mice Suite
Scripting and automation with the Men & Mice Suite
 
IETF 92 Webinar
IETF 92 WebinarIETF 92 Webinar
IETF 92 Webinar
 
DNS fragmentation attacks - the dangers of not validating DNSSEC
DNS fragmentation attacks - the dangers of not validating DNSSEC DNS fragmentation attacks - the dangers of not validating DNSSEC
DNS fragmentation attacks - the dangers of not validating DNSSEC
 
What happens when firefox crashes?
What happens when firefox crashes?What happens when firefox crashes?
What happens when firefox crashes?
 
DANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSECDANE and Application Uses of DNSSEC
DANE and Application Uses of DNSSEC
 
A DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMFA DevOps Perspective: MongoDB & MMF
A DevOps Perspective: MongoDB & MMF
 
PowerDNS Webinar
PowerDNS Webinar PowerDNS Webinar
PowerDNS Webinar
 
Hacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades shortHacking school computers for fun profit and better grades short
Hacking school computers for fun profit and better grades short
 
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE BostonMarauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
Marauder or Scanning Your DNSDB for Fun and Profit - SOURCE Boston
 
Speech-Enabling Web Apps
Speech-Enabling Web AppsSpeech-Enabling Web Apps
Speech-Enabling Web Apps
 

More from Men and Mice

More from Men and Mice (20)

Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network StrategiesCisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
Cisco Live 2019: New Best Practices for Hybrid and Multicloud Network Strategies
 
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOSPart 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
Part 3 - Local Name Resolution in Linux, FreeBSD and macOS/iOS
 
Part 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows NetworksPart 2 - Local Name Resolution in Windows Networks
Part 2 - Local Name Resolution in Windows Networks
 
Namespaces for Local Networks
Namespaces for Local NetworksNamespaces for Local Networks
Namespaces for Local Networks
 
How to send DNS over anything encrypted
How to send DNS over anything encryptedHow to send DNS over anything encrypted
How to send DNS over anything encrypted
 
The DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rollsThe DNSSEC KSK of the root rolls
The DNSSEC KSK of the root rolls
 
The CAA-Record for increased encryption security
The CAA-Record for increased encryption securityThe CAA-Record for increased encryption security
The CAA-Record for increased encryption security
 
SMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANESMTP STS (Strict Transport Security) vs. SMTP with DANE
SMTP STS (Strict Transport Security) vs. SMTP with DANE
 
DNSSEC signing Tutorial
DNSSEC signing Tutorial DNSSEC signing Tutorial
DNSSEC signing Tutorial
 
BIND 9 logging best practices
BIND 9 logging best practicesBIND 9 logging best practices
BIND 9 logging best practices
 
DNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing SolutionsDNS High-Availability Tools - Open-Source Load Balancing Solutions
DNS High-Availability Tools - Open-Source Load Balancing Solutions
 
Fighting Abuse with DNS
Fighting Abuse with DNSFighting Abuse with DNS
Fighting Abuse with DNS
 
What is new in BIND 9.11?
What is new in BIND 9.11?What is new in BIND 9.11?
What is new in BIND 9.11?
 
Yeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the rootYeti DNS - Experimenting at the root
Yeti DNS - Experimenting at the root
 
Windows Server 2016 Webinar
Windows Server 2016 WebinarWindows Server 2016 Webinar
Windows Server 2016 Webinar
 
Kea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISCKea DHCP – the new open source DHCP server from ISC
Kea DHCP – the new open source DHCP server from ISC
 
DNSTap Webinar
DNSTap WebinarDNSTap Webinar
DNSTap Webinar
 
RIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinarRIPE 71 and IETF 94 reports webinar
RIPE 71 and IETF 94 reports webinar
 
Keeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runitKeeping DNS server up-and-running with “runit
Keeping DNS server up-and-running with “runit
 
PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2PowerDNS Webinar - Part 2
PowerDNS Webinar - Part 2
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Dns reflection attacks webinar slides