• Keine Ergebnisse gefunden

Network Security and Measurement

N/A
N/A
Protected

Academic year: 2022

Aktie "Network Security and Measurement"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Network Security and Measurement Assignment 01

HAW Hamburg WS 2020

Prof. Dr. Thomas Schmidt, Raphael Hiesgen, M.Sc. Deadline: November 11, 2020

1. DNS Around Us

Before heading into the details of DNS we want to take a look at the local deployment and query some information to get familiar with it.

Tools: dig, tshark, tcpdump. Record types: A, AAAA, NS, DNSKEY, RRSIG.

(a) Find the authoritative name server for HAW Hamburg.

(b) Can a DNS query tell you whether there is IPv6 support for the HAW website?

(c) Does the HAW domain support DNSSEC?

(d) Request an A record for a domain using dig, e.g., haw-hamburg.de, and observe the requests with a sniffer. Does this match your expectations? Compare your observation to an ANYrequest to whitehouse.gov.

2. Record Sizes of DNS Responses

DNS record sizes matter for multiple reasons. First they are often queried and second they might be abused for criminal purposes, which will be discussed in more detail in a later lecture.

Dataset: The Alexa top 1M sites are listed in alexa-top1m-2020-10-30 0900 UTC.csv, located inshared-data on mobi8.

(a) Plot a distribution of the top-level domains in the dataset.

(b) Collect DNS records for Alexa top 1M domains. Build three datasets for A, AAAA, and ANY requests.

(c) Visualize the a distribution of the record sizes and print the 10 domains with the largest responses. How do the sets differ?

(d) Do some resolvers behave differently? The system default is 8.8.8.8, but there are many more resolvers.

3. DNSSEC Prevalence

DNSSEC extends DNS with the authentication of messages and records. Security itself is often not enough to get companies to implement new things—unless it has significant monetary benefits. Let’s see how prevalent DNSSEC is among the top web sites.

Tools: python via dnspython1 or dig.

(a) How many of the Alexa top 1M deploy DNSSEC?

(b) Visualize the DNSSEC support by TLD, e.g., through a bar graph of the top 10.

(c) Make a CDF that accumulates the share of DNSSEC supporting domains with in- creasing rank.

1https://dnspython.readthedocs.io/en/stable/index.html

1

(2)

4. DNSSEC Validation

DNSSEC is useless if records cannot be validated by resolvers. In this exercise we will look into the validation of signatures using python.

Tools: dnspython, DNS Viz (https://dnsviz.net/).

(a) Find one domain that supports DNSSEC and validate its signature.

(b) Implement a python script that validates a given domain. Walking the chain of trust requires extra work that is not easily handled by the library, skip it for now.

i. Instantiate a resolver,

ii. Find the responsible nameserver,

iii. Perform a query for the DNSKEY record (set want dnssec=True), iv. Validate the signature,

v. Handle errors accordingly. (Distinguish between validation and missing records!) (c) Check the Alexa list for invalid records and present your findings.

2

Referenzen

ÄHNLICHE DOKUMENTE

hypothesis) is orthogonal to the classification of passive versus active measurements (how data are collected), and passive versus. active measurements are orthogonal to control

We are able to scan every second host by scanning just 2% of the announced IPv4 address space. This results in a scan traffic reduction of 98 % compared to a IPv4

While DANE has the potential to improve security of all TLS interactions it sees more use with mail servers than for general web browsing.. In this exercise we will compare

Even though we will only process data for one day (due to time constrains) consider that for a representative analysis it might be necessary to analyze one month or even one year

(c) Make a graph that places each source in a graph according to the number of targeted hosts (x-axis) and the number of targeted ports (y-axis).. Highlight those sources you

If you load the data into a DataFrame you can convert a column to time using pd.to datetime.. group by works on time as well using a

- Rule 2: No Blocking: A provider of fixed broadband Internet access service shall not block lawful content, applications, services, or non-harmful devices, subject to

Töö eesmärk oli konstrueerida Irc3 valgu C-terminuse mutantide ekspressioonivektorid ning välja puhastada Irc3 valgu N- ja C-terminuse mutandid ja teostada nende