Podcast
Questions and Answers
How and where can DNS be attacked? (Give 3 different answers)
How and where can DNS be attacked? (Give 3 different answers)
- Cache poisoning (correct)
- Redirection (correct)
- Forging requests or responses (correct)
- Spoofing of DNS servers on different levels (correct)
Why is DNS vulnerable?
Why is DNS vulnerable?
Unencrypted requests/responses, non-verified answers, non-authorized servers, unprotected caches - all is based on the simple assumption: “don't lie about others” and trust among the involved systems.
What can happen, if DNS gives wrong answers? What can be done against this (name two solutions)?
What can happen, if DNS gives wrong answers? What can be done against this (name two solutions)?
- Cutting of part of the name space (correct)
- Choosing DNS server directly (e.g., 8.8.8.8) (correct)
- Using DNSSEC (correct)
- Redirection of mapping name to IP address (correct)
How does DNS ensure the uniqueness of names? Who owns the names in DNS?
How does DNS ensure the uniqueness of names? Who owns the names in DNS?
What is the difference between recursive and iterative name resolution?
What is the difference between recursive and iterative name resolution?
What is the focus of congestion and flow control, respectively? Why are they needed?
What is the focus of congestion and flow control, respectively? Why are they needed?
What does a duplicated ACK in TCP tell the sender? What is the idea of fast recovery?
What does a duplicated ACK in TCP tell the sender? What is the idea of fast recovery?
What determines the flow of data in TCP? Name three issues and describe!
What determines the flow of data in TCP? Name three issues and describe!
How can TCP detect a congestion? Describe briefly! What are the pros and cons of the two solutions?
How can TCP detect a congestion? Describe briefly! What are the pros and cons of the two solutions?
Why can't we build large networks with many nodes based on switches only?
Why can't we build large networks with many nodes based on switches only?
How is routing scalability in the Internet handled?
How is routing scalability in the Internet handled?
What are differences between routing and forwarding? Name two!
What are differences between routing and forwarding? Name two!
Give 3 examples for routing metrics!
Give 3 examples for routing metrics!
Besides scalability, what is missing in standard link-state and distance vector routing protocols? How does BGP handle these issues?
Besides scalability, what is missing in standard link-state and distance vector routing protocols? How does BGP handle these issues?
Why is it so easy to announce "false" paths?
Why is it so easy to announce "false" paths?
Why can RPKI also help in the web ecosystem - isn't it enough to encrypt web pages?
Why can RPKI also help in the web ecosystem - isn't it enough to encrypt web pages?
What does “ossification” of the transport layer mean? What causes this "ossification" (give 2 examples)?
What does “ossification” of the transport layer mean? What causes this "ossification" (give 2 examples)?
Why does simply sending different data packets of a single TCP connection over different paths not work?
Why does simply sending different data packets of a single TCP connection over different paths not work?
How does MPTCP circumvent the "ossification"?
How does MPTCP circumvent the "ossification"?
Why may TCP slow down HTTP and thus the rendering of web pages?
Why may TCP slow down HTTP and thus the rendering of web pages?
How does QUIC solve this issue and how does it circumvent the “ossification” of the transport layer?
How does QUIC solve this issue and how does it circumvent the “ossification” of the transport layer?
Can we directly transmit data? What is always required?
Can we directly transmit data? What is always required?
What are the effects of bandwidth limitation of a physical medium?
What are the effects of bandwidth limitation of a physical medium?
How to achieve bit synchronization between sender and receiver? Give two examples!
How to achieve bit synchronization between sender and receiver? Give two examples!
Why is it impossible to detect all possible errors?
Why is it impossible to detect all possible errors?
Flashcards
DNS Attacks
DNS Attacks
Attackers can exploit vulnerabilities in DNS to redirect traffic, manipulate data, or disrupt internet services. This is done by altering or manipulating DNS records, spoofing servers, or intercepting DNS requests and responses.
DNS Vulnerability
DNS Vulnerability
DNS is vulnerable due to its reliance on trust and lack of adequate security measures. Unencrypted communication, unverified responses, and the absence of authorization mechanisms make it susceptible to attacks.
Cache Poisoning
Cache Poisoning
Cache poisoning involves manipulating DNS caches with incorrect data, leading to incorrect resolution of domain names. This results in redirection of traffic to malicious servers.
Consequences of Incorrect DNS Answers
Consequences of Incorrect DNS Answers
Signup and view all the flashcards
DNSSEC
DNSSEC
Signup and view all the flashcards
Choosing a Specific DNS Server
Choosing a Specific DNS Server
Signup and view all the flashcards
DNS Name Uniqueness
DNS Name Uniqueness
Signup and view all the flashcards
Recursive Name Resolution
Recursive Name Resolution
Signup and view all the flashcards
Iterative Name Resolution
Iterative Name Resolution
Signup and view all the flashcards
Congestion Control
Congestion Control
Signup and view all the flashcards
Flow Control
Flow Control
Signup and view all the flashcards
Duplicated ACK in TCP
Duplicated ACK in TCP
Signup and view all the flashcards
Fast Recovery in TCP
Fast Recovery in TCP
Signup and view all the flashcards
RTT in TCP
RTT in TCP
Signup and view all the flashcards
Error Rate in TCP
Error Rate in TCP
Signup and view all the flashcards
Receiver Window in TCP
Receiver Window in TCP
Signup and view all the flashcards
Link Layer Data Rate in TCP
Link Layer Data Rate in TCP
Signup and view all the flashcards
Congestion Window in TCP
Congestion Window in TCP
Signup and view all the flashcards
Implicit Congestion Detection in TCP
Implicit Congestion Detection in TCP
Signup and view all the flashcards
Explicit Congestion Detection in TCP
Explicit Congestion Detection in TCP
Signup and view all the flashcards
Limitations of Switches in Large Networks
Limitations of Switches in Large Networks
Signup and view all the flashcards
Routing Scalability in the Internet
Routing Scalability in the Internet
Signup and view all the flashcards
Routing vs. Forwarding
Routing vs. Forwarding
Signup and view all the flashcards
BGP Routing Features
BGP Routing Features
Signup and view all the flashcards
RPKI and Network Security
RPKI and Network Security
Signup and view all the flashcards
Transport Layer Ossification
Transport Layer Ossification
Signup and view all the flashcards
Middle Box Ossification
Middle Box Ossification
Signup and view all the flashcards
Multipath TCP and Middle Boxes
Multipath TCP and Middle Boxes
Signup and view all the flashcards
MPTCP and Ossification
MPTCP and Ossification
Signup and view all the flashcards
TCP Slowdowns in HTTP
TCP Slowdowns in HTTP
Signup and view all the flashcards
QUIC and HTTP
QUIC and HTTP
Signup and view all the flashcards
QUIC and Transport Layer Ossification
QUIC and Transport Layer Ossification
Signup and view all the flashcards
Data Transmission and Physical Representation
Data Transmission and Physical Representation
Signup and view all the flashcards
Bandwidth Limitation
Bandwidth Limitation
Signup and view all the flashcards
Signal Level Quantization and Interference
Signal Level Quantization and Interference
Signup and view all the flashcards
Bit Synchronization
Bit Synchronization
Signup and view all the flashcards
Framing in Data Transmission
Framing in Data Transmission
Signup and view all the flashcards
Limitations of Error Detection
Limitations of Error Detection
Signup and view all the flashcards
Study Notes
Exam Telematics - Solutions
- The solutions provided are examples, not exhaustive, but sufficient for full marks. Correct keywords and coherent arguments are essential.
DNS (16 points)
-
DNS Attacks (3):
- Cache poisoning
- Spoofing of DNS servers (at various levels)
- Forging requests/responses
- Redirection
-
DNS Vulnerability (2):
- Unencrypted requests/responses
- Non-verified answers
- Unauthorised servers
- Unprotected caches
-
Incorrect DNS Answers (4):
- Consequences: Name to IP mapping errors, redirection to wrong servers, reduced web access.
- Solutions: Direct use of trusted DNS servers (e.g., 8.8.8.8), DNSSEC implementation
-
DNS Name Uniqueness (3):
- Uniqueness ensured through hierarchical structure (top-level, second-level, etc).
- Each level's Network Information Center (NIC)/administrator manages/assigns names to owners.
- Owner registration in a database.
-
Recursive vs. Iterative Resolution (4):
- Recursive: Query answered by the requested node, possibly involving further requests without user involvement.
- Iterative: Node provides pointers to the requester for further queries.
Congestion and Flow Control (20 points)
-
Congestion Control Focus (4):
- Focus on the network
- Aims to prevent congestion
- Necessary for network stability
-
Flow Control Focus (4):
- Focus on the end-system
- Prevents receiver overload
- Necessary for preventing packet loss
-
Duplicated ACKs in TCP (4):
- Indication of successful packet transmission.
- Fast recovery avoids 'slow start'. 'Slow start' initializes the congestion window at one maximum segment size (MSS) but starts right away.
-
TCP Flow Determination (6):
- RTT: Round trip time
- Error rate: Determines retransmission amount
- Receiver window: Defines receiver capacity
-
TCP Congestion Detection (6):
- Explicit: Using ECN bits in the IP header (set by routers experiencing congestion, reflected to sender).
- Implicit: Sender detects time-outs or missing ACKs (indicating congestion).
Routing (18 points)
-
Limitations of Switches (2):
- Flat address space requires storing all addresses
- Inefficient for large networks.
- Requires logical tree structure to avoid loops.
-
Routing Scalability (2):
- Hierarchies
- Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs)
- Autonomous Systems (AS) boundaries
-
Routing vs. Forwarding (3):
- Forwarding is time-critical with one choice
- Routing is less time-critical and multiple paths.
-
Routing Metrics (3):
- Delay
- Hop count
- Data rate
-
Routing Issue Handling (Routing Protocols) (3):
- Policies and paths
- Handling asymmetric routing
- Different policies applied to paths
-
False Path Announcement (2):
- Lack of verification mechanisms
- Trust-based system
- Manipulating announcements
-
RPKI Support on Web (3):
- Enables encrypting website content
- Protection against routing manipulation
- Protection against Denial of Service (DoS).
Ossification/New Protocols (18 points)
-
Transport Layer Ossification (4):
- Established protocols (TCP/UDP) are widely used and integrated.
- Changes to protocols are difficult due to widespread use.
- Middleboxes cause dependency on existing protocols.
-
TCP Connection Handling (4):
- Maintaining state during packet delivery over different paths often fails.
- Middleboxes follow connections, making it difficult.
-
MPTCP Circumvention (2):
- Breaks up connections into multi-path TCP (MPTCP) individual segments.
-
HTTP Slowdown (4):
- Lost segments block correct data delivery
- TCP congestion can cause delays
- User experience is negatively affected.
Bits and Signals (18 points)
-
Data Transmission Requirement (4):
- Physical representation mapping needed
- Signal modulation crucial
-
Bandwidth Limitation (2):
- Shannon's law defines data rates dependent on bandwidth and signal-to-noise ratio.
-
Quantization Challenges (2):
- Decreasing signal levels lead to increasing interference, potential for data corruption.
-
Bit Synchronization (4):
- Manchester encoding (edge-based): Transitions in the middle of a bit
- Differential encoding: Transitions based on difference between previous and current bit values
-
Frame Alignment (4):
- Defining and separating frame starts/limits.
- Including checksums/length information for error checks.
-
Transmission Error Detection (2):
- CRC (Cyclic Redundancy Check).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the solutions to DNS attacks, vulnerabilities, and incorrect answers. It explores the importance of DNSSEC implementation and the uniqueness of DNS names. Assess your understanding of these concepts relevant to telematics and network security.