NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities

05/18/2020
by   Lior Shafir, et al.
0

The Domain Name System (DNS) infrastructure, a most critical system the Internet depends on, has recently been the target for different DDoS and other cyber-attacks, e.g., the notorious Mirai botnet. While these attacks can be destructive to both recursive and authoritative DNS servers, little is known about how recursive resolvers operate under such attacks (e.g., NXDomain, water-torture). In this paper, we point out a new vulnerability and show an attack, the NXNSAttack, that exploits the way DNS recursive resolvers operate when receiving NS referral response that contains name-servers but without their corresponding IP addresses (i.e., missing glue-records). We show that the number of DNS messages exchanged in a typical resolution process might be much higher in practice than what is expected in theory, mainly due to a proactive resolution of name-servers' IP addresses. We show how this inefficiency becomes a bottleneck and might be used to mount a devastating attack against either or both, recursive resolvers and authoritative servers. The NXNSAttack is more effective than the NXDomain attack: i) It reaches an amplification factor of more than 1620x on the number of packets exchanged by the recursive resolver. ii) Besides the negative cache, the attack also saturates the `NS' resolver caches. In an attempt to mitigate the attack impact, we propose enhancements to the recursive resolvers algorithm to prevent unnecessary proactive fetches. Finally, we implement our Max1Fetch enhancement on the BIND resolver and show that Max1Fetch does not degrade the recursive resolvers performance, throughput and latency, by testing it on real-world traffic data-sets.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/26/2019

A wrinkle in time: A case study in DNS poisoning

The Domain Name System (DNS) provides a translation between readable dom...
research
01/18/2022

Analyzing Enterprise DNS Traffic to Classify Assets and Track Cyber-Health

The Domain Name System (DNS) is a critical service that enables domain n...
research
11/12/2019

A Reproducibility Study of "IP Spoofing Detection in Inter-Domain Traffic"

IP spoofing enables reflection and amplification attacks, which cause ma...
research
10/04/2001

ENUM: The Collision of Telephony and DNS Policy

ENUM marks either the convergence or collision of the public telephone n...
research
06/08/2021

DNS attack mitigation Using OpenStack Isolation

The Domain Name System (DNS) is essential for the Internet, giving a mec...
research
12/30/2019

ICSTrace: A Malicious IP Traceback Model for Attacking Data of Industrial Control System

Considering the attacks against industrial control system are mostly org...
research
11/09/2021

Classifying DNS Servers based on Response Message Matrix using Machine Learning

Improperly configured domain name system (DNS) servers are sometimes use...

Please sign up or login with your details

Forgot password? Click here to reset