65 research outputs found
A matter of degree:characterizing the amplification power of open DNS resolvers
Open DNS resolvers are widely misused to bring about reflection and amplification DDoS attacks. Indiscriminate efforts to address the issue and take down all resolvers have not fully resolved the problem, and millions of open resolvers still remain available to date, providing attackers with enough options. This brings forward the question if we should not instead focus on eradicating the most problematic resolvers, rather than all open resolvers indiscriminately. Contrary to existing studies, which focus on quantifying the existence of open resolvers, this paper focuses on infrastructure diversity and aims at characterizing open resolvers in terms of their ability to bring about varying attack strengths. Such a characterization brings nuances to the problem of open resolvers and their role in amplification attacks, as it allows for more problematic resolvers to be identified. Our findings show that the population of open resolvers lies above 2.6M range over our one-year measurement period. On the positive side, we observe that the majority of identified open resolvers cut out when dealing with bulky and DNSSEC-related queries, thereby limiting their potential as amplifiers. We show, for example, that 59% of open resolvers lack DNSSEC support. On the downside, we see that a non-negligible number of open resolvers facilitate large responses to ANY and TXT queries (8.1% and 3.4% on average, respectively), which stands to benefit attackers. Finally we show that by removing around 20% of potent resolvers the global DNS amplification potential can be reduced by up to 80%
Large-scale DNS and DNSSEC data sets for network security research
The Domain Name System protocol is often abused to perform denial-of-service attacks. These attacks, called DNS amplification, rely on two properties of the DNS. Firstly, DNS is vulnerable to source address spoofing because it relies on the asynchronous connectionless UDP protocol. Secondly, DNS queries are usually small whereas DNS responses may be much larger than the query. In recent years, the DNS has been extended to include security features based on public key cryptography. This extension, called DNSSEC, adds integrity and authenticity to the DNS and solves a serious vulnerability in the original protocol. A downside of DNSSEC is that it may further increase the potential DNS has for amplification attacks. This disadvantage is often cited by opponents of DNSSEC as a major reason not to deploy the protocol. Until recently, however, ground truth about how serious an issue this can be was never established. This technical report describes the data sets obtained during a study we carried out to establish this ground truth. We make these data sets available as open data under a permissive Creative Commons license. We believe these data sets have a lot of value beyond our research. They, for example, allow characterisations of EDNS0 implementations, provide information on IPv6 deployment (presence or absence of AAAA records) for a large number of domains in separate TLDs, etc
Improving Response Deliverability in DNS(SEC)
The Domain Name System provides a critical service on the Internet, where it allows host names to be translated to IP addresses. However, it does not provide any guarantees about authenticity and origin integrity of resolution data. DNSSEC attempts to solve this through the application of cryptographic signatures to DNS records. These signatures generally result in larger responses compared to plain DNS responses. Some of these larger responses experience fragmentation, which in turn might be partially blocked by some firewalls. Apparently unresolvable zones may in those cases be a consequence. Analysis of DNS traffic suggests that at least one per cent of all resolvers experience this problem with our signed zones. However, we suspect this number to be much larger. In our presentation we will elaborate on the potential extent of this problem and propose to test two solutions. We intent to test both solutions in our production environment
Measuring DNS over TCP in the Era of Increasing DNS Response Sizes: A View from the Edge
The Domain Name System (DNS) is one of the most crucial parts of the
Internet. Although the original standard defined the usage of DNS over UDP
(DoUDP) as well as DNS over TCP (DoTCP), UDP has become the predominant
protocol used in the DNS. With the introduction of new Resource Records (RRs),
the sizes of DNS responses have increased considerably. Since this can lead to
truncation or IP fragmentation, the fallback to DoTCP as required by the
standard ensures successful DNS responses by overcoming the size limitations of
DoUDP. However, the effects of the usage of DoTCP by stub resolvers are not
extensively studied to this date. We close this gap by presenting a view at
DoTCP from the Edge, issuing 12.1M DNS requests from 2,500 probes toward Public
as well as Probe DNS recursive resolvers. In our measurement study, we observe
that DoTCP is generally slower than DoUDP, where the relative increase in
Response Time is less than 37% for most resolvers. While optimizations to DoTCP
can be leveraged to further reduce the response times, we show that support on
Public resolvers is still missing, hence leaving room for optimizations in the
future. Moreover, we also find that Public resolvers generally have comparable
reliability for DoTCP and DoUDP. However, Probe resolvers show a significantly
different behavior: DoTCP queries targeting Probe resolvers fail in 3 out of 4
cases, and, therefore, do not comply with the standard. This problem will only
aggravate in the future: As DNS response sizes will continue to grow, the need
for DoTCP will solidify.Comment: Published in ACM SIGCOMM Computer Communication Review Volume 52
Issue 2, April 202
- …