Solving the DNS Cache Poisoning Problem Without Changing the Protocol
نویسندگان
چکیده
In this paper we propose a solution to the DNS cache poisoning problem, which we called WSEC DNS (Wildcard Secure DNS). Our solution leverages existing properties of the DNS protocol and does not require any changes neither to the DNS protocol itself nor to the DNS resolution software run by nameservers. We propose to take advantage of the definition of wildcards given in RFC 1034 and RFC 4592, and of TXT resource records in order to increase the entropy of DNS queries to the point that cache poisoning attacks become infeasible. An important advantage of our approach is that DNS operators are not obligated to implement our solution, because WSEC DNS guarantees complete backword compatibility with current nameservers’ configurations. Nonetheless, recursive DNS servers that intend to take advantage of the benefits of WSEC DNS need to implement some new functionalities. On the other hand, collaborating DNS operators who want to protect their domain names against possible cache poisoning must be willing to make simple configuration changes to their Start of Authority (SOA) nameservers (i.e., edit their zone-files), according to the recommendations reported in this paper.
منابع مشابه
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning
This paper discusses the Address Resolution Protocol (ARP) and the problem of ARP cache poisoning. ARP cache poisoning is the malicious act, by a host in a LAN, of introducing a spurious IP address to MAC (Ethernet) address mapping in another host’s ARP cache. We discuss design constraints for a solution: the solution needs to be implemented in middleware, without access or change to any operat...
متن کاملBIND 9 DNS Cache Poisoning v0.8.9_clean
The paper shows that BIND 9 DNS queries are predictable – i.e. that the source UDP port and DNS transaction ID can be effectively predicted. A predictability algorithm is described that, in optimal conditions, provides very few guesses for the “next” query (10 in the basic attack, and 1 in the advanced attack), thereby overcoming whatever protection offered by the transaction ID mechanism. This...
متن کاملThe Hitchhiker's Guide to DNS Cache Poisoning
DNS cache poisoning is a serious threat to today’s Internet. We develop a formal model of the semantics of DNS caches, including the bailiwick rule and trust-level logic, and use it to systematically investigate different types of cache poisoning and to generate templates for attack payloads. We explain the impact of the attacks on DNS resolvers such as BIND, MaraDNS, and Unbound and their impl...
متن کاملDepenDNS: Dependable Mechanism against DNS Cache Poisoning
DNS cache poisoning attacks have been proposed for a long time. In 2008, Kaminsky enhanced the attacks to be powerful based on nonce query method. By leveraging Kaminsky’s attack, phishing becomes large-scale since victims are hard to detect attacks. Hence, DNS cache poisoning is a serious threat in the current DNS infrastructure. In this paper, we propose a countermeasure, DepenDNS, to prevent...
متن کاملDelay Fast Packets (DFP): Prevention of DNS Cache Poisoning
The Domain Name System (DNS) protocol is used as a naming system for computers, services, or any other network resource. This paper presents a solution for the cache poisoning attack in which the attacker inserts incorrect data into the DNS cache. In order to successfully poison the cache, the attacker response must beat the real response in the race back to the local DNS server. In our model, ...
متن کامل