2023年第32届USENIX安全探讨会|USENIX Security 2023

摘要

In this paper, we report MaginotDNS, a powerful cache poisoning attack against DNS servers that simultaneously act as recursive resolvers and forwarders (termed as CDNS). The attack is made possible through exploiting vulnerabilities in the bailiwick checking algorithms, one of the cornerstones of DNS security since the 1990s, and affects multiple versions of popular DNS software, including BIND and Microsoft DNS. Through field tests, we find that the attack is potent, allowing attackers to take over entire DNS zones, even including Top-Level Domains (e.g., .com and .net). Through a large-scale measurement study, we also confirm the extensive usage of CDNSes in real-world networks (up to 41.8% of our probed open DNS servers) and find that at least 35.5% of all CDNSes are vulnerable to MaginotDNS. After interviews with ISPs, we show a wide range of CDNS use cases and real-world attacks. We have reported all the discovered vulnerabilities to DNS software vendors and received acknowledgments from all of them. 3 CVE-ids have been published, and 2 vendors have fixed their software. Our study brings attention to the implementation inconsistency of security checking logic in different DNS software and server modes (i.e., recursive resolvers and forwarders), and we call for standardization and agreements among software vendors.

日期
8月 10, 2023 12:00 AM — 11:59 PM
位置
Anaheim Marriott
700 W Convention Way, Anaheim, 92802

在2023年第32届USENIX安全探讨会上,我分享了最新研究工作:“The Maginot Line: Attacking the Boundary of DNS Caching Protection”,也见到和交到了很多朋友。

李想
李想
清华大学博士研究生(网络空间安全)

李想,清华大学网络科学与网络空间研究院五年级博士研究生,导师为李琦副教授和段海新教授。研究方向为网络与协议安全,已发表论文12篇(含一作5篇:在网络安全四大顶会均有发表、通讯1篇),授权专利1项,在Black Hat多次演讲,获得180+CVE等漏洞编号。研究获得多个政府及大学CERT安全公告、60+媒体报道,并被纳入RFC标准文档。其也获得了多项奖项荣誉,如清华优秀奖学金、龙湖奖学金卓越奖等。