Off-Path DNSSEC Downgrade Attacks

Elias Heftrig,Haya Shulman, Michael Waidner

PROCEEDINGS OF THE 2023 ACM SIGCOMM 2023 CONFERENCE, SIGCOMM 2023(2023)

引用 0|浏览0
暂无评分
摘要
Recent works found that signing zones with new cryptographic ciphers may disable DNSSEC validation in DNS resolvers. Adversaries could exploit this to manipulate algorithm numbers of ciphers in DNS responses, to make them appear as unknown, hence maliciously downgrading DNSSEC validation. In this work we show that these manipulation of DNSSEC records can also be launched remotely by off-path adversaries. We develop a DNSSEC downgrade attack using IP fragmentation. The idea is to create large DNS responses, that exceed the Maximum Transmission Unit on that path. The off-path adversary injects a malicious IP fragment, which when reassembled with the genuine IP fragment, overwrites the algorithm number of the ciphers in DNSSEC records. Our experimental evaluation of the off-path attack with a victim resolver that we set up identified 7.7K vulnerable domains out of 43K DNSSEC-signed 1M-top Tranco domains. We provide recommendations to mitigate the vulnerabilities.
更多
查看译文
关键词
DNS,DNSSEC,Off-path Attacks,Downgrade Attacks
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要