The traditional design principle for Internet protocols indicates: "Be strict when sending and tolerant when receiving" [RFC1958], and DNS is no exception to this. The transparency of DNS in handling the DNS records, also standardised specifically for DNS [RFC3597], is one of the key features that made it such a popular platform facilitating a constantly increasing number of new applications. An application simply creates a new DNS record and can instantly start distributing it over DNS without requiring any changes to the DNS servers and platforms. Our Internet wide study confirms that more than 1.3M (96% of tested) open DNS resolvers are standard compliant and treat DNS records transparently. In this work we show that this `transparency' introduces a severe vulnerability in the Internet: we demonstrate a new method to launch string injection attacks by encoding malicious payloads into DNS records. We show how to weaponise such DNS records to attack popular applications. For instance, we apply string injection to launch a new type of DNS cache poisoning attack, which we evaluated against a population of open resolvers and found 105K to be vulnerable. Such cache poisoning cannot be prevented with common setups of DNSSEC. Our attacks apply to internal as well as to public services, for instance, we reveal that all eduroam services are vulnerable to our injection attacks, allowing us to launch exploits ranging from unauthorised access to eduroam networks to resource starvation. Depending on the application, our attacks cause system crashes, data corruption and leakage, degradation of security, and can introduce remote code execution and arbitrary errors. In our evaluation of the attacks in the Internet we find that all the standard compliant open DNS resolvers we tested allow our injection attacks against applications and users on their networks.
翻译:互联网协议的传统设计原则表明 : “ 接收 DRC(1958年) 时, 发送时要严格和容忍, 并且 DNS 也不例外 。 DNS 处理 DNS 记录的透明度, 也是DNS [RFC3597] 专门标准化的 DNS 记录的透明度, 是一个关键特征之一, 这使得它成为便利新应用程序数量不断增加的流行平台。 应用程序只是创造了一个新的 DNS 记录, 并且可以在 DNS 服务器和平台不要求任何更改的情况下立即在 DNS 上发布新的 DNS 记录。 我们的 Internet 研究证实, 超过 1.3M (96% 测试过的) 打开 DNS 的 远程 解决器符合标准, 并透明地处理 DNS 记录 。 在这项工作中, 我们显示, 这种“ 透明度 透明度 ” 使 DNS 的用户在互联网上极易受到攻击: 我们展示了一种新的方法, 通过将恶意载荷载器输入所有 DNS 记录来攻击。 我们的 DNS, 我们用标准注射了一种标准的方法来启动一种新的 DS 。 我们的 DS 。