Methodology for DNS Cache Poisoning Vulnerability Analysis of DNS64 Implementations

被引:0
|
作者
Lencse, G. [1 ,2 ]
Kadobayashi, Y. [1 ,2 ]
机构
[1] Nara Inst Sci & Technol, Lab Cyber Resilience, 8916-5 Takayama, Ikoma, Nara 6300192, Japan
[2] Szechenyi Istvan Univ, H-9026 Gyor, Hungary
来源
INFOCOMMUNICATIONS JOURNAL | 2018年 / 10卷 / 02期
关键词
DNS cache poisoning; DNS64; IPv6 transition technologies; NAT64; security; testbed; virtualization;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The trustworthy operation of the DNS service is a very important precondition for a secure Internet. As we point it out, DNS cache poisoning could be even more dangerous if it is performed against DNS64 servers. Based on RFC 5452, we give an introduction to the three main components of DNS cache poisoning vulnerability, namely Transaction ID prediction, source port number prediction, and a birthday paradox based attack, which is possible if a DNS or DNS64 server sends out multiple equivalent queries (with identical QNAME, QTYPE, and QCLASS fields) concurrently. We design and implement a methodology and a testbed, which can be used for the systematic testing of DNS or DNS64 implementations, whether they are susceptible to these three vulnerabilities. We perform the tests with the following DNS64 implementations: BIND, PowerDNS, Unbound, TOTD (two versions) and mtd64-ng. As for the testbed, we use three virtual Linux machines executed by a Windows 7 host. As for tools, we use VMware Workstation 12 Player for virtualization, Wireshark and tshark for monitoring, dns64perf for Transaction ID and source port predictability tests, and our currently developed "birthday-test" program for concurrently sent multiple equivalent queries testing. Our methodology can be used for DNS cache poisoning vulnerability analysis of further DNS or DNS64 implementations. A testbed with the same structure may be used for security vulnerability analysis of DNS or DNS64 servers and also NAT64 gateways concerning further threats.
引用
收藏
页码:13 / 25
页数:13
相关论文
共 7 条
  • [1] Benchmarking DNS64 implementations: Theory and practice
    Lencse, Gabor
    Kadobayashi, Youki
    COMPUTER COMMUNICATIONS, 2018, 127 : 61 - 74
  • [2] Reducing DNS Cache Poisoning Attacks
    Mohan, Jayashree
    Puranik, Shruthi
    Chandrasekaran, K.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [3] Improving the Performance and Security of the TOTD DNS64 Implementation
    Lencse, Gabor
    Repas, Sandor
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2014, 14 (01): : 9 - 15
  • [4] Poster: On the Capability of DNS Cache Poisoning Attacks
    Wang, Zheng
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1523 - 1525
  • [5] DNS Cache Poisoning: A Review on its Technique and Countermeasures
    Dissanayake, I. M. M.
    2018 NATIONAL INFORMATION TECHNOLOGY CONFERENCE (NITC), 2018,
  • [6] DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels
    Man, Keyu
    Qian, Zhiyun
    Wang, Zhongjie
    Zheng, Xiaofeng
    Huang, Youjun
    Duan, Haixin
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1337 - 1350
  • [7] An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks
    Wang, Zheng
    Yu, Shui
    Rose, Scott
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 793 - 807