TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS. Moura, G. C. M., Castro, S., Heidemann, J., & Hardaker, W. In Proceedings of the ACM Internet Measurement Conference, pages 398–418, Virtual, November, 2021. ACM. Paper doi abstract bibtex The Internet's Domain Name System (DNS) is a part of every web request and e-mail exchange, so DNS failures can be catastrophic, taking out major websites and services. This paper identifies TsuNAME, a vulnerability where some recursive resolvers can greatly amplify queries, potentially resulting in a denial-of-service to DNS services. TsuNAME is caused by cyclical dependencies in DNS records. A recursive resolver repeatedly follows these cycles, coupled with insufficient caching and application-level retries greatly amplify an initial query, stressing authoritative servers. Although issues with cyclic dependencies are not new, the scale of amplification has not previously been understood. We document real-world events in .nz (a country-level domain), where two misconfigured domains resulted in a 50% increase on overall traffic. We reproduce and document root causes of this event through experiments, and demostrate a 500x amplification factor. In response to our disclosure, several DNS software vendors have documented their mitigations, including Google public DNS. For operators of authoritative DNS services we have developed and released CycleHunter, an open-source tool that detect cyclic dependencies and prevent attacks. We use CycleHunter to evaluate roughly 184 million domain names in 7 large, top-level domains (TLDs), finding 44 cyclic dependent NS records used by 1.4k domain names. The TsuNAME vulnerability is weaponizable, since an adversary can easily create cycles to attack the infrastructure of a parent domains. Documenting this threat and its solutions is an important step to ensuring it is fully addressed.
@InProceedings{Moura21b,
author = "Giovane C. M. Moura and Sebastian Castro and
John Heidemann and Wes Hardaker",
title = "{TsuNAME}: exploiting misconfiguration and vulnerability to {DDoS} {DNS}",
booktitle = "Proceedings of the " # "ACM Internet Measurement Conference",
year = 2021,
sortdate = "2021-11-02",
project = "ant, lacanic, paaddos, ddidd",
jsubject = "network_security",
pages = "398--418",
month = nov,
address = "Virtual",
publisher = "ACM",
jlocation = "johnh: pafile",
keywords = "anycast, dns, tcp, latency, root, .nl-tld,tsuname, vunerability",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Moura21b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Moura21b.pdf",
doi = "https://doi.org/10.1145/3487552.3487824",
abstract = "The Internet's Domain Name System (DNS) is a part of every web request
and e-mail exchange, so DNS failures can be catastrophic, taking out
major websites and services. This paper identifies TsuNAME, a
vulnerability where some recursive resolvers can greatly amplify
queries, potentially resulting in a denial-of-service to DNS services.
TsuNAME is caused by cyclical dependencies in DNS records. A
recursive resolver repeatedly follows these cycles, coupled with
insufficient caching and application-level retries greatly amplify an
initial query, stressing authoritative servers. Although issues with
cyclic dependencies are not new, the scale of amplification has not
previously been understood. We document real-world events in .nz (a
country-level domain), where two misconfigured domains resulted in a
50\% increase on overall traffic. We reproduce and document root
causes of this event through experiments, and demostrate a 500x
amplification factor. In response to our disclosure, several DNS
software vendors have documented their mitigations, including Google
public DNS. For operators of authoritative DNS services we have
developed and released CycleHunter, an open-source tool that detect
cyclic dependencies and prevent attacks. We use CycleHunter to
evaluate roughly 184 million domain names in 7 large, top-level
domains (TLDs), finding 44 cyclic dependent NS records used by 1.4k
domain names. The TsuNAME vulnerability is weaponizable, since an
adversary can easily create cycles to attack the infrastructure of a
parent domains. Documenting this threat and its solutions is an
important step to ensuring it is fully addressed.",
}
Downloads: 0
{"_id":"PnEtj9Awx3RYXdN6w","bibbaseid":"moura-castro-heidemann-hardaker-tsunameexploitingmisconfigurationandvulnerabilitytoddosdns-2021","author_short":["Moura, G. C. M.","Castro, S.","Heidemann, J.","Hardaker, W."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Giovane","C.","M."],"propositions":[],"lastnames":["Moura"],"suffixes":[]},{"firstnames":["Sebastian"],"propositions":[],"lastnames":["Castro"],"suffixes":[]},{"firstnames":["John"],"propositions":[],"lastnames":["Heidemann"],"suffixes":[]},{"firstnames":["Wes"],"propositions":[],"lastnames":["Hardaker"],"suffixes":[]}],"title":"TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS","booktitle":"Proceedings of the ACM Internet Measurement Conference","year":"2021","sortdate":"2021-11-02","project":"ant, lacanic, paaddos, ddidd","jsubject":"network_security","pages":"398–418","month":"November","address":"Virtual","publisher":"ACM","jlocation":"johnh: pafile","keywords":"anycast, dns, tcp, latency, root, .nl-tld,tsuname, vunerability","url":"https://ant.isi.edu/%7ejohnh/PAPERS/Moura21b.html","pdfurl":"https://ant.isi.edu/%7ejohnh/PAPERS/Moura21b.pdf","doi":"https://doi.org/10.1145/3487552.3487824","abstract":"The Internet's Domain Name System (DNS) is a part of every web request and e-mail exchange, so DNS failures can be catastrophic, taking out major websites and services. This paper identifies TsuNAME, a vulnerability where some recursive resolvers can greatly amplify queries, potentially resulting in a denial-of-service to DNS services. TsuNAME is caused by cyclical dependencies in DNS records. A recursive resolver repeatedly follows these cycles, coupled with insufficient caching and application-level retries greatly amplify an initial query, stressing authoritative servers. Although issues with cyclic dependencies are not new, the scale of amplification has not previously been understood. We document real-world events in .nz (a country-level domain), where two misconfigured domains resulted in a 50% increase on overall traffic. We reproduce and document root causes of this event through experiments, and demostrate a 500x amplification factor. In response to our disclosure, several DNS software vendors have documented their mitigations, including Google public DNS. For operators of authoritative DNS services we have developed and released CycleHunter, an open-source tool that detect cyclic dependencies and prevent attacks. We use CycleHunter to evaluate roughly 184 million domain names in 7 large, top-level domains (TLDs), finding 44 cyclic dependent NS records used by 1.4k domain names. The TsuNAME vulnerability is weaponizable, since an adversary can easily create cycles to attack the infrastructure of a parent domains. Documenting this threat and its solutions is an important step to ensuring it is fully addressed.","bibtex":"@InProceedings{Moura21b,\n\tauthor = \t\"Giovane C. M. Moura and Sebastian Castro and\n John Heidemann and Wes Hardaker\",\n\ttitle = \t\"{TsuNAME}: exploiting misconfiguration and vulnerability to {DDoS} {DNS}\",\n booktitle = \"Proceedings of the \" # \"ACM Internet Measurement Conference\",\n year = 2021,\n\tsortdate = \"2021-11-02\",\n\tproject = \"ant, lacanic, paaddos, ddidd\",\n\tjsubject = \"network_security\",\n pages = \"398--418\",\n month = nov,\n address = \"Virtual\",\n publisher = \"ACM\",\n jlocation = \"johnh: pafile\",\n\tkeywords = \t\"anycast, dns, tcp, latency, root, .nl-tld,tsuname, vunerability\",\n\turl =\t\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Moura21b.html\",\n\tpdfurl =\t\"https://ant.isi.edu/%7ejohnh/PAPERS/Moura21b.pdf\",\n doi = \"https://doi.org/10.1145/3487552.3487824\",\n\tabstract = \"The Internet's Domain Name System (DNS) is a part of every web request\nand e-mail exchange, so DNS failures can be catastrophic, taking out\nmajor websites and services. This paper identifies TsuNAME, a\nvulnerability where some recursive resolvers can greatly amplify\nqueries, potentially resulting in a denial-of-service to DNS services.\nTsuNAME is caused by cyclical dependencies in DNS records. A\nrecursive resolver repeatedly follows these cycles, coupled with\ninsufficient caching and application-level retries greatly amplify an\ninitial query, stressing authoritative servers. Although issues with\ncyclic dependencies are not new, the scale of amplification has not\npreviously been understood. We document real-world events in .nz (a\ncountry-level domain), where two misconfigured domains resulted in a\n50\\% increase on overall traffic. We reproduce and document root\ncauses of this event through experiments, and demostrate a 500x\namplification factor. In response to our disclosure, several DNS\nsoftware vendors have documented their mitigations, including Google\npublic DNS. For operators of authoritative DNS services we have\ndeveloped and released CycleHunter, an open-source tool that detect\ncyclic dependencies and prevent attacks. We use CycleHunter to\nevaluate roughly 184 million domain names in 7 large, top-level\ndomains (TLDs), finding 44 cyclic dependent NS records used by 1.4k\ndomain names. The TsuNAME vulnerability is weaponizable, since an\nadversary can easily create cycles to attack the infrastructure of a\nparent domains. Documenting this threat and its solutions is an\nimportant step to ensuring it is fully addressed.\",\n}\n\n","author_short":["Moura, G. C. M.","Castro, S.","Heidemann, J.","Hardaker, W."],"bibbaseid":"moura-castro-heidemann-hardaker-tsunameexploitingmisconfigurationandvulnerabilitytoddosdns-2021","role":"author","urls":{"Paper":"https://ant.isi.edu/%7ejohnh/PAPERS/Moura21b.html"},"keyword":["anycast","dns","tcp","latency","root",".nl-tld","tsuname","vunerability"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://bibbase.org/f/dHevizJoWEhWowz8q/johnh-2023-2.bib","dataSources":["tvsqNFk5TtbQJY2wo","YLyu3mj3xsBeoqiHK","fLZcDgNSoSuatv6aX","fxEParwu2ZfurScPY","b6BAndrcxvv6AyYZN","7nuQvtHTqKrLmgu99"],"keywords":["anycast","dns","tcp","latency","root",".nl-tld","tsuname","vunerability"],"search_terms":["tsuname","exploiting","misconfiguration","vulnerability","ddos","dns","moura","castro","heidemann","hardaker"],"title":"TsuNAME: exploiting misconfiguration and vulnerability to DDoS DNS","year":2021}