DNSSEC, from an end-user perspective, part 1
Published on 10 Dec 2013
We all know since at least 1990 that the DNS protocol is insecure. Yet DNS is still the basis of almost all Internet communication. The biggest problem with DNS is that a malicious attacker can redirect victims, where victims try to connect to, e.g. safesite.com, but instead of this, they relate to the attacker's website. There are a lot of different ways to achieve this attack.
DNS cache poisoning the DNS server, "Da Old way."
The attacker forces the victim's DNS server to resolve a domain where the attacker is the authoritative name server, and the attacker sends additional information to the DNS server that he is also the authoritative name server for safesite.com. This information is cached and used later when the victim resolves safesite.com.
It is easy to protect against this attack, any decent DNS server should be able to protect against this attack by dropping this additional information from DNS responses.
DNS cache poisoning, "Da Kaminsky way"
An attacker can initiate queries to the victim's DNS server, and in the meantime, "flood" the DNS server with fake responses. The server will accept the fake response if the following conditions are right:
- the DNS server receives the answers on the same IP as it expects (this is not an attack limitation),
- the DNS server receives the answer to his question (again not a limitation, an attacker knows what he wants to attack),
- the random(?) port used to send the query matches the answer,
- the random(?) 16-bit(!) unique transaction number in the answer matches with the query.
If the last two are not random, an attacker can easily poison the server in a matter of seconds. Or if your DNS server is behind NAT, the NAT can remove the randomness :-O
To protect yourself against this, you should randomize the source port and unique identifier better, and disable your DNS server as being an open recursive resolver.
Rogue DNS server via malware
This is pretty common in both banking trojans, adware, etc. The malware reconfigures the users configured DNS server to use a malicious one, either in the local OS settings or in the home router.
To protect against this: don't let malware in your environment ;)
ISP hijack, for advertisement or spying purposes
This is the worst of all. ISP's hijack non-existing domains, and display advertisements. And because they broke the RFC, it will break a lot of your applications. I bet ISPs still think about this as a good idea :(
Sometimes captive portals use DNS hijacking to redirect the users to the default login page. Although it breaks things, it is still better than the ISP solution, because it is only a problem at the beginning of the connection, and not permanently.
Pentester hijacks DNS to test application via active man-in-the-middle
Although this is not malicious at all (developers might think otherwise), but a lot of application security tests (thick clients, mobile applications) can only be carried out via DNS spoofing. Application security testers can easily make this attack because they can place the host machine in a network segment where they can make an active man-in-the-middle attack and respond to DNS queries sooner as the official DNS server. Or simply set the DNS server to their own DNS server.
Malicious attacker hijacks DNS via active MITM
This is similar to the previous one, but the goal is different. Although an attacker with active man-in-the-middle position can attack the victim in 1000 different ways (like SMB relaying, capturing LM/NTLM network hashes, modifying clear-text traffics, etc...), DNS spoofing is one of them.
Having access to the DNS admin panel and rewriting the IP
I believe this is going to be a new trend. This attack is the most effective one, and the hardest to prevent. Usually, it is not the admin panel that is being hacked, instead an admin's password gets stolen, or the password reset is hacked.
You, as a client, can do three things to protect against this attack:
- Choose a decent provider and prey :)
- Put a registry lock on your DNS settings (serverDeleteProhibited, serverTransferProhibited, and serverUpdateProhibited). Although this additional layer is good enough today, I bet some motivated attackers will be able to successfully attack this. The attacker only has to:
- know the phone number of the client, which will be called by the registrar
- hijack the call (social engineering the phone company)
- provide an individual security phrase (social engineering the client)
- Or run your own DNS server (this is not a solution for everybody)
ConclusionAlthough almost all attacks can be mitigated one way or another, there was a desperate need to solve this DNS spoofing issue once and for all. And so it begins, DNSSEC has been developed.
In part 2, we are going to investigate DNSSEC, what you can expect from it, and what you can't.