Connect with us

Hi, what are you looking for?

Cyber Security

What’s TsuNAME? DDoS attack vector threatens authoritative DNS servers

Computer scientists have uncovered a flaw in some DNS resolvers that, left unresolved, might be abused to launch DDoS attacks against authoritative DNS servers.

The vulnerability – dubbed TsuNAME – has the potential to impair a core internet service, rendering at least portions of the net difficult to reach in the process.

“TsuNAME occurs when domain names are misconfigured with cyclic dependent DNS records, and when vulnerable resolvers access these misconfigurations, they begin looping and send DNS queries rapidly to authoritative servers and other resolvers,” the researchers explain in a paper (PDF) on the vulnerability.

Using real production data, the four researchers – Giovane Moura of SIDN Labs, Sebastian Castro and John Heidemann from InternetNZ, and Wes Hardaker of USC/ISI – showed how just two misconfigured domains led to a 50% increase on overall traffic volume for .nz’s authoritative servers.

Defending against TsuNAME requires changes to some recursive resolver software, by including loop detection codes and caching cyclic-dependent records.

Cycle of repair

The team have developed CycleHunter, an open-source tool that allows for authoritative DNS server operators to detect cyclic dependencies and therefore see exactly which systems need security remediation work to defend against potential attack.

Performing an analysis of 184 million domain names in seven large, top-level domains (TLDs), the researchers used to tool to find 44 cyclic-dependent NS records (likely from configuration errors) used by 1,400 domain names.

The team is working with resolver developers and many TLD operators to protect DNS systems against potential attack. Google Public DNS and Cisco OpenDNS have already been updated.

Cricket Liu, chief DNS architect at Infoblox, told The Daily Swig that while “TsuNAME is certainly serious” the community has “discovered and dealt with issues like this before.

“DNS servers already have mechanisms in place to protect themselves from *some* of these configurations, such as looping aliases, and adding a new mechanism to detect and cope with this one probably won’t be difficult,” Liu explained.

Work to address TSuNAME is already well in hand, he added.

Liu said: “The paper says that OpenDNS and Google Public DNS have already fixed the problem. In addition, the most important DNS servers to patch are the Internet’s big open recursive DNS servers (such an Google Public DNS and Cloudflare), since those could be used by a bad guy to initiate a DDoS attack, and there aren’t very many of those.”

Weapons grade

The researchers warn that a “well motivated adversary could easily weaponize this vulnerability” but Liu expressed scepticism on this point.

“I also think weaponizing TsuNAME seems somewhat difficult,” Liu told The Daily Swig. “The authors talk about setting up the problematic circular delegations, but they need to control the zones ‘on both sides’ to set them up. To attack some example.org, delegated to example.com, they’d need to control example.com.”

The Daily Swig asked both the researchers follow-up questions about the TsuNAME vulnerability. No word back yet, but we’ll update this story as and when more information comes to hand.

Advertisement. Scroll to continue reading.

Source: https://portswigger.net/daily-swig/whats-tsuname-ddos-attack-vector-threatens-authoritative-dns-servers

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Cyber Security

Website of Israel’s largest oil refinery operator, BAZAN Group is inaccessible from most parts of the world as threat actors claim to have hacked the Group’s cyber...

Cyber Security

TCP SYN Flood attacks are the most popular ones among DDOS attacks. Here we will discuss, in detail, the basis of the TCP SYN attack and...

Cyber Security

A new Mirai botnet variant tracked as ‘V3G4’ targets 13 vulnerabilities in Linux-based servers and IoT devices to use in DDoS (distributed denial of...

Cyber Security

A new open source library designed to thwart server-side request forgery (SSRF) attacks plugs a significant gap in Go developers’ armory, according to its architects. Safeurl,...

Copyright © 2023 Newsworthy News | Global | Political | Local | All News | Website By: Top Search SEO