OARC 41 & ICANN DNS Symposium 2023

摘要

In this talk, we present a new DNS amplification attack named TsuKing. Instead of exploiting individual DNS resolvers independently to achieve an amplification effect, TsuKing deftly coordinates numerous vulnerable DNS resolvers and crafted queries together to form potent DoS amplifiers. We demonstrate that with TsuKing, an initial small amplification factor can increase exponentially through the internal layers of coordinated amplifiers, resulting in an extremely powerful amplification attack. TsuKing has three variants, including DNSRetry, DNSChain, and DNSLoop, all of which exploit a suite of inconsistent DNS implementations to achieve an enormous amplification effect. We conducted comprehensive measurements and evaluations to demonstrate the feasibility of TsuKing. In particular, we found that about 11.7% of 1.3M open DNS resolvers are potentially vulnerable to being exploited by TsuKing. And real-world controlled evaluations indicated that adversaries can achieve an amplification factor of at least 3,700×. We have reported the above vulnerabilities to all relevant vendors and also provided them with our recommendations for mitigation. We have received positive responses from 5 vendors, such as Unbound, confirming the issues, and got 3 CVE numbers. Some of the vendors are actively implementing our recommendations.

日期
9月 6, 2023 — 9月 7, 2023
位置
Hybrid in-person and online workshop (Meliá Danang Beach Resort)
19 Trường Sa, Hoà Hải, Ngũ Hành Sơn, Đà Nẵng, 550000

OARC 41 & ICANN DNS Symposium 2023会议上(线上线上相结合),丰露代替我演示了TsuKing攻击。十分感谢!

现场反馈

talk1
talk2
talk3
talk4