[DNSOP] DNS cache poisoning is back

John Levine <johnl@taugh.com> Sat, 14 November 2020 03:39 UTC

Return-Path: <johnl@iecc.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E0B33A0F46 for <dnsop@ietfa.amsl.com>; Fri, 13 Nov 2020 19:39:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.85
X-Spam-Level:
X-Spam-Status: No, score=-1.85 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.25, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=iecc.com header.b=KYuJ/EzS; dkim=pass (2048-bit key) header.d=taugh.com header.b=V38HIuYA
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cujSzyTvFFes for <dnsop@ietfa.amsl.com>; Fri, 13 Nov 2020 19:39:33 -0800 (PST)
Received: from gal.iecc.com (gal.iecc.com [IPv6:2001:470:1f07:1126:0:43:6f73:7461]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BB3993A0F61 for <dnsop@ietf.org>; Fri, 13 Nov 2020 19:39:32 -0800 (PST)
Received: (qmail 26604 invoked from network); 14 Nov 2020 03:39:31 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=iecc.com; h=date:message-id:from:to:subject:mime-version:content-type:content-transfer-encoding:cleverness; s=67e1.5faf5173.k2011; bh=OGzauXu1QX+wN+njCfWqN3KBSv4IzGSmzbjEXPLLou4=; b=KYuJ/EzSm+V9iqTtqKFCm7ZCy8Xb4fiwhN1GBunPrKXNAPLN2fBVx/s6AyV6j3Ck5horvdh0C8wV+efLzz0TgoGxTRQEwUUwUtxV0B7iBuj3pSaQGvSfugD12dLlWSWGlEK0W3D4xiAE4hUdspGHlH42wdhT6KWmNRFX2TlTk9Hg3kCe+6wN4KH/739YCBjPM849c42rFp3PH2rt/pL7Y3740iWoMOIZmgi3nfC8ygNwf8gKVfD8fDQ3g5PBVpbewR+LzjutnO6hefFlrUinyr5q4QyBLgzJjZhxw7D1gaHSIoooJ9qXfn1poyKBfc2WSqjBW9NSxG/oCkM/1wDiXA==
DKIM-Signature: v=1; a=rsa-sha256; c=simple; d=taugh.com; h=date:message-id:from:to:subject:mime-version:content-type:content-transfer-encoding:cleverness; s=67e1.5faf5173.k2011; bh=OGzauXu1QX+wN+njCfWqN3KBSv4IzGSmzbjEXPLLou4=; b=V38HIuYAQ7SH0hb+fiPEY5OLo79EIU2OkaNdNJymTp7h5Rhqeu8nZptb33m4IadtG5NFTt1FdJQGs2cDcfqVCm9oVxBr81vRROIOkPtcG5qjp+bDAwAX+8ZSSiXaRHF8QP+fA2UYMp6X6gC3WzT6kkjO6FLB3k+w2iA+aw1Z1OPlDtARWpZSiGJqjWf7l2a4YGT2DgeXB0vY0dxdjvZ+2s36BS5uqqxG5yE/oE1f4k04IcIuHGIrq77N54yaY0uuSxgjWU9iyeGTL9Hnnu8n8TMo1Cq/K2nb/vaD1fBsPK8orumxvWVxzIPJklIvMhUkgYMco3rrXUiysuwdbelU+A==
Received: from ary.qy ([IPv6:2001:470:1f07:1126::78:696d:6170]) by imap.iecc.com ([IPv6:2001:470:1f07:1126::78:696d:6170]) with ESMTPS (TLS1.2 ECDHE-RSA AES-256-GCM AEAD) via TCP6; 14 Nov 2020 03:39:31 -0000
Received: by ary.qy (Postfix, from userid 501) id B0B68270E1D1; Fri, 13 Nov 2020 22:39:30 -0500 (EST)
Date: 13 Nov 2020 22:39:30 -0500
Message-Id: <20201114033930.B0B68270E1D1@ary.qy>
From: "John Levine" <johnl@taugh.com>
To: dnsop@ietf.org
Organization: Taughannock Networks
X-Headerized: yes
Cleverness: minimal
Mime-Version: 1.0
Content-type: text/plain; charset=utf-8
Content-transfer-encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/QfDcp0L0NKcR41HL8riW7MHT4Mo>
Subject: [DNSOP] DNS cache poisoning is back
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 14 Nov 2020 03:39:34 -0000

This paper from UC Riverside given at this week's ACM CCS '20
conference describes a DNS cache poisoning attack that uses weaknesses
in UDP stacks. They say it works on real public caches including
Cloudflare, Google, and Quad 9,

https://www.cs.ucr.edu/~zhiyunq/pub/ccs20_dns_poisoning.pdf

-- 
Regards,
John Levine, johnl@taugh.com, Primary Perpetrator of "The Internet for Dummies",
Please consider the environment before reading this e-mail. https://jl.ly