论文标题
注射攻击重新加载:DNS上的恶意有效载荷
Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
论文作者
论文摘要
Internet协议的传统设计原则表明:“在接收时发送和宽容时要严格” [RFC1958],而DNS也不例外。 DNS在处理DNS记录时的透明度,也专门针对DNS [RFC3597]标准化,是使其成为一个流行的平台之一,促进了不断增加的新应用程序。应用程序只需创建新的DNS记录,就可以立即开始通过DNS分发它,而无需对DNS服务器和平台进行任何更改。我们的互联网广泛研究证实,超过130万(测试的96%)开放DNS解析器是标准标准的,并且透明地处理DNS记录。 在这项工作中,我们表明这种“透明度”在互联网中引入了严重的脆弱性:我们通过将恶意有效载荷编码到DNS记录中,展示了一种新方法来启动字符串注射攻击。我们展示了如何为此类DNS记录进行武器武器以攻击流行的应用程序。例如,我们应用弦注射来发射一种新型的DNS缓存中毒攻击,我们对此进行了评估,我们对开放式解析器的种群进行了评估,并发现105K脆弱。 DNSSEC的常见设置不能阻止这种缓存中毒。例如,我们的攻击适用于内部和公共服务,我们透露,所有Eduroam服务都容易受到注射攻击的影响,从而使我们能够启动从未经授权的访问Eduroam网络的访问到资源饥饿等。根据应用程序的不同,我们的攻击会导致系统崩溃,数据损坏和泄漏,安全性退化,并可以引入远程代码执行和任意错误。 在对Internet攻击的评估中,我们发现我们测试的所有标准符合标准的开放DNS解析器允许注射攻击其网络上的应用程序和用户。
The traditional design principle for Internet protocols indicates: "Be strict when sending and tolerant when receiving" [RFC1958], and DNS is no exception to this. The transparency of DNS in handling the DNS records, also standardised specifically for DNS [RFC3597], is one of the key features that made it such a popular platform facilitating a constantly increasing number of new applications. An application simply creates a new DNS record and can instantly start distributing it over DNS without requiring any changes to the DNS servers and platforms. Our Internet wide study confirms that more than 1.3M (96% of tested) open DNS resolvers are standard compliant and treat DNS records transparently. In this work we show that this `transparency' introduces a severe vulnerability in the Internet: we demonstrate a new method to launch string injection attacks by encoding malicious payloads into DNS records. We show how to weaponise such DNS records to attack popular applications. For instance, we apply string injection to launch a new type of DNS cache poisoning attack, which we evaluated against a population of open resolvers and found 105K to be vulnerable. Such cache poisoning cannot be prevented with common setups of DNSSEC. Our attacks apply to internal as well as to public services, for instance, we reveal that all eduroam services are vulnerable to our injection attacks, allowing us to launch exploits ranging from unauthorised access to eduroam networks to resource starvation. Depending on the application, our attacks cause system crashes, data corruption and leakage, degradation of security, and can introduce remote code execution and arbitrary errors. In our evaluation of the attacks in the Internet we find that all the standard compliant open DNS resolvers we tested allow our injection attacks against applications and users on their networks.