• English
  • Deutsch
  • Log In
    Password Login
    Research Outputs
    Fundings & Projects
    Researchers
    Institutes
    Statistics
Repository logo
Fraunhofer-Gesellschaft
  1. Home
  2. Fraunhofer-Gesellschaft
  3. Konferenzschrift
  4. Poster: Off-Path DNSSEC Downgrade Attacks
 
  • Details
  • Full
Options
September 1, 2023
Conference Paper
Title

Poster: Off-Path DNSSEC Downgrade Attacks

Abstract
Recent works found that signing zones with new cryptographic ciphers may disable DNSSEC validation in DNS resolvers. Adversaries could exploit this to manipulate algorithm numbers of ciphers in DNS responses, to make them appear as unknown, hence maliciously downgrading DNSSEC validation. In this work we show that these manipulation of DNSSEC records can also be launched remotely by off-path adversaries. We develop a DNSSEC downgrade attack using IP fragmentation. The idea is to create large DNS responses, that exceed the Maximum Transmission Unit on that path. The off-path adversary injects a malicious IP fragment, which when reassembled with the genuine IP fragment, overwrites the algorithm number of the ciphers in DNSSEC records. Our experimental evaluation of the off-path attack with a victim resolver that we set up identified 7.7K vulnerable domains out of 43K DNSSEC-signed 1M-top Tranco domains. We provide recommendations to mitigate the vulnerabilities.
Author(s)
Heftrig, Elias  
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Schulmann, Haya  
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Waidner, Michael  
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
Mainwork
SIGCOMM 2023, ACM SIGCOMM Conference. Proceedings  
Conference
Association for Computing Machinery, Special Interest Group on Data Communication (ACM SIGCOMM Conference) 2023  
DOI
10.1145/3603269.3610840
Language
English
Fraunhofer-Institut für Sichere Informationstechnologie SIT  
  • Cookie settings
  • Imprint
  • Privacy policy
  • Api
  • Contact
© 2024