Dear members of the DNSop wg,

In the recent years we have been working on DNSSEC and mitigated a number
of vulnerabilities. Last year we identified flaws in the DNSSEC standard
that can be exploited to launch Denial of Service attacks against DNSSEC
validating software. For instance, some popular resolvers can be stalled
for 16 hours with just a single DNS packet.

We demonstrated the attacks to the vendors and worked with them to develop
effective patches. This task turned out to be challenging and required a
number of iterations.

The flaws in the DNSSEC standard have implications for ALL standard
supporting DNS resolvers and are challenging to resolve, as is also evident
from the number of patches-iterations we had with the developers. Further,
patched DNS resolvers break the standard requirements, or else are
vulnerable to CPU exhaustion attacks.

A brief explanation of the flaws in the DNSSEC standard and our KeyTrap
attacks that exploit them can be found here:

https://labs.ripe.net/author/haya-shulman/keytrap-algorithmic-complexity-attacks-exploit-fundamental-design-flaw-in-dnssec/


The technical report describing our research can be found here:

https://www.athene-center.de/fileadmin/content/PDF/Keytrap_2401.pdf


We would like to use this opportunity to thank the many vendors for their
support and collaboration during the last months.


Best regards,
Haya Schulmann

--
Prof. Dr. Haya Schulmann
Goethe-Universität Frankfurt
ATHENE
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to