## page was renamed from DNS/毒盛/Kaminsky手法/2020/saddns.net ## page was copied from DnsTemplate ##master-page:HelpTemplate = SAD DNS = <> <> https://www.saddns.net/ --- [[/sections]] DNSキャッシュ毒盛攻撃が強力になって、復活した(死んではいないが)。[[/CVE-2020-25705]] rate limiting が side channel として使われて、送信portを推定できてしまう。:-< {{{ 私の対策: DNS Cookie を使いましょう。使えない相手にはTCPで問い合わせよう。 }}} BIND, unbound, dnsmasq が言及されている。[[/knot-resolver]] には言及なし。 https://twitter.com/CZ_NIC/status/1329417736552910852?s=20 Blog CZ.NIC: Knot Resolver is not SAD DNS resolver: https://en.blog.nic.cz/2020/11/19/knot-resolver-is-not-sad-dns-resolver/ [[/対策]] [[/8.1]] A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing) [[/Sergio]] https://business.blogthinkbig.com/simple-explanation-sad-dns-why-disaster-or-blessing/ Why SAD DNS Isn’t So Sad with SOLIDserver 24 November 2020 https://www.efficientip.com/sad-dns-solidserver/ ?utm_source=social&utm_medium=twitter&utm_campaign=bp-sad-dns <> [[/cloudflare]] による解説では基礎知識も説明されているので、 ここを先に確認してから論文を読むことを勧める。-- ToshinoriMaeno <> [[/警告例 ]] https://twitter.com/Tr3s0r/status/1328198988479295488?s=20 一週間過ぎて、日本語のblogが出た。https://twitter.com/knqyf263/status/1329381990840274944?s=20 query 送信ポートの推定話が中心で、とても参考になる。-- ToshinoriMaeno <> 実装の不良かと思わせる話もあって、なるほどと思った。 ICMP port unreachableを送るかどうかではなくて、 global counter のカウントダウンが問題だということなのか。とすると、... probeのための返答はしてもらわないとだめだ。 == 要点 == CVE-2020-25705 INFERRING DNS QUERY’S SOURCE PORT [[/4]] Extending attack window. [[/5]] == UDPスキャンでUDPパケットを送信したとき == {{{ 応答なし⇒ポート空いてる ICMP port unreachable⇒ポート閉じてる }}} この情報だけでは不十分。 global rate limite の問題 https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_cao.pdf CVE-2020-25705 POC https://github.com/tdwyer/CVE-2020-25705/blob/main/cve-2020-25705.py [[/調査]] == 論文リンク == DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels<(Disthinguished Paper Award) [PDF] [Slides] [Video] Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan In Proceedings of ACM Conference on Computer and Communications Security (CCS`20), November 9-13, 2020, Virtual Event, US ISCの愚痴: https://www.isc.org/blogs/2020-saddns/ Linux “weakness” is *SECURITY* – ‘DNS cache Poisoning Attacks’ https://linuxnewbiesince1996.wordpress.com/2020/11/15/linux-weakness-is-security-dns-cache-poisoning-attacks/ https://www.saddns.net/ Am I affected by the vulnerability? {{{ Likely, as long as you are using a vulnerable DNS service (e.g., 8.8.8.8 or 1.1.1.1). Most public resolvers have been checked to be vulnerable. If you are using private DNS services (i.e., those provided by your ISP or your organization), we do not have sufficient data but there is a good chance that it is vulnerable as well. Refer to this question for more details. }}} == history == {{{ Your DNS server IP is 162.158.117.60 It seems your DNS server is running Linux > 3.18 Since it is running the vulnerable version of OS that has not been patched yet, your DNS server is vulnerable. The test is conducted on 2020-11-13 08:28:04.737081966 Disclaimer: This test is not 100% accurate and is for test purposes only. }}} {{{ 158.162.in-addr.arpa. 1621 IN NS cruz.ns.cloudflare.com. 158.162.in-addr.arpa. 1621 IN NS kevin.ns.cloudflare.com. }}} <> ---- CategoryDns CategoryWatch CategoryTemplate