TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities

4 点作者 mp3il大约 5 年前

1 comment

petee大约 5 年前
Since there isn&#x27;t an abstract, I&#x27;ll drop a key quotes from the intro -<p><i>&quot;In this paper, we point out a new vulnerability and show an attack, the NXNSAttack, that exploits the way DNS recursive resolvers operate when receiving NS referral response that contains nameservers but without their corresponding IP addresses (i.e., missing glue-records)</i>&quot;<p><i>&quot;The NXNSAttack is more effective than the NXDomain attack: i) It reaches an amplification factor of more than 1620x on the number of packets exchanged by the recursive resolver. ii) Besides the negative cache, the attack also saturates the ‘NS’ resolver caches.</i>&quot;<p><i>&quot;Essentially the attacker issues many requests for sub-domains of domains authorized by its own authoritative server (step 1 in Fig. 3). Each such request is crafted to have a different sub-domain to make sure it is not in the resolver’s cache, thus forcing the resolver to communicate with the attacker’s authoritative server to resolve the queried subdomains (step 2). The attacker authoritative name-server then returns an NS referral response with n name-server names but without their glue records(step 3), i.e., without their associated IP addresses, forcing the resolver to start a resolution query for each one of the name-server names in the response</i>&quot;