MoinQ:

Contents

  1. history

Abstract.

DNS is a protocol responsible for translating human-readable
domain names into IP addresses. 
Despite being essential for many Internet services to work properly,
it is inherently vulnerable to manipulation. 
In November 2021, users from Mexico received bogus DNS
responses when resolving whatsapp.net. 
It appeared that a BGP route
leak diverged DNS queries to the local instance of the k-root located in China. 
Those queries, in turn, encountered middleboxes that injected fake DNS responses. 

In this paper, we analyze that event from the RIPE Atlas point of view and observe that 
its impact was more significant than initially thought—
the Chinese root server instance was reachable
from at least 15 countries several months before being reported. 

We then launch a nine-month longitudinal measurement campaign using
RIPE Atlas probes and locate 11 probes outside China reaching the
same instance, although this time over IPv6. 
More broadly, motivated by the November 2021 event, 
we study the extent of DNS response injection when contacting root servers. 

While only less than 1% of queries are impacted, 
they originate from 7% of RIPE Atlas probes in 66 countries. 

We conclude by discussing several countermeasures that limit the
probability of DNS manipulation.

1. history


CategoryDns CategoryWatch CategoryTemplate

MoinQ: DNS/セキュリティ/Intercept and Inject (last edited 2023-09-04 22:20:00 by ToshinoriMaeno)