DNSSEC glitch causes .gov sites to become inaccessible

Posted by   Virus Bulletin on   Aug 15, 2013

Name servers unable to distinguish faulty from rogue responses.

A glitch at VeriSign yesterday led to DNSSEC-aware name servers being unable to verify responses on the .gov top-level domain (TLD), which in turn led to many users being unable to access services residing on a .gov domain.

It wasn't a good day for the Internet yesterday. A 'maintenance glitch' caused the website of the New York Times to display a "service unavailable" message for several hours, Microsoft recalled a patch for Exchange 2013 just hours after its release, and many users were unable to reach US government websites.

The latter, Johannes Ullrich of the SANS Internet Storm Center explains, was caused by a DNSSEC error at the .gov TLD - which has since been confirmed by VeriSign, which operates .gov.

DNSSEC cryptographically signs information provided by DNS. DNS, which translates domain names such as www.virusbtn.com into harder-to-memorize IP addresses like 109.200.4.26, is often called 'the phonebook of the Internet'. In fact, it does a lot more than making web addresses memorable, and opening a single web page into a browser can easily result in more than 100 DNS lookups.

This makes DNS a weak spot in the Internet infrastructure, and someone who is able to send rogue responses to DNS queries can do a lot of harm. The DNSChanger malware, which modified victims' DNS settings to have them served advertisements of the criminals' partners rather than those of paying advertisers, saw its owners make millions of dollars before their arrest in 2011.

By digitally signing responses, DNSSEC attempts to prevent harm that can be caused by incorrect and possibly malicious responses. Because a DNS query typically requires several requests, the response to each of them is signed.

A request for www.fbi.gov, for instance, starts with a request to one of the Internet's 'root servers', which responds with the name servers responsible for the .gov TLD. A request to one of these name servers then returns the name servers responsible for fbi.gov and its subdomains. One of these name servers will then respond with the IP address of www.fbi.gov.

For DNSSEC to work as intended, each of these responses has to been signed. The bug at VeriSign caused the second step to fail, resulting in invalid responses. In practice, this meant if you made a request to a .gov domain, all of which use DNSSEC, and your name server supported DNSSEC, the domain would not resolve.

Yesterday's .gov issues highlight an important problem with DNSSEC. In practice, when a DNS response is received with an invalid signature, it is far more likely that this is caused by a technical glitch rather than a malicious or even incorrect response. Yet the name server cannot distinguish between these cases and the end-user can't even distinguish between these and a third possibility: that the domain simply doesn't exist.

When DNSSEC matures, glitches like this are likely to become less common, but they will still happen from time to time. At the same time, for DNSSEC to return anything but an empty response, would seriously weaken its properties.

I am aware of some of the criticism on DNSSEC, but I think that in the end, the protocol is worthy of being implemented widely. However, we should be well aware that doing so will lead to the occasional lack of availability of services we want to access.

Posted on 15 August 2013 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.