Multiple defenses offer the best protection against insidious security threats. Sandy Wilbourn explains what the Kaminsky DNS cache poisoning flaw is and how to safeguard your company’s network.
The seriousness of the recent domain name system (DNS) cache poisoning vulnerability, discovered by security researcher Dan Kaminsky, raises the bar for network security administrators and should provoke the development of a comprehensive plan to address this insidious threat. Every business has a caching DNS server and is thus a target of the Kaminsky DNS cache poisoning flaw.
A Kaminsky DNS cache poisoning attack consists of two steps:
- First, the attacker sends fake DNS queries, or questions, to internal caching DNS servers. These queries are for domains that the caching server will not have cached, so it will have to generate subsequent queries to authoritative servers on the Internet.
- Secondly, the attacker then sends a barrage of fake answers to each fake question, attempting to spoof the answer from the authoritative server. To succeed, the attacker has to correctly guess various query parameters, such as the Transaction ID and the User Datagram Protocol (UDP) source port, before a valid response from the legitimate authoritative server reaches the caching DNS server. There are some additional technical details about the fake answer that will be discussed later in this article.
If the attacker succeeds in getting his or her fake answer accepted by the caching DNS server, the consequences are quite serious. The poisoned DNS entry can be used to redirect Web traffic, e-mail or any other IP application to a malicious server controlled by an attacker. Since the DNS points users to their destinations, it is completely unaware that the traffic is being diverted.
Protecting against the Kaminsky attack
As with any security vulnerability, the best approach for protecting against the Kaminsky attack is to employ multiple defenses. In this case, traditional firewalls and intrusion prevention systems (IPS) can be part of the solution, providing an initial defensive shield that will reduce the number of fake DNS query requests and responses.
But most firewalls and IPS will not stop a fake DNS response from poisoning the DNS cache if the DNS query parameters match. This means it is a primary consideration to ensure that the DNS server itself employs the best possible defenses. Put another way, DNS security starts with the DNS server.
DNS Security Starts with the DNS Server
The DNS server is best equipped to deal with DNS threats since it is where all the DNS intelligence resides. The following are four capabilities that your DNS server should have to protect the DNS. It is worth investigating your DNS server to make certain all of these defenses are available and enabled.
- UDP source port randomization (UDP SPR) was specified by key DNS vendors as the initial response to the Kaminsky attack. Randomizing the UDP source port used in a query makes it harder for an attacker to guess the query parameters in a fake answer. Although UDP SPR is a useful defense, there is widespread concern that it is not an adequate long-term response to cache poisoning.