skip to main content
10.1145/2523649.2523662acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Socket overloading for fun and cache-poisoning

Published:09 December 2013Publication History

ABSTRACT

We present a new technique, which we call socket overloading, that we apply for off-path attacks on DNS. Socket overloading consists of short, low-rate, bursts of inbound packets, sent by off-path attacker to a victim host. Socket overloading exploits the priority assigned by the kernel to hardware interrupts, and enables an off-path attacker to illicit a side-channel on client hosts, which can be applied to circumvent source port and name server randomisation. Both port and name server randomisation are popular and standardised defenses, recommended in [RFC5452], against attacks by off-path adversaries. We show how to apply socket overloading for DNS cache poisoning and name server pinning against popular systems that support algorithms recommended in [RFC6056] and [RFC4097] respectively.

Our socket overloading technique may be of independent interest, and can be applied against other protocols for different attacks.

References

  1. M. Allman. Comments on selecting ephemeral ports. ACM SIGCOMM Computer Communication Review, 39(2):13--19, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Antonatos, P. Akritidis, V. T. Lam, and K. G. Anagnostakis. Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ACM Transactions on Information and System Security, 12(2):12:1--12:15, Dec. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. J. Bernstein. DNS Forgery. Internet publication at http://cr.yp.to/djbdns/forgery.html, November 2002.Google ScholarGoogle Scholar
  4. R. Beverly, R. Koga, and K. Claffy. Initial Longitudinal Analysis of IP Source Spoofing Capability on the Internet. Internet Society Article, 2013.Google ScholarGoogle Scholar
  5. CAIDA. Anonymized Internet Traces 2012 Dataset. http://www.caida.org/data/passive/passive_2012_dataset.xml, 2012.Google ScholarGoogle Scholar
  6. G. R. Corporation. DNS Nameserver Spoofability Test. https://www.grc.com/dns/dns.htm, 2012.Google ScholarGoogle Scholar
  7. DNS-OARC. Domain Name System Operations Analysis and Research Center. https://www.dns-oarc.net/oarc/services/porttest, 2008.Google ScholarGoogle Scholar
  8. O. Gudmundsson and S. D. Crocker. Observing DNSSEC Validation in the Wild. In SATIN, March 2011.Google ScholarGoogle Scholar
  9. R. Hay, J. Kalechstein, G. Nakibly, and S. Center. Subverting bindâĂŹs srtt algorithm derandomizing ns selection. August 2013.Google ScholarGoogle Scholar
  10. A. Herzberg and H. Shulman. Stealth DoS attacks on secure channels. In Proc. Symp. on Network and Distributed Systems Security (NDSS '10), San Diego, CA, Feb. 2010. Internet Society.Google ScholarGoogle Scholar
  11. A. Herzberg and H. Shulman. Antidotes for DNS Poisoning by Off-Path Adversaries. In International Conference on Availability, Reliability and Security (ARES), pages 262--267. IEEE, IEEE Computer Society, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Herzberg and H. Shulman. Security of Patched DNS. In S. Foresti, M. Yung, and F. Martinelli, editors, Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10--12, 2012. Proceedings, volume 7459 of Lecture Notes in Computer Science, pages 271--288. Springer, 2012.Google ScholarGoogle Scholar
  13. A. Herzberg and H. Shulman. DNSSEC: Interoperability Challenges and Transition Mechanisms. In International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Herzberg and H. Shulman. DNSSEC: Security and Availability Challenges. In IEEE CNS 2013. The Conference on Communications and Network Security., 2013.Google ScholarGoogle Scholar
  15. A. Herzberg and H. Shulman. Fragmentation Considered Poisonous: or one-domain-to-rule-them-all.org. In IEEE Conference on Communications and Network Security (CNS). IEEE, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  16. A. Herzberg and H. Shulman. Socket Overloading for Fun and Cache-Poisoning. CoRR, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Herzberg and H. Shulman. Towards adoption of dnssec: Availability and security challenges. Cryptology ePrint Archive, Report 2013/254, 2013. http://eprint.iacr.org/.Google ScholarGoogle Scholar
  18. A. Herzberg and H. Shulman. Vulnerable Delegation of DNS Resolution. In Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, September, 2013. Proceedings, Lecture Notes in Computer Science. Springer, 2013.Google ScholarGoogle Scholar
  19. A. Herzberg and H. Shulman. Retrofitting Security into Network Protocols: the Case of DNSSEC. IEEE Internet Computing, 2014. Accepted for publication.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. A. Herzberg, H. Shulman, J. Ullrich, and E. Weippl. Cloudoscopy: Services Discovery and Topology Mapping. In Proceedings of the fifth ACM workshop on Cloud computing security workshop. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Hubert and R. van Mook. Measures for Making DNS More Resilient against Forged Answers. RFC 5452 (Proposed Standard), Jan. 2009.Google ScholarGoogle Scholar
  22. D. Kaminsky. It's the End of the Cache As We Know It. In Black Hat conference, August 2008.Google ScholarGoogle Scholar
  23. S. R. Kleiman. Apparatus and method for interrupt handling in a multi-threaded operating system kernel, May 7 1996. US Patent 5,515,538.Google ScholarGoogle Scholar
  24. A. Kuzmanovic and E. W. Knightly. Low-Rate TCP-Targeted Denial of Service Attacks: the Shrew vs. the Mice and Elephants. In SIGCOMM, pages 75--86, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Larsen and F. Gont. Recommendations for Transport-Protocol Port Randomization. RFC 6056 (Best Current Practice), Jan. 2011.Google ScholarGoogle Scholar
  26. M. Larson and P. Barber. Observed DNS Resolution Misbehavior. RFC 4697 (Best Current Practice), Oct. 2006.Google ScholarGoogle Scholar
  27. W. Lian, E. Rescorla, H. Shacham, and S. Savage. Measuring the practical impact of DNSSEC deployment. In S. King, editor, Proceedings of USENIX Security 2013. USENIX, Aug. 2013. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. J. Oberheide. PDPT: Passive DNS Port Test. http://jon.oberheide.org/blog/2008/07/21/pdpt-passive-dns-port-test/, July 2008.Google ScholarGoogle Scholar
  29. N. Provos. DNS Testing Image. http://www.provos.org/index.php?/archives/43-DNS-Testing-Image.html, July 2008.Google ScholarGoogle Scholar
  30. K. Ramakrishnan. Performance considerations in designing network interfaces. Selected Areas in Communications, IEEE Journal on, 11(2):203--219, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. V. Ramasubramanian and E. Sirer. Perils of transitive trust in the domain name system. In Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement, pages 35--35. USENIX Association, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. K. Salah, K. El-Badawi, and F. Haidari. Performance analysis and comparison of interrupt-handling schemes in gigabit networks. Computer Communications, 30(17):3425--3441, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. K. Salah and M. Hamawi. Impact of cpu-bound processes on ip forwarding of linux and windows xp. Journal of Universal Computer Science, 16(21):3299--3313, 2010.Google ScholarGoogle Scholar
  34. J. H. Salim, R. Olsson, and A. Kuznetsov. Beyond softnet. In Proceedings of the 5th annual Linux Showcase & Conference, volume 5, pages 18--18, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. P. Vixie. DNS and BIND security issues. In Proceedings of the 5th Symposium on USENIX Security, pages 209--216, Berkeley, CA, USA, jun 1995. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Socket overloading for fun and cache-poisoning

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
            December 2013
            374 pages
            ISBN:9781450320153
            DOI:10.1145/2523649

            Copyright © 2013 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 9 December 2013

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate104of497submissions,21%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader