Skip to main content
Top

2019 | OriginalPaper | Chapter

Large-Scale Analysis of Infrastructure-Leaking DNS Servers

Authors : Dennis Tatang, Carl Schneider, Thorsten Holz

Published in: Detection of Intrusions and Malware, and Vulnerability Assessment

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The Domain Name System (DNS) is a fundamental backbone service of the Internet. In practice, this infrastructure often shows flaws, which indicate that measuring the DNS is important to understand potential (security) issues. Several works deal with the DNS and present such problems, mitigations, and attack vectors. A so far overlooked issue is the fact that DNS servers might answer with information about internal network information (e.g., hostnames) to external queries. This behavior results in a capability to perform an active network reconnaissance without the need for individual vulnerabilities or exploits. Analyzing how public DNS services might involuntarily disclose sensitive information ties in with the trust we have on Internet services.
To investigate this phenomenon, we conducted a systematic measurement study on this topic. We crawl all public reachable DNS servers in 15 scans over a period of almost six months and analyze up to 574,000 DNS servers per run that are configured in a way that might lead to this kind of information leakage. With this large-scale evaluation, we show that the amount of this possible infrastructure leaking DNS servers is on average almost 4% over all of our scans on every reachable DNS servers on the Internet. Based on our newest scan, the countries with most of these servers are Romania, China, and the US. In these countries, the share of such servers among of all reachable servers is about 15% in Romania, 9% in China, and 2.9% in the US. A detailed analysis of the responses reveals that not all answers provide useful information for an adversary. However, we found that up to 158,000 DNS servers provide potentially exploitable information in the wild. Hence, this measurement study demonstrates that the configuration of a DNS server should be executed carefully; otherwise, it may be possible to disclose too much information.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
7.
go back to reference Chung, T., et al.: A longitudinal, end-to-end view of the DNSSEC ecosystem. In: USENIX Security Symposium (2017) Chung, T., et al.: A longitudinal, end-to-end view of the DNSSEC ecosystem. In: USENIX Security Symposium (2017)
8.
go back to reference Dell’Amico, M., Bilge, L., Kayyoor, A., Efstathopoulos, P., Vervier, P.-A.: Lean on me: mining internet service dependencies from large-scale DNS data. In: Annual Computer Security Applications Conference (ACSAC) (2017) Dell’Amico, M., Bilge, L., Kayyoor, A., Efstathopoulos, P., Vervier, P.-A.: Lean on me: mining internet service dependencies from large-scale DNS data. In: Annual Computer Security Applications Conference (ACSAC) (2017)
9.
go back to reference Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by internet-wide scanning. In: 22nd ACM Conference on Computer and Communications Security (2015) Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., Halderman, J.A.: A search engine backed by internet-wide scanning. In: 22nd ACM Conference on Computer and Communications Security (2015)
12.
13.
go back to reference Fukuda, K., Heidemann, J.: Detecting malicious activity with DNS backscatter. In: ACM SIGCOMM Internet Measurement Conference (IMC) (2015) Fukuda, K., Heidemann, J.: Detecting malicious activity with DNS backscatter. In: ACM SIGCOMM Internet Measurement Conference (IMC) (2015)
15.
go back to reference Kührer, M., Hupperich, T., Bushart, J., Rossow, C., Holz, T.: Going wild: large-scale classification of open DNS resolvers. In: ACM SIGCOMM Internet Measurement Conference (IMC). ACM (2015) Kührer, M., Hupperich, T., Bushart, J., Rossow, C., Holz, T.: Going wild: large-scale classification of open DNS resolvers. In: ACM SIGCOMM Internet Measurement Conference (IMC). ACM (2015)
16.
go back to reference Liu, B., et al.: Who is answering my queries: understanding and characterizing interception of the DNS resolution path. In: USENIX Security Symposium (2018) Liu, B., et al.: Who is answering my queries: understanding and characterizing interception of the DNS resolution path. In: USENIX Security Symposium (2018)
17.
go back to reference Liu, D., Hao, S., Wang, H.: All your DNS records point to us: understanding the security threats of dangling DNS records. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016) Liu, D., Hao, S., Wang, H.: All your DNS records point to us: understanding the security threats of dangling DNS records. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)
18.
go back to reference Padmanabhan, R., Dhamdhere, A., Aben, E., Spring, N., et al.: Reasons dynamic addresses change. In: ACM SIGCOMM Internet Measurement Conference (IMC) (2016) Padmanabhan, R., Dhamdhere, A., Aben, E., Spring, N., et al.: Reasons dynamic addresses change. In: ACM SIGCOMM Internet Measurement Conference (IMC) (2016)
19.
go back to reference Pearce, P., et al.: Global measurement of DNS manipulation. In: USENIX Security Symposium (2017) Pearce, P., et al.: Global measurement of DNS manipulation. In: USENIX Security Symposium (2017)
20.
go back to reference Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.: Address Allocation for Private Internets. RFC 1597, RFC Editor, March 1994 Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G.: Address Allocation for Private Internets. RFC 1597, RFC Editor, March 1994
21.
go back to reference Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G., Lear, E.: Address Allocation for Private Internets. RFC 1918, RFC Editor, February 1996 Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G., Lear, E.: Address Allocation for Private Internets. RFC 1918, RFC Editor, February 1996
22.
go back to reference Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A., Chen, H.: Network reconnaissance. Network Security (2008) Shaikh, S.A., Chivers, H., Nobles, P., Clark, J.A., Chen, H.: Network reconnaissance. Network Security (2008)
24.
go back to reference van Rijswijk-Deij, R., Jonker, M., Sperotto, A., Pras, A.: A high-performance, scalable infrastructure for large-scale active DNS measurements. IEEE J. Sel. Areas Commun. 34, 1877–1888 (2016) van Rijswijk-Deij, R., Jonker, M., Sperotto, A., Pras, A.: A high-performance, scalable infrastructure for large-scale active DNS measurements. IEEE J. Sel. Areas Commun. 34, 1877–1888 (2016)
25.
go back to reference Woolf, S., Conrad, D.: Requirements for a Mechanism Identifying a Name Server Instance. RFC 4892, RFC Editor, June 2007 Woolf, S., Conrad, D.: Requirements for a Mechanism Identifying a Name Server Instance. RFC 4892, RFC Editor, June 2007
Metadata
Title
Large-Scale Analysis of Infrastructure-Leaking DNS Servers
Authors
Dennis Tatang
Carl Schneider
Thorsten Holz
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-22038-9_17

Premium Partner