DNS 安全威脅

對DNS的攻擊方式主要包括三大類,

  • 流量型拒絕服務攻擊,如UDP flood、TCP flood、DNS請求flood,和PING flood等。
  • 異常請求訪問攻擊,如超長域名請求、異常域名請求等,這類型攻擊的特點是通過發掘DNS服務器的漏洞 ,通過僞造特定的請求報文,導致DNS服務器軟件工作異常而退出或崩潰而無法啓動,達到影響DNS服務器正常工作的目的
  • DNS劫持攻擊,如篡改LDNS緩存內容、篡改授權域內容、ARP欺騙劫持授權域、分光劫持等,這種類型攻擊的特點是通過直接篡改解析記錄或在解析記錄傳遞過程中篡改其內容或搶先應答,從而達到影響解析結果的目的

 

威脅發生地方

Number Area Threat
(1) Zone Files File Corruption (malicious or accidental). Reading private zone files, configuration files and logs to expose hidden devices. Local threat. Mitigated by good System Administration practices.
(2) Zone Transfers IP address spoofing (impersonating update source), DDoS attacks (persistent requests for transfer). Server to Server threat. Mitigated by either IP address limits or cryptographic solutions using TSIG (shared secret MAC).
(3) Dynamic Updates Unauthorized Updates, malicious updates, IP address spoofing (impersonating update source). Server to Server Threat. Mitigated by either IP address limits or cryptographic solutions using either TSIG (symmetric-like MAC)or SIG(0) (an asymmetric).
(4) Remote Queries Cache Poisoning/Pollution by IP spoofing, data interception or a subverted Master or Slave. DDoS attacks based on Open Resolvers and other configuration errors. Zombied or virus compromised PC or server. Server to Client threat. Mitigated by either IP address limits or cryptographic solutions using DNSSEC (asymmetric cryptography).
(5) Resolver Queries Data interception, Poisoned/Polluted Cache, subverted Master or Slave, local IP spoofing. Increasingly remote devices use a DNS proxy which can either be compromised, badly configured or poorly implemented. Remote Client-Client threat. Mitigated by end-to-end cryptographic solutions using DNSSEC (asymmetric cryptography).

如上所述,威脅發生在DNS解析的所有途徑,客戶解析器與localDNS之間;local DNS緩存;local DNS與授權DNS之間;primary DNS與Secondary DNS之間;授權DNS數據庫、遠端管理平臺。各個層面都需要考慮安全。

 

 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章