The "KeyTrap" DNS vulnerability
With just a single DNS packet, hackers could paralyze all common DNS implementations and public DNS providers. Exploiting this attack would have serious consequences for any application that uses the internet, including the unavailability of technologies such as web browsers, email and instant messaging. This devastating effect prompted major DNS vendors to call KeyTrap "The worst attack on DNS ever discovered"
Some more information and pointers to updates can be found on the CVE-2023-50387 page; some distributors have been faster to get updates out than others.
(Thanks to Dave Täht).
Posted Feb 20, 2024 20:04 UTC (Tue)
by h2g2bob (subscriber, #130451)
[Link] (2 responses)
I don't see NSD on the vulnerable list - maybe diversity of implementations (one of nsd's stated aims) is helping? (Or perhaps nobody thought to check it!)
Posted Feb 20, 2024 21:00 UTC (Tue)
by bwelling (subscriber, #13189)
[Link]
Posted Feb 20, 2024 21:02 UTC (Tue)
by mjeanson (subscriber, #72087)
[Link]
Posted Feb 20, 2024 21:51 UTC (Tue)
by rfunk (subscriber, #4054)
[Link]
Posted Feb 21, 2024 9:37 UTC (Wed)
by mtaht (subscriber, #11087)
[Link] (5 responses)
As one of the instigators of getting dnsmasq dnssec capable (starting 2012!), and a believer in the technology, I am sad to have so thoroughly missed this algorithmic attack. I can think of a dozen ways chained with other vulnerabities common in embedded devices - or merely in a web browser hitting the wrong url - even "modern" ones - that this can be nasty.
At one level, the rise of DOH in modern web browsers is putting a much lower load on the central DNS servers than ever before, but losing local dns to this attack will be a PITA for everything else.
I worry that dnssec is enabled in container deployments, also.
Patch now. I hope more mitigations are found. It does require a malicious entry in the DNS to make happen, so there is that.
Posted Feb 21, 2024 12:30 UTC (Wed)
by npws (subscriber, #168248)
[Link] (3 responses)
Regarding the bug itself, I'm very surprised how something quite obvious could go unnoticed for so long.
Posted Feb 21, 2024 23:12 UTC (Wed)
by cytochrome (subscriber, #58718)
[Link]
Posted Feb 22, 2024 9:18 UTC (Thu)
by rhowe (subscriber, #102862)
[Link] (1 responses)
"We show experimentally that an adversary using
https://www.athene-center.de/fileadmin/content/PDF/Techni...
Posted Feb 22, 2024 9:19 UTC (Thu)
by rhowe (subscriber, #102862)
[Link]
Posted Mar 1, 2024 21:22 UTC (Fri)
by jch (guest, #51929)
[Link]
I could be wrong, but my impression is that at least part of the community have been quietly dubitative about DNSsec. I wouldn't be too worried.
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
a single DNSSEC signed DNS response can DoS resolver"
The "KeyTrap" DNS vulnerability
The "KeyTrap" DNS vulnerability
