|
|
Subscribe / Log in / New account

Huston: KeyTrap!

Geoff Huston digs into the details of the KeyTrap DNS vulnerability, which was disclosed in February.

It's by no means "[devastating]" for the DNS, and the fix is much the same as the previous fix. As well as limiting the number of queries that a resolver can generate to resolve a queried name, a careful resolver will limit both the elapsed time and perhaps the amount of the resolver's processing resources that are used to resolve any single query name.

It's also not a novel discovery by the ATHENE folk. The vulnerability was described five years ago by a student at the University of Twente. I guess the issue was that the student failed to use a sufficient number of hysterical adjectives in describing this DNS vulnerability in the paper!



to post comments

Huston: KeyTrap!

Posted Mar 12, 2024 12:37 UTC (Tue) by johnjones (guest, #5462) [Link]

Brilliant write up and UNIVERSITY OF TWENTE should get credit for putting all Bachelor essays online correctly, D.A. Bleeker well done !
Bleeker, D.A. (2019) DoS attack on recursive resolvers with DNSSEC key-tag collisions. http://essay.utwente.nl/78777/

Huston: KeyTrap!

Posted Mar 12, 2024 14:45 UTC (Tue) by paulj (subscriber, #341) [Link]

Very good write up, thanks Geoff - if you're an LWN reader.

So basically, the answer to "A malicious DNS zone could tie up naive resolvers" is that zone operators should just... be respectful of the resources of resolvers, and /not/ generate zones with lots of keys, especially not with lots of keys with KeyTag collisions. And where a zone operator is just taking the piss, resolvers should put a sensible cap on how far they'll check.

Ok, this will break name resolution in zones made by evil operators, but... so what? :)

"Don't break your back to accommodate malicious data crafted by evil operators" should be a new networking principle I guess.

Huston: KeyTrap!

Posted Mar 12, 2024 16:11 UTC (Tue) by auerswal (subscriber, #119876) [Link] (1 responses)

I would not say that "the" vulnerability was described by a University of Twente student five years ago:

1. The KeyTrap[1] paper from ATHENE describes four related vulnerabilities. The University of Twente Bachelor Thesis[2] describes one of these vulnerabilities.

2. The KeyTrap paper describes combining vulnerabilities to create quadratic algorithmic complexity attacks, while the University of Twente Bachelor Thesis only describes a linear algorithmic complexity attack.

3. The University of Twente student did not manage to create a denial of service (DoS), although they tried. The ATHENE researchers could create DoS situations with all their attack methods.

I guess the issue was that the student failed in their attempts to demonstrate a DoS attack, while the ATHENE project demonstrated a 16h DoS of BIND9 with a single DNS request (and more DoS attacks against quite a few DNS resolvers). ;-)

[1]: https://www.athene-center.de/fileadmin/content/PDF/Keytra...
[2]: https://essay.utwente.nl/78777/1/Research_paper.pdf

Huston: KeyTrap!

Posted Mar 16, 2024 2:02 UTC (Sat) by gdt (subscriber, #6284) [Link]

In academic terms, enough that the student's work should have been cited, could have explicitly compared in the Related Work section. Hopefully that will be corrected when the paper meets peer review prior to academic publication. The summary of the ATHENE contribution at the concluding paragraph of the literature review in Related Work is still solid: "In contrast to previous work our KeyTrap attacks do not require multiple packets..." [which itself has a small error -- 'packets' -- which peer review will also hopefully correct].

Huston: KeyTrap!

Posted Mar 12, 2024 19:55 UTC (Tue) by flussence (guest, #85566) [Link]

> I guess the issue was that the student failed to use a sufficient number of hysterical adjectives in describing this DNS vulnerability in the paper!

And that there is why we despise brand-and-logo CVEs. They've just reinvented warning fatigue and pushed responsible, non-clickbait disclosure even further out of sight. Even the phrase "responsible disclosure" has been twisted into SEO dreck nowadays...

Huston: KeyTrap!

Posted Mar 14, 2024 0:31 UTC (Thu) by motk (subscriber, #51120) [Link]

What would Vetinari do here? Tax the rat farms


Copyright © 2024, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds