In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases?
The following list are the attack types from the first post, where DNSSEC can protect the users:
- DNS cache poisoning the DNS server, "Da Old way"
- DNS cache poisoning, "Da Kaminsky way"
- ISP hijack, for advertisement or spying purposes
- Captive portals
- Pentester hijacks DNS to test application via active man-in-the-middle
- Malicious attacker hijacks DNS via active MITM
The following list are the attack types from the first post, where DNSSEC cannot protect the users:
- Rogue DNS server set via malware
- Having access to the DNS admin panel and rewriting the IP
- ISP hijack, for advertisement or spying purposes
- Captive portals
- Pentester hijacks DNS to test application via active man-in-the-middle
- Malicious attacker hijacks DNS via active MITM
If you are a reader who thinks while reading, you might say "What the hell? Am I protected or not???". The problem is that it depends… In the case where the attacker is between you and your DNS server, the attacker can impersonate the DNS server, downgrade it to a non DNSSEC aware one, and send responses without DNSSEC information.
Now, how can I protect against all of these attacks? Answer is "simple":
- Configure your own DNSSEC aware server on your localhost, and use that as a resolver. This is pretty easy, even I was able to do it using tutorials.
- Don't let malware run on your system! ;-)
- Use at least two-factor authentication for admin access of your DNS admin panel.
- Use a registry lock (details in part 1).
- Use a DNSSEC aware OS.
- Use DNSSEC protected websites.
- There is a need for an API or something, where the client can enforce DNSSEC protected answers. In case the answer is not protected with DNSSEC, the connection can not be established.
Now some random facts, thoughts, solutions around DNSSEC:
- Did you know .SE signed its zone with DNSSEC in September 2005, as the first TLD in the world?
- Did you know DNSSEC was first deployed at the root level on July 15, 2010?
- Did you know .NL become the first TLD to pass 1 million DNSSEC-signed domain names?
- Did you know that Hungary is in the testing phase of DNSSEC (watch out, it is Hungarian)?
- Did you know that you can also use and test that cool DNSSEC validator?
- Did you know that there are alternative solutions like DNSCrypt?
- Did you know that in the future you might be able to enforce HSTS via DNSSEC?
- Did you know that in the future you might be able to use certificate pinning via DNSSEC?
Note from David:
Huh, I have just accidentally deleted this whole post from Z, but then I got it back from my browsing cache. Big up to Nir Sofer for his ChromeCacheView tool! Saved my ass from kickin'! :D
Continue reading
- Pentest Tools Free
- Blackhat Hacker Tools
- Hacking Tools And Software
- Kik Hack Tools
- Hacker Tools For Windows
- Github Hacking Tools
- Hacker Tools Hardware
- Hacking Tools Kit
- Hacker Tools Free Download
- Hack Tools For Pc
- Pentest Tools Review
- Hacking Tools Name
- Hacker Tools For Windows
- Termux Hacking Tools 2019
- Hacking Tools For Windows 7
- Hackrf Tools
- Growth Hacker Tools
- Usb Pentest Tools
- Ethical Hacker Tools
- Hack Tools For Windows
- Blackhat Hacker Tools
- Hacking Tools 2020
- Pentest Tools Subdomain
- Hacker Hardware Tools
- Hacking Tools Windows 10
- Pentest Tools Open Source
- Install Pentest Tools Ubuntu
- Hackers Toolbox
- Hacker Tools Apk Download
- Hackrf Tools
- Hacking Tools Mac
- Hacking Tools 2019
- Hacker Tools For Windows
- Hacker Tools Apk Download
- Best Hacking Tools 2019
- What Is Hacking Tools
- Hacker Tools Free
- Hacking Tools Pc
- New Hack Tools
- Pentest Tools Subdomain
- Github Hacking Tools
- Game Hacking
- Hacking Tools Software
- Hack Tools For Pc
- Hacker Tools Mac
- Hacker Tool Kit
- Nsa Hack Tools Download
- Hack Tools Online
- Pentest Tools For Windows
- Hacking Tools Pc
- Hack Website Online Tool
- Hacks And Tools
- Computer Hacker
- Nsa Hacker Tools
- Hacking Tools And Software
- Hacker Tools Software
- Hacking Tools For Windows Free Download
- Pentest Tools Linux
- Hacking Tools For Windows
- Hack Tools 2019
- What Is Hacking Tools
- Pentest Tools Apk
- Hack Tool Apk No Root
- Hacking Tools For Mac
- Hacking Apps
- Hack Rom Tools
- Pentest Tools Website
- Pentest Box Tools Download
- Hacker Tools Windows
- Pentest Tools Find Subdomains
- How To Hack
- Hack Tools For Ubuntu
- Hacking Tools Usb
- Beginner Hacker Tools
- Hacker Tools For Windows
- Pentest Tools For Windows
- Pentest Tools Nmap
- New Hacker Tools
- Hacks And Tools
- Hack Tools For Games
- Pentest Tools Subdomain
- Hack Tools
- Beginner Hacker Tools
- Pentest Tools Alternative
- Hack And Tools
- Underground Hacker Sites
- How To Install Pentest Tools In Ubuntu
- Pentest Tools For Ubuntu
- Hacker Tools For Windows
- New Hacker Tools
- Pentest Tools List
- Blackhat Hacker Tools
- Nsa Hacker Tools
- Tools Used For Hacking
- Best Pentesting Tools 2018
- Pentest Box Tools Download
- Usb Pentest Tools
- How To Hack
- Hacking Tools Hardware
- Hacker Tools Software
- Best Hacking Tools 2019
- Pentest Tools Android
- Hack Tools For Pc
- Pentest Automation Tools
- Hacking Tools
- Growth Hacker Tools
- Pentest Tools Find Subdomains
- Install Pentest Tools Ubuntu
- Blackhat Hacker Tools
- What Is Hacking Tools
- Pentest Tools Url Fuzzer
- How To Hack
- Nsa Hacker Tools
- Kik Hack Tools
- Hacking Tools Hardware
- Wifi Hacker Tools For Windows
- Hack Website Online Tool
- Hak5 Tools
- Hack Tools Mac
0 comments: on "DNSSEC, From An End-User Perspective, Part 3"
Post a Comment