Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement - IMC '05 2005
DOI: 10.1145/1330107.1330152
|View full text |Cite
|
Sign up to set email alerts
|

Perils of transitive trust in the domain name system

Abstract: The Domain Name System, DNS, is based on nameserver delegations, which introduce complex and subtle dependencies between names and nameservers. In this paper, we present results from a large scale survey of DNS that shows that these dependencies lead to a highly insecure naming system. We report specifically on three aspects of DNS security: the properties of the DNS trusted computing base, the extent and impact of existing vulnerabilities in the DNS infrastructure, and the ease with which attacks against DNS … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
43
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 54 publications
(44 citation statements)
references
References 10 publications
1
43
0
Order By: Relevance
“…Unfortunately [19]), the resulting relationships form a more elaborate trust network, transitively [19]. (c) Finally, nameservers of a domain have implicit relationships with the nameservers of the parent domain, which are trusted by default.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Unfortunately [19]), the resulting relationships form a more elaborate trust network, transitively [19]. (c) Finally, nameservers of a domain have implicit relationships with the nameservers of the parent domain, which are trusted by default.…”
Section: Background and Related Workmentioning
confidence: 99%
“…This snapshot was generated from a study done at Cornell University [19] and contains 166, 771 distinct name servers that contribute towards resolution of 597, 196 distinct domains. Figure 5 shows the CDF of the number of attacks against the authoritative nameservers of the parent domain that the majority-consensus approach can tolerate.…”
Section: A Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Attackers were able to alter DNS messages or even hijack DNS sessions by taking advantage of the lack of cryptography as well as of the small set and non-randomized transaction identities. Even in 2005, after many years of DNS usage, it was found that reliance on poor transitive trust relations can lead, in many cases, to failures-as they occur in different administrative domains than the attacked DNS server [15]. Rendezvous networks should be designed with trust in mind, moreover as we learned from the DNS paradigm, no matter how well-designed a protocol is, its implementation may suffer from security vulnerabilities, therefore a reliable rendezvous network should be fault tolerant.…”
Section: Security Threatsmentioning
confidence: 99%
“…This brittleness may be mitigated against to a certain degree, with backup coordinator nodes, however even in these cases the wider system is reliant upon the existence and performance of a small number of key nodes. Failure at these key points in the network may well cripple wider functionality, at best [45]. These drawbacks lead to the need for a truly decentralised approach to the allocation of resources that does not rely on a central coordinator [23].…”
Section: Decentralised Approachesmentioning
confidence: 99%