Subverting BIND's SRTT Algorithm - Usenix

19 downloads 183 Views 1MB Size Report
DNS. Resolver. Attacker. DNS Query: What is the IP of ibm.com? DNS server .... Data parsed out of the root's zone file:
Subverting BIND’s SRTT Algorithm Roee Hay IBM

Jonathan Kalechstein

Gabi Nakibly

Technion

National EW Research & Simulation Center

Agenda • Off-path (blind) DNS cache poisoning attacks • BIND’s name server (NS) selection algorithm and previous attacks

• The new attack

Off-Path DNS Cache Poisoning

A Trivial Scenario

DNS Resolver

DNS server

Attacker

A Trivial Scenario

DNS Resolver

DNS server

DNS Query: What is the IP of ibm.com?

Attacker

A Trivial Scenario DNS query: What is the IP of ibm.com?

DNS Resolver

DNS server

Attacker

A Trivial Scenario DNS query: What is the IP of ibm.com?

DNS Resolver

DNS server

Malicious DNS Answer: The IP is 6.6.6.6.

Attacker

A Trivial Scenario DNS query: What is the IP of ibm.com?

DNS Resolver

DNS Answer: The IP is 129.42.60.158.

Malicious DNS Answer: The IP is 6.6.6.6.

DNS server

Attacker

Common Protection Against Off-Path Attacks DNS Query Packet

• Queries • Answers (empty)

UDP

DNS Answer: The IP is 129.42.60.158. • SRC Port • DST Port

• SRC IP address Malicious Answer: • DSTDNS IP address

IP

DNS Resolver

DNS

DNS query: What isis• the what the IP IP of of ibm.com? ibm.com? TXID

The IP is 6.6.6.6.

DNS Randomize server the data

Attacker

Off-path DNS Poisoning: An Actual Attack ibm.com zone NS1

DNS Resolver

NS2

NS3 NS4

Attacker

Off-path DNS Poisoning: An Actual Attack DNS query (DST IP=NS2, TXID=2500, SRC Port = 1200)

DNS Resolver

ibm.com zone NS1 NS2

NS3 NS4

Attacker

Off-path DNS Poisoning: An Actual Attack DNS query (DST IP=NS2, TXID=2500, SRC Port = 1200)

DNS Resolver

ibm.com zone NS1 NS2

NS3 NS4

Malicious spoofed DNS answer (SRC IP=NS2 TXID=2500, DST Port = 1200)

Attacker

Off-path DNS Poisoning: An Actual Attack

DNS Resolver

DNS query (DST IP=NS2, TXID=2500, SRC Port = 1200)

ibm.com zone

DNS answer (SRC IP=NS2, TXID=2500, DST Port = 1200)

NS2

NS1

NS3 NS4

Malicious spoofed DNS answer (SRC IP=NS2 TXID=2500, DST Port = 1200)

Attacker

Motivation • The security of the DNS transaction directly depends on the nonce’s randomness.

DNS Nonce Selected NS Source Port TXID

Motivation • The security of the DNS transaction directly depends on the nonce’s randomness.

DNS Nonce

• The source port and TXID are well studied.

Selected NS Source Port TXID

Motivation • The security of the DNS transaction directly depends on the nonce’s randomness.

DNS Nonce

• The source port and TXID are well studied. • We try to tackle the NS selection. • Derandomizing only the NS selection does not make an off-path attack feasible. It makes existing attacks more efficient, i.e. faster. • It enables on-path (Man-in-the-Middle) attacks if the attacker is on one path between the resolver and the NS, but not on another.

Selected NS Source Port TXID

CDF of the # of NSs (Top-Level Domains only) 1 0.9 0.8 0.7

CDF

0.6 0.5 0.4 0.3 0.2 0.1

0

1

2

3

4

5

6

7

8

9

10

11

# of NSs * Data parsed out of the root’s zone file: http://www.iana.org/domains/root/files

12

13

14

15

16

17

18

19

20

BIND’s NS Selection and Attacks

BIND’s NS Selection: The Smoothed RTT Algorithm • Goal. Choose the most responsive (by Round-Trip Time) NS.

• Problem. RTT changes frequently. • Data structure. A moving average for each NS IP.

• Operations. • • • •

Initialize Update Decay Error

𝑆𝑅𝑇𝑇 ∈ 1,32 𝜇𝑠 𝑆𝑅𝑇𝑇 = 0.7 ⋅ 𝑆𝑅𝑇𝑇𝑜𝑙𝑑 + 0.3 ⋅ 𝑅𝑇𝑇 𝑆𝑅𝑇𝑇 = 0.98 ⋅ 𝑆𝑅𝑇𝑇𝑜𝑙𝑑 𝑆𝑅𝑇𝑇 = min 𝑆𝑅𝑇𝑇𝑜𝑙𝑑 + 200𝑚𝑠, 1𝑠

• Cache. A map keyed only by NS IPs is maintained. • Selection. Candidate NS with lowest SRTT value is queried first.

The SRTT Algorithm: A Potential Vulnerability • The NS selection is derandomized if we can control the SRTT value of the candidates. • Either by: • Increasing all candidates but one • Decreasing the victim NS.

• Since the cache stores all NSs together, maybe we can control it externally by a malicious NS?

Previous Work and our Contribution • [Herzberg & Shulman, 2012] increases the SRTT of all candidates NSs but one by abusing fragmented IP packets.

SRTT ops Initialize Decay

Update Error

Previous Work and our Contribution • [Herzberg & Shulman, 2012] increases the SRTT of all candidates NSs but one by abusing fragmented IP packets. • [Petr, 2009] decreases the SRTT of the victim NS by fast spoofed responses.

SRTT ops Initialize Decay

Update Error

Previous Work and our Contribution • [Herzberg & Shulman, 2012] increases the SRTT of all candidates NSs but one by abusing fragmented IP packets. • [Petr, 2009] decreases the SRTT of the victim NS by fast spoofed responses.

• These attacks are probabilistic.

SRTT ops Initialize Decay

Update Error

Previous Work and our Contribution • [Herzberg & Shulman, 2012] increases the SRTT of all candidates NSs but one by abusing fragmented IP packets. • [Petr, 2009] decreases the SRTT of the victim NS by fast spoofed responses.

• These attacks are probabilistic. • We present a deterministic attack against the Decay and Initialize operations. • Another cool feature: The victim NS does not see our attack.

SRTT ops Initialize Decay

Update Error

The New Attack

General Setting of the Attack

Attacker

The attacker’s control PC

General Setting of the Attack

Attacker

𝐴1

The attacker’s control PC

An attacker’s controlled NS. Authoritative of the a1.foo. domain

General Setting of the Attack

Attacker

The attacker’s control PC

𝐴1

An attacker’s controlled NS. Authoritative of the a1.foo. domain

𝐴2

An attacker’s controlled NS. Authoritative of the a2.foo. domain

General Setting of the Attack ibm.com zone

Attacker

Resolver

V NS

The resolver which we attack

𝐴1

𝐴2

General Setting of the Attack ibm.com zone

Attacker

𝐴1

𝐴2

Resolver

V NS

We lower the SRTT of V on the resolver, thus force it to be selected when resolving ibm.com. The target zone can have an arbitrary amount of authoritative name servers.

General Setting of the Attack ibm.com zone

Attacker

𝐴1

𝐴2

Resolver

V NS

𝑛 non-open NSs which we abuse. Can be anywhere on the Internet. We don’t need to control them.

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

SRTT

OP

V

100000 [U]

NS

90000 [U]

V NS

𝐴1

𝐴2 SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

What is the IP of a2.foo?

Resolver

SRTT

OP

V

100000 [U]

NS

90000 [U]

V NS

𝐴1

𝐴2 SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

What is the IP of a2.foo?

Resolver

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

21

[I]

NS

𝐴1 Next list (SRTT sorted)

𝐴2

𝐴2

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

21

[I]

NS

𝐴1 Next list (SRTT sorted)

𝐴2

𝐴2

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Resolver

Attacker

𝐴1

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

21

[I]

NS

What is the IP of a2.foo?

Next list (SRTT sorted)

𝐴2

𝐴2

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Resolver

Attacker

𝐴1

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

NS

a2.foo is 6.6.6.6.

Next list (SRTT sorted)

𝐴2 SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

a2.foo is 6.6.6.6.

Resolver

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

NS

𝐴1 Next list (SRTT sorted)

𝐴2 SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

What is the IP of attack.a1.foo?

Resolver

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

NS

𝐴1 Next list (SRTT sorted)

𝐴2 SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

What is the IP of attack.a1.foo?

Resolver

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

𝐴1

31

[I]

NS

𝐴1 Next list (SRTT sorted)

𝐴2

𝐴1

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

𝐴1

31

[I]

NS

𝐴1 Next list (SRTT sorted)

𝐴2

𝐴1

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Resolver

Attacker

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

𝐴1

31

[I]

NS

What is the IP of attack.a1.foo?

𝐴1 Next list (SRTT sorted)

𝐴2

𝐴1

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Resolver

Attacker

𝐴1

V

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

𝐴1

78443 [U]

NS

I don’t know ask: 𝐶1 , 𝐶2 , … , 𝐶𝑛 𝐴2 , V

Next list (SRTT sorted)

𝐴2

𝐴1

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Resolver

Attacker

𝐴1

I don’t know ask: 𝐶1 , 𝐶2 , … , 𝐶𝑛 𝐴2 , V

V NS

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

𝐴1

78443 [U]

𝐶1

23

[I]

𝐶2

22

[I]

32

[I]

25

[I]

⋮ 𝐶𝑘 ⋮ 𝐶𝑛

Next list (SRTT sorted)

𝐴2

𝐶2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

V NS

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

𝐴1

78443 [U]

𝐶1

23

[I]

𝐶2

22

[I]

32

[I]

25

[I]



𝐴1

𝐶𝑘 ⋮ 𝐶𝑛

Next list (SRTT sorted)

𝐴2

𝐶2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

V NS

𝐶2 , What is the IP of attack.a1.foo?

𝐴1

SRTT

OP

V

100000 [U]

NS

90000 [U]

𝐴2

10000 [U]

𝐴1

78443 [U]

𝐶1

23

[I]

𝐶2

22

[I]

32

[I]

25

[I]

⋮ 𝐶𝑘 ⋮ 𝐶𝑛

Next list (SRTT sorted)

𝐴2

𝐶2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

Query refused.

𝐴1

V NS

SRTT

OP

V

98000 [D]

NS

90000 [U]

𝐴2

9800 [D]

𝐴1

78443 [U]

𝐶1

22 [D]

𝐶2

84341 [U]

⋮ 𝐶𝑘

31 [D]

⋮ 𝐶𝑛

24 [D]

Next list (SRTT sorted)

𝐴2

𝐶2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

Query refused.

𝐴1

V NS

SRTT

OP

V

98000 [D]

NS

90000 [U]

𝐴2

9800 [D]

𝐴1

78443 [U]

𝐶1

22 [D]

𝐶2

84341 [U]

⋮ 𝐶𝑘

31 [D]

⋮ 𝐶𝑛

24 [D]

Next list (SRTT sorted)

𝐴2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

V NS

SRTT

OP

V

98000 [D]

NS

90000 [U]

𝐴2

9800 [D]

𝐴1

78443 [U]

𝐶1

22 [D]

𝐶2

84341 [U]



𝐴1

𝐶𝑘

31 [D]

⋮ 𝐶𝑛

24 [D]

Next list (SRTT sorted)

𝐴2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

V NS

SRTT

OP

V

98000 [D]

NS

90000 [U]

𝐴2

9800 [D]

𝐴1

78443 [U]

𝐶1

22 [D]

𝐶2

84341 [U]



𝐴1

𝐶𝑘

31 [D]

⋮ 𝐶𝑛

24 [D]

Next list (SRTT sorted)

𝐴2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

V NS

𝐶1 , What is the IP of attack.a1.foo?

𝐴1

SRTT

OP

V

98000 [D]

NS

90000 [U]

𝐴2

9800 [D]

𝐴1

78443 [U]

𝐶1

22 [D]

𝐶2

84341 [U]

⋮ 𝐶𝑘

31 [D]

⋮ 𝐶𝑛

24 [D]

Next list (SRTT sorted)

𝐴2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

Query refused.

𝐴1

V NS

SRTT

OP

V

96040 [D]

NS

90000 [U]

𝐴2

9604 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 𝐶𝑘

30 [D]

⋮ 𝐶𝑛

23 [D]

Next list (SRTT sorted)

𝐴2

𝐶1



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

ibm.com zone

Attacker

Resolver

Query refused.

𝐴1

V NS

SRTT

OP

V

96040 [D]

NS

90000 [U]

𝐴2

9604 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 𝐶𝑘

30 [D]

⋮ 𝐶𝑛

23 [D]

Next list (SRTT sorted)

𝐴2



𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

After 𝑛 − 1 Iterations…

Resolver’s SRTT Cache

The Attack ibm.com zone

Attacker

Resolver

V NS

WHO

SRTT

OP

V

100000 ⋅ 0.98𝑛−1 [D]

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛−1 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]



𝐴1

32 ⋅ 0.98𝑛−1 [D]

𝐶𝑘 ⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack ibm.com zone

Attacker

Resolver

V NS

WHO

SRTT

OP

V

100000 ⋅ 0.98𝑛−1 [D]

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛−1 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]



𝐴1

32 ⋅ 0.98𝑛−1 [D]

𝐶𝑘 ⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack ibm.com zone

Attacker

Resolver

V NS

𝐶𝑘 , What is the IP of attack.a1.foo?

𝐴1

WHO

SRTT

OP

V

100000 ⋅ 0.98𝑛−1 [D]

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛−1 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 32 ⋅ 0.98𝑛−1 [D]

𝐶𝑘 ⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

Attacker

Resolver

Query refused

𝐴1

V NS

OP

100000 ⋅ 0.98𝑛 [D]

V ibm.com zone

SRTT

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

Attacker

Resolver

Query refused

𝐴1

V NS

OP

100000 ⋅ 0.98𝑛 [D]

V ibm.com zone

SRTT

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐶𝑘

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

SRTT

100000 ⋅ 0.98𝑛 [D]

V ibm.com zone

Attacker

Resolver

Query refused

𝐴1

V NS

OP

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

SRTT

100000 ⋅ 0.98𝑛 [D]

V ibm.com zone

Attacker

Resolver

V NS

OP

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]



𝐴1

𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack

WHO

SRTT

100000 ⋅ 0.98𝑛 [D]

V ibm.com zone

Resolver

Attacker

V NS

OP

NS

90000 [U]

𝐴2

10000 ⋅ 0.98𝑛 [D]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]



𝐴1

What is the IP of attack.a1.foo?

𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack ibm.com zone

Resolver

Attacker

V NS

WHO

SRTT

OP

V

100000 ⋅ 0.98𝑛+1 [D]

NS

90000 [U]

𝐴2

12003 [U]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]



𝐴1

attack.a1.foo’s IP is 6.6.6.6.

𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2

𝐴2

V

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack ibm.com zone

Attacker

attack.a1.foo’s IP is 6.6.6.6.

Resolver

V NS

WHO

SRTT

OP

V

100000 ⋅ 0.98𝑛+1 [D]

NS

90000 [U]

𝐴2

12003 [U]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]



𝐴1

𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2 SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Resolver’s SRTT Cache

The Attack ibm.com zone

Attacker

𝐴1

V

Resolver large value of 𝑛, NS the attacked resolver times out (after 30 seconds), so we don’t even need 𝐴2 .

attack.a1.foo’s IP is For a sufficiently 6.6.6.6.

WHO

SRTT

OP

V

100000 ⋅ 0.98𝑛+1 [D]

NS

90000 [U]

𝐴2

12003 [U]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted)

𝐴2 SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

Wrap-up • We lowered the SRTT value of an arbitrary NS to an arbitrary value. • Cool features of the attack: • The attack is deterministic and requires 3 packets only. • We abuse non-open resolvers in contrast to many attacks that abuse open ones. • Recovery is not instant as of the SRTT update operation.

• The general lesson is to separate the cache. Never maintain a shared one.

Resolver’s SRTT Cache WHO

SRTT

OP

V

100000 ⋅ 0.98𝑛+1 [D]

NS

90000 [U]

𝐴2

12003 [U]

𝐴1

78443 [U]

𝐶1

63289 [U]

𝐶2

84341 [U]

⋮ 𝐶𝑘

91203 [U]

⋮ 𝐶𝑛

53248 [U]

Next list (SRTT sorted) V

NS

SRTT Operations [I]nit

[U]date [D]ecay

[E]rror

? Thank you.