Cryptology ePrint Archive: Report 2010/115
A Security Evaluation of DNSSEC with NSEC3
Jason Bau, and John C Mitchell
Abstract: Domain Name System Security Extensions (DNSSEC) and
Hashed Authenticated Denial of Existence (NSEC3) are
slated for adoption by important parts of the DNS hierarchy,
including the root zone, as a solution to vulnerabilities
such as ”cache-poisoning” attacks. We study the security
goals and operation of DNSSEC/NSEC3 using Murphi,
a finite-state enumeration tool, to analyze security properties
that may be relevant to various deployment scenarios.
Our systematic study reveals several subtleties and potential
pitfalls that can be avoided by proper configuration
choices, including resource records that may remain valid
after the expiration of relevant signatures and potential insertion
of forged names into a DNSSEC-enabled domain
via the opt-out option. We demonstrate the exploitability
of DNSSEC opt-out options in an enterprise setting by constructing
a browser cookie-stealing attack on a laboratory
domain. Under recommended configuration settings, further
Murphi model checking finds no vulnerabilities within
our threat model, suggesting that DNSSEC with NSEC3
provides significant security benefits.
Category / Keywords: applications / Domain Name System (DNS)
Publication Info: Revised and corrected version of conference paper in Network and Distributed Systems Security (NDSS) 2010
Date: received 2 Mar 2010
Contact author: mitchell at cs stanford edu
Available format(s): PDF | BibTeX Citation
Version: 20100304:141700 (All versions of this report)
Short URL: ia.cr/2010/115
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]