skip to main content
10.5555/1267591.1267609guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Using the domain name system for system break-ins

Published: 05 June 1995 Publication History

Abstract

The DARPA Internet uses the Domain Name System (DNS), a distributed database, to map host names to network addresses, and vice-versa. Using a vulnerability first noticed by P.V. Mockapetris, we demonstrate how the DNS can be abused to subvert system security. We also show what tools are useful to the attacker. Possible defenses against this attack, including one implemented by Berkeley in response to our reports of this problem, are discussed, and the limitations on their applicability are demonstrated.
This paper was written in 1990, and was withheld from publication by the author. The body of the paper is unchanged, even to the extreme of giving the size of the Internet as 200,000 hosts. An epilogue has been added that discusses why it was held back, and why it is now being released.

References

[1]
{Bel89} Steven M. Bellovin. Security problems in the TCP/IP protocol suite. Computer Communications Review, 19(2):32-48, April 1989.]]
[2]
{Bel90} Steven M. Bellovin. Pseudonetwork drivers and virtual networks. In USENIX Conference Proceedings, pages 229-244, Washington, D.C., January 22-26, 1990.]]
[3]
{BM91} Steven M. Bellovin and Michael Merritt. Limitations of the Kerberos authentication system. In USENIX Conference Proceedings, pages 253-267, Dallas, TX, Winter 1991.]]
[4]
{Bry88} B. Bryant. Designing an authentication system: A dialogue in four scenes, February 8, 1988. Draft.]]
[5]
{CDF89} J. Case, C. Davin, and M. Fedor. Simple network management protocol SNMP. Technical Report RFC 1098, Internet Engineering Task Force, April 1989. Obsoletes RFC 1067; Updated by RFC1157.]]
[6]
{EK95} Donald E. Eastlake, 3rd and Charles W. Kaufman. Domain name system protocol security extensions. Internet draft; work in progress, January 2, 1995.]]
[7]
{KN93} J. Kohl and B. Neuman. The kerberos network authentication service (V5). Request for Comments (Experimental) RFC 1510, Internet Engineering Task Force, Sep 1993.]]
[8]
{MNSS87} S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorization system. In Project Athena Technical Plan. MIT, December 1987. Section E.2.1.]]
[9]
{Moc87a} P. Mockapetris. Domain names - concepts and facilities. Request for Comments (Standard) RFC 1034, Internet Engineering Task Force, November 1987. Obsoletes RFC0973; Updated by RFC1101.]]
[10]
{Moc87b} P. Mockapetris. Domain names - implementation and specification. Request for Comments (Standard) RFC 1035, Internet Engineering Task Force, November 1987. Obsoletes RFC0973; Updated by RFC1348.]]
[11]
{Mor85} Robert T. Morris. A weakness in the 4.2BSD Unix TCP/IP software. Computing Science Technical Report 117, AT&T Bell Laboratories, Murray Hill, NJ, February 1985.]]
[12]
{NT94} B. Clifford Neuman and Theodore Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications , 32(9):33-38, September 1994.]]
[13]
{SNS88} Jennifer Steiner, B. Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. In Proc. Winter USENIX Conference , pages 191-202, Dallas, TX, 1988.]]
[14]
{SS93} Christoph L. Schuba and Eugene H. Spafford. Addressing weaknesses in the domain name system protocol. Master's thesis, Purdue University, 1993. Department of Computer Sciences.]]
[15]
{Sto89} Cliff Stoll. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage . Doubleday, New York, 1989.]]
[16]
{Vix95} Paul Vixie. DNS and BIND security issues. In Proceedings of the Fifth Usenix UNIX Security Symposium, Salt Lake City, UT, 1995. To appear.]]

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
SSYM'95: Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
June 1995
204 pages

Sponsors

  • UniForum
  • USENIX Assoc: USENIX Assoc

Publisher

USENIX Association

United States

Publication History

Published: 05 June 1995

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media