论文标题

封闭的解析器项目:测量入站流量的源地址验证的部署

The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic

论文作者

Nosyk, Yevheniya, Korczyński, Maciej, Lone, Qasim, Skwarek, Marcin, Jonglez, Baptiste, Duda, Andrzej

论文摘要

源地址验证(SAV)是一种标准,旨在丢弃带有欺骗源IP地址的数据包。缺少用于传出流量的SAV被称为分布式拒绝服务(DDOS)攻击的根本原因,并受到广泛关注。虽然不太明显,但缺乏入站过滤使攻击者可以作为网络的内部主机出现,并可能揭示有关网络基础结构的宝贵信息。入站IP欺骗可能会放大其他攻击向量,例如DNS缓存中毒或最近发现的NXNSATTACT。在本文中,我们介绍了封闭解析器项目的初步结果,该项目旨在减轻入站IP欺骗问题。我们对IPv4和IPv6地址空间进行过滤或不通过其源地址过滤的源数据包过滤或不过滤传入数据包的网络进行了首次进行互联网范围的主动测量研究。为了实现这一目标,我们确定了封闭和开放的DNS解析器,这些解析器接受来自其网络外部的欺骗请求。提出的方法提供了网络提供商的入站SAV部署的最完整图片。我们的测量值涵盖了超过55%的IPv4和27%的IPv6自主系统(AS),并揭示了其中的绝大多数人完全或部分容易受到入站欺骗的影响。通过识别双堆叠的DNS解析器,我们还表明,IPv6的入站过滤的频率少于IPv4。总体而言,我们发现13.9 K IPv6开放解析器可以利用用于扩增的DDOS攻击 - 是以前的工作的13倍。此外,我们列举发现4.25 m IPv4和103 K IPv6脆弱的封闭解析器,这只能由于我们的欺骗技术才能被检测到,并且与NXNSATTACT结合时构成了重大威胁。

Source Address Validation (SAV) is a standard aimed at discarding packets with spoofed source IP addresses. The absence of SAV for outgoing traffic has been known as a root cause of Distributed Denial-of-Service (DDoS) attacks and received widespread attention. While less obvious, the absence of inbound filtering enables an attacker to appear as an internal host of a network and may reveal valuable information about the network infrastructure. Inbound IP spoofing may amplify other attack vectors such as DNS cache poisoning or the recently discovered NXNSAttack. In this paper, we present the preliminary results of the Closed Resolver Project that aims at mitigating the problem of inbound IP spoofing. We perform the first Internet-wide active measurement study to enumerate networks that filter or do not filter incoming packets by their source address, for both the IPv4 and IPv6 address spaces. To achieve this, we identify closed and open DNS resolvers that accept spoofed requests coming from the outside of their network. The proposed method provides the most complete picture of inbound SAV deployment by network providers. Our measurements cover over 55 % IPv4 and 27 % IPv6 Autonomous Systems (AS) and reveal that the great majority of them are fully or partially vulnerable to inbound spoofing. By identifying dual-stacked DNS resolvers, we additionally show that inbound filtering is less often deployed for IPv6 than it is for IPv4. Overall, we discover 13.9 K IPv6 open resolvers that can be exploited for amplification DDoS attacks - 13 times more than previous work. Furthermore, we enumerate uncover 4.25 M IPv4 and 103 K IPv6 vulnerable closed resolvers that could only be detected thanks to our spoofing technique, and that pose a significant threat when combined with the NXNSAttack.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源