|
|||||||||||||||||||||||||
|
|||||||||||||||||||||||||
|
New Survey Reveals More Than 75 Percent of Authoritative Name Servers Have an Increased Vulnerability to DNS Pharming AttacksThe survey also revealed that over 40 percent of the name servers investigated provide zone transfers to arbitrary queriers October 27, 2005; 12:56 PM SUNNYVALE, Calif., Oct. 24, 2005 — The Measurement Factory, experts in performance testing and protocol compliance, and Infoblox Inc., a developer of essential infrastructure for identity-driven networks, today announced results of a survey of more than 1.3 million Internet-connected, authoritative domain name system (DNS) servers around the globe. The results of the survey, available at The Measurement Factory website (http://dns.measurement-factory.com/surveys/sum1.html), indicate that as many as 84 percent of Internet name servers could be vulnerable to pharming attacks, and that many exhibit other security and deployment-related vulnerabilities. DNS servers are essential network infrastructure that map names (e.g., yahoo.com) to IP addresses (e.g., 66.94.234.13), directing Internet inquiries to the appropriate location. Simply put, domain name resolution conducted by these servers is required to perform any Internet-related request. Should an enterprise or organization’s DNS systems fail, all Internet functions, like email and Web access, simply will not be available. The survey – conducted by The Measurement Factory and sponsored by Infoblox – consisted of a number of queries carefully designed to determine the relative vulnerability of each name server to attacks or failures due to security or configuration, which can jeopardize network availability. Survey Results Expose Widespread Vulnerabilities The most surprising result of the survey showed that between 75 and 84 percent of the name servers investigated provide recursive name services to arbitrary queriers on the Internet. Industry best practices dictate that recursive name services – a form of name resolution that may require a name server to relay requests to other name servers – should only be enabled on a DNS server for a restricted list of known, trusted requestors. Providing recursion to arbitrary IP addresses on the Internet exposes a name server to both cache poisoning and denial of service attacks. For example, the recent spate of “pharming” attacks exploit name servers that allow recursive queries from any IP address. The survey also revealed that over 40 percent of the name servers investigated provide zone transfers to arbitrary queriers. Like recursive name services, zone transfers, which copy an entire segment of an organization’s DNS data from one DNS server to another, should only be allowed for a designated list of trusted, authorized hosts, such as secondary name servers. Offering zone transfers to any requestor exposes a name server to denial of service attacks. The survey also showed that almost one-third of the name servers that have been set up to provide redundancy for authoritative data are configured on the same IP network segment. As a result, a successful denial-of-service attack on a single network segment or a failure of a limited portion of the customer’s network can result in a loss of authoritative name resolution service, eliminating the intended benefit of installing multiple, redundant DNS servers. Cricket Liu, vice president of architecture at Infoblox and author of O’Reilly & Associates’ DNS and BIND, DNS & BIND Cookbook, and DNS On Windows Server 2003, commented, “Given what enterprises are risking – the availability of all of their network services – these results are frightening, especially since there are easy ways to address these issues.” Remedies to Address DNS Vulnerabilities
To view more helpful tools for DNS Best Practices, visit: To view the complete survey results, visit: About Infoblox About The Measurement Factory
|
|
Related Press Releases and Features | |
|
|
Copyright © 1998 - 2018 DevStart, Inc. All Rights Reserved |