Speaker
Description
While DNS is often exploited for reflective DoS attacks, it can also be turned into a powerful amplifier to overload itself. We refer to this emerging type of attacks as "self-amplification". They enable an attacker to overwhelm a victim DNS server using substantially fewer requests than conventional attacks. The possibilities of such vulnerabilities have been long predicted by the designers of DNS, but their surprising complexity and full potential has just become prominent. In this talk, we'll present a taxonomy of amplification primitives intrinsic to DNS and explain how they can be systematically composed to produce multiplicative amplification effects, which lead to a large family of compositional amplification (CAMP) vulnerabilities. This holistic view will hopefully help developers and operators understand and mitigate self-amplification vulnerabilities in fundamental ways.
Talk duration | 10 Minutes (+discussion panel time) |
---|