DNSBomb: A New, Practical, and Powerful Pulsing DoS Attack Exploiting DNS Queries and Responses

The digital landscape is rapidly evolving, bringing both unprecedented opportunities and new threats. Among the most concerning of these threats is the Distributed Denial of Service (DDoS) attack, particularly a novel variant known as DNSBomb discovered by researchers from the Tsinghua University in Beijing, China. This powerful and practical pulsing DoS attack exploits DNS queries and responses, transforming beneficial DNS mechanisms into malicious vectors.

Understanding DNSBomb

DNS (Domain Name System) employs various mechanisms to ensure availability, security, and reliability. However, the inherent features such as timeout, query aggregation, and response fast-returning can be exploited maliciously. DNSBomb leverages these mechanisms to accumulate DNS queries sent at a low rate, amplify them into large-sized responses, and then concentrate all responses into a short, high-volume periodic burst. This overwhelming pulse can simultaneously cripple target systems, causing complete packet loss or severe service degradation across different connection types, including TCP, UDP, and QUIC.

Extensive Evaluation and Findings

Researchers conducted an extensive evaluation of DNSBomb on 10 mainstream DNS software, 46 public DNS services, and approximately 1.8 million open DNS resolvers. The results were alarming:

  • All DNS resolvers tested were susceptible to DNSBomb, capable of conducting more powerful attacks than previous pulsing DoS attacks.
  • Small-scale experiments showed peak pulse magnitudes approaching 8.7Gb/s, with a bandwidth amplification factor exceeding 20,000x.
  • Controlled attacks resulted in complete packet loss or significant service degradation on both stateless and stateful connections.

These findings underscore the potential for DNSBomb to cause widespread disruption to internet services globally.

Mitigation and Industry Response

In response to these findings, researchers proposed effective mitigation solutions and responsibly reported them to all affected vendors. To date, 24 vendors, including BIND, Unbound, PowerDNS, and Knot, have acknowledged the issue and are actively patching their software using the provided solutions. Additionally, 10 CVE-IDs have been assigned to address the vulnerabilities exploited by DNSBomb:

The industry-wide response highlights the importance of collaboration and proactive measures in cybersecurity. Vendors like Knot, Simple DNS Plus, Technitium, MaraDNS, Dnsmasq, CoreDNS, and SDNS are all part of this collective effort to mitigate the DNSBomb threat.

Broader Implications and Call to Action

The discovery of DNSBomb extends beyond DNS systems. Any system or mechanism capable of aggregating “things,” such as Content Delivery Networks (CDNs), could potentially be exploited to construct pulsing traffic. The researchers, along with cybersecurity firms, emphasize the need for ongoing investigation and the development of robust mitigation strategies. The findings highlight the importance of understanding and securing the foundational mechanisms of the internet to prevent such disruptive attacks.

Conclusion

As the digital landscape continues to evolve, so do the threats that challenge its stability. The DNSBomb attack serves as a stark reminder of the need for continuous collaboration and innovation in cybersecurity services. By understanding and addressing these threats proactively, cybersecurity companies and consultants can safeguard the infrastructure that underpins our digital world.