KELLEGRAM'S LAIR

My personal guides.


Explaining some terms


In this post I will use certain terms that you might be unfamiliar with, therefore I will first provide a brief explanation with sources.

What is DNS?

DNS stands for Domain Name System and it’s an internet protocol used for translating the human readable URLs (for example www.kellegram.xyz) into computer recognizable IP addresses, that are needed for your devices to find and connect to servers worldwide.

DNS as an area for exploits

There are many ways to attack user’s computers over the web and targeting DNS resolvers is one of them. One such exploit, called DNS spoofing, also known as DNS cache poisoning was used many years ago, but eventually the known methods were patched. Unfortunately many DNS resolvers, especially the ones used by Internet Service Providers did not take all necessary steps to secure their networks and in turn yours.

How is DNS poisoning performed?

The attack is performed by corrupting the DNS data in the DNS resolver’s cache, which in turn causes the name server to return wrong information, for example a different than expected IP address. This can be used to direct your traffic to a different destination, for example an attacker’s server.

So what is the Sad DNS attack?

SAD DNS (Side channel AttackeD DNS) attack is the first weaponizable network side channel attack and it allows the attacker to inject malicious DNS records into a DNS cache. These network side channels are part of all modern operating systems, including Linux, Windows and MacOS. This means that both desktop systems as well as servers using a DNS resolver can be affected.

Addressing SAD DNS


Am I vulnerable?

Probably. A website was created to test whether the DNS provider that you use is vulnerable, here. It also contains a lot of relevant information, including a Q&A which I recommend reading to learn more about this exploit.

As stated on the website:

[…] as long as you are using a vulnerable DNS service (e.g., […]1.1.1.1). Most public resolvers have been checked to be vulnerable. If you are using private DNS services (i.e., those provided by your ISP or your organization), we do not have sufficient data but there is a good chance that it is vulnerable as well.

Can I do something as a user?

Yes. Some of these you really should be doing regardless, but with this attack making a comeback in a new form it becomes even more important to be careful.

  • Do NOT go on HTTP sites. This is best practice regardless of whether SAD DNS existed or not.

    • Always make sure that you are only using websites that are secured via HTTP over TLS/SSL (it’s where a website URL starts with HTTPS instead of HTTP).
    • You can make this easier by installing the HTTPS Everywhere and setting it to Encrypt All Sites Eligible
  • Switch to a DNS provider that has the vulnerabilities patched. (Currently there is no 100% surefire way of knowing what provider is completely safe from the attack).

    • Change it network-wide (This is will depend on your router’s firmware, therefore you will have to find out how it’s done on your particular model if you don’t yet know)
    • Guides on changing your DNS provider per device can be found here:
  • Become your own resolver

You can never trust the companies to fix vulnerabilities on time, or at all for that matter. The safest way to go about this, is to become your own DNS resolver. One such way is to use Unbound. From the official description: “Unbound is a validating, recursive, and caching DNS resolver product from NLnet Labs. It is distributed free of charge in open-source form under the BSD license.”

Guides on setting up Unbound:

Can I do something if I have a private DNS?

Yes. I will keep all known methods of addressing this issue updated here.

  • Rid the side channel
    • Disable outgoing ICMP traffic
    • Randomize ICMP global rate limit (This was patched into linux kernel 5.10 and is being backported to older stable versions)
  • Add more secrets to DNS messages
    • DNSSEC
    • 0x20 encoding
    • DNS cookie
  • Reduce the attack window
    • Reduce the timeout for outstanding queries

Resources