What Happens When Your DNS Cache Is Poisoned
Within each organization's IT structure, there are normally one or more domain name servers depending on the organization's size. This server's purpose is to translate a domain name into an IP address to order to communicate with resources in the internet. Since each domain name and IP address is unique in nature, there are no two alike so long as they are connected to the internet. As a method to improve the efficiency of the DNS server, each is set up with a cache to store translated information. The principle applied is that if a user enters a certain domain name, it is a likely chance that he will re-visit the site in the future. Hence, the cache serves to speed things up in immediately returning the translation instead of repeating it.
If the DNS software has a flaw or its server is not well managed and left vulnerable to malicious attacks, it is at risk of DNS cache poisoning. What this means is that the server may return an IP address not matching the actual one held by its domain name. As such, when a user types in a domain name, he is redirected to another domain or is left with a message stating that the server cannot be found. This is due to the IP address glitch. If an organization is supported by numerous DNS servers in a parent-child relationship, a compromised parent server puts its child servers at risk.
More often than not, the objective of poisoning the cache is to redirect users from an actual website to a spoof version. Some attackers may go to the extent of recreating near exact replicas of the actual version in order to fool unsuspecting users. Once sensitive and confidential information is captured, users are left in the lurch as their bank account or credit card details are abused. Other forms of malicious intent may include the inducement of users to execute or download computer viruses or worms into their computer systems. Once it penetrates the safety measures of corporate firewalls, these pesky applications then wreck havoc within the organization.
Once DNS cache poisoning is detected, mitigations steps need to be immediately taken. Since most unauthorized access is via unclosed back doors, it is of utmost necessity that system administrators constantly update their computer systems at server and client levels. Trust relationships defined between servers may need to be tightened to eliminate spreading of this wildfire. Although source port randomness with use of cryptography is a great method of prevention, their effectiveness may be wiped up due to the workings of other devices related to network address translation. Flushing the cache of a domain name server is also a mode of getting rid of bad DNS entries.
Category: Network
0 comments