L4. Compare recursive and iterative DNS resolvers. What are security challenges in DNS? Flashcards

1
Q

What is a DNS resolver?

A

A specific type of DNS server responsible for translating domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a recursive DNS resolver?

A

A DNS resolver that handles the whole DNS resolution process for the client. The resolver collects all the necessary information and sends back a complete response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an iterative DNS resolver?

A

A DNS resolver that handles only the initial DNS query. It provides the next step rather than the complete answer, requiring the client to follow a chain of referrals to DNS servers to get the final answer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the recursive DNS resolution process?

A
  1. Client (e.g., a web browser) queries a recursive resolver
  2. The recursive resolver queries multiple DNS servers on behalf of the client, starting with the root DNS servers, then proceeds to TLD (Top-Level Domain) servers, and finally to the authoritative servers for the domain in question.
  3. The resolver collects all the necessary information and sends a complete response back to the client.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the iterative DNS resolution process?

A
  1. The client queries an iterative resolver
  2. The resolver provides partial information, directing the client to other DNS servers.
  3. The client queries each DNS server sequentially. For instance, it starts with the root server, which points to a TLD server, and then queries the TLD server, which points to an authoritative server.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are advantages and disadvantages of recursive DNS resolvers?

A

Advantages: simplicity and caching.

Clients do not need to handle the complexity of querying multiple servers. Recursive resolvers often cache responses, reducing latency for repeated queries and decreasing the load on DNS infrastructure.

Disadvantages: overhead and bottlenecks.

The resolver handles the entire query process, which can be resource-intensive. A high load on recursive resolvers can become a bottleneck, impacting response times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are advantages and disadvantages of iterative DNS resolvers?

A

Advantages: reduced load on resolvers and client control.

Each server only needs to provide partial information, distributing the load. Clients have more control over the query process, which can be advantageous in certain scenarios.

Disadvantages: complexity and increased latency.

Clients must handle multiple queries and manage the state of the ongoing resolution process. The overall resolution process may take longer due to multiple round trips between the client and various DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are security challenges in DNS?

A

Spoofing, tunneling, DDoS attacks, MitM attacks, amplification attacks, registrar hijacking, typosquatting and homograph attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is DNS spoofing?

A

When attackers insert false information into the cache of a recursive resolver, redirecting users to malicious sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can spoofing be mitigated?

A

DNSSEC (Domain Name System Security Extensions) provides data origin authentication and data integrity to protect against spoofing attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DNS tunneling?

A

When attackers encapsulate other protocols within DNS queries and responses to bypass security measures and exfiltrate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are DDoS attacks?

A

Distributed Denial of Service Attacks: Attackers overwhelm DNS servers with a high volume of queries, causing service disruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can DNS tunneling be mitigated?

A

Monitoring and filtering DNS traffic, using DNS firewalls, and anomaly detection systems can help detect and block tunneling activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can DDoS attacks be mitigated?

A

Using redundant DNS infrastructure, anycast routing, and DDoS mitigation services can help absorb and deflect attack traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are MitM attacks?

A

Man-in-the-Middle Attacks: Attackers intercept and potentially alter DNS queries and responses between clients and DNS servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can MitM attacks be mitigated?

A

Using DNS over HTTPS (DoH) or DNS over TLS (DoT) encrypts DNS queries and responses, protecting them from interception and tampering.

17
Q

What are DNS amplification attacks?

A

When attackers exploit the amplification effect of DNS queries to generate large volumes of traffic, overwhelming the target network.

18
Q

How can DNS amplification attacks be mitigated?

A

Implementing response rate limiting (RRL) on DNS servers can help reduce the impact of amplification attacks.

19
Q

What is registrar hijacking?

A

When attackers gain unauthorized access to domain registration accounts to modify DNS settings, redirecting traffic or taking domains offline.

20
Q

How can registrar hijacking be mitigated?

A

Using strong authentication mechanisms, such as multi-factor authentication (MFA), and monitoring account activity can help protect against hijacking.

21
Q

What is typosquatting and homograph attacks?

A

When attackers register domain names that are similar to legitimate ones (e.g., using visually similar characters) to deceive users.

22
Q

How can typosquatting and homograph attacks be mitigated?

A

User education, browser defenses, and domain registration policies can help reduce the effectiveness of these attacks.