NEW: Unlock the Future of Finance with CRYPTO ENDEVR - Explore, Invest, and Prosper in Crypto!
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms
No Result
View All Result
Crypto Endevr
No Result
View All Result

KeyTrap DNSSEC: The day the internet (almost) stood still

KeyTrap DNSSEC: The day the internet (almost) stood still
Share on FacebookShare on Twitter

KeyTrap: A DNSSEC Vulnerability Affecting DNS Resolvers

Understanding the Issue

KeyTrap attacks exploit algorithmic complexity, for example, in validating signatures against DNSSEC keys, to tie up resources and stop resolvers from handling valid requests.

The Impact

A single 100-byte DNS request can cause a resolver to cease responding for between two minutes and 16 hours, depending on the implementation. Because the vulnerability exploited features of the DNSSEC standard designed to support functions such as key rollover and algorithm rollover, all implementations were vulnerable.

Resolving the Issue

Researchers Elias Heftrig and Niklas Vogel, part of the four-person ATHENE team, explained during their talk at Black Hat the roots of the problem and how it was resolved through a month-long confidential disclosure process. They worked with vendors and operators, including ISC (BIND), Google, Cloudflare, and Akamai, to develop mitigations and patches, which were rolled out in February 2024.

Mitigations and Patches

The researchers and vendors collaborated to develop and implement various mitigations and patches to address the issue. These measures included:

  • Implementing rate limiting to prevent resource exhaustion
  • Improving cache efficiency to reduce the load on resolvers
  • Enhancing error handling to prevent resource exhaustion

Conclusion

The KeyTrap vulnerability highlights the importance of continued vigilance and collaboration in maintaining the security of critical infrastructure. The successful mitigation and patching of this issue demonstrate the effectiveness of responsible disclosure and the importance of working together to address complex technical challenges.

FAQs

  • What is KeyTrap? KeyTrap is a DNSSEC vulnerability that exploits algorithmic complexity to tie up resources and stop resolvers from handling valid requests.
  • How does KeyTrap work? KeyTrap attacks exploit features of the DNSSEC standard designed to support functions such as key rollover and algorithm rollover, causing resolvers to cease responding for extended periods.
  • How was the issue resolved? The issue was resolved through a month-long confidential disclosure process, involving researchers, vendors, and operators, which led to the development and implementation of mitigations and patches.
  • What was the impact of the issue? A single 100-byte DNS request could cause a resolver to cease responding for between two minutes and 16 hours, depending on the implementation.
cryptoendevr

cryptoendevr

Related Stories

Cisco warns of critical API vulnerabilities in ISE and ISE-PIC

Cisco warns of critical API vulnerabilities in ISE and ISE-PIC

June 28, 2025
0

Rewrite the Furthermore, the vulnerabilities are not dependent on one another, Cisco stresses in its advisory. Exploitation of one of...

Don’t trust that email: It could be from a hacker using your printer to scam you

Don’t trust that email: It could be from a hacker using your printer to scam you

June 28, 2025
0

Rewrite the In the campaign observed by Varonis’ forensics experts, the attacker used PowerShell to send emails that were designed...

What does the next era of AI fraud hold?

What does the next era of AI fraud hold?

June 28, 2025
0

Rewrite the We are at an interesting inflection point with AI as new opportunities start to take shape, with life-saving...

Was CISOs von Moschusochsen lernen können

Was CISOs von Moschusochsen lernen können

June 28, 2025
0

Rewrite the Das ist die Essenz dessen, was ich als “Moschusochsenstrategie” bezeichne. Der Hintergrund: Werden Moschusochsen von Wölfen angegriffen, bildet...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Are You Thinking or Doing? 🧠

Are You Thinking or Doing? 🧠

June 28, 2025
Don’t trust that email: It could be from a hacker using your printer to scam you

Don’t trust that email: It could be from a hacker using your printer to scam you

June 28, 2025
Billions in corporate buys can’t budge Bitcoin—5 reasons the BTC price won’t move

Billions in corporate buys can’t budge Bitcoin—5 reasons the BTC price won’t move

June 28, 2025
Ethereum ‘Death Cross’ Flashes For The First Time Since 2022 ETH Price Sell-off

Ethereum ‘Death Cross’ Flashes For The First Time Since 2022 ETH Price Sell-off

June 28, 2025
Bybit Ethereum Heist Propels Record .1 Billion in Crypto Stolen by Hackers So Far in 2025

Bybit Ethereum Heist Propels Record $2.1 Billion in Crypto Stolen by Hackers So Far in 2025

June 28, 2025

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

CRYPTO ENDEVR

About Us

Crypto Endevr aims to simplify the vast world of cryptocurrencies and blockchain technology for our readers by curating the most relevant and insightful articles from around the web. Whether you’re a seasoned investor or new to the crypto scene, our mission is to deliver a streamlined feed of news and analysis that keeps you informed and ahead of the curve.

Links

Home
Privacy Policy
Terms and Services

Resources

Glossary

Other

About Us
Contact Us

Our Newsletter

Join TOKENS for a quick weekly digest of the best in crypto news, projects, posts, and videos for crypto knowledge and wisdom.

© Copyright 2024. All Right Reserved By Crypto Endevr.

No Result
View All Result
  • Top Stories
    • Latest News
    • Trending
    • Editor’s Picks
  • Media
    • YouTube Videos
      • Interviews
      • Tutorials
      • Market Analysis
    • Podcasts
      • Latest Episodes
      • Featured Podcasts
      • Guest Speakers
  • Insights
    • Tokens Talk
      • Community Discussions
      • Guest Posts
      • Opinion Pieces
    • Artificial Intelligence
      • AI in Blockchain
      • AI Security
      • AI Trading Bots
  • Learn
    • Projects
      • Ethereum
      • Solana
      • SUI
      • Memecoins
    • Educational
      • Beginner Guides
      • Advanced Strategies
      • Glossary Terms

Copyright © 2024. All Right Reserved By Crypto Endevr