Internet-Draft EFAS February 2025
Pan Expires 27 August 2025 [Page]
Workgroup:
dnsop
Internet-Draft:
draft-pan-dnsop-authenticated-subdomain-whitelist-00
Published:
Intended Status:
Informational
Expires:
Author:
L. Pan

Authenticated subdomain whitelist (ASDWL) for second-level domain (SLD)

Abstract

This document describes about an authenticated subdomain whitelist (ASDWL) scheme to mitigate the random subdomain attacks on second-level domain (SLD).

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 27 August 2025.

Table of Contents

1. Background

The DNS random subdomain attack, also referred to as DNS water torture attack or pseudo-random subdomain attack, represents a form of DDoS attack specifically targeting DNS services. The attacker orchestrates huge amounts of bots to send queries to recursive resolvers. These queries are random subdomains under the victim domains, which are not currently cached in recursive resolvers. Consequently, the recursive resolvers must forward these queries to the authoritative servers responsible for the victim domains. This process places a significant burden on both the recursive resolvers and the authoritative servers, potentially leading to service degradation or outright failure.

We describe an authenticated subdomain whitelist (ASDWL) scheme to mitigate DNS random subdomain attacks on second-level domains.

2. Terminology

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].

Basic terms used in this specification are defined in the documents [RFC1034], [RFC1035], [RFC8499].

3. Prepare Private Key and Certificate for ASDWL

The administor of SLD should generate a private key priv_wl used to sign the ASDWL, and issue an end-entity X.509 certificate Cert_wl for the corresponding public key pub_wl used to verify the ASDWL signature.

4. Structure of ASDWL

ASDWL followes the flattened JWS JSON serialization syntax, contains 3 parts: payload, header, and signature.

5. Publish ASDWL

The administor of SLD should define a well-known subdomain '_asdwl.example.com' for the SLD 'example.com' to publish its ASDWL url address (marked as Url_wl).

And configure a DANE TLSA RR and a TXT RR for it.

6. Get ASDWL

When the authoritative server of SLD detects the random subdomain attack, it can attach the TLSA and TXT records of the well-known subdomain '_asdwl.example.com' to the DNS answer section. And then the recursive resolver can get ASDWL of the SLD 'example.com' with the following steps:

7. Recursive Resolver Mitigates Random Subdomain Attacks with ASDWL

Recursive resolver could mitigate random subdomain attacks with ASDWL:

8. Authoritative Server Mitigates Random Subdomain Attacks with ASDWL

Authoritative server could mitigate random subdomain attacks with ASDWL:

9. Security Considerations

Through ASDWL, the authoritative server of SLD can give an explict subdomain list which recursive resolver should make best effort to serve. The recursive resolver to gain the subdomain whitelist directly from the authoritative server of SLD from the Url_wl of ASDWL.

It is compatible with DNSSEC, heuristic rule defense systems, and machine learning random subdomain defense systems [HeavyHitter] [DetectWaterTorture].

If DNSSEC [RFC9364] has been deployed on the SLD 'example.com', then the recursive resolver could make DNSSEC validation on the RRSIGs of TLSA/TXT RRs.

10. References

10.1. Normative References

[RFC1034]
Mockapetris, P., "Domain names - concepts and facilities", STD 13, RFC 1034, DOI 10.17487/RFC1034, , <https://www.rfc-editor.org/info/rfc1034>.
[RFC1035]
Mockapetris, P., "Domain names - implementation and specification", STD 13, RFC 1035, DOI 10.17487/RFC1035, , <https://www.rfc-editor.org/info/rfc1035>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/info/rfc2119>.
[RFC7515]
Jones, M., Bradley, J., and N. Sakimura, "JSON Web Signature (JWS)", RFC 7515, DOI 10.17487/RFC7515, , <https://www.rfc-editor.org/info/rfc7515>.
[RFC8499]
Hoffman, P., Sullivan, A., and K. Fujiwara, "DNS Terminology", RFC 8499, DOI 10.17487/RFC8499, , <https://www.rfc-editor.org/info/rfc8499>.
[RFC9364]
Hoffman, P., "DNS Security Extensions (DNSSEC)", BCP 237, RFC 9364, DOI 10.17487/RFC9364, , <https://www.rfc-editor.org/info/rfc9364>.

10.2. Informative References

[DetectWaterTorture]
Kishimoto, Y. T. T. Y. R. K. M. K. and H., "Detection of the dns water torture attack by analyzing features of the subdomain name", n.d., <Journal of Information Processing, vol. 24, no. 5, pp. 793–801, 2016.>.
[HeavyHitter]
Shagam, S. L. F. Y. A. A. B.-B. E. C. and M., "Mitigating dns random subdomain ddos attacks by distinct heavy hitters sketches", n.d., <in Proceedings of the fifth ACM/IEEE workshop on hot topics in web systems and technologies, 2017, pp. 1–6.>.

Author's Address

Lanlan Pan
Guangdong
China