Security Vulnerability: SADDNS attack (CVE-2020-25705)
This document (000019786) is provided subject to the disclaimer at the end of this document.
SUSE Linux Enterprise Server 12
As DNS is UDP based, it is open to malicious package injection attacks, and various have been identified over time.
The DNSSSEC enhancement would fix the package injection attacks using cryptographic integrity protection, but is not yet widely deployed.
When using traditional DNS there have been 2 primary mitigations against this kind of poisoning been added:
- randomization of the transaction ID (a 16 bit identity in every DNS packet)
- randomization of the UDP port sending/receiving the replies (another 16 bit entity)
The researchers have now shown that the current Linux kernels have a side-channel attack using predictable ICMP port-unreachable replies on non-open UDP ports, like e.g. DNS reply ports, which allows attackers to remotely detect the open ports.
This again reduce the attack surface to 16 bit space, making DNS cache poisoning attacks again possible.
To restore the mitigation the solution is to remove this side channel attack from the Linux kernel.
SUSE is also releasing kernel updates that removes the side-channel attack from the ICMP replies.
- Filter out "icmp type port-unreachable" messages on ipv4 and ipv6 via the firewall on your resolver host.
iptables -A OUTPUT -p icmp --icmp-type port-unreachable -j DROP ip6tables -A OUTPUT -p ipv6-icmp --icmp-type port-unreachable -j DROPThis might however restrict network functionality.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000019786
- Creation Date: 16-Nov-2020
- Modified Date:16-Nov-2020
- SUSE Linux Enterprise Server
For questions or concerns with the SUSE Knowledgebase please contact: firstname.lastname@example.org