DNS Security: Protecting Yourself from DNS Attacks

February 18, 2024

DNS was created in the 1980s when the internet was a friendly place. Security wasn't really a concern. Unfortunately, attackers have found plenty of ways to exploit this.

Common DNS Attacks

DNS Spoofing/Cache Poisoning

An attacker tricks a DNS server into storing fake records. When you try to visit your bank's website, you get sent to a lookalike site that steals your credentials. Scary stuff.

DNS Hijacking

Your DNS queries get redirected to a malicious server. This can happen through malware on your computer, a compromised router, or even a rogue ISP.

DDoS Attacks

Attackers flood DNS servers with traffic, making websites unreachable. Some attacks use DNS amplification, where small queries generate huge responses.

DNS Tunneling

Attackers hide malicious traffic inside DNS queries to bypass firewalls. Since DNS traffic is usually allowed through, it's a sneaky way to exfiltrate data.

How to Protect Yourself

Use DNSSEC

DNSSEC adds digital signatures to DNS records, making it much harder to forge responses. Not all domains support it yet, but adoption is growing.

Choose a Secure DNS Provider

Public DNS services like Cloudflare (1.1.1.1) and Google (8.8.8.8) have strong security measures. They also support DNS over HTTPS (DoH) and DNS over TLS (DoT) for encrypted queries.

Keep Your Router Secure

Change default passwords, update firmware regularly, and disable remote management if you don't need it.

Monitor Your DNS Traffic

Unusual DNS patterns can indicate malware or data exfiltration. Enterprise tools can help detect anomalies.

Enable DNS Filtering

Services like OpenDNS or Quad9 block known malicious domains automatically.

The internet has gotten a lot more hostile since DNS was invented. Taking these precautions helps keep you safe.