{"id":83920,"date":"2014-04-29T17:53:14","date_gmt":"2014-04-29T14:53:14","guid":{"rendered":"https:\/\/www.technion.ac.il\/blog\/students-reveal-loophole-in-dns-security\/"},"modified":"2014-04-29T17:53:14","modified_gmt":"2014-04-29T14:53:14","slug":"students-reveal-loophole-in-dns-security","status":"publish","type":"post","link":"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/","title":{"rendered":"Students Reveal Loophole in DNS Security"},"content":{"rendered":"

\u00a0<\/b><\/b><\/p>\n

Technion Students Find a Loophole in Security\u00a0in the World’s Most Popular Internet DNS Protocol<\/h2>\n

Following the discovery, algorithms will be replaced in the next software version release<\/h2>\n

Technion students, Roee Hay and Jonathan Kalechstein from the Faculty of Computer Science discovered a new weakness (loophole), which had not been previously documented in the world\u2019s most widely used DNS software \u2013 BIND. \u201cWe were very surprised to find a loophole in the protocol,\u201d said Kalechstein. \u201cWe reported it to the authorities responsible for its implementation, they responded that they were unaware of this problem, and added that they will replace the algorithms in the next software version release.\u201d<\/p>\n

\"\u05e8\u05d5\u05e2\u05d9<\/a>
\u00a0Roee Hay presenting his research project on the day of the competition held by the Faculty of Computer Science at the Technion
Photograph: Shiatzo Photography Services, the Technion\u2019s Spokesperson\u2019s Office<\/figcaption><\/figure>\n

The project was carried out at the Laboratory of Computer Communication & Networking in the Faculty of Computer Science at the Technion, and was led by Dr. Gabi Nakibly from Rafael (Rafael Advanced Defense Systems Ltd.). It won the faculty wide competition, the Amdocs Best Project Contest. In August 2013, the project was publicized at an academic conference on information security \u2018Usenix WOOT,\u2019 held in the US.<\/p>\n

\u201cWe devised an attack on DNS, a protocol that is one of the cornerstones of the Internet, and we identified a weakness in one of its implementations,\u201d explained Roee Hay. \u201cThe DNS protocol has been around for several years and has been investigated by researchers from all over the world. We knew in advance that the chances of finding a loophole in the software would be very small, but we like challenges.\u201d<\/p>\n

DNS (Domain Name System) is one of the most basic Internet protocols. It allows access to a decentralized database enabling computers to translate the names of websites to web addresses (IP addresses).<\/p>\n

\u201cDuring the resolution of name to IP address, DNS servers look for the server storing the corresponding IP address,\u201d explains Dr. Gabi Nakibly. \u201cThe weakness that the students found allows hackers to compel a DNS server to connect with a specific server chosen out of a set of potential servers. If that server is controlled by the attacker, that DNS server \u00a0will receive a false IP address. This type of cyber attack gives hackers an advantage, by causing computers to \u2018talk\u2019 with network stations that they alone control without being able to detect the occurrence of the fraud.\u201d<\/p>\n

\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"

\u00a0 Technion Students Find a Loophole in Security\u00a0in the World’s Most Popular Internet DNS Protocol Following the discovery, algorithms will be replaced in the next software version release Technion students, Roee Hay and Jonathan Kalechstein from the Faculty of Computer Science discovered a new weakness (loophole), which had not been previously documented in the world\u2019s… Continue Reading Students Reveal Loophole in DNS Security<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-83920","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"\nStudents Reveal Loophole in DNS Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Students Reveal Loophole in DNS Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Technion Students Find a Loophole in Security\u00a0in the World’s Most Popular Internet DNS Protocol Following the discovery, algorithms will be replaced in the next software version release Technion students, Roee Hay and Jonathan Kalechstein from the Faculty of Computer Science discovered a new weakness (loophole), which had not been previously documented in the world\u2019s… Continue Reading Students Reveal Loophole in DNS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/\" \/>\n<meta property=\"og:site_name\" content=\"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-29T14:53:14+00:00\" \/>\n<meta name=\"author\" content=\"shlomi ben-oz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"shlomi ben-oz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/\",\"url\":\"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/\",\"name\":\"Students Reveal Loophole in DNS Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\",\"isPartOf\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/#website\"},\"datePublished\":\"2014-04-29T14:53:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home Page\",\"item\":\"https:\/\/www.technion.ac.il\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Students Reveal Loophole in DNS Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#website\",\"url\":\"https:\/\/www.technion.ac.il\/en\/\",\"name\":\"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.technion.ac.il\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320\",\"name\":\"shlomi ben-oz\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g\",\"caption\":\"shlomi ben-oz\"},\"url\":\"https:\/\/www.technion.ac.il\/en\/blog\/author\/ben-ozshlomitechnion-ac-il\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Students Reveal Loophole in DNS Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/","og_locale":"en_US","og_type":"article","og_title":"Students Reveal Loophole in DNS Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","og_description":"\u00a0 Technion Students Find a Loophole in Security\u00a0in the World’s Most Popular Internet DNS Protocol Following the discovery, algorithms will be replaced in the next software version release Technion students, Roee Hay and Jonathan Kalechstein from the Faculty of Computer Science discovered a new weakness (loophole), which had not been previously documented in the world\u2019s… Continue Reading Students Reveal Loophole in DNS Security","og_url":"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/","og_site_name":"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","article_published_time":"2014-04-29T14:53:14+00:00","author":"shlomi ben-oz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"shlomi ben-oz","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/","url":"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/","name":"Students Reveal Loophole in DNS Security - \u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","isPartOf":{"@id":"https:\/\/www.technion.ac.il\/en\/#website"},"datePublished":"2014-04-29T14:53:14+00:00","author":{"@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320"},"breadcrumb":{"@id":"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.technion.ac.il\/en\/blog\/students-reveal-loophole-in-dns-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home Page","item":"https:\/\/www.technion.ac.il\/en\/"},{"@type":"ListItem","position":2,"name":"Students Reveal Loophole in DNS Security"}]},{"@type":"WebSite","@id":"https:\/\/www.technion.ac.il\/en\/#website","url":"https:\/\/www.technion.ac.il\/en\/","name":"\u05d4\u05d8\u05db\u05e0\u05d9\u05d5\u05df-\u05de\u05db\u05d5\u05df \u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9 \u05dc\u05d9\u05e9\u05e8\u05d0\u05dc","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.technion.ac.il\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/d65b78b7a7446bdf9fb69078573b8320","name":"shlomi ben-oz","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.technion.ac.il\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5b97bb3947cb26db7c002c11fa0f50454ced53af5f27e730cc60fec87ae78347?s=96&d=mm&r=g","caption":"shlomi ben-oz"},"url":"https:\/\/www.technion.ac.il\/en\/blog\/author\/ben-ozshlomitechnion-ac-il\/"}]}},"_links":{"self":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts\/83920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/comments?post=83920"}],"version-history":[{"count":0,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/posts\/83920\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/media?parent=83920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/categories?post=83920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.technion.ac.il\/en\/wp-json\/wp\/v2\/tags?post=83920"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}