论文标题

Geofence中的孔:“智能” DNS服务中的隐私漏洞

Holes in the Geofence: Privacy Vulnerabilities in "Smart" DNS Services

论文作者

Fainchtein, Rahel A., Aviv, Adam J., Sherr, Micah, Ribaudo, Stephen, Khullar, Armaan

论文摘要

Smart DNS(SDNS)服务在通常无法访问“ Geofenced”内容(通常是Netflix或Hulu之类的视频流网站)中,除非客户在规定的地理区域内,否则通常无法访问。 SDN易于使用,并且不涉及软件安装。相反,它仅需要用户修改其DNS设置,以指向SDNS解析器。 SDN解析器“明智地”标识了地理域,并代替其适当的DNS分辨率,返回了位于Geofence内的代理服务器的IP地址。然后,这些服务器在用户及其预期目的地之间透明地替代流量,从而绕过这些地理限制。 本文介绍了SDNS服务的首次学术研究。我们确定了许多严重而普遍的隐私漏洞,这些漏洞暴露了有关这些系统用户的信息。这些包括建筑弱点,使内容提供商能够确定哪些请求客户使用SDN。更糟糕的是,我们确定了一些SDN服务的设计缺陷,这些SDN服务允许{\ em Any}任意第三方列举这些服务的用户(通过IP地址),即使所述用户当前处于离线状态。我们为至少一个SDNS提供商采用的这些攻击提出了缓解策略,以回应我们的发现。

Smart DNS (SDNS) services advertise access to "geofenced" content (typically, video streaming sites such as Netflix or Hulu) that is normally inaccessible unless the client is within a prescribed geographic region. SDNS is simple to use and involves no software installation. Instead, it requires only that users modify their DNS settings to point to an SDNS resolver. The SDNS resolver "smartly" identifies geofenced domains and, in lieu of their proper DNS resolutions, returns IP addresses of proxy servers located within the geofence. These servers then transparently proxy traffic between the users and their intended destinations, allowing for the bypass of these geographic restrictions. This paper presents the first academic study of SDNS services. We identify a number of serious and pervasive privacy vulnerabilities that expose information about the users of these systems. These include architectural weaknesses that enable content providers to identify which requesting clients use SDNS. Worse, we identify flaws in the design of some SDNS services that allow {\em any} arbitrary third party to enumerate these services' users (by IP address), even if said users are currently offline. We present mitigation strategies to these attacks that have been adopted by at least one SDNS provider in response to our findings.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源