DNS Cache Poisoning: What You Need to Know

Understanding DNS Cache Poisoning
DNS cache poisoning, frequently referred to as DNS spoofing, represents a malicious attack targeting weaknesses within the domain name system (DNS). This attack redirects internet traffic from authentic servers to fraudulent destinations.
How DNS Poisoning Works
The core mechanism involves corrupting the data stored in a DNS server's cache with incorrect information. This manipulation causes the server to resolve domain names to the attacker’s specified IP addresses.
A significant danger of DNS poisoning lies in its potential for propagation. The corrupted data can cascade from one DNS server to another, amplifying the impact of the attack.
A Notable Incident: The Great Firewall of China
In 2010, a prominent DNS poisoning incident had far-reaching consequences. The event caused the Great Firewall of China to briefly extend its censorship capabilities beyond China’s geographical boundaries.
Specifically, internet users in the USA experienced temporary censorship as a result of the poisoned DNS records. The issue was ultimately resolved, restoring normal internet access.
This incident underscores the potential for DNS attacks to disrupt internet functionality and even impact geopolitical boundaries.
Understanding the Function of DNS
When a domain name, such as "google.com," is entered into a computer, the system initiates contact with its designated DNS server. This server then provides the corresponding IP address, or a series of them, which allows the computer to locate and connect to the website. Essentially, the computer establishes a direct connection using this numerical address.
The primary role of DNS is to translate easily remembered domain names – like "google.com" – into the numerical IP addresses computers use, for example, "173.194.67.102". This conversion is fundamental to internet navigation.
- Further Information: HTG Explains: What is DNS?
DNS functions as a crucial intermediary, bridging the gap between human-friendly names and machine-level addresses.

The image illustrates a concept related to DNS security, highlighting potential vulnerabilities.
The Process in Detail
Instead of users needing to remember complex numerical sequences, DNS allows for the use of intuitive domain names. This simplifies the process of accessing online resources significantly.
The DNS server acts as a directory, efficiently mapping names to addresses. Without this system, navigating the internet would be considerably more difficult.
DNS Caching
A single, centralized DNS server for the entire Internet would be impractical and slow. Instead, a hierarchical system is employed, leveraging caching at multiple levels to improve efficiency.
Internet Service Providers (ISPs) operate their own DNS servers, storing frequently accessed DNS records. This reduces the need to constantly query upstream servers.
Home routers also act as DNS servers, caching information obtained from the ISP’s DNS infrastructure. This further speeds up DNS resolution for devices on the local network.
Finally, individual computers maintain a local DNS cache. This allows for rapid retrieval of DNS lookups that have already been completed, avoiding redundant queries.
How DNS Caching Works
When your computer needs to access a website, it first checks its local DNS cache. If the information isn’t found, it queries the router’s DNS server.
If the router doesn’t have the record, it contacts the ISP’s DNS server. The ISP, in turn, may consult other DNS servers until the correct IP address is located.
Once the IP address is found, it’s stored in the caches of each server along the path – your computer, router, and ISP – for a specified period, known as the Time To Live (TTL).
Caching significantly reduces latency and network traffic, resulting in faster website loading times.
DNS Cache Poisoning
Incorrect data within a DNS cache constitutes a DNS cache poisoning vulnerability. This occurs when malicious data is introduced, leading to inaccurate resolution of domain names.
Consider a scenario where an attacker gains unauthorized access to a DNS server. They could then manipulate records, such as redirecting requests for google.com to an IP address controlled by the attacker.
Consequently, users querying this compromised DNS server would be directed to the attacker’s site, potentially a phishing website designed to steal credentials or distribute malware.
How DNS Poisoning Spreads
The impact of DNS poisoning isn't limited to the initially compromised server. The incorrect information can propagate across the internet.
If multiple Internet Service Providers (ISPs) rely on the poisoned server for DNS information, the flawed entry will be replicated within their systems and cached.
This propagation extends further, affecting home routers and individual computer DNS caches as they perform lookups, receive the false response, and store it locally.
Ultimately, a widespread DNS poisoning attack can redirect a significant number of users to malicious destinations.
The process involves a cycle of incorrect information being disseminated and cached, amplifying the reach of the attack.
The Expansion of China's Internet Control MeasuresThe possibility of internet censorship extending beyond China’s borders is not merely hypothetical; a significant incident has already demonstrated this potential. A key mechanism employed by China’s Great Firewall involves blocking access at the Domain Name System (DNS) level.
Websites prohibited within China, such as twitter.com, can have their DNS records deliberately redirected to an incorrect address when queried through Chinese DNS servers. Consequently, standard access to these sites becomes impossible. This can be understood as a deliberate contamination of DNS server caches by China.
A Real-World Incident in 2010
In 2010, a DNS misconfiguration at an Internet service provider (ISP) located outside of China triggered a widespread issue. The ISP inadvertently began retrieving DNS information from servers within China.
This resulted in the caching of inaccurate DNS records on the ISP’s own servers. Subsequently, other ISPs obtained DNS data from this compromised source and propagated the incorrect information further.
The propagation of these poisoned DNS entries continued until a portion of users in the United States experienced blocked access to popular platforms like Twitter, Facebook, and YouTube, despite utilizing American ISPs.
Effectively, the Great Firewall of China extended its reach beyond national boundaries, restricting access for individuals outside of China. This event constituted a large-scale DNS poisoning attack. (Source.)
- DNS poisoning occurs when incorrect DNS records are introduced into a DNS server's cache.
- This can lead to users being redirected to malicious or blocked websites.
- The 2010 incident demonstrates how such poisoning can have international consequences.
The incident highlights the interconnected nature of the internet and the potential for censorship mechanisms to inadvertently affect users globally.
Addressing the Core Issue
A fundamental challenge with DNS cache poisoning stems from the inherent difficulty in verifying the authenticity of DNS responses. It’s often impossible to definitively ascertain whether received data is genuine or has been maliciously altered.
The enduring resolution to this vulnerability lies in the implementation of DNSSEC. This protocol enables organizations to cryptographically sign their DNS records, leveraging public-key cryptography.
This signing process provides a mechanism for computers to validate the trustworthiness of DNS records, effectively identifying and rejecting poisoned data that attempts to redirect users to unintended destinations.
Further Exploration
- For a deeper understanding, consider exploring: How DNSSEC Will Help Secure the Internet and How SOPA Almost Made It Illegal.
Image attribution: Andrew Kuznetsov (Flickr), Jemimus (Flickr), NASA.