FINDING · DEFENSE

Without DNSSEC, Hold-On can be defeated by a sophisticated censor that crafts injected packets with TTL and timing matching the expected legitimate reply, injecting just before its predicted arrival. When combined with DNSSEC, Hold-On is robust even against this attack because the censor cannot forge a valid DNSSEC signature; injection can still cause a denial-of-service by forcing a 'Bogus' result, but Hold-On prevents that by waiting for the legitimate validating reply.

From 2012-duan-hold-onHold-On: Protecting Against On-Path DNS Poisoning · §VI · 2012 · Securing and Trusting Internet Names

Implications

Tags

techniques
dns-poisoningpacket-injection

Extracted by claude-sonnet-4-6 — review before relying.