{"id":6100,"date":"2024-02-17T17:51:32","date_gmt":"2024-02-17T12:21:32","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=6100"},"modified":"2024-02-24T18:47:23","modified_gmt":"2024-02-24T13:17:23","slug":"dns-keytrap-vulnerability","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/","title":{"rendered":"DNS KeyTrap vulnerability"},"content":{"rendered":"\n<p>DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC (DNS Security Extensions). A single DNS packet can exhaust the CPU, causing a Denial of Service in a DNSSEC validating recursive resolver.<\/p>\n\n\n\n<p>Security researchers at the&nbsp;<a href=\"https:\/\/www.athene-center.de\/en\/news\/press\/key-trap\" target=\"_blank\" rel=\"noreferrer noopener\">German National Research Center for Applied Cybersecurity ATHENE<\/a>&nbsp;uncovered the critical flaw, which has been assigned and listed as&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-50387\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-50387<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-50868\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-50868<\/a> <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the risks and impacts of DNS KeyTrap vulnerability?<\/h2>\n\n\n\n<p>For an enterprise or an ISP operating a validating DNSSEC recursive resolver, the impact of the vulnerability will be catastrophic.<\/p>\n\n\n\n<p>Since the exploit would result in a spike and exhaustion of CPU, the recursive resolver will be non-functional, resulting in operational and business downtime.<\/p>\n\n\n\n<p>An attacker can craft and send a single packet(DNS query) to a DNSSEC validating recursive resolver, resulting in all systems using only that recursive resolver offline. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-impact-of-the-dns-keytrap-vulnerability-on-the-internet\">The impact of the DNS KeyTrap vulnerability on the Internet<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design2-683x1024.png\" alt=\"DNS KeyTrap vulnerability\" class=\"wp-image-6141\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design2-683x1024.png 683w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design2-200x300.png 200w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design2-768x1152.png 768w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/Untitled-design2.png 800w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/figure>\n\n\n\n<p>The impact of DNS KeyTrap vulnerability to the Internet could have been fatal. With approximately 60% of the Internet users in&nbsp;<a href=\"https:\/\/stats.labs.apnic.net\/dnssec\/IN\" target=\"_blank\" rel=\"noreferrer noopener\">India<\/a>&nbsp;and 30% of the Internet users in the&nbsp;<a href=\"https:\/\/stats.labs.apnic.net\/dnssec\/XA\" target=\"_blank\" rel=\"noreferrer noopener\">world<\/a>&nbsp;relying on DNSSEC validating recursive resolvers, the magnitude of the vulnerability would have been severe were it not for coordinated efforts and responsible disclosure.<\/p>\n\n\n\n<p>Credit to the folks at the&nbsp;<a href=\"https:\/\/www.athene-center.de\/en\/news\/press\/key-trap\" target=\"_blank\" rel=\"noreferrer noopener\">German National Research Center for Applied Cybersecurity ATHENE<\/a> for the responsible disclosure and working with the stakeholders in the DNS ecosystem &#8211; resolver operators, resolver software vendors and others. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cve-2023-50387\"><strong>CVE-2023-50387<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the \"KeyTrap\" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records. <\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-cve-2023-50868\"><strong>CVE-2023-50868<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \"NSEC3\" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p>Shreshta engineering team have swiftly patched all customer&nbsp;<a href=\"https:\/\/shreshtait.com\" target=\"_blank\" rel=\"noreferrer noopener\">DNS Shield<\/a>&nbsp;(<a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">DNS Firewall\/Protective DNS<\/a>) cloud and on-premise instances.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Safety Recommendations<\/strong><\/h2>\n\n\n\n<p>If you operate a DNSSEC validating recursive resolver, please find our safety recommendations below,<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The ideal option is to update the recursive resolver software<\/li>\n\n\n\n<li>If that&#8217;s not an option, major recursive resolver software vendors have made a patch available<\/li>\n\n\n\n<li>We strongly recommend against disabling DNSSEC to eliminate the risk of exposure to the vulnerability<\/li>\n<\/ul>\n\n\n\n<p>The link to the full report is available <a href=\"https:\/\/www.athene-center.de\/fileadmin\/content\/PDF\/Keytrap_2401.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-reading\"><strong>Recommended reading<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-shreshta-blog wp-block-embed-shreshta-blog\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Eu7I3rcNar\"><a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/\">Domain shadowing<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Domain shadowing&#8221; &#8212; Shreshta Blog\" src=\"https:\/\/shreshtait.com\/blog\/2024\/02\/domain-shadowing\/embed\/#?secret=RZiMYhoGel#?secret=Eu7I3rcNar\" data-secret=\"Eu7I3rcNar\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC (DNS Security Extensions). A single DNS packet can exhaust the CPU, causing a Denial of Service in a DNSSEC validating recursive resolver. Security researchers at the&nbsp;German National Research Center for Applied Cybersecurity ATHENE&nbsp;uncovered the critical flaw, which has been assigned and listed as&nbsp;CVE-2023-50387&nbsp;and&nbsp;CVE-2023-50868 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6146,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[43,133,44,42],"tags":[144,45,145,76,142,143],"class_list":["post-6100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dns","category-dns-firewall","category-protective-dns","category-threat-intelligence","tag-denial-of-service","tag-dns","tag-dnssec","tag-india","tag-keytrap","tag-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC(DNS Security Extensions). A single DNS packet can cause a DoS.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS KeyTrap vulnerability\" \/>\n<meta property=\"og:description\" content=\"DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC(DNS Security Extensions). A single DNS packet can cause a DoS.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-17T12:21:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-24T13:17:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/New-Blog-Instagram-Post.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"DNS KeyTrap vulnerability\",\"datePublished\":\"2024-02-17T12:21:32+00:00\",\"dateModified\":\"2024-02-24T13:17:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/\"},\"wordCount\":352,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/New-Blog-Instagram-Post.png\",\"keywords\":[\"denial of service\",\"dns\",\"DNSSEC\",\"india\",\"KeyTrap\",\"vulnerability\"],\"articleSection\":[\"DNS\",\"DNS Firewall\",\"Protective DNS\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/New-Blog-Instagram-Post.png\",\"datePublished\":\"2024-02-17T12:21:32+00:00\",\"dateModified\":\"2024-02-24T13:17:23+00:00\",\"description\":\"DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC(DNS Security Extensions). A single DNS packet can cause a DoS.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/New-Blog-Instagram-Post.png\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/New-Blog-Instagram-Post.png\",\"width\":1080,\"height\":1080,\"caption\":\"DNS KeyTrap vulnerability\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2024\\\/02\\\/dns-keytrap-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS KeyTrap vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"},\"sameAs\":[\"https:\\\/\\\/shreshtait.com\\\/blog\"],\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/author\\\/pswapneel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC(DNS Security Extensions). A single DNS packet can cause a DoS.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"DNS KeyTrap vulnerability","og_description":"DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC(DNS Security Extensions). A single DNS packet can cause a DoS.","og_url":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2024-02-17T12:21:32+00:00","article_modified_time":"2024-02-24T13:17:23+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/New-Blog-Instagram-Post.png","type":"image\/png"}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"DNS KeyTrap vulnerability","datePublished":"2024-02-17T12:21:32+00:00","dateModified":"2024-02-24T13:17:23+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/"},"wordCount":352,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/New-Blog-Instagram-Post.png","keywords":["denial of service","dns","DNSSEC","india","KeyTrap","vulnerability"],"articleSection":["DNS","DNS Firewall","Protective DNS","Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/","url":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/New-Blog-Instagram-Post.png","datePublished":"2024-02-17T12:21:32+00:00","dateModified":"2024-02-24T13:17:23+00:00","description":"DNS KeyTrap vulnerability is a critical flaw in the design of DNSSEC(DNS Security Extensions). A single DNS packet can cause a DoS.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/New-Blog-Instagram-Post.png","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2024\/02\/New-Blog-Instagram-Post.png","width":1080,"height":1080,"caption":"DNS KeyTrap vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DNS KeyTrap vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},{"@type":"Person","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"},"sameAs":["https:\/\/shreshtait.com\/blog"],"url":"https:\/\/shreshtait.com\/blog\/author\/pswapneel\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=6100"}],"version-history":[{"count":44,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6100\/revisions"}],"predecessor-version":[{"id":6484,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/6100\/revisions\/6484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/6146"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=6100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=6100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=6100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}