New Chromium security feature accidentally creating massive load on DNS servers
Aug 25, 2020 at 2:21 PM

New Chromium security feature accidentally creating massive load on DNS servers

A security feature in the browser tech that powers some of the world's most popular Internet browsers is causing the Domain Name System that allows users to easily browse the Internet by website names instead of IP addresses to suffer a massive influx of requests.

Chromium's new "Intranet Redirect Detector" security feature currently accounts for around half of the total received traffic for the world's root DNS servers.

When looking up a word or term in any Chromium-powered web browser, the browser submits DNS lookups for 3 randomly generated 7-to-15-character top-level "domains." Though this is an effective defense system against networks that hijack mistyped URLs, for the majority of servers that aren't, this defense mechanism can bounce a DNS query up and up until it receives a notice from a root server that the URL typed doesn't exist.

Since the post on the APNIC blog detailing the issue, it has received daily updates on the Chromium Bug Tracker. Once this issue is resolved, it will help in curbing over 60 billion needless DNS queries plaguing the Internet's root DNS servers.

Further coverage: APNIC Blog Ars Technica

Aug 25, 2020 by Ian Dorfman

Chromium iconChromium
  1117
  • ...

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to...

No comments so far, maybe you want to be first?
Gu