Skip to content

TsuNAME vulnerability and PowerDNS Recursor

May 10, 2021 6:00:00 AM

Recently, the TsuNAME vulnerability was published. It concerns DNS recursors endlessly querying authoritative nameservers if the nameservers listed in the domains form a loop.

The researchers contacted us before publication, and we established then that while a very old version of PowerDNS recursor was found to be looping, all version of PowerDNS Recursor since 4.0 are not affected. Note that PowerDNS Recursor versions prior to 4.2 are End Of Life. For details, consult our EOL policy page.

While not looping endlessly, PowerDNS does issue more queries than strictly necessary while encountering a nameserver loop, so we decided to implement a further mitigation of the issue. This mechanism, (the non-resolving nameserver cache) will be available and enabled by default in the upcoming PowerDNS Recursor 4.5 release.

Actions for system administrators running PowerDNS Recursor

Make sure you run a supported version of PowerDNS Recursor. Currently this means version 4.2.5, 4.3.7, 4.4.3 or newer. Note that some distributions ship unsupported versions of PowerDNS recursor. This is something out of our control, but for popular distributions you can install the latest supported version from our repository.

Back to overview

Related Articles

Blog Post Sample 11

Robert Brandt April 5, 2024

This is the second in a series of three blog posts we are publishing about recent ...

Blog Post Sample 10

Erik Winkels April 5, 2024

This is the second in a series of three blog posts we are publishing about recent ...

Blog Post Sample 09

Andrea Carpani April 5, 2024

This is the second in a series of three blog posts we are publishing about recent ...

Blog Post Sample 08

Robert Brandt April 5, 2024

This is the second in a series of three blog posts we are publishing about recent ...