This document discusses vulnerabilities in the design of the Domain Name System (DNS) and how those vulnerabilities can be exploited. Specifically, it describes how DNS caches, proxies, and routes can be used to map DNS servers and inject content into caches. It also summarizes methods for tunneling arbitrary content through DNS using techniques like modifying Time-To-Live values and encoding data in domain names or record types. Finally, it discusses some approaches for suppressing DNS tunnels, such as flagging unusually large or formatted traffic.