Re: Anyone can take over virtually any domain on the net...

From: Kurt Seifried (listuserat_private)
Date: Thu Jan 13 2000 - 12:30:36 PST

  • Next message: Lark Lizerman: "Re: WebSitePro/2.3.18 is revealing Webdirectories"

    Repost of an article I wrote last month.
    
    http://www.securityportal.com/direct.cgi?/closet/closet19991231.html
    
    Kurt Seifried, seifriedat_private, for http://www.securityportal.com/
    
    This article was meant for January 12, 2000 but SANS posted an item about it
    being a problem so I thought I'd get it out the door.
    December 31, 1999 - So you've got your DNS servers locked down, running the
    latest greatest BIND code as a non-root user, in a chrooted environment and
    life is pretty good. Until you go to your website and are faced with child
    porn. So you take the web server(s) down and use your write protected
    bootable tripwire disks, and everything checks out ok. No files have been
    deleted or modified, all the web content is there, it's all normal. Bring
    the server back up, make sure everything is running, and you go back to the
    URL, child porn. You put the IP address into your web browser, you get the
    normal site ("Widget's R US").
    (Actors voice similar to that guy on America's Most Wanted): What you just
    read was a re-creation of an event that may have happened to someone. It
    could happen to you to! Malicious script-kiddies (this does not require any
    skill or much intelligence) changed your DNS records and "hijacked" the
    domain. To confuse matters they also changed the registrar and points of
    contact, resulting in a significant delay while getting everything sorted
    out.
    DNS names are centrally registered, usually via a web based form or email.
    The authentication typically used is "mail from", that is if a request for
    changes arrives from the right email address, the changes are made (and we
    all know that email spoofing is trivial). To combat this you can configure
    it to require an acknowledgement, however a mildly competent attacker will
    simply forge an acknowledgement, and possibly flood your mail server (or
    your account) with bogus email to prevent you from seeing the message (that
    you might send a reply back saying "don't"). Unfortunately this system
    worked quite well for a long time, domain names have only become popular
    lately, especially with E-commerce and so on taking place, as well the
    Internet community was, generally speaking, less malicious.
    
    SANS has been running an incident reporting website for a week now, people
    email in logs/incident reports, etc and SANS posts them up. There is an
    advisory (not an actually advisory per se, but a strong warning none the
    less) at:
    
    http://www.sans.org/y2k/123199-1305.htm
    
    regarding this problem.
    
    Using the guardian scheme with Network Solutions (those wonderful people
    that spammed me, sorry but I had to say it) is relatively simple, go to the
    contact form at:
    
    http://www.networksolutions.com/cgi-bin/makechanges/itts/handle
    
    and enter your contact handle, email address and click modify. The next
    screen will ask you to choose your authentication method, the simplest is
    the crypt password scheme, you simple enter a password which is cyrpt()'ed,
    to change DNS records/etc in the future you must enter that password. This
    is definitely better then nothing, and it will slow an attacker down,
    however you are still vulnerable to someone monitoring your email and
    capturing it, as a determined attacker would do.
    
    The other alternative is to use PGP, unfortunately their system only
    supports older versions of PGP, and the keyserver is abysmally slow. However
    with a little patience you can add your key, the procedure is covered at:
    
    http://www.networksolutions.com/help/guardian.html
    
    and basically consists of emailing a key to PGPREGat_private,
    putting "add" in the subject line, and the key in the body of the message.
    Once that is successfully registered you can then specify that key for use
    with the guardian scheme. You will be required to PGP sign all changes,
    making it very secure (even if an attacker eavesdrops they won't be able to
    forge messages).
    Like many things, people have been complacent about DNS security, because it
    has not been a real problem in past. TImes are changing however and the
    Internet is turning into a pretty dangerous environment. You need to protect
    yourself, and the guardian scheme will let you do so effectively.
    
    Kurt Seifried (seifriedat_private) is a security analyst and the author
    of the "Linux Administrators Security Guide", a source of natural fiber and
    Linux security, part of a complete breakfast.
    
    Related links:
    DNS security - closing the b(l)inds:
    http://www.securityportal.com/closet/closet19990929.html
    
    Kurt Seifried
    http://www.securityportal.com/lasg/
    http://www.securityportal.com/closet/
    http://www.cryptoarchive.net/
    http://www.seifried.org/
    http://www.seifried.org/keys/
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 15:28:14 PDT