Free Republic
Browse · Search
News/Activism
Topics · Post Article

Although there's essentially nothing an end-user can do to protect him- or herself -- other than to regularly sweep the system for spyware and/or have real-time anti-spyware defenses up and running -- DNS server administrators, particularly those in enterprises, should scramble.

I run anti-spyware programs once a week.

1 posted on 04/06/2005 3:35:48 PM PDT by Eagle9
[ Post Reply | Private Reply | View Replies ]


To: Eagle9
I run anti-spyware programs once a week.

Good, but this attack is perfect for phishing. Even if you're paranoid and manually type in http://paypal.com, if the attacker has gotten to the DNS server you're using you'll still get sent to the fake site.

2 posted on 04/06/2005 3:42:01 PM PDT by ThinkDifferent (These pretzels are making me thirsty)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

Tech ping.


3 posted on 04/06/2005 3:42:55 PM PDT by Eagle9
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9

Actually, there are several things you can do.

You could run a local DNS caching server on you home network, for example. It's pretty easy to set one up in Linux, BSD, or Solaris.

Or you could just configure you TCP/IP connection to use a DNS server known to be reliable. The OpenRoot Foundation's DNS servers are quite good, and they invite everyone to use them:

http://support.open-rsc.org/


4 posted on 04/06/2005 3:46:18 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9

This thing keeps moving my home page from google to some searchnet crap and it keeps putting crap in my favorites. We have anti-spyware up and running but everytime I start up my computer it gets high-jacked. Any clue as to how to get rid of this?


5 posted on 04/06/2005 3:47:08 PM PDT by Slyfox
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9
The impact is either unknown expected to be minor to the infrastructure.

Who proof reads this stuff?

6 posted on 04/06/2005 3:47:22 PM PDT by scab4faa (http://www.compfused.com/directlink/703/)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9

Those whose ISPs are smart and thus running Linux should not see any issues at all.


7 posted on 04/06/2005 3:47:50 PM PDT by ikka
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9
Domain Poisoning

Not to be confused with ptomaine poisoning...

8 posted on 04/06/2005 3:50:22 PM PDT by sourcery (Resistance is futile: We are the Blog)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9

I just lost my computer to these evil bast*ards. I ended up hijacked to about.com. As I began running spyware, adware, & malware programs to clean the machine (one program alone found over 189 pieces of malicious programs & registry entries!) my computer became more & more unstable. At one point, the video began to flash (like it was trying to refesh itself) which prevented me from navigating by mouse. I finally found, quarantined, & deleted a program called "lexplore" which is the Sodabot virus. This gave me back SOME functionality, but most of my Microsoft programs had been uninstalled or disabled. Control Panel, for instance, was gone completely. I can't say for a certainty how my machine was infected, but I don't think it's a coincidence that I had just finished downloading Windows & Explorer updates. I am thus assuming that the Microsoft server was compromised.

Computer is now with my Geek getting a fresh install of everything right down to the OS & that's going to cost me, bigtime. Why is it that we can't go after the companies who benefit from hijacking through class action lawsuits or even under the RICO laws of the U.S.? I understand having no recourse for companies licensed & located outside the U.S., but there's a lot of U.S. companies that obviously stand to benefit from this malicious invasion. One would have to be a complete idiot to believe that sites like about.com aren't complicit in these attacks.


14 posted on 04/06/2005 4:06:12 PM PDT by torqemada ("Nobody expects the Spanish Inquisition!")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9
Is the Apple computer susceptible to these problems?
21 posted on 04/06/2005 4:33:26 PM PDT by ncpatriot
[ Post Reply | Private Reply | To 1 | View Replies ]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

33 posted on 04/06/2005 6:11:31 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9
There is only one solution to this. The punishment for this kind of activity must be elevated to the level of social damage that it causes.

After 20+ years in the industry I pride myself on being fairly aware of such dangers, but just yesterday I put a new hard disk in a system, installed Windows XP and foolishly installed the networking before I installed service pack 2, the firewall and anti-virus software.

While downloading Verizon's Online DSL and MSN Premium, I picked up a virus. My only contact with the internet was to make initial contact with my provider and the system was infected. It took me a while to figure out what had happened and soon I had lost a day's work.

They could put these punks away for 20 to life and I wouldn't think it was overkill.

39 posted on 04/06/2005 8:20:41 PM PDT by rkhampton
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9

Bump for later


41 posted on 04/06/2005 8:27:47 PM PDT by IdahoNative
[ Post Reply | Private Reply | To 1 | View Replies ]

Update:
TechWen b
ISC Explains Microsoft Server Poisoning Vulnerabilities
April 7, 2005

The Internet Storm Center Thursday clarified details of the ongoing DNS cache poisoning attack, and how hackers are infecting Windows servers.

After consultations with Microsoft and after receiving additional reports from users on tested methods of protecting Windows servers, the ISC posted a document that outlines its recommendations. Microsoft also revised a Knowledgebase article on its support site.

The design flaw ISC mentioned Wednesday relates to when Windows servers have forwarding enabled. Apparently, Windows DNS servers expect the upstream server -- the one sending data to a second server -- to scrub any cache poisoning attacks, and so accepts all data, regardless of its current setting to protect against cache poisoning.

ICS is asking for help in pinning down under which circumstances this forwarding can create a vulnerability. So far, said ISC analyst Kyle Haugsness, it appears that upstream servers running BIND4 and BIND8 do not clean the poisoned cache before sending to down to the Windows DNS server, while BIND9 does.

Specific recommendations for various BIND configurations have been posted by Haugsness on the Thursday's front page of the ISC Web site.
____________________________________________________________

Internet Storm Center

Handlers Diary April 7th 2005

Updated April 7th 2005 16:25 UTC (Handler: Kyle Haugsness)

DNS cache poisoning update

Yellow

The InfoCon is currently set at yellow in response to the DNS cache poisoning issues that we have been reporting on for the last several days. We originally went to yellow because we were uncertain of the mechanisms that allowed seemingly "secure" systems to be vulnerable to this issue. Now that we have a better handle on the mechanisms, WE WANT TO GET THE ATTENTION OF ISPs AND ANY OTHERS WHO RUN DNS SERVERS THAT MAY ACT AS FORWARDS FOR DOWNSTREAM Microsoft DNS SYSTEMS. If you are running BIND, please consider updating to Version 9. Read on for more information...

DNS cache poisoning update

We have received more technical details on the software configurations that are vulnerable. Thanks to Microsoft for clarifying details on Windows DNS and thanks to numerous others for reporting. We try to get all the technical details right before publishing information on attacks like this, but if we waited until we were 100% sure all the time, we would never be able to notify the community when the attacks are actually happening.

On Windows 2000 SP3 and above, the DNS server DOES protect against DNS cache pollution by default. The registry key to protect against the poisoning is not necessary: the value is TRUE if the registry key does not exist. Microsoft has now corrected the KB article that we published earlier with this information.

   http://support.microsoft.com/default.aspx?scid=kb;en-us;241352 
   http://support.microsoft.com/kb/316786 

On Windows 2000, you should manage the DNS cache protection security setting through the DNS Management Console. On Windows 2000 below SP3, the "Secure cache against pollution" is not the default so you should enable it using the DNS Management Console. On Windows 2000 SP3 and above (and Windows 2003), the secure setting is the default (even if the registry key does not exist).

Our recommendation is to only set the registry key (HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DNS\Parameters) on Windows NT4. Otherwise, use the DNS Management Console. If you are on Windows 2000 and you created the key already, you are safe to leave it in place as long as the value is "1".

There seems to be other possible scenarios where cache poisoning can occur. When forwarding to another server, Windows DNS servers expects the upstream DNS server to scrub out cache poisoning attacks. The Windows DNS server accepts all data that it receives, regardless of the setting for protecting against cache poisoning. So vulnerability of the attack depends upon whether the upstream DNS server is filtering out the attack.

We are currently trying to determine the behavior of DJBDNS, and BIND versions 4, 8, and 9 when acting as a forwarder. We are asking for assistance from the community to determine their behavior so write us if you have details. It appears that BIND4 and BIND8 do not scrub the data, whereas BIND9 does. See the following scenarios:

Windows DNS --> forwarding to BIND4 or BIND8. Windows DNS server assumes that BIND scrubs out the poisoning attempt. BIND4 and BIND8 do NOT appear to scrub the attack. Windows DNS trusts the data and the Windows DNS cache will become poisoned.

Windows DNS --> forwarding to BIND9. This configuration seems to be secure because BIND9 scrubs the poisoning attempt.

Windows DNS (slave) --> forwarding to Windows DNS (master). In this scenario, your vulnerability is based on the vulnerability of the master. If the master is vulnerable, then it will be poisoned and forward the attack to the slave server, which will also be poisoned. However, if the master is secure then both servers should be safe.

The following recommendations are based on the current assumption that BIND4 and BIND8 forwarders will not filter the cache poisoning attack to its downstream clients. If we find out that this is not the case, then the recommendations may not be valid. If you have Windows DNS servers forwarding to BIND4 or BIND8, you should start investigating an upgrade of those BIND servers to BIND9. If upgrading to BIND9 would not be a possibility, a secondary recommendation would be to turn off the forwarding on Windows DNS and allow the server to contact the Internet directly so that it can apply the proper protection against cache poisoning. If you run an ISP and have clients that are using your DNS servers as forwarders, you may want to consider upgrading your resolvers to BIND9 in order to protect your clients.

Alternatively, if you have Windows DNS servers that are functioning as forwarders then you should verify that those machines are protected, which should protect the rest of the DNS servers behind it.

50 posted on 04/07/2005 1:28:37 PM PDT by Eagle9
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9; Weirdad; enotheisen; Quix; agitator; Ed_in_NJ; 1234; codyjacksmom; American_Centurion; ...
InfoSec Pinglist Information



Paging the InfoSec pinglist...
Let me know if you want to be 1 or 0. (That's ON or OFF, for those who are not binary-compliant)





DNS poisoning doesn't have anything to do with spyware - it's an attack against DNS server infrastructure. Click on the link below for a somewhat technical but very good history of the issue of DNS Cache Poisoning
"DNS Cache Poisoning - The Next Generation" by Joe Stewart, GCIH (jstewart@lurhq.com)



The InfoSec pinglist is back! I have been very busy lately and am getting busier, but I'm going to make my best effort to rally the pinglist more often.


For some background, I'm an IT security consultant. I fly around, hack our clients networks, systems, and applications, and show them what to change in their policies, procedures, and architecture to keep the real bad guys from getting in. It's a living!
51 posted on 04/07/2005 10:11:40 PM PDT by adam_az (UN out of the US! - http://www.moveamericaforward.org/?Page=Petition)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9

bump .... thank God for checkpoint and SMART DEFENSE.


53 posted on 04/07/2005 10:42:49 PM PDT by Centurion2000 (Nations do not survive by setting examples for others. Nations survive by making examples of others)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Eagle9

bookmark for later


59 posted on 04/08/2005 4:32:27 AM PDT by Ed_in_NJ (Who killed Suzanne Coleman?)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson