Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
The Internet Security

DNS Flaw Hits More Than Just the Web 215

gringer writes "Dan Kaminsky presented at the Black Hat conference in Las Vegas on Wednesday, and said that the DNS vulnerability he discovered is much more dangerous than most have appreciated. Besides hijacking web browsers, hackers might attack email services and spam filters, FTP, Rsync, BitTorrent, Telnet, SSH, as well as SSL services. Ultimately it's not a question of which systems can be attacked by exploiting the flaw, but rather which ones cannot. Then again, it could just be hype. For more information, see Kaminsky's power point presentation." Update: 08/07 19:48 GMT by T : There's also an animation of the progress of the patch.
This discussion has been archived. No new comments can be posted.

DNS Flaw Hits More Than Just the Web

Comments Filter:
  • Shocked!!! (Score:5, Insightful)

    by YouOverThere ( 50298 ) on Thursday August 07, 2008 @01:07PM (#24511999)

    You mean all the services that use DNS are at risk?!?!?!
    Say it isn't so...!
    Here all this time I thought the Internet WAS the Web...

  • Re:Shocked!!! (Score:3, Insightful)

    by duranaki ( 776224 ) on Thursday August 07, 2008 @01:16PM (#24512147)
    Mod up, my brother!

    I was surprised to see this made slashdot without the appropriate, "Well, duh!!!" comment attached.
  • Litmus testing (Score:5, Insightful)

    by Just Some Guy ( 3352 ) <kirk+slashdot@strauser.com> on Thursday August 07, 2008 @01:17PM (#24512151) Homepage Journal

    If you are reading this on Slashdot, and you are just now realizing that DNS exploits affect more than just the web, then get the hell out of here. Shoo. Leave your card at the door.

  • 9 time presenter? (Score:3, Insightful)

    by Chris Pimlott ( 16212 ) on Thursday August 07, 2008 @01:23PM (#24512257)

    Ugh, he may be a great researcher, but those are some terrible slides. Did he say anything that wasn't on a slide?

  • by Rob Kaper ( 5960 ) on Thursday August 07, 2008 @01:28PM (#24512351) Homepage

    This might surprise people relatively new to technology, but it should be obvious to anyone who's been in the field for a while.

    If you can hijack DNS, you can of course replace any networked service with your own (as man-in-the-middle attack or otherwise). If you change the road signs on an intersection in the countryside, not just cars are vulnerable - all traffic is.

    This would have been an interesting and informative story in the early days of Slashdot when we were all still new to the concepts of Internet. Anno 2008, I would have expected more from the editors (maybe not the new recruit, but timothy has been around for a long time). News for nerds has become news for the masses, it seems.

    Maybe I should stop reading the main page and start checking only Science, Mobile and YRO.

  • by David Jao ( 2759 ) <djao@dominia.org> on Thursday August 07, 2008 @01:33PM (#24512439) Homepage

    someone could hijack your bank website, use a self-signed certificate and Firefox would just ignore the authentication error.

    What's to stop somebody from hijacking the bank website, redirecting to a website that uses no SSL at all, and waiting for the passwords to roll in?

    Firefox and IE will, by default, warn you about sending unencrypted passwords. Once. And no more than once.

    Of course, many or perhaps even most people will notice that the site is unencrypted, but the attacker doesn't need to fool everybody. Even a 20% success rate is plenty good enough.

  • Re:Litmus testing (Score:4, Insightful)

    by DavidTC ( 10147 ) <slas45dxsvadiv.vadivNO@SPAMneverbox.com> on Thursday August 07, 2008 @01:33PM (#24512441) Homepage

    No shit.

    News for Really Dumb Nerds: Rest of internet uses same DNS system as web pages, not some magical other system to look up domain names.

    This flaw, if it exist, is more dangerous for email and FTP. Because those automatically log in, and thus attackers can just wildcard all domains to a password collection server.

    Unlike web sites, where you have to mimic each individual website, or built a complicated pass-through, to get people to log in. (Or attempt to steal cookies, which has its own problems.)

    I realized that about two minutes after I read about the flaw.

  • Re:Litmus testing (Score:5, Insightful)

    by Rob Kaper ( 5960 ) on Thursday August 07, 2008 @01:34PM (#24512461) Homepage

    Sorry Kirk, we can't win this battle. Back in the day only professionals, nerds and skilled technicians visited Slashdot. These days the site (for monetary reasons, I'm sure) has to cater to a much larger audience and we have to accept that we, the low-digit-UID crowd, are no longer representative for Slashdot.

    The only problem is, our chances are not much better anywhere else. I miss the days when the Internet consisted mostly of early adopters. (Then again, we need the masses because they make it feasible to have actually useful things like Internet banking and on-line pizza orders.)

  • by rickb928 ( 945187 ) on Thursday August 07, 2008 @01:36PM (#24512491) Homepage Journal

    From one of the referenced articles:

    "Mr Silva at VeriSign said even though patches have been put in place, this doesn't mean users can sit back and relax.

    "The biggest gap in security rests between the keyboard and the back of the chair," he said.

    "The look and feel of a website is not what a consumer should trust. They should trust the security behind that website and do simple things like use more secure passwords and change their password regularly." "

    Absolutely. Changing your password often on the faked site will go a long ways to ensuring your trust in the Internet is not betrayed.

    Dan really does get this. Nothing is safe. DNS affects pretty much everything on the Internet, and it's a big mess waiting to be *further* exploited.

    And the PR flaks ^H^H^H^H^H^H^H^H Senior Vice Presidents and Chief Technology Officers at various Internet security firms do not get it. Or their direct reports do not get it, whoever gave them the statement to read that so clearly is so wrong.

    Trust No One. Not your ISP, not your bank, not your favorite search engine, not your software vendors. Makes me want to get a regular landline phone again and call people...

  • by Bill, Shooter of Bul ( 629286 ) on Thursday August 07, 2008 @01:40PM (#24512577) Journal
    I really don't think it will surprise anyone. If some one knows technology, they understand it. If someone doesn't know technology then nothing about it is surprising to them because they really think their computers are magic boxes. And if you tell them part of the magic box has a problem they won't assume to know what parts of the reaming magic box will have a problem, other than the tangible parts they see ( I think the DNS problem has screwed up my mouse/printer). I don't think there is a group of people thought that a DNS exploit would only affect browsing websites, and were surprised to learn that's not the whole truth.

    I think the only group of affected people were technical people who had a segfault in their brains when they first thought about it. So they are now surprised not at how DNS works, but at the memory faults in their head.
  • by nonpareility ( 822891 ) on Thursday August 07, 2008 @01:41PM (#24512583)

    What's to stop somebody from hijacking the bank website, redirecting to a website that uses no SSL at all, and waiting for the passwords to roll in?

    If you normally access your bank's website by way of https, you wouldn't get redirected because the hijacked website's certificate wouldn't be valid. Other than that, you're just describing phishing.

  • by MadMidnightBomber ( 894759 ) on Thursday August 07, 2008 @01:51PM (#24512755)

    Ken Silva, chief technology officer at Verisign, said: "We have anticipated these flaws in DNS for many years and we have basically engineered around them."

    He believed there had been "some hype" around how the DNS flaw will affect consumers. He added that while it was an interesting way to exploit DNS on weak servers, there were other ways to misdirect people that remained.

    Here we should point out that Verisign are the pig-fuckers who stopped returning NXDOMAIN for .com in favour of their own search page and should never be trusted to say anything sensible about DNS.

    "It's been overplayed in a sense. I think it has served to confuse the consumer into believing there is somehow now a way to misdirect them to a wrong site.

    Well, Mr Silva, it IS a way to misdirect them to a wrong site.

  • by querist ( 97166 ) on Thursday August 07, 2008 @02:08PM (#24513053) Homepage

    Always consider the source when evaluating a comment.

    Verisign are in the business of addressing this exact problem. In Mr. Silva's ideal world, everyone has a Verisign certificate and then (in theory, anyway) there is no way for someone to be directed to the wrong site because the certificate validation will alert the user.

    Has anyone priced a Verisign certificate lately? Verisign stand to profit significantly from this, and Mr. Silva's downplaying of the risk is exactly what he should do. People will want to know why he's so confident, and he'll just respond with what essentially will be a sales pitch complete with fear, uncertainty, and doubt. He'll impress upon the listener that (again, in his view) a Verisign certificate is the only way to protect your web site and yourself.

    To abuse a Slashdot meme...

    1. Massive vulnerability in DNS makes people distrust DNS

    2. Company markets certificates to "verify" that web sites are what they are supposed to be.

    3. ??? (Actually, I think this would be have MS make the certificate warning REALLY "in your face" to scare the end user.)

    4. Profit!

  • Re:Litmus testing (Score:5, Insightful)

    by caferace ( 442 ) on Thursday August 07, 2008 @02:10PM (#24513079) Homepage
    "If you are reading this on Slashdot..."

    Good point. How do we know this really is Slashdot?

  • by blacklint ( 985235 ) on Thursday August 07, 2008 @02:30PM (#24513445)
    My bank has a dumb tethered login on the main page, where a form delivered over HTTP posts to a page secured with HTTPS. It took a slashdot thread pointing this out for me to realize it, and now I always use an extra click to find the HTTPS login page. But I'm sure that most people don't, so by the time they even could notice something's wrong, it would be too late. (I use a fairly major American bank.)

Always try to do things in chronological order; it's less confusing that way.

Working...