Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Networking The Internet IT

What Could You Do With a Bogus Root Name Server? 120

Barlaam notes a post from the Renesys Blog which follows up on news they discussed a couple weeks ago about the 'identity theft' of a root name server. To emphasize the issue of safeguarding such a system, they've now posted an explanation of exactly how the situation could be exploited. "It shouldn't be too hard to see that you could end up answering every DNS query from an organization that came to you for an updated list of root name servers. Every one. And you might end up doing this for a very long time, especially if your answers were largely correct. An attack like this would have no resemblance to the YouTube hijack, where the entire planet gets a blank page and it's immediately apparent that something isn't right. Obvious events like this will continue to occur, and we'll continue to resolve them relatively quickly. But as this incident demonstrates, DNS hijacks are far less obvious and potentially far more harmful."
This discussion has been archived. No new comments can be posted.

What Could You Do With a Bogus Root Name Server?

Comments Filter:
  • by Indes ( 323481 ) on Sunday June 01, 2008 @12:14PM (#23618303) Homepage
    .. do what we do every night.. try to take over the world!!

    (Seriously, Imagine borrowing every bank's front page in North America .... You could be cashing in big time..... )
    • by HTH NE1 ( 675604 )
      What could you do with a bogus root name server
      What could you do with a bogus root name server
      What could you do with a bogus root name server
      Er'ly in the mornin'?
      • by treeves ( 963993 )
        That's got too many syllables for the tune.
        • by HTH NE1 ( 675604 )

          That's got too many syllables for the tune.
          It didn't stop Band-Aids from adding the word "brand" to their jingle. Just double-beat "Drunk-" and "-lor" for "bogus" and "server"; it's a bit of a tongue-twister, but that's part of the fun! Especially when you continue it with the next verse:

          Impersonatewindowsupdate and serve up malware
          Impersonatewindowsupdate and serve up malware
          Impersonatewindowsupdate and serve up malware
          Er'ly in the mornin'!
  • Hmmm... (Score:2, Informative)

    by cp.tar ( 871488 )

    ... so, you answer nearly all of them correctly.
    Except for the precious few, which, say, redirect you to almost exact copies of pages which take your credit card data.

    Or did I get it wrong?

  • easy (Score:5, Funny)

    i would redirect http://slashdot.org/ [slashdot.org] to http:///..org [..org]

    yeah how funny is it now that the joke is on the other foot biatches!

  • by ZeroPly ( 881915 ) on Sunday June 01, 2008 @12:20PM (#23618361)
    ... whereby you can actually "sign" digital data so that it's clear where it came from. If somehow they could incorporate that into this whole "DNS" system, maybe it would fix the problem?
  • Simple recipe (Score:5, Insightful)

    by canuck57 ( 662392 ) on Sunday June 01, 2008 @12:22PM (#23618381)

    If you have lost DNS, game is over, you lose. A recipe if your system hits a compromised root server.

    • You open up email to read todays email. You PC looks up pop3.yourisp.com.
    • DNS returns the IP of evil PC to your PC which will connect to it.
    • Next, evil PC will emulate your login, IP address and record the password. Could even be a /. password.
    • Evil pc now has the info needed to read/retrieve your email.

    Better yet, people often use similar IDs and passwords into other systems. Evil hackers can often use the email to figure out which banks, credit, stock brokers and on line e-tailers you use. Maybe change the home address of your Amazon account and order stuff, if the e-tailor isn't right on top of it.

    Root servers need to be secure, end of story.

    I should note the above method would also work with SSL, be creative, it only has to be a legitimate cert with a root chain.

    • Re:Simple recipe (Score:4, Insightful)

      by Joe The Dragon ( 967727 ) on Sunday June 01, 2008 @12:31PM (#23618441)
      ISP can make so that pop3 only works from inside of there own network and force you to have a differnt web mail password not use the same login in system for web mail and pop3 mail.
      • by bconway ( 63464 )
        ISP access restrictions on their servers won't do anything for a client unknowingly connecting to a 3rd party via DNS hijacking/poisoning.
        • In this case, it will still prevent them from reading your email by downloading it from your ISP's server (assuming they don't have a computer on your ISP's network). Of course, they do still have your username and password.
      • ISP can make so that pop3 only works from inside of there own network and force you to have a differnt web mail password not use the same login in system for web mail and pop3 mail.

        While I can't per say get to pop3 proper from work, I can get tot he web mail server. Huge hacker advantage about web mail. It doesn't move the message so the real user will not notice missing mail. A little perl script, harvest in bulk.

        No, I gave a high level view. I will not post the code to do it and spell it out for na-sayers. It can be done. Wireless to is a nice entry point. Send a proxy redirect... fun and games.

    • Re:Simple recipe (Score:5, Insightful)

      by imipak ( 254310 ) on Sunday June 01, 2008 @12:38PM (#23618469) Journal
      Oh good god, that's just the tip of the iceberg. More likely would be to MitM some large corps' Outlook Web Access or other places where domain credentials are exposed (VPNs and the like.) Wait until you've got a domain admin's password. You now own that entire corp. Now rinse and repeat for government bodies. How hard do you think it would be for the proverbial well-motivated and resourced attacker to trigger off a war in such circumstances?

      Think about it.

      • Oh good god, that's just the tip of the iceberg. More likely would be to MitM some large corps' Outlook Web Access or other places where domain credentials are exposed (VPNs and the like.) Wait until you've got a domain admin's password. You now own that entire corp. Now rinse and repeat for government bodies. How hard do you think it would be for the proverbial well-motivated and resourced attacker to trigger off a war in such circumstances?

        Think about it.

        Yep, you got the idea. Yes, it works similarily for other ports/protocols as well as network routing devices too. Think, you could even proxy back the traffic to the intended site login transactions as they occur. This way the session even behave properly, abet perhaps a little slower for the hops the traffic makes.

        Yes, I think about it, yes, if a sophisticated hacking group decided to go for a target, most are not remotely prepared for what will happen.

    • Re: (Score:1, Informative)

      by Anonymous Coward
      I should note the above method would also work with SSL, be creative, it only has to be a legitimate cert with a root chain.

      Absolutely not. Do you know anything about SSL?

      The certificate has to be signed by a legitimate Certificate Authority, and be in the name of pop3.yourisp.com. Otherwise your email program says "Hey! I was expecting a certificate for pop3.yourisp.com, when I got a certificate for pop3.evilisp.com!".

      Well, most email programs will. Even Outlook will do that.

      You can mess up a lot with DNS.
      • Indeed, but then Social Engineering comes into play - like that time someone managed to convince Verisign to reissue them one of Microsoft's Software Publishing Certificates, allowing them to sign programs as if they were Microsoft.
    • Comment removed based on user account deletion
      • Comment removed based on user account deletion
        • by Consul ( 119169 )
          For a second there, I thought you had just introduced me to a new technical term I had never heard before. :-) We now must find a networking meaning for "chanted" and start using it.
          • Re: (Score:2, Funny)

            by maxume ( 22995 )
            Chanting is clearly the network noise that p2p peers make simply letting other nodes know that they are alive and well (rather than traffic from transferring data or handling real business).
    • Re:Simple recipe (Score:5, Informative)

      by Vellmont ( 569020 ) on Sunday June 01, 2008 @01:07PM (#23618723) Homepage

      If you have lost DNS, game is over, you lose. A recipe if your system hits a compromised root server.

      Unless you happen to have SSL enabled pop or imap.

      A (revised) recipe for an SSL enabled mail host:
              * You open up email to read todays email. You PC looks up pop3.yourisp.com.
              * DNS returns the IP of evil PC to your PC which will connect to it.
              * Evil PC returns a forged SSL certfificate claiming to be pop3.yourisp.com
              * Your email client brings up an error message saying there's something wrong with this certificate (self signed, etc)
              * You hopefully get suspicious, (this never having happened before), and don't click through.
              * Attack fails.

      If you don't get suspicious, and just click OK, you're right. But the situation isn't quite as dire as you make it out to be. I'd never connect to a non-secure host for something like email.
      • Your email client brings up an error message saying there's something wrong with this certificate (self signed, etc)

        Which email client brigns up an error message for a self-signed POP3 server certificate?

        (Try it, you'll be surprised how many don't.)

        • Re: (Score:3, Informative)

          by grcumb ( 781340 )

          Which email client brigns up an error message for a self-signed POP3 server certificate?

          Mail.app and Thunderbird, for two.

          Mail's error message actually characterises a self-signed cert with language to the effect of, "Couldn't connect to the server because of an untrustworthy certificate." When this was reported to me by a non-technical user, they repeated only the first two words: Couldn't connect.

          That's how things should be.

          I'm hoping that Firefox's improved handling of self-signed certificates ge

        • Re: (Score:3, Informative)

          by darthflo ( 1095225 )
          I can confirm Outlook 2003, 2007 and any remotely recent version of The Bat!
      • Don't put too much faith in SSL. Read Bluecoat SSL visibility [bluecoat.com]. It works and decodes the SSL in the middle to inspect traffic. This is the good use of the technique. It is however more sophisticated than plain text protocols to pull off.

        • by Jouster ( 144775 )
          Er... no. SSL is endpoint-to-endpoint secure, no matter who's upstream of you. How in the world would you think that this could work without the client's knowledge?
      • I've had SSL certificates change or be self-signed on my mail server at UCSD. At that point, I can decide either to click ok, or not check my email. Guess what I, and every single one of the other people in the computer science did? Clicked ok.

        I was suspicious enough to delay clicking okay until I called the helpdesk, but it turns out, yes, they did mess with their cert, and it was legit.

        Sad but true: People need their email more than they need security.
    • by fishbowl ( 7759 )
      >If you have lost DNS, game is over, you lose.

      I play the TLS trump card.

      • Re: (Score:1, Redundant)

        by Niten ( 201835 )

        I respond with the "your web browser honors 50 billion different CAs by default, and getting an illicit certificate signed by a single one of them won't be difficult" card.

    • Re:Simple recipe (Score:5, Informative)

      by MushMouth ( 5650 ) on Sunday June 01, 2008 @01:28PM (#23618875)
      Amazon makes you re-enter the complete credit card number if you ship to a new address.
      • Amazon makes you re-enter the complete credit card number if you ship to a new address.

        Good to know. And what if the user emailed it? Mind you, most will not. But point taken. Amazon then is ahead of the curve.

      • Re: (Score:3, Funny)

        by cjb658 ( 1235986 )

        Amazon makes you re-enter the complete credit card number if you ship to a new address.
        What a horrible inconvenience! You should be able to buy it with one click!
    • All the more reason for protocols to start using real security. Imagine the attack with password authenticated key exchange [wikipedia.org]:
      • You open up to read email. Your PC looks up mail.yourhost.com
      • DNS returns the IP of the Evil Impersonator.
      • You connect to the Evil Impersonator and start the protocol.
      • Evil Impersonator runs PAKE protocol in question, impersonating mail.yourhost.com, based on a guess of your password.
      • Your client says "incorrect password". You try a few more times and get really suspicious.
      • Because
      • Re: (Score:2, Insightful)

        by jeiler ( 1106393 )

        Instead of a MitM attack, would it be possible to do a "proxy-in-the-middle" attack?

        * User opens up to read email/connect to their bank account/something secure.
        * DNS returns IP of evil impersonator (EI) instead of Real Computer (RC).
        * User requests connection from EI. EI transparently proxies that connection to RC, while listening for the password that authenticates the key exchange.
        * Profit! Or would it be?

        I can't imagine this kind of hole not already being covered, but it seems like it would be fe

        • Re: (Score:3, Informative)

          by kvezach ( 1199717 )
          No, because without a password, most password authenticated key exchange algorithm have the same security properties as Diffie-Hellman. In other words, even if you knew the password, you couldn't snoop the connection passively. The only way to thwart it is by an active attack, but for that you need the password, otherwise the two parties' keys won't match.

          See SPEKE [wikipedia.org], for instance, which is pretty much a Diffie-Hellman key exchange with the (fixed) generator constant replaced by a hash of the password. Snoo
          • by jeiler ( 1106393 )
            Thanks. I know that question fell into the "stupid newbie" category, but I've never taken a look at the process of authentication.
      • The rest is an engineering problem :)
        I thought engineering was restricted to levels 1 through 7 ;)
    • by the_olo ( 160789 )

      I should note the above method would also work with SSL, be creative, it only has to be a legitimate cert with a root chain.


      Well, the CN field on the legitimate cert would have to match the DNS FQDN name that the client looked up the server address with. Unless your POP3 client doesn't verify that x.509 CN matches the DNS FQDN, which would make its SSL support pointless. Even MS Outlook does that properly.

  • break everything (Score:4, Insightful)

    by imipak ( 254310 ) on Sunday June 01, 2008 @12:25PM (#23618405) Journal
    Then sit back cackling with glee whilst civilisation falls apart?

    Seriously, in the last decade the premise that the Net is always there has become a silent assumption underlying a lot of critical systems. No I'm not talking about nuclear power stations being online, I'm talking about basic logistics chain outages that mean there's no-one there to run the power station, because they've no fuel for their car, because the petrol tanker driver is off scavaging food for his kids. There are a number of scenarios that could knock out the net (or at least cause widespread depeering, so you'd be stuck on your provider's network and unable to get traffic to/from anywhere else); it would be... well, a bit too interesting for my liking to see how things would go with, say, a seven day outage. Actually a 7 day outage might be just enough to wake people up to the importance of patching your infrastructure, having a heterogenous mix of code for all critical functions, oh and and enforcing BGP security.

    • by cp.tar ( 871488 )

      Maybe the geeks should go on strike.

      No patches; no tech support; no maintenance -- until things are organized properly.

      • by Joebert ( 946227 )
        How the hell is that supposed to happen without any geeks ?
      • Re: (Score:1, Insightful)

        by ijakings ( 982830 )
        THis post raises an interesting point. For the most part what Ive seen is that the IT or general tech industry has no large union. At least it doesnt in the UK.

        THink about it, If they did they could bring a country to its knees with say a 7 day strike. People have become so dependent on things just working, and when they dont they call in the tech guy that they would be going crazy after 7 days.

        Sure youve got that one guy in every department who is or thinks he is really good at computers, but how long unti
        • by maxume ( 22995 )
          Yeah, but who wants to be in a union with people who want to be in a union?

          (Unions certainly did a great deal of good for workers rights in the United States, but many of the important gains they made became laws and many of them now serve to make it very difficult to get rid of dead weight, to the detriment of everybody, including other union members)
          • Re: (Score:1, Informative)

            by Anonymous Coward
            Unions everywhere else are not like unions in the US.
        • by asc99c ( 938635 )
          I'm not sure a union is really what tech workers need or even want. There's too much variety in the jobs people do and how competent they are at them, even with the same job title. Teaching is a similar situation where the typical behaviour of unions seems like a bad idea, and that view seems to be borne out in practice.

          It would be more a professional body similar to those that govern the medical and law professions. They might have the resources to organise a strike but I think would pretty much always
      • Re: (Score:2, Funny)

        by Anonymous Coward
        Better, we can go on a strike and then shut down the Internet. Then, when governments of the world come to us asking for us to repair whatever happened, we say: "ok, we can do that, but before we do we need, 10 million dollars, 3 bikini supermodels and a fast sport car of our choice, for each one of us.
        That would be sweet...
        *GO BACK TO THE BASEMENT, JOHNNY*
        *OK MOM! - Oh God, can't even dream in peace anymore...*
      • Re: (Score:1, Insightful)

        by Anonymous Coward

        Maybe the geeks should go on strike.

        No patches; no tech support; no maintenance -- until things are organized properly.

        "But what can any of us do about it? Who is Linus Torvalds?"
        - Stallman Shrugged.

      • by mdm42 ( 244204 )
        of course we'd first have to agree on how to define "properly"...
        • by cp.tar ( 871488 )

          And we can argue until the civilization collapses.

          Lazy and malevolent, that's the ticket. ;)

      • by cjb658 ( 1235986 )
        Yes, let's make those jocks sleep in the gym! [wikipedia.org]
    • Re:break everything (Score:5, Interesting)

      by milsoRgen ( 1016505 ) on Sunday June 01, 2008 @12:53PM (#23618617) Homepage

      Actually a 7 day outage might be just enough to wake people up to the importance of patching your infrastructure
      That and I'm afraid it would awaken certain governments with the sudden realization now is the chance to install a large scale surveillance infrastructure (or something just as evil) all in the name of fighting the terrorists that caused the disturbance. Oh and I'm sure there would be provisions added to enforce copyright while they're at it.
      • Re:break everything (Score:5, Interesting)

        by ColdWetDog ( 752185 ) * on Sunday June 01, 2008 @01:02PM (#23618693) Homepage

        That and I'm afraid it would awaken certain governments with the sudden realization now is the chance to install a large scale surveillance infrastructure (or something just as evil) all in the name of fighting the terrorists that caused the disturbance. Oh and I'm sure there would be provisions added to enforce copyright while they're at it.

        Exactly. If you think the problem is bad now, wait until we've fixed it. (Arthur Kasspe). This should be the motto engraved on every Government departmental seal.

  • flat files (Score:2, Funny)

    by Gothmolly ( 148874 )
    The solution is to maintain a series of flat-file or relational DBs locally for every host on the Internet. Periodically, you should be able to do an FTP or similar of the latest master file, and place it on your local nameservers or hosts. Its the only way to be sure.
  • by karl.auerbach ( 157250 ) on Sunday June 01, 2008 @12:38PM (#23618473) Homepage
    Back in Febrary 2006 I wrote a note "What Could You Do With Your Own Root Server" at
    http://www.cavebear.com/cbblog-archives/000232.html

    My conclusions were that one could make money and cause trouble.

    One of the more interesting aspects was (and still is) that one could operate root servers and, using the Google model, pay ISPs and users to send their queries to your roots so that you could generate data mining revenues.

    That quality of data that is minded form root traffic would not be as good as that as from a top level domain server - and who has some large top level domains and also has root servers? Verisign.

    And ICANN's contract with Verisign explicitly permits data mining of query traffic.
  • It's sad that DNSSEC hasn't gotten wider adoption given that the problem of spoofing is getting bigger.
  • by iminplaya ( 723125 ) on Sunday June 01, 2008 @12:40PM (#23618491) Journal
    Time for you mental midgets to start remembering IP addresses. Do your own damn cacheing.

    It's a JOKE! Alright?
    • Re: (Score:2, Insightful)

      by eneville ( 745111 )

      Time for you mental midgets to start remembering IP addresses. Do your own damn cacheing. It's a JOKE! Alright?
      Well, it's not such a silly idea. When I look at my firefox 3 smart book marks, there are maybe 5 pages that I go to regularly. Anything else I can see using google page cache. So what's the big deal, having those few sites in a local hosts file isn't so much of a task.
    • Time for you mental midgets to start remembering IP addresses.

      Only after we switch to IPv6.

    • by mini me ( 132455 )
      It's good enough for the telephone system, so I don't see why not.
  • Anything associated with the Bush Adminsitration and fundraising for Senator McCain would definitely be sent to some educational sites of my choosing. Government propaganda sites in China would also be re-directed to more educational sites. Sites for military contractors like Halliburton, Blackwater, Lockheed Martin, McDonland Douglass, and Northorp Gruman would be re-directed to sites that show war profiteering information and US General Sevices Administration no-bid or non-competitive contract abuses.
    • Look up an anarchist/comedy/anti-establishment group called "The Yes Men". They pulled a magnificent prank on the World Trade Organization by putting up a web site that people who didn't read carefully would assume was theirs.

      The slagging they gave the WTO was presented in such a fashion that those would would seek such a site out would be well into it before they realized they were being had.

      Being able to redirect by controlling DNS servers could raise the bar quite a bit, and you can bet that the o

    • Anything associated with the Bush Adminsitration and fundraising for Senator McCain would definitely be sent to some educational sites of my choosing. Government propaganda sites in China would also be re-directed to more educational sites. Sites for military contractors like Halliburton, Blackwater, Lockheed Martin, McDonland Douglass, and Northorp Gruman would be re-directed to sites that show war profiteering information and US General Sevices Administration no-bid or non-competitive contract abuses.

      B
  • hosts file (Score:3, Informative)

    by eneville ( 745111 ) on Sunday June 01, 2008 @12:51PM (#23618589) Homepage
    216.34.181.48 www.slashdot.org
    208.65.153.253 www.youtube.com
    208.65.153.238 www.youtube.com
    208.65.153.251 www.youtube.com
    69.63.184.15 www.facebook.com
    81.110.242.129 www.s5h.net
    66.102.9.99 www.google.com
    66.102.9.104 www.google.com
    66.102.9.147 www.google.com
    Use google page cache for anything else
    • Is there any software for Linux that can generate hosts file entries from bookmarks (and scan for changes) like Fastnet99 [majorgeeks.com] for Windows?
      • We don't need anything special for that. We have perl. Reply here if you want me to write it for you. But it doesn't take a huge amount of effort, just read the stdin for hrefs and do a lookup, then write the output to stdout.

        #!/usr/bin/perl

        use strict;
        use warnings;
        use Net::DNS;

        my %hosts;

        sub lookup {
        my $res = Net::DNS::Resolver->new;
        my $query = $res->search( shift );

        if ($query) {
        foreach my $rr ($query->answer) {
        next unless( $rr->type eq "A" );
        return( $rr->address
        • Re: (Score:3, Funny)

          by gnuman99 ( 746007 )
          Sir, what are you doing?!? Perl is NOT meant to be readable. It the code MUST be all on one line!

          use strict; use warnings; use Net::DNS; my %hosts; sub lookup { my $res = Net::DNS::Resolver->new;my $query = $res->search( shift );if ($query) {foreach my $rr ($query->answer) {next unless( $rr->type eq "A" );return( $rr->address );}}else {warn "query failed: ", $res->errorstring, "\n";}}while( my $l = ) {if( $l =~ m!(http://.+?)\s! ) {print( "$1\n" );if( $1 =~ m!http://(.*?)/! ) {my $ip = loo
  • Profit! (Score:1, Funny)

    by Anonymous Coward
    1. Invest in sawdust futures. 2. Redirect everything to goatse.cx
  • That's easy (Score:5, Informative)

    by bconway ( 63464 ) on Sunday June 01, 2008 @12:52PM (#23618599) Homepage
    World-wide Rickroll?
  • Take it... (Score:2, Insightful)

    by Timosch ( 1212482 )
    ...and sell it to the Chinese government. The answer to all their desires... No, just kidding.
  • by PPH ( 736903 ) on Sunday June 01, 2008 @12:55PM (#23618631)
    Goatse.cx lives!
  • Long gone are the days of digital 'graffiti', its all about hard cash now.

    i'm sure that would be worth something to someone.. Perhaps even enough to afford that shiny new powerbook pro :)
  • I'd find a way to trick MediaDefender into DoS'ing some sensitive and well monitored .gov or .mil facility, then watch them disappear from the planet, hopefully with serious and non-temporary consequences for the MAFIAA bastards behind them, too, maybe earning all of us some decent civil liberty guarantees in the process.

    Failing that, I'd be content with seeing them DoS themselves or any of their parent companies every time they try to spray their shit on any other address.
    • by Ant P. ( 974313 )
      You've got it the wrong way around.

      Point every single domain name on the planet to mediadefender's servers. Not only would it make every router within 8 hops burst into flames, the banks would be out for their blood too.
  • "What Could You Do With a Bogus Root Name Server?" Easy, slap it around and call it Suzy. Or possibly, put it in a sack and beat it senseless.
  • If we change "what would YOU do" to "what to you think might be done":

    A bogus root server could be coded to pay attention to the source of the query and only create illusions for targeted victims - serving normal information to everyone else.

    With that capability you can perform man-in-the-middle attacks on the victim - directing his connection to your own forwarding-and-tapping-and/or-modifying servers whenever the victim is attempting to connect to an external domain and his own nameserver got the domain r
  • I'd redirect all the adult domain names to websites about Jesus.

If all else fails, lower your standards.

Working...