Do you have any links to the reports I would like to read them... I could not find them using Google? On Wed, Aug 13, 2008 at 10:52 AM, Faehl, Chris <[EMAIL PROTECTED]> wrote:
> John, > > Yes, there have been successful attacks. As you might expect, many of the > targets are financial institutions. > > Chris Faehl > Hosting Manager, RightNow Technologies > > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > Behalf Of John Smith > Sent: Wednesday, August 13, 2008 8:29 AM > To: Chris Buxton > Cc: Ben Croswell; bind-users@isc.org > Subject: Re: Not sure if my DNS is vulnerable? > > Has anyone heard of any successful attacks? > On Wed, Aug 13, 2008 at 10:27 AM, John Smith <[EMAIL PROTECTED]> wrote: > > > That clears it up for me. Thank you. > > > > > > > > On Wed, Aug 13, 2008 at 10:12 AM, Chris Buxton <[EMAIL PROTECTED] > >wrote: > > > >> -----BEGIN PGP SIGNED MESSAGE----- > >> Hash: SHA1 > >> > >> No, that's pretty much it. > >> > >> Step 1) Attacker sets up attacking name server, which waits for contact > >> from a potential victim. > >> > >> Step 2) Attacker hacks a web page, adding a short (and > legitimate-looking) > >> JavaScript. > >> > >> Step 3) Innocent web browser in your organization visits the web page, > >> loading the attack script. > >> > >> Step 4) The script tries to load an image from the attacker's domain. > This > >> tells the attacking name server your source port for queries, can encode > the > >> target domain to be spoofed, and triggers the attack. During the attack, > the > >> JavaScript is trying to load images from successive domains in the same > zone > >> as the target domain to be spoofed, on a schedule. The attacking name > server > >> is trying to spoof each of these nearby names, on the same schedule, by > >> brute-forcing the transaction ID. (It's only 16 bits long - that's not > much > >> of a crypto key.) The script can load more images from the attacker's > >> domain, thus informing the attacking name server of its progress and > getting > >> status reports back. > >> > >> The whole attack is completely automated, is triggered by a trusted > user's > >> web browser, will penetrate firewalls in nearly all cases (but an IPS > may be > >> able to stop it - by disabling inbound responses to your resolving name > >> server, rendering it useless), and is fast and deadly. > >> > >> Chris Buxton > >> Professional Services > >> Men & Mice > >> > >> On Aug 13, 2008, at 6:56 AM, Ben Croswell wrote: > >> > >> I would say you are "less vulnerable", but you are still vulnerable. > >>> It is only a matter of time before someone integrates the exploit code > >>> into > >>> a webpage. > >>> One of your internal users goes to the web page which has the browser > >>> resolve somehost.evil.org. The attacker now knows the IP of your > >>> outbound > >>> DNS server. At this point I would guess, it wouldn't to difficult to > >>> have > >>> javascript on the webpage force the browser to do the actual DNS > queries > >>> from the inside. Once those go out the attacker spams the answer back > to > >>> win the race. > >>> > >>> Anyone else can correct me if I am too far off base. > >>> > >>> -- > >>> -Ben Croswell > >>> > >>> On Wed, Aug 13, 2008 at 9:15 AM, John Smith <[EMAIL PROTECTED]> wrote: > >>> > >>> So I have a caching only DNS server that is behind a firewall and has > no > >>>> incoming connections allowed unless specifically requested from > inside. > >>>> My > >>>> DNS server does contact the root DNS servers upstream. But again > >>>> incoming > >>>> conections are only allowed into my DNS server unless the originated > >>>> from > >>>> the inside. > >>>> As far as I understand the problem for the recent DNS issues is from > >>>> someone > >>>> on the outside of my firewall ( I am ignoring an attack from the > inside) > >>>> would have to send my DNS server (which they cannot) some DNS requests > >>>> in > >>>> order to get a reply for them to attack? > >>>> Am I right? so since I do not have external access to port 53 I am > >>>> relatively safe? > >>>> > >>>> Since my DNS is not randomizing ports but is radomizign transaction > >>>> id's? > >>>> > >>>> Just curious. > >>>> > >>>> > >>>> > >>>> > >>>> > >>> > >>> > >>> > >> -----BEGIN PGP SIGNATURE----- > >> Version: GnuPG v1.4.8 (Darwin) > >> > >> iEYEARECAAYFAkii6+cACgkQ0p/8Jp6Boi2vwgCgrKvtDF328VuRHml3lavIgOiu > >> 0J8An1bEBeeQ6pCVyXu7vzND68WvQ/VB > >> =Otxk > >> -----END PGP SIGNATURE----- > >> > > > > > > > >