Hello Solaris developers, I need help with diagnosing possible malware,
which seems to be originating from Solaris shared library.
The problem occurs when I submit a URL that doesn't exist. Instead of
returning an error, it seems Solaris resolver returns IP addresses of
webserver which redirect HTTP requests to web pages filled with Google
adds, etc. So, somebody is making money form all these redirects.
What's worse, is that quite frequently legitimate URL names, are mapped to
these bogus IP addreses, blocking me from accessing the legitimate web
site for a period of 5 to 30 minutes.
Originally I thought it was my ISP that was redirecting customer traffic,
however this problem does not occur on other machines on the same network,
which have identical DNS settings to the Solaris box.
This is what happens when I try to connect to non-existent domain from
NetBSD box:
p3smp$ uname -rs
NetBSD 5.0.1
p3smp$ /usr/bin/telnet www.nowaynosuchhost.com 80
www.nowaynosuchhost.com: No address associated with hostname
And this is what happens when I try the same on Solaris box:
r...@ultra10 uname -a
SunOS ultra10 5.10 Generic_139555-08 sun4u sparc SUNW,Ultra-5_10
r...@ultra10 /usr/bin/telnet www.nowaynosuchhost.com 80
Trying 97.107.142.101...
Connected to www.nowaynosuchhost.com.net.
Escape character is '^]'.
GET / HTTP/1.1
Host: www.nowaynosuchhost.com
HTTP/1.1 302 Found
Date: Wed, 25 Nov 2009 12:46:13 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.1.6
Set-Cookie: count=1; expires=Wed, 25-Nov-2009 20:46:26 GMT
Set-Cookie: lat=1259153186
Location: http://search.infoweb.net/?mysearch=nowaynosuchhost
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8
Connection to www.nowaynosuchhost.com.net closed by foreign host.
Now, as far as I remember, I downloaded this version of Solaris from Sun's
official website. I don't know if it came with the malware, or if some
other programs I installed on this Solaris machine (OpenOffice, Opera web
browser, Acrobat reader and a few others), have installed the malware.
Could the developers who know how the resolver libraries function help me
track and disable the malware. Maybe someone knows a good DTrace script to
show what's going on inside function calls?
Thank you very much.
_______________________________________________
opensolaris-code mailing list
opensolaris-code@opensolaris.org
http://mail.opensolaris.org/mailman/listinfo/opensolaris-code