DNS Exploit in the Wild

Page 3 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: iamwiz82
Originally posted by: StarsFan4Life
Originally posted by: iamwiz82
Originally posted by: StarsFan4Life
We tested it here:

Your name server, at 64.129.67.XXX, appears to be safe, but make sure the ports listed below aren't following an obvious pattern

However, this IP is not the DNS server we use. Is this test even legit or correct?

It's testing whatever your DNS is set to, not necessarily the ISP.

Also, regarding your port pattern issue, I had to turn on the scambling functionality on my Checkpoint box.

Well, our DNS is NOT set to the IP above, rather a completely different ip.

The IP above is the public IP that is probably NATed on your firewall. The firewall knows your DNS servers' IPs. Your firewall should also be scrambling the NATed ports.

So this test is legit and correct?
 

iamwiz82

Lifer
Jan 10, 2001
30,772
13
81
Originally posted by: StarsFan4Life
Originally posted by: iamwiz82
Originally posted by: StarsFan4Life
Originally posted by: iamwiz82
Originally posted by: StarsFan4Life
We tested it here:

Your name server, at 64.129.67.XXX, appears to be safe, but make sure the ports listed below aren't following an obvious pattern

However, this IP is not the DNS server we use. Is this test even legit or correct?

It's testing whatever your DNS is set to, not necessarily the ISP.

Also, regarding your port pattern issue, I had to turn on the scambling functionality on my Checkpoint box.

Well, our DNS is NOT set to the IP above, rather a completely different ip.

The IP above is the public IP that is probably NATed on your firewall. The firewall knows your DNS servers' IPs. Your firewall should also be scrambling the NATed ports.

So this test is legit and correct?

Yes. What firewall are you running?
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
Firefox warned me of a DNS name change in a website I was shopping at; said if I didn't trust it, I should hit CANCEL. I did.

^Is that related to any of this? BTW, this happened earlier today. Firefox figured that a redirection to another *similar site* might be unsafe.

 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: RESmonkey
Firefox warned me of a DNS name change in a website I was shopping at; said if I didn't trust it, I should hit CANCEL. I did.

^Is that related to any of this? BTW, this happened earlier today. Firefox figured that a redirection to another *similar site* might be unsafe.

What were the websites?
 

dmcowen674

No Lifer
Oct 13, 1999
54,889
47
91
www.alienbabeltech.com
This is what I got

================
Your name server, at xxx.xxx.xxx.xxx, may be safe, but the NAT/Firewall in front of it appears to be interfering with its port selection policy.

The difference between largest port and smallest port was only 33.

Please talk to your firewall or gateway vendor -- all are working on patches, mitigations, and workarounds.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: RESmonkey
Firefox warned me of a DNS name change in a website I was shopping at; said if I didn't trust it, I should hit CANCEL. I did.

^Is that related to any of this? BTW, this happened earlier today. Firefox figured that a redirection to another *similar site* might be unsafe.

Yes, it's because of this. While your banking sites, paypal, etc are all fine because of SSL, I'd verify/view the certificate on any sites dealing with money/identity.
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
1800 contacts; although my order did go through.

I just switched to OpenDNS. What does this do?
 

iamwiz82

Lifer
Jan 10, 2001
30,772
13
81
Originally posted by: RESmonkey
1800 contacts; although my order did go through.

I just switched to OpenDNS. What does this do?

OpenDNS has patched servers = protection.
 

randay

Lifer
May 30, 2006
11,018
216
106
so how does one know that doxpara and other testers have not been redirected and giving false hope to teh interwebs users?!?
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
So did they get my information, or did Firefox stop the redirection when I hit "cancel"?

They got it, your screwed.

Im sure you are just fine.

Should I cancel the CC? Or put some sort of hold/freeze on it?

 

randay

Lifer
May 30, 2006
11,018
216
106
Originally posted by: RESmonkey
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
So did they get my information, or did Firefox stop the redirection when I hit "cancel"?

They got it, your screwed.

Im sure you are just fine.

Should I cancel the CC? Or put some sort of hold/freeze on it?

what kind of CC is it?
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: RESmonkey
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
So did they get my information, or did Firefox stop the redirection when I hit "cancel"?

They got it, your screwed.

Im sure you are just fine.

Should I cancel the CC? Or put some sort of hold/freeze on it?

No way man. You aren't even sure if this an exploit or just a random fault in Firefox.

Anyone else tried http://www.1800contacts.com/?
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: OdiN
Originally posted by: StarsFan4Life
Originally posted by: Gooberlx2
Still vulnerable. I wonder if our IT dept even knows about this.

Was this referenced to me?

I sure hope you aren't part of any IT department.

Well I am and don't appreciate these comments. Just because I am part of an IT department, doesn't mean I know everything. I love to learn though.
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
So did they get my information, or did Firefox stop the redirection when I hit "cancel"?

They got it, your screwed.

Im sure you are just fine.

Should I cancel the CC? Or put some sort of hold/freeze on it?

No way man. You aren't even sure if this an exploit or just a random fault in Firefox.

Anyone else tried http://www.1800contacts.com/?

IF there were random uses of CC later on in the future, would one be able to dispute them?

I'm not too confident in think this was an FF error; the DNS error was clearly following the lines of this exploit. I've never had FF tell me anything like that.
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: RESmonkey
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
So did they get my information, or did Firefox stop the redirection when I hit "cancel"?

They got it, your screwed.

Im sure you are just fine.

Should I cancel the CC? Or put some sort of hold/freeze on it?

No way man. You aren't even sure if this an exploit or just a random fault in Firefox.

Anyone else tried http://www.1800contacts.com/?

IF there were random uses of CC later on in the future, would one be able to dispute them?

I'm not too confident in think this was an FF error; the DNS error was clearly following the lines of this exploit. I've never had FF tell me anything like that.

So how the heck are we going to know for sure? I mean, if the hacker just sets up a website JUST like 1800contacts.com is now, all they have to do is re-direct it and bam, they have your CC info. How can we KNOW for sure if this is happening?
 

Fern

Elite Member
Sep 30, 2003
26,907
174
106
Network noob alert!

I've read every post and the links. But I'm still pretty clueless.

I ran the check and I'm not safe.

I know how to change the DNS numbers, but before I do I'd really like it if someone could tell me what that does.

I'm on a small office network (XP) with about 5 PCs hooked up. I don't think I can do anything with the router. My ISP is bellsouth (DSL).

Any info is appreciated.

T.I.A.

Fern

 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
For the concerned , here is the big deal.
Someone could go to a site like paypal. Save the site, using just cut and paste and screenshots. Then they create a new site using those materials. Re-direct your dns server to their new site and prompt for your login information. You then enter your information, just like you normally would, and you will not know you were just screwed until it is too late.

For now I would double click the padlock that appears with banking, credit, shopping, etc sites and make sure its a valid certificate. At least until everyone is sure all is okay. I would do that even if the test says the servers are okay, because there is a lot of conjecture going on right now about how to get around the latest patches.

Better safe than sorry and it only takes two secs.


This does not protect you on sites that do not use SSL for logins.
Sites like forums, online mail, etc or anything else that ask for info would still be vulnerable. But at least those will not cost you your money.
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: Modelworks
For the concerned , here is the big deal.
Someone could go to a site like paypal. Save a the site, using just cut and paste and screenshots. Then they create a new site using those materials. Re-direct your dns server to their new site and prompt for your login information. You then enter your information, just like you normally would, and you will not know you were just screwed until it is too late.

For now I would double click the padlock that appears with banking, credit, shopping, etc sites and make sure its a valid certificate. At least until everyone is sure all is okay. I would do that even if the test says the servers are okay, because there is a lot of conjecture going on right now about how to get around the latest patches.

Better safe than sorry and it only takes two secs.

So, explain this again?
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: StarsFan4Life
Originally posted by: Modelworks
For the concerned , here is the big deal.
Someone could go to a site like paypal. Save a the site, using just cut and paste and screenshots. Then they create a new site using those materials. Re-direct your dns server to their new site and prompt for your login information. You then enter your information, just like you normally would, and you will not know you were just screwed until it is too late.

For now I would double click the padlock that appears with banking, credit, shopping, etc sites and make sure its a valid certificate. At least until everyone is sure all is okay. I would do that even if the test says the servers are okay, because there is a lot of conjecture going on right now about how to get around the latest patches.

Better safe than sorry and it only takes two secs.

So, explain this again?

What do you not understand ?
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
modelworks - not every site redirects where you put your username/password into to SSL/encryption. The legitimate site of course encrypts your username/pass and then you go onto the HTTPS page.

That's the real danger because the fake page could just be used to gather username/password, it wouldn't need to use SSL, just regular http.

Now most banking sites with the required new security will be fine because of the two factor authentication but not every site uses it.
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
Originally posted by: StarsFan4Life
Originally posted by: RESmonkey
So did they get my information, or did Firefox stop the redirection when I hit "cancel"?

They got it, your screwed.

Im sure you are just fine.

Should I cancel the CC? Or put some sort of hold/freeze on it?

No way man. You aren't even sure if this an exploit or just a random fault in Firefox.

Anyone else tried http://www.1800contacts.com/?

IF there were random uses of CC later on in the future, would one be able to dispute them?

I'm not too confident in think this was an FF error; the DNS error was clearly following the lines of this exploit. I've never had FF tell me anything like that.

So how the heck are we going to know for sure? I mean, if the hacker just sets up a website JUST like 1800contacts.com is now, all they have to do is re-direct it and bam, they have your CC info. How can we KNOW for sure if this is happening?

I know I went to the correct 1800contacts, and it was fine up until the point where you checkout. Once I hit SUBMIT, hit went to the THANK YOU page, and then FF alerted me on the redirection to a site w/ a diff certificate/DNS something.

And what is this padlock Modelworks speaks of?
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |