DNS Exploit in the Wild

Page 4 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Fern

Elite Member
Sep 30, 2003
26,907
174
106
Originally posted by: Modelworks
For the concerned , here is the big deal.
Someone could go to a site like paypal. Save the site, using just cut and paste and screenshots. Then they create a new site using those materials. Re-direct your dns server to their new site and prompt for your login information. You then enter your information, just like you normally would, and you will not know you were just screwed until it is too late.

For now I would double click the padlock that appears with banking, credit, shopping, etc sites and make sure its a valid certificate. At least until everyone is sure all is okay. I would do that even if the test says the servers are okay, because there is a lot of conjecture going on right now about how to get around the latest patches.

Better safe than sorry and it only takes two secs.


This does not protect you on sites that do not use SSL for logins.
Sites like forums, online mail, etc or anything else that ask for info would still be vulnerable. But at least those will not cost you your money.

So my concern is only about sites that I visit?

If so, is my little local network safe?

T.I.A.

Fern
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
It's in the bottom right of your web browser, you can double click it to examine the certificate.

All browsers default behavior is to alert you if the certificate is no good but if you've changed that you should check every certificate.
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: spidey07
It's in the bottom right of your web browser, you can double click it to examine the certificate.

All browsers default behavior is to alert you if the certificate is no good but if you've changed that you should check every certificate.

The fact people are not aware of this, really concerns me. This could be much worse than I feared.
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
Originally posted by: Modelworks
Originally posted by: spidey07
It's in the bottom right of your web browser, you can double click it to examine the certificate.

All browsers default behavior is to alert you if the certificate is no good but if you've changed that you should check every certificate.

The fact people are not aware of this, really concerns me. This could be much worse than I feared.

The word "certificate" did come up in the error/warning, if that helps.

How would one be able to tell whether a certificate is legit or not by clicking it?

 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: Modelworks
Originally posted by: spidey07
It's in the bottom right of your web browser, you can double click it to examine the certificate.

All browsers default behavior is to alert you if the certificate is no good but if you've changed that you should check every certificate.

The fact people are not aware of this, really concerns me. This could be much worse than I feared.

Try telling the everyday Joe how to do this. Hell, I don't even use them.

I think this DNS exploit is going to be big....

FREAKIN idiots for releasing the info too!
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: StarsFan4Life
Originally posted by: Modelworks
Originally posted by: spidey07
It's in the bottom right of your web browser, you can double click it to examine the certificate.

All browsers default behavior is to alert you if the certificate is no good but if you've changed that you should check every certificate.

The fact people are not aware of this, really concerns me. This could be much worse than I feared.

Try telling the everyday Joe how to do this. Hell, I don't even use them.

I think this DNS exploit is going to be big....

FREAKIN idiots for releasing the info too!


Okay , going to try to break it down a bit simpler.

Most banking sites, or sites that ask for info use encryption between your pc and their servers called SSL. That prevents someone from getting your password off a router between you and them.

The sites that use SSL have to get a certificate from one of the agencies in charge of licensing. The most popular one is verisign.
http://www.verisign.com/

They provide a certificate that your browser checks when you go to a site that uses SSL to make sure the site is who they say they are. The certificates are not impossible to fake, but it isn't likely. When you are on the login page, look for a yellow padlock on the browser in the bottom right corner. Double click is and it should read what site you are on and who issued the certificate. If it does not match the site, then I would not enter any information.

Some sites like, Windows live do not use SSL unless you click the advanced security option on the site. Other sites do not use SSL at all. If it is a banking site and it is not using SSL I would not bank online with them.

 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Modelworks - read my post up above. A LOT of banking/credit card/shopping sites the main page is not SSL and there is an area to enter your username/pass. Of course the username/pass is sent with SSL on the real site and the next page is SSL as well.

So all I gotta do is slap up a page identical to the banks, your browser will show http://www.usbank.com but your connected to my web server, not the banks. Then you enter your username/pass, now I has it.

There is no way to tell if the site is legit or not this way
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: Modelworks
Originally posted by: StarsFan4Life
Originally posted by: Modelworks
Originally posted by: spidey07
It's in the bottom right of your web browser, you can double click it to examine the certificate.

All browsers default behavior is to alert you if the certificate is no good but if you've changed that you should check every certificate.

The fact people are not aware of this, really concerns me. This could be much worse than I feared.

Try telling the everyday Joe how to do this. Hell, I don't even use them.

I think this DNS exploit is going to be big....

FREAKIN idiots for releasing the info too!


Okay , going to try to break it down a bit simpler.

Most banking sites, or sites that ask for info use encryption between your pc and their servers called SSL. That prevents someone from getting your password off a router between you and them.

The sites that use SSL have to get a certificate from one of the agencies in charge of licensing. The most popular one is verisign.
http://www.verisign.com/

They provide a certificate that your browser checks when you go to a site that uses SSL to make sure the site is who they say they are. The certificates are not impossible to fake, but it isn't likely. When you are on the login page, look for a yellow padlock on the browser in the bottom right corner. Double click is and it should read what site you are on and who issued the certificate. If it does not match the site, then I would not enter any information.

Some sites like, Windows live do not use SSL unless you click the advanced security option on the site. Other sites do not use SSL at all. If it is a banking site and it is not using SSL I would not bank online with them.

If a hacker does his thing, I am SURE he wouldn't leave out something like this. I am pretty sure he/she would create the certificates to match.

 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: spidey07
Modelworks - read my post up above. A LOT of banking/credit card/shopping sites the main page is not SSL and there is an area to enter your username/pass. Of course the username/pass is sent with SSL on the real site and the next page is SSL as well.

So all I gotta do is slap up a page identical to the banks, your browser will show http://www.usbank.com but your connected to my web server, not the banks. Then you enter your username/pass, now I has it.

There is no way to tell if the site is legit or not this way


That is why I said I would not use a site that does not have a valid certificate for the login page itself.

One of the pages that does what you describe though is here:
http://login.live.com/

No surprise it is microsofts.
 

torpid

Lifer
Sep 14, 2003
11,631
11
76
OK, I checked my iPhone with the OARC site and it is safe, but the one on Dan Kaminsky's site says it is not. What the???
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: torpid
OK, I checked my iPhone with the OARC site and it is safe, but the one on Dan Kaminsky's site says it is not. What the???

I got to go with Dan for now, since he is the one who came up with it.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Surfing the web has now become like clicking a link in an E-mail. You have no idea of where you're really going.
 

torpid

Lifer
Sep 14, 2003
11,631
11
76
Originally posted by: Modelworks
Originally posted by: torpid
OK, I checked my iPhone with the OARC site and it is safe, but the one on Dan Kaminsky's site says it is not. What the???

I got to go with Dan for now, since he is the one who came up with it.

The confusing part is that dan's site claims it uses the same port, but the other site claims it is using a random port with good dispersal.
 

aphex

Moderator<br>All Things Apple
Moderator
Jul 19, 2001
38,572
2
91
I know this has probably been discussed at length somewhere before, and I've been curious about this in the past.

How do we know Open DNS is safe either? (Not necessarily just from this exploit, but in general as well)
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: torpid
Originally posted by: Modelworks
Originally posted by: torpid
OK, I checked my iPhone with the OARC site and it is safe, but the one on Dan Kaminsky's site says it is not. What the???

I got to go with Dan for now, since he is the one who came up with it.

The confusing part is that dan's site claims it uses the same port, but the other site claims it is using a random port with good dispersal.

I would just be more careful than usual until all this is sorted out, whether the test say your okay or not.
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: aphex
I know this has probably been discussed at length somewhere before, and I've been curious about this in the past.

How do we know Open DNS is safe either? (Not necessarily just from this exploit, but in general as well)

Well, you have to place your trust with someone in order to use the internet. OPenDNS seems to have developed a history of being trustworthy and they have been quick to patch what occurs. The other thing to realize is you can use IP addresses in place of names and this threat basically goes away since you no longer need to use a dns server.

I just don't think everyone wants to start talking like, have you been to the forums at 208.65.201.106 ?

So if everyone is using the same ip for OPenDNS you can be pretty sure it is the correct one.
 
Mar 11, 2004
23,444
5,849
146
This is going to be huge I think. I sure hope ISPs take this very seriously and get information or better yet patches out ASAP.

I've been trying to setup my router for OpenDNS, but for some reason I can't get to the webconfig. I can get to the modem but I can't change DNS settings on it. I'm going to need to get the install CD and see if that'll allow me to access it. It's a Netgear and yes I've tried what should be the two addresses to access it, the one has been taken by the modem, and the other doesn't work.

Would searching for the websites on Google and navigating that way direct you to the correct site, or is it possible that it could get spoofed there as well? I'm thinking of what I could recommend the non-computer savvy people I know to help them for the meantime.
 

JackBurton

Lifer
Jul 18, 2000
15,993
14
81
Originally posted by: newb111
Originally posted by: OdiN
Oh damn!

So they could make something like paypal.com resolve to their own site which looks exactly like paypal.....and there goes your bank account.

Or skip the step and make bankofamerica.com go to their site

BoA has security steps to prevent DNS redirects, site keys. So even if you were redirected, you should definitely know something is up.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
non-computer savvy people should not use any sites where they provide any information they don't want to fall into the wrong hands. Anything having to do with money, identity, shopping, etc. I told my girl, just don't do these things until it's settled.
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: spidey07
non-computer savvy people should not use any sites where they provide any information they don't want to fall into the wrong hands. Anything having to do with money, identity, shopping, etc. I told my girl, just don't do these things until it's settled.

:thumbsup:
 

danzigrules

Golden Member
Apr 20, 2000
1,255
0
76
may be safe, but the NAT/Firewall in front of it appears to be interfering with its port selection policy. The difference between largest port and smallest port was only 317.

Please talk to your firewall or gateway vendor -- all are working on patches, mitigations, and workarounds.


Is this good or bad?

since it wasn't answered the first time around, or I over looked it.
 

randay

Lifer
May 30, 2006
11,018
216
106
Originally posted by: AccruedExpenditure
If you guys really think the big corps/targets like eBay/Paypal/Amazon haven't patched this up already you're mistaken
-AE

clueless much?
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: AccruedExpenditure
If you guys really think the big corps/targets like eBay/Paypal/Amazon haven't patched this up already you're mistaken
-AE

They have nothing to patch.
It is YOUR ISP that is vulnerable and the servers you use to get the ip address of those sites that is the problem.

About the only way those sites could protect the customer 100% would be to post a number unique to each login that required you to call them and verify it every time you logged in.

That or everyone start using numbers

 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |