DNS Exploit in the Wild

Page 5 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
The plot thickens. It seems that the patches are only a temporary fix. That if someone can guess the correct port on the server they can still manipulate it with the exploit.
So looks like it is going to be awhile before this is totally resolved.

Administrators should not wait any longer to install available patches for their nameservers. By assigning a random source port for each DNS query, these ensure that the attacker will not only have to guess the transaction ID, but also the UDP port. Unfortunately, this still does not solve the problem, but only defers it. For that reason, there is talk of introducing DNSSEC across the board, since the authenticity of the responding server is established via PKI key verification.
 

her209

No Lifer
Oct 11, 2000
56,336
11
0
OMG, DNS requests aren't encrypted and there can be subject to MITM attacks.

ZMG!!!
 

Harvey

Administrator<br>Elite Member
Oct 9, 1999
35,057
67
91
I'm on SBC (now AT&T). I phoned their tech support and explained the problem, including leading them to pages describing it. Their front line off shore people didn't know anything about this, but they passed me to their upper tier support people. It took a while, and I have to thank others in this thread for the info I was able to give them.

The tech said they are already migrating to new DNS servers, and he gave me the following settings for ATT worldnet (including SBC, etc.) DSL subscribers ONLY:

Controt Panel > Network Connections

Click Network Connections

Right click Local Area Connections and click Properties.

Under the General tab (the default), highlight "Internet Protocol (TCP/IP)," and click the Properties button.

In the second box of settings, Check Use the following DNS server addresses (not the default):

Preferred DNS server: 68.94.156.1

Alternate DNS server: 68.94.157.1

Turn off or unplug your DSL/Cable modem off for about 10 seconds, reboot your machine, and turn on/plug it your modem on again.

I checked this at the above test site. So far, it is shown as not vulnerable.

The above will work for all AT&T subscribers. I suggest phoning your ISP and going through the same dance with them to get their recommendations. It's their servers. They should have the handle on any temporary settings or patches that will work on their system.

Thanks for the info. Hope this contributes.
 

paulxcook

Diamond Member
May 1, 2005
4,277
1
0
I've entered the DNS server IPs into my router and the changes were accepted but I'm still not passing the DNS test. Ideas anybody? I even checked the walkthru on the OpenDNS site to make sure I wasn't stupid and my linksys screen matches theirs.
 

Harvey

Administrator<br>Elite Member
Oct 9, 1999
35,057
67
91
Originally posted by: paulxcook
I've entered the DNS server IPs into my router and the changes were accepted but I'm still not passing the DNS test. Ideas anybody? I even checked the walkthru on the OpenDNS site to make sure I wasn't stupid and my linksys screen matches theirs.

You may have to turn off your DSL/cable modem, reboot, and re-power your modem.
 

91TTZ

Lifer
Jan 31, 2005
14,374
1
0
Originally posted by: RESmonkey
Firefox warned me of a DNS name change in a website I was shopping at; said if I didn't trust it, I should hit CANCEL. I did.

^Is that related to any of this? BTW, this happened earlier today. Firefox figured that a redirection to another *similar site* might be unsafe.

It would be hasty to attribute all your errors to this problem, which isn't that widespread yet.

Your error sounds like a certificate error.
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Ok, sort of a problem here. Earlier, I changed my router DNS ip's to the OpenDNS ip's from the first page of this post:

208.67.222.222
208.67.220.220

When I got home today, I tried to log onto my server (media server I have) whose computer name is "Server". When I tried to use Remote Desktop, typing in the computer name would not find the computer. However, if I typed in the IP (192.168.0.100) I could connect.

I ran a tracert to "Server", it did a route all over the internet, finishing with one of the DNS ip's I put in from OpenDNS. Strange.

I took the DNS ip's out that I put in, restarted the router and I could connect to "Server" using RDP. I switched the DNS back to the OpenDNS IP's, I couldn't connect to "Server", but could connect via IP.

Any ideas on why this is?
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: Chiropteran
Originally posted by: ViRGE
If it was ignored, and it was forever, that would be true. But it wasn't ignored, some 100+ vendors all worked on the problem and had patches ready to go on Super Patch Tuesday. And the entire details of the situation were going to be released a month after that, so that everyone had a chance to regression test the patches and get their stuff updated.

Terminating the window for regression testing and patching is irresponsible at best, threatening at worst.

And what if they did wait, and millions of users had bank account numbers stolen in the meantime? Would you have personally paid for all the damage done?
I'm not sure how waiting a month on releasing the exploit details would make it easier to pull off posioning attacks. Now on the other hand I can certainly see how releasing the exploit details early could allow for attacks to be more likely to succeed.
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: StarsFan4Life
Ok, sort of a problem here. Earlier, I changed my router DNS ip's to the OpenDNS ip's from the first page of this post:

208.67.222.222
208.67.220.220

When I got home today, I tried to log onto my server (media server I have) whose computer name is "Server". When I tried to use Remote Desktop, typing in the computer name would not find the computer. However, if I typed in the IP (192.168.0.100) I could connect.

I ran a tracert to "Server", it did a route all over the internet, finishing with one of the DNS ip's I put in from OpenDNS. Strange.

I took the DNS ip's out that I put in, restarted the router and I could connect to "Server" using RDP. I switched the DNS back to the OpenDNS IP's, I couldn't connect to "Server", but could connect via IP.

Any ideas on why this is?
Your router provides its own DNS tables that includes its own entry for "server". Since you switched to OpenDNS, you need to switch to accessing it by IP.
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: aphex
I know this has probably been discussed at length somewhere before, and I've been curious about this in the past.

How do we know Open DNS is safe either? (Not necessarily just from this exploit, but in general as well)
They're verified to be secure. They've said that they've patched their servers, and by feeding them random subdomain requests for a specific domain, we can see what ports and transaction IDs are used; they're perfectly random like they should be. This is not to say that their service doesn't suck for other reasons, but no one should be poisoning their DNS records.
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: ViRGE
Originally posted by: StarsFan4Life
Ok, sort of a problem here. Earlier, I changed my router DNS ip's to the OpenDNS ip's from the first page of this post:

208.67.222.222
208.67.220.220

When I got home today, I tried to log onto my server (media server I have) whose computer name is "Server". When I tried to use Remote Desktop, typing in the computer name would not find the computer. However, if I typed in the IP (192.168.0.100) I could connect.

I ran a tracert to "Server", it did a route all over the internet, finishing with one of the DNS ip's I put in from OpenDNS. Strange.

I took the DNS ip's out that I put in, restarted the router and I could connect to "Server" using RDP. I switched the DNS back to the OpenDNS IP's, I couldn't connect to "Server", but could connect via IP.

Any ideas on why this is?
Your router provides its own DNS tables that includes its own entry for "server". Since you switched to OpenDNS, you need to switch to accessing it by IP.

So what do I do here?
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: StarsFan4Life
Ok, sort of a problem here. Earlier, I changed my router DNS ip's to the OpenDNS ip's from the first page of this post:

208.67.222.222
208.67.220.220

When I got home today, I tried to log onto my server (media server I have) whose computer name is "Server". When I tried to use Remote Desktop, typing in the computer name would not find the computer. However, if I typed in the IP (192.168.0.100) I could connect.

I ran a tracert to "Server", it did a route all over the internet, finishing with one of the DNS ip's I put in from OpenDNS. Strange.

I took the DNS ip's out that I put in, restarted the router and I could connect to "Server" using RDP. I switched the DNS back to the OpenDNS IP's, I couldn't connect to "Server", but could connect via IP.

Any ideas on why this is?

Your router supports dynamic DNS registration used by windows. The router will be the DNS server for your LAN and provide itself as the DNS server for clients via DHCP. Windows will register it's name so you have name resolution for that machine. OpenDNS can't be expected, nor should they support that.

Just stick to IP address for now otherwise you'll have to mess with netbios over TCP for name resolution and without a netbios name server that can be real ugly.
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: spidey07
Originally posted by: StarsFan4Life
Ok, sort of a problem here. Earlier, I changed my router DNS ip's to the OpenDNS ip's from the first page of this post:

208.67.222.222
208.67.220.220

When I got home today, I tried to log onto my server (media server I have) whose computer name is "Server". When I tried to use Remote Desktop, typing in the computer name would not find the computer. However, if I typed in the IP (192.168.0.100) I could connect.

I ran a tracert to "Server", it did a route all over the internet, finishing with one of the DNS ip's I put in from OpenDNS. Strange.

I took the DNS ip's out that I put in, restarted the router and I could connect to "Server" using RDP. I switched the DNS back to the OpenDNS IP's, I couldn't connect to "Server", but could connect via IP.

Any ideas on why this is?

Your router supports dynamic DNS registration used by windows. The router will be the DNS server for your LAN and provide itself as the DNS server for clients via DHCP. Windows will register it's name so you have name resolution for that machine. OpenDNS can't be expected, nor should they support that.

Just stick to IP address for now otherwise you'll have to mess with netbios over TCP for name resolution and without a netbios name server that can be real ugly.

So when will this damn EXPLOIT be fixed. Sounds like someone should be held responsible for the potential to bring down "The Internet"
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: StarsFan4Life
So when will this damn EXPLOIT be fixed. Sounds like someone should be held responsible for the potential to bring down "The Internet"

The problem lies with the protocol itself. If you want somebody to blame, look at the names on the RFC. It's a very old protocol and bullet proof security weren't on peoples minds then.
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: RESmonkey
I called my ISP, and there are only min.wage "tech support" people who have no clue.

Same with my local Time Warner. The lady I chatted with thought I was crazy, she actually asked me if I was a hacker.
 

Harvey

Administrator<br>Elite Member
Oct 9, 1999
35,057
67
91
Originally posted by: RESmonkey
I called my ISP, and there are only min.wage "tech support" people who have no clue.

Ask for... make that DEMAND second tier support. They may not have an answer, but at least, you should be able to find someone who knows enough to understand the problem.

That's what happened when I called AT&T. I directe the guy to the links while talking with him. He understood, and he had to put me on hold while he contacted his superior, but that's when he came back with the info.

The truth is, I don't know if their new DNS server is less vulnerable, but after I did, doxpara.com no longer showed I was on a vulnerable line. Unfortunately, the link is now down so either the bad guys or the AnandTech effect got to it.
 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Since the exploit was announced, seems the bad guys are adding to it.
Jerry Dixon worked for Homeland Security so that tells you how serious this is.
More info from the webcast done today by Dan:

Today Black Hat held a preview webcast with [Dan Kaminsky] about the massive DNS bug he discovered. On July 8th, multiple vendors announced a patch for an undisclosed DNS vulnerability. [Dan Kaminisky] did not release the details of the vulnerability at that time, but encouraged security researchers to not release their work, if they did happen to discover the bug. On the 21st, the full description of the vulnerability was leaked.

In today's webcast, [Dan] covered how he felt about the handling of the vulnerability and answered a few questions about it. He started out by talking about how he stumbled across the bug; he was working on how to make content distribution faster by using DNS to find the server closest to the client. The new attack works because DNS servers not using port randomization make it easy for the attacker to forge a response. You can read the specifics of the attack here.

[Dan] talked about the work that had been done since the July 8th announcement. A handful of researchers had contacted him with exact bug in hand, but as requested, did not release the information. When first announced, 86% of all servers voluntarily tested using the checker on doxpara.com were vulnerable. 13 days later, the vulnerability was published and only 52% of the people using the checker are vulnerable. That's not perfect, but 13 days gave plenty of companies enough time to both test and roll out their patches.

[Jerry Dixon], the former Director of the National Cyber Security Division, pointed out that even though the vulnerability was eventually leaked, the patches had already been out for 13 days; this isn't a zero day vulnerability with no fix. So, we're in a fairly good position. That being said, even since our Metasploit announcement yesterday, they've pushed new module code that will take over an entire domain. Security researcher [Rich Mogull] has feels that producing this exploit code quickly was "bullshit" and "only helps the bad guys".

[Dan] pointed out that some related work people have been doing to mitigate DNS cache poisoning using firewalls. [Michael Rash] wrote about using iptables in Linux to randomize outbound requests and [Jon Hart] covered using PF in OpenBSD. The team is actively contacting vulnerable servers to get them to patch. They've also advised IDS vendors to look for multiple replies with the same ID as a telltale sign of this attack.

You can check your DNS servers using the tool on doxpara.com. We've personally switched our machines to OpenDNS's servers 208.67.222.222 and 208.67.220.220. Not only did it give us some piece of mind, but the performance is way better than our ISP's overloaded DNS.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Just to add from what our DNS guys were talking about today (yes, 6 people devoted to nothing but DNS).

Yesterday MS security "experts" told them they had a patch in the works for MS DNS servers, but not to deploy it due to testing and this "isn't a big deal".

Today MS completely changed their tune - here's the patch, deploy it at all costs. The dns guys have been working on this and been on the phone constantly since it was announced. I'm not slamming MS, but to have a complete about face tune like that is unusual.
 

Gothgar

Lifer
Sep 1, 2004
13,429
1
0
hmmm, I couldn't get doxpara, so I switched my DNS to the open DNS servers, and now I can get doxpara, I wonder if I was vulnerable before...

Time Warner in So Cal...
 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |