DNS Exploit in the Wild

Page 6 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: spidey07
Just to add from what our DNS guys were talking about today (yes, 6 people devoted to nothing but DNS).

Yesterday MS security "experts" told them they had a patch in the works for MS DNS servers, but not to deploy it due to testing and this "isn't a big deal".

Today MS completely changed their tune - here's the patch, deploy it at all costs. The dns guys have been working on this and been on the phone constantly since it was announced. I'm not slamming MS, but to have a complete about face tune like that is unusual.

I think the thing that is scaring people involved with the actual patching is the rate at which it is developing. A friend just got an email from cisco that another patch was coming out in just a day or two and that to use what they released already until then. Already on various forums I have read of people talking about ways to get around the current patches. Looks like they opened a can of worms.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: aphex
Any chance this is related?

http://forums.anandtech.com/me...=2210695&enterthread=y

She's on Bellsouth DSL, vulnerable according to doxpara, we just switched her to Open DNS tonight.

Any unusual online activity could be related to this. Not saying it's the cause, I've done this network security crap for a living for 15 years and I'm not doing squat on the internet if it involves money/identity without very, very careful scrutiny. And even then for me, it's not worth risking it unless it's just credit card info.

 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: Modelworks
Originally posted by: spidey07
Just to add from what our DNS guys were talking about today (yes, 6 people devoted to nothing but DNS).

Yesterday MS security "experts" told them they had a patch in the works for MS DNS servers, but not to deploy it due to testing and this "isn't a big deal".

Today MS completely changed their tune - here's the patch, deploy it at all costs. The dns guys have been working on this and been on the phone constantly since it was announced. I'm not slamming MS, but to have a complete about face tune like that is unusual.

I think the thing that is scaring people involved with the actual patching is the rate at which it is developing. A friend just got an email from cisco that another patch was coming out in just a day or two and that to use what they released already until then. Already on various forums I have read of people talking about ways to get around the current patches. Looks like they opened a can of worms.

Yeah, it's the protocol and RFC itself. Very similar to the BGP vulnerability a while ago.

 

Modelworks

Lifer
Feb 22, 2007
16,240
7
76
Originally posted by: Xanis
anyone else having trouble getting on the doxpara site?

I think it just can't handle the load.
Quick search showed that site has a almost 900% increase in traffic
 

xanis

Lifer
Sep 11, 2005
17,571
8
0
Originally posted by: Modelworks
Originally posted by: Xanis
anyone else having trouble getting on the doxpara site?

I think it just can't handle the load.
Quick search showed that site has a almost 900% increase in traffic

Ah, I see. I'll try tomorrow morning.
 

IEC

Elite Member
Super Moderator
Jun 10, 2004
14,440
5,429
136
Not sure if PDX area Qwest is vulnerable, so I switched to OpenDNS for the time being.
 

IEC

Elite Member
Super Moderator
Jun 10, 2004
14,440
5,429
136
Originally posted by: Xanis
anyone else having trouble getting on the doxpara site?

I haven't been able to access that or the OARC test on either Qwest DNS or Open DNS.
 

StarsFan4Life

Golden Member
May 28, 2008
1,199
0
0
Originally posted by: Spartan Niner
Originally posted by: Xanis
anyone else having trouble getting on the doxpara site?

I haven't been able to access that or the OARC test on either Qwest DNS or Open DNS.

DDOS from the hackers already starting?

Going to sleep now, wonder if the internet will be up in the morning.
 

IEC

Elite Member
Super Moderator
Jun 10, 2004
14,440
5,429
136
Originally posted by: StarsFan4Life
Originally posted by: Spartan Niner
Originally posted by: Xanis
anyone else having trouble getting on the doxpara site?

I haven't been able to access that or the OARC test on either Qwest DNS or Open DNS.

DDOS from the hackers already starting?

Going to sleep now, wonder if the internet will be up in the morning.

I was able to test doxpara on both DNS now. But yeah those two sites are getting HAMMERED.
 

xanis

Lifer
Sep 11, 2005
17,571
8
0
I just got on doxpara and ran the test. Says I might be safe, but my NAT/Firewall is interfering... oi.
 

Crucial

Diamond Member
Dec 21, 2000
5,026
0
71
the opendns servers just took a crap for me. switched to another server I know and it's working fine now.
 

imported_Champ

Golden Member
Mar 25, 2008
1,608
0
0
So I have no understanding about what this really is but you guys are actually taking this seriously so it must be bad:shocked:

So I ran the test on doxpara and it said Your name server, at 64.xx.xxx.xxx, appears to be safe, but make sure the ports listed below aren't following an obvious pattern.

the it shows this request

83bc3baf835d.toorrr.com:

then my server number followed by TXID=xxxxx five times over

so is 83bc3baf835.toorrr.com the site or something i should be worried about because i dont know what that site is?
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: Champ
So I have no understanding about what this really is but you guys are actually taking this seriously so it must be bad:shocked:

So I ran the test on doxpara and it said Your name server, at 64.xx.xxx.xxx, appears to be safe, but make sure the ports listed below aren't following an obvious pattern.

the it shows this request

83bc3baf835d.toorrr.com:

then my server number followed by TXID=xxxxx five times over

so is 83bc3baf835.toorrr.com the site or something i should be worried about because i dont know what that site is?
<characters>.toorrr.com is the domain that they're using to test with. What happens is that you're given a series of requests to run lookups on for randomly generated subdomains of toorrr.com (which they control). Their master DNS server then logs these requests coming from your ISP's DNS server (since it would need to go to the master for all of these new subdomains) and reports the data back to you. This way they can see exactly what ports and transaction IDs are being used. If there's little-to-no randomness, then someone can brute force fake transactions and poison your ISP's DNS server, and you are told that your ISP's DNS server is vulnerable.

If it says you're safe, then you're safe.
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: spidey07
Just to add from what our DNS guys were talking about today (yes, 6 people devoted to nothing but DNS).

Yesterday MS security "experts" told them they had a patch in the works for MS DNS servers, but not to deploy it due to testing and this "isn't a big deal".

Today MS completely changed their tune - here's the patch, deploy it at all costs. The dns guys have been working on this and been on the phone constantly since it was announced. I'm not slamming MS, but to have a complete about face tune like that is unusual.
I thought MS had all of their related patches out and shipped on the 8th?
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
Who is usually behind these DDOS and DNS exploits? What kind of hackers? I suppose way beyond "4chan" people?
 

ViRGE

Elite Member, Moderator Emeritus
Oct 9, 1999
31,516
167
106
Originally posted by: RESmonkey
Who is usually behind these DDOS and DNS exploits? What kind of hackers? I suppose way beyond "4chan" people?
You'd be primarily looking at fraudsters. The most obvious use of stealing a domain is to steal credentials and other data for fraudulent purposes. However you could also do it to effectively bring a site offline, or replace a site with faulty information (e.g. replace the content of Whitehouse.gov with a notice that WW3 has started). Some people may not even be above doing it just to mess with people.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
Originally posted by: ViRGE
Originally posted by: spidey07
Just to add from what our DNS guys were talking about today (yes, 6 people devoted to nothing but DNS).

Yesterday MS security "experts" told them they had a patch in the works for MS DNS servers, but not to deploy it due to testing and this "isn't a big deal".

Today MS completely changed their tune - here's the patch, deploy it at all costs. The dns guys have been working on this and been on the phone constantly since it was announced. I'm not slamming MS, but to have a complete about face tune like that is unusual.
I thought MS had all of their related patches out and shipped on the 8th?

MS may have, I'm not part of that group but they're my buddies. They (DNS guys) have been on the horn constantly with MS for probably two+ weeks now, 10 hours a day they're on the horn.

I'm not pointing fingers at MS, just the pointing out the shift in attitude from them the last 24-48 hours.
 

RESmonkey

Diamond Member
May 6, 2007
4,818
2
0
Originally posted by: ViRGE
Originally posted by: RESmonkey
Who is usually behind these DDOS and DNS exploits? What kind of hackers? I suppose way beyond "4chan" people?
You'd be primarily looking at fraudsters. The most obvious use of stealing a domain is to steal credentials and other data for fraudulent purposes. However you could also do it to effectively bring a site offline, or replace a site with faulty information (e.g. replace the content of Whitehouse.gov with a notice that WW3 has started). Some people may not even be above doing it just to mess with people.

Well, if they do replace websites, they better screenshot it. I want to see it for the lulz.
 

her209

No Lifer
Oct 11, 2000
56,336
11
0

Jeff7

Lifer
Jan 4, 2001
41,596
19
81
A question then about router setup:

In my router, it uses DHCP to get the WAN info for the cable modem. This includes the DNS settings. The only way to edit the DNS servers is to set it to use a static IP.

So then the question:
If I change the DNS settings on my PC's Networking section, will it use those DNS servers instead of the router's?

 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |