Microsoft Downplaying Recent DNS Vulnerability 93
Microsoft Watch writes "Microsoft downplays a recent DNS vulnerability in all Microsoft operating systems (XP, Vista, 2000, and 2003), claims Amit Klein, the security researcher who published the original vulnerability description (PDF) earlier this month. According to Klein, the description in Microsoft's Secure Windows Initiative blog entry is misleading, contains disinformation about the DNS transaction ID algorithm, and downplays the severity of the issue. Klein refutes Microsoft's claim that there is no way to reproduce the next transaction ID, given a series of observed transaction IDs. He shows that this is possible in his paper, which Microsoft had before publishing the SWI post, as well as on the series of data provided in the SWI blog itself."
Re: (Score:3, Informative)
I'll be here all week (Score:1)
Re: (Score:3, Insightful)
You'd almost think Microsoft marketing wants tech-savvy people to discuss anything but their defective products and poor support.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Under any other circumstance I would never have spotted your post at all - it must be that I track you around Slashdot, like an animal.
Can you say.... (Score:2)
Unlikely, but... (Score:4, Interesting)
If they cared (Score:1, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Unlikely, but... (Score:5, Insightful)
Re: (Score:1)
It's a valid question. (Score:1)
Re: (Score:2)
We have SafeSurf types of plugins for FireFox and various toolbars like the one from NetCraft that warn you about fake/dangerous sites, we even have things like AVG8 with its mildly annoying symbols next to URLs that popup windows when you hover. Isn't it about time somebody created a Bullshit-o-meter site & plugins?? When you googl
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
That's what I always think when I see this - how would I write it up if it were mine?
Re: (Score:2)
Re:Unlikely, but... (Score:5, Funny)
"Are you sure you want to poison the DNS stub resolver cache? Allow or Deny."
That'll fix it.
Super Secure Vista! (Score:1, Flamebait)
"Making money through doing evil"? (Score:1, Flamebait)
I think that Microsoft has not been fixing security issues in Vista because, if they ever deliver a secure operating system, PC customers will never buy another.
It's not an impossible challenge, making a secure [apple.com] operating system [openbsd.org]. Other organizations have done it. If Microsoft hasn't, that is because it doesn't want to.
Microsoft exploits the ignorance of its customers. But now the customers are beginning
Re: (Score:2)
I think that Microsoft has not been fixing security issues in Vista because, if they ever deliver a secure operating system, PC customers will never buy another.
Yet they HAVE been fixing security issues. Maybe not fast enough, and maybe there are still outstanding issues, but to claim otherwise is wrong. Your belief is apparently that people ONLY upgrade for security fixes? I strongly disagree and would like to see how you could possibly back that statement up.
It's not an impossible challenge, making a secure [apple.com] operating system [openbsd.org]. Other organizations have done it. If Microsoft hasn't, that is because it doesn't want to.
Apple has had plenty of security holes, so they should not be held up as your exemplar. OpenBSD is about as good as it gets. They make no bones about going for the SECURE/SAFE option over the fast, userfrie
Microsoft knew. Vista ghastly performance loss. (Score:2)
Windows Vista users suffer a ghastly performance loss (roughly two times, hardware for hardware) [infoworld.com].
Re: (Score:1)
So, please, hate on Mi
la la la la I CAN'T HEAR YOU la la la (Score:4, Informative)
Re: (Score:2)
Yes. Paranoid schizophrenia.
Re: (Score:2)
I'm sorry, that was a low blow on my part, justified, but still low.
Just so I don't get into oblivion as a troll, I will add something informative and on-topic. It appears that MSFT is getting heat from its channel "partners" about MSFT itself bashing Vista too much.
http://www.crn.com/software/207402573 [crn.com]
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
The "Desktop Linux" developers tend to downplay usability stuff
two words (Score:4, Insightful)
two better words (Score:1, Insightful)
zero credibility
That's what happens when you lie instead of fixing problems.
MODERATORS: Please note (Score:2, Informative)
Re: (Score:2)
Put the woman down
Okay, I don't get the issue here. (Score:5, Informative)
Now, forgive me if I'm missing the obvious, but why would an attacker, *who can read an outgoing request to a DNS server in real time*, not simply craft a reply using the outgoing packet data as a model? Why bother figuring out the transaction ID when an attacker, according to the scenarios given, *should already have it*, having gotten it from the sniffed packet.
I just don't see how being predictable makes this any worse, when you're apparently dealing with someone already on your own network, or on the route between you and your DNS server.
Re: (Score:1)
Re: (Score:3, Informative)
In other words, you do not have to have access to the victim's network or the server's network -- just a network which can query the server.
Re:Okay, I don't get the issue here. (Score:5, Interesting)
One of the current proposals (which I'm not a fan of because of other technical implications for DNS) is that since DNS query names are case-insensitive and copied by the server from the request packet to the response packet, to use the "uppercase bit" of each letter as more bits for the secure transaction ID. The fact that people are willing to consider hacks like these should tell you something about how badly we're backed into a corner on this issue with the DNS protocol. Hopefully soon someone will do something sensible like standardize an EDNS1 with extra transaction ID bits in the OPT RR, and then in like 10 years (if history is any guide) it might actually see wide deployment.
Re: (Score:1)
If you can guess the Transaction ID ( a 16-bit number ) you can poison a DNS cache. How many DNS resolutions do you make in a typical minute? Probibly on the order of 160~180 ( which DECREASES the odds of a poision hit down from a 16-bit to a 8-bit number of minutes. or about 10 hours...now get a 1,000 machines on a bot-net network to do it, and
Re: (Score:1)
Read the article? (Score:2, Interesting)
So please reply with an analysis of the article so I can ignore it and make chair jokes.
Re: (Score:3, Insightful)
Re: (Score:2)
If I've seen lots of baseless articles recently, I will post wait until somebody actually reads the article (as its one that isn't in my area of expertise) and explains weather its baseless o
Re: (Score:1)
Gates mocrosoft mind trick.. (Score:1, Funny)
Re: (Score:1)
Why is this news? (Score:5, Insightful)
$DUDE claims this is really serious and should be fixed at once.
(optional) $DUDE does the Right Thing and tells $VENDOR about it so they can fix it before he goes public.
$VENDOR replies that $DUDE's claims are overblown.
Flamewar on
(optional, much later) $VENDOR quietly fixes $PRODUCT.
Re: (Score:1)
if $VENDOR == MS
switch (DayOfWeek) {
case M : Deny Deny Deny
print "no we didn't"
case T : set $BUG = $FEATURE
Re: (Score:1)
Re: (Score:2)
$DUDE finds vulnerability in $PRODUCT made by $VENDOR.
$DUDE claims this is really serious and should be fixed at once.
(optional) $DUDE does the Right Thing and tells $VENDOR about it so they can fix it before he goes public.
$DUDE finds vulnerability in $PRODUCT made by $VENDOR.
$DUDE claims this is really serious and should be fixed at once.
(optional) $DUDE does the Right Thing and tells $VENDOR about it so they can fix it before he goes public.
$VENDOR fixes the
Re: (Score:1)
RTFA (Score:5, Informative)
April 30th, 2007 - Microsoft Security Response Center (MSRC) were informed of this issue.
March 18th, 2008 - Microsoft releases a service pack for Windows Vista (Vista SP1), which includes a fix for this issue.
April 8th, 2008 - Microsoft issues a fix ([19]) for Windows Vista, Windows XP SP2, Windows 2003 and Windows 2000 SP4. The fix is downloadable at Microsoftâ(TM)s website. Simultaneously, Trusteer discloses the vulnerability to the public (in the form of this document).
Also, as stated above, the scenarios required to pull this off are pointless. If someone is sniffing your traffic in your switched network, they already have access to your network that could invoke far more problems than simple DNS poisoning.
Re: (Score:2, Funny)
Re: (Score:1)
Oh, I forgot, here at
Microsoft is right, DNS is broken (Score:1)
Time for DNSSEC or something equivalent. - Now, if that could be forged, this would be a high priority issue on the other hand.
My opinion is Microsoft isn't totally wrong (Score:3, Informative)
Also, since POSIX is entirely unaware of the GUI API, there has never been a good method of communicating events to the application. Ideally, there would have been a system related to select() or poll() which would have allowed host name resolution to be part of the same application loop as other socket communication.
That being said, Windows has more or less always include host name resolution as part of the application event loop. Even back when Winsock 1.1 was primarily used. When the host name is resolved, an event is passed to the application. But it is not my intention to discuss DNS from an application level, but instead from a protocol level.
This hack that the reported document is definately a hole in Windows DNS client implementation, Microsoft should fix it, they should treat any vulnerability with respect and diligence. This hack however requires a lot of things to happen at once.
First of all, it requires that the attacker is in a position where they can reliably observe point to point DNS traffic. Meaning from the workstation to the server and back. When used with switches and dslams, this is not generally possible since unless the switch has a defined observer port (which HP procurve allows, but disables by default) traffic is closed and only broadcast requests will be observable outside the point to point path.
Second, it requires that the attacker is located in a position on the network where they can respond to DNS requests faster than the server. So, if the edge switch they're connected to puts them physically closer to the target, but the switch has a higher speed uplink to the backbone, there's still little chance the attacker will inject their packets in time.
Third, it requires making the machine which is being attacked to perform multiple DNS queries. If the attacker gets lucky (another if) the user will be setup for proxy server auto discover which was typically true in earlier versions of IE. Then using a broadcast type situation, they'd be able to configure a proxy server which would inject web pages to the clients computer containing multiple DNS entries. Unfortunately, this would remove the need to perform DNS lookups and they'd have to shut off the proxy and hope the browser falls back to proxyless operation mode.
Finally, it would require that his math for calculating the next DNS event id, source port, etc... is sound. I haven't checked the math, nor am I inclined to since even if we assume he's 100% correct, requiring it to rain at an angle of 32degs precisely at 12:05.2334 UTC on April the 19th of 2009 while Christopher Columbus rises from his grave to baptise the next baby Jesus is just irrational.
Hackers, save yourself some time, if you have this kind of access to the network, use a keylogger, much higher chance of success and much easier. Just remember to not hide under the desk of the computer you're trying to log.
Really, This is OLD news, but with new twist... (Score:2, Informative)
1) It was discovered as the cache-poisioning problem.
2) It Affects MS DNS clients, and IIs Server. ( Clients for their poisoning effects, and IIs Servers for the actual poisioning.
3) You can fix ANY client by pointing to OpenDNS, ( I have had extensive corrspondance with their technical team. )
4) Microsoft was suppoed to fix this for All the Clients and servers, they backed off and said it was only for Server 2003, and Vista....
then only for Vista SP1, then... didnt make V