Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security The Internet IT

Identity Theft Hits the Root Name Servers 131

aos101 writes "The Renesys blog has an interesting story about networks advertising the old address space of the L root name server after ICANN changed the IP address last November. These networks were also running root name servers on the old IP address of the L root name server up until last week, so any DNS servers still using the old IP address might have been getting their answers from these bogus name servers. A very cursory examination by Renesys of one of these bogus servers found that it appeared to be providing correct responses, which might be why no one noticed the problem. As Renesys points out, the volume of traffic to a root server is staggering, so the people running these bogus root servers must have had a reason. What did they get out of it?"
This discussion has been archived. No new comments can be posted.

Identity Theft Hits the Root Name Servers

Comments Filter:
  • Good Samaritans? (Score:3, Insightful)

    by FurtiveGlancer ( 1274746 ) <AdHocTechGuy&aol,com> on Monday May 19, 2008 @09:03AM (#23461988) Journal
    Somehow, I doubt that is the explanation, but wouldn't it be nice if it were true?
    • by stoborrobots ( 577882 ) on Monday May 19, 2008 @09:25AM (#23462220)
      Or possibly some attempt at stopping arbitrarily many of their customers setups from breaking... If you've got enough poorly configured machines, it might be easier to ensure that the servers they are looking for remain available, rather than trying to fix _all_ of them immediately... Especially if they're mission-critical systems...
      • Re: (Score:3, Insightful)

        by perlchild ( 582235 )
        Then wouldn't need to advertise routes/ip space for their own customers... The very word advertise, in the context, means to third parties, as in BGP advertisement.
        • Re: (Score:3, Insightful)

          Umm, the "customers" in question might not have been on the same AS?

          And, for that matter, if Bill Manning authorized the use of the address space, then it's not even an attack!
        • Someone may have just forgotten to block an internal routing advertisement from being propogated to the outside or something.
      • by aleph42 ( 1082389 ) * on Monday May 19, 2008 @09:55AM (#23462602)
        You guys are awefully optimistic; those who pulled that off had an enormous power for a short time. Quoting TFA:

        In general, they could engage in all sorts of mischief, ranging from very targeted ("let's get this one individual or organization") to very wide-ranging ("let's blow away .com today").
        all the while completly undetected. I don't understand all the details, but from what I got the whole name resolving is a trust based system; so advertising a false youtube domain would temporarly work, but then you'd be busted and left with no karma. Except that these "root servers" are free of those constraint.

        The fact that those who did this had huge resources do not make it less scary, neither does the fact that nobody detected anything. Remeber how that guy operated a tor exit node to get a whole lot of interesting datas; the idea here is the same.

        (A concrete example would be to send your wikipedia request to a bogus wikipedia website. It would forward all your queries to the real wikipedia, so you couldn't tell the difference (man in the middle), but on some pages it would serve you an altered page; it could also make you feel like you wrote an article, but the article would actually only show up on your copy of the bogus website, not the real one. Encryption twarts this, otherwise it's really the worst case scenario.)

        And apparently, there is nothing to prevent it from happening again. Since people seem so little concerend, I must have missed some detail which makes everything fine; or at least I really hope so.
        • Just a precision: the great firewall of China, or your ISP, has the same power (man in the middle possibility). But as in the p2p throttling case, once people detect it, they know that the culprit is the ISP.

          Also, an ISP from an other country will not be able to affect you; but that root server effect is world-wide.

          Of course (IIRC), the US always had their hand on a server with that kind of privilege. But again, meddling with it would have directly incriminated the US.
        • The problem is that the underlying BGP is a trust based system. That's really what trust was taken advantage of. When you learn how that works and how BGP hijacking can happen, you realize how important HTTPS is and how vulnerable to man-in-the-middle attacks everything else is.
    • Re:Good Samaritans? (Score:5, Interesting)

      by SatanicPuppy ( 611928 ) * <Satanicpuppy@nosPAm.gmail.com> on Monday May 19, 2008 @09:31AM (#23462296) Journal
      I upgraded a corporate DNS once and left the old system in place, just changed the CNAME to point to the new server. The new server (windows) ate itself later, and since the guy whose baby it was had been canned, I just switched the name back to the old servers.

      Later, my new boss wanted to switch to a Linux based system, instead of the windows system which I'd already repurposed. I quoted him a modest server, set it up as a secure proxy for some of our internal web applications, and let the original linux system keep chugging along.

      I figure I can get at least two more servers out of this, before I actually have to upgrade the system.

      Maybe the guys at root-servers just left some hardware running at the old address? ;)

      They should never have relinquished the address so damn quickly. Turn off the equipment for a few weeks first and let people see that that address no longer works...Don't just let someone move in seamlessly and hijack your junk.
      • by zappepcs ( 820751 ) on Monday May 19, 2008 @09:35AM (#23462346) Journal
        Mod parent up. Those IP addresses should NEVER have been let out in the cold where they could be misused. That's just not right
        • Re: (Score:3, Interesting)

          Here's my question:

          Isn't there some sort of authentication for DNS a la SSL certificates? If not, would this take a major overhaul of the DNS system to support it?

          As I understand it, there's also a man-in-the-middle type of attack with DNS where a local router (possibly a Hacked By Chinese(tm) "Cisco" router) will substitute its own DNS replies instead of passing the query to the real DNS server.

          Couldn't both of these issues be resolved by having a field on the DNS record where the reply is signed by the DN
          • by stoborrobots ( 577882 ) on Monday May 19, 2008 @09:48AM (#23462488)
            There is DNS Security [wikipedia.org]... But really, it's like any fix for SMTP - nobody bothers using it because nobody is using it...
            • by el_nino ( 4271 )
              There are people pushing for DNSSEC, but there's obviously a great deal of inertia involved.

              Around the same time as L was moved, the Swedish ccTLD .SE together with other Swedish net organisations sent an open letter [www.iis.se]
              to ICANN urging them to deploy DNSSEC and sign the root zone.

              Hopefully this incident will speed things up.
            • I think it is a bit early to say DNSSEC is being ignored. The most recent related RFC is dated Feburary 2008 (although Wikipedia says it was released in March). The Wikipedia article mentions work on setting up implementations. It sounds like it is getting slowly phased in, but as the parent implied, like many other internet standards, it may end up dying before anyone actually starts using it.
            • Thanks for the pointer. Like everything else, it seems my original ideas have been thought of years ago. :-)

              Judging by the other replies to your post, it seems like there's some hope. Even if it was just .com and .org at first, that'd be a huge step forward.
      • Re:Good Samaritans? (Score:5, Interesting)

        by Firehed ( 942385 ) on Monday May 19, 2008 @09:48AM (#23462480) Homepage
        According to l.root-servers.org linked above, the IP change happened on the first of November last year, and only a couple weeks ago was taken offline at the old address. Is six months not enough?
        • Re: (Score:2, Insightful)

          by Anonymous Coward
          Probably not. I'm sure there are still a lot of people using hints files from years, if not decades ago. Most people don't think to update them unless they're installing a new server. Even then they're unlikely to update them since they just copy the zone files from the old server to the new one and usually the hints file is included and overwrites whatever came with the new server's distribution. ;-/
          • Re: (Score:3, Informative)

            by Jellybob ( 597204 )
            Most modern DNS servers will automatically update their hints file each time they're restarted, by making a request to whichever root they connected to for the current list.
          • Updating hints is a one-line cronjob that you can run weekly or monthly. How hard is that to set up while you're setting up your DNS in the first place?
        • by SatanicPuppy ( 611928 ) * <Satanicpuppy@nosPAm.gmail.com> on Monday May 19, 2008 @10:50AM (#23463268) Journal
          Not if it still works. You need to take the old address offline for a while.

          Most people don't pay much attention to their DNS infrastructure. The stuff doesn't need much maintenance. If it breaks, they'll notice that something is wrong, but if it continues working seamlessly, they'll ignore it.

          • *shrug* There are 12 other fail-over points. I certainly wouldn't notice if one of the root-servers fell off the internet.

            Granted, someone much bigger than me might notice that 8% of their queries are failing and being re-tried... But I don't know how long it would take before it happened...
        • Exactly. This is going to cost stupid people who don't bother keeping a working dns system a lot of money - or they might get shamed.

          Exactly what you'd want if you want people to be more aware of internet and dns problems.

          Update those root zonefiles, people !
      • Re: (Score:3, Insightful)

        by Jartan ( 219704 )
        From my reading of the article they didn 't "relinquish" the ip at all. Basically some new groups claimed that they owned the ip address (when they didn't) and the sections of the internet just accepted that claim and started routing data to that IP to those groups.

        If you follow the article the actual change of IP address doesn't even matter. The server change merely provided a situation where they weren't paying as much attention to the old DNS.

        It sounds like the attack could be pulled off at any time vs
    • Re:Good Samaritans? (Score:5, Informative)

      by locofungus ( 179280 ) on Monday May 19, 2008 @09:34AM (#23462328)
      From the link in the FA:

      http://blog.icann.org/?p=227 [icann.org]

      It is expected that the old address will continue to work for at least six months after the transition, but will ultimately be retired from service.

      1st November 2007 -> 1st May 2008 is 6 months. So they left it a few days over 6 months ...

      Tim.
      • Re: (Score:3, Informative)

        Except that apparently ICANN switched their machine off on May 2nd. However, anticipating such a switch off, three other organisations around the world stepped in over the past 6 months to fill the void, and mostly went undetected for the last 6 months...
    • by SpinyNorman ( 33776 ) on Monday May 19, 2008 @09:39AM (#23462392)
      It does seem like the simplest explanation.

      For the owner of the original IP address now being vacated by ICANN, there is also maybe a self-interest motive of identifying the servers who hadn't updated so as to notify them and kill the unwanted traffic.

      Given how visible this is, it's hard to imagine anyone doing it for criminal purposes and thinking they could get away with it.
      • Given this is the Internet, it's hard to imagine anyone getting caught for it.
      • by leuk_he ( 194174 )
        It is very visible, but also not illegal. They serve data from a server they own, from a ip adress they bought (got assigned?).

        If they want to point to spammy sites, or collect dns typing mistakes then they are legal.
        • Yes, but...

          1) This is the (D)ARPANet... I'm sure the US government would not take kindly to spoofing a root level name server even if the mechanism by which it was done was legal

          2) Never mind the military/government basis of the internet, knowingly messing with .com domains could presumably be taken as messing with interstate commerce and fall under the scrutiny of the FBI. I sure wouldn't do it!
  • Summary of this article should read:

    "Hey, something happened. No, we don't know who, what, when, or why. We do know where, but that's it. You got any ideas?"

    Should have been submitted as "Ask Slashdot"... Then maybe we might find out what happened, if anything. As is, it is a non-news item.
    • by Anonymous Coward on Monday May 19, 2008 @09:24AM (#23462206)
      nonsense. the article is very clear: here's what happened:

      icann hosted L-root on ip addresses they didn't have an exclusive right to use.

      they decided to stop doing that and moved L-root to somewhere else.

      shortly thereafter someone else decided to operate a name server on the very same IP addresses.

      that's *what* happened. perhaps you meant to say that the article doesn't say *why* it happened. that would be a fair criticism.
      • So, (and I admit my internetworking ignorance here) is there any mechanism to allow a root nameserver to inform the next tier of servers that it's moving, or at least tell everyone to that cached domain names may not point to the right place?
      • by subsoniq ( 652203 ) on Monday May 19, 2008 @02:21PM (#23465830)
        nonsense. the article is very clear: here's what happened: icann hosted L-root on ip addresses they didn't have an exclusive right to use. they decided to stop doing that and moved L-root to somewhere else. shortly thereafter someone else decided to operate a name server on the very same IP addresses. that's *what* happened. perhaps you meant to say that the article doesn't say *why* it happened. that would be a fair criticism.

        you're missing something here. It wasn't just that "someone" else decided to operate a bogus L root server on that IP address, it's that several someones were doing this. The article states there were FOUR of these running on the OLD ip address. so you had the newly IP'd correct L server, and 4 bogus L servers (one of which was being run by ICANN itself), all using the same old IP address.

        How could this happen you ask? because 3 entities not authorized to announce they host that IP block did so anyway, so there were 4 different routes to that IP block on the Internet, resulting in 4 possible places you could end up at when sending DNS queries to the old address, 198.32.64.12.

        So basically there are 2 concerns here, one is that a couple of Internet entities were advertising routes for an IP block they were not authorized to advertise, and that they were running a bogus L root server from that IP block on it's old address. Bill Manning owned the IP block so his ISP was authorized to advertise that route, and it might be obvious why ICANN was also advertising a route for it as well (to try to get that traffic going to the old IP address for root lookups), but why were Community DNS and Diyixian.com advertising that route and running a bogus L root server?
    • As is, it is a non-news item.

      Not entirely. It reminded me to update my root zone file on my DNS servers ;)
  • Cashing In (Score:2, Insightful)

    by kennyj449 ( 151268 )
    They were probably running something similar to Verisign's SiteFinder that attempts to cash in on typos and non-registered domains.
    • Re: (Score:3, Informative)

      by Anonymous Coward
      nope. as the article points out, the fake L-root that is still running right now appears to be returning correct data for existing domains and NX records for non existing domains.

      they may be gathering data from NX hits, though. who could say. well, community dns could say. perhaps they will.
      • Re: (Score:3, Informative)

        by Anonymous Coward
        Right. Still returning correct data but collecting logs of names that don't exist so they can sell them to all those wacky people who register everything udner the sun and park adverts on it (I hate that). A story about this was /.'ed back in October but it was Verisign selling the data to third parties. http://www.domainnamenews.com/editorial/verisign-to-profit-from-rootserver-data/889 [domainnamenews.com]
      • NX was going to be my guess. There have been people spamming in NANOG on occasion trying to buy NX data from providers.....so there is obviously a market for it. Good call.
      • by Punto ( 100573 )
        Incidentally, about 90% of the hits on the root nameservers are NX, since all of the correct request get cached downstream, but nobody can cache an NX response, so they keep coming back.
      • Maybe I misunderstand what a root DNS server does, but I was under the impression that the only thing root servers did was answer "who is in charge of top level domain .tld?"

        What possible use could a list of mistaken TLDs be if these TLDs need to be approved by ICANN before they can be used?
  • by apodyopsis ( 1048476 ) on Monday May 19, 2008 @09:13AM (#23462088)
    statistics? profiling?

    that data would be worth something to ad men surely...
  • What? (Score:5, Insightful)

    by explosivejared ( 1186049 ) <hagan.jared@NOsPaM.gmail.com> on Monday May 19, 2008 @09:14AM (#23462102)
    Actually, "attack" isn't really an appropriate term. It was not really an attack or a hijack or even identity theft. For one thing, these terms imply the existence of both a victim and a villain. In this story, the villains are not obvious and there might not have been any victims.

    How do we go from this to a headline reading Identity Theft Hits the Root Servers?

    There is no reason to believe that it was malicious at all. We all are familiar with that black hat turned grey or white that wants to help out by demonstrating vulnerabilities in the system. That is just as plausible as anything else. Maybe it's the free-masons!! The Illumanati, maybe!!! The only certain thing about this is the need to secure name service. We should be glad even though it was compromised, there is no apparent damage done.
    • Maybe it's the free-masons!! The Illumanati, maybe!!!
      Or the NSA!!! Maybe space aliens!! Or, or, I know...the Bilderberg Group!!!

      Either that, it was just some spammers trying to gather information. Nah, that's wayyyy too plausible.
  • by drags ( 695101 ) on Monday May 19, 2008 @09:19AM (#23462134)
    Evil marketing firms are always looking for ways to improve typo-squatting. Popping a root server's address space is the ultimate in NXDOMAIN (failed to match) lookups as every DNS server on the net that cannot resolve a domain (such as unregistered typo-domains) will go further and further back until it hits a root server. Hence having a root server's NXDOMAIN data is the ultimate in typo-squatting.
    • by mpeg4codec ( 581587 ) on Monday May 19, 2008 @12:42PM (#23464624) Homepage
      I honestly doubt that typo-squatters care about the millions of requests for com, net, org, and all the other TLDs and ccTLDs, which is all you'll get if you have control of a root server. If someone makes a typo on some com domain, it won't make it any further than com's servers, so having control of the root is rather moot unless someone also makes a typo in the TLD.

      On the other hand, the person in control of the root could give bogus records for the name servers for something like com. This is unlikely to be a major problems since the TTL on all the records served by the root is 120 days. Most people are going to be querying a caching name server of some sort, so it's statistically unlikely to affect much of the population before it is detected and dealt with.

      Not to plug my own work too much, but as a part of my research, I work with a team that monitors DNSSEC deployment. This is something we would in theory be able to see from our distributed polling framework, and our datasets going back to 2005 don't show anything like a rogue TLD server being published. Kind of unfortunate in a way, being that DNS isn't exactly the most interesting research topic at face value.
      • by ais523 ( 1172701 )
        Well, you could typo-squat non-existent TLDs. I've been known to typo on TLDs before. Also, someone with those sort of resources could probably direct .com to a mirror that gave much the same results, but typosquatted, as you suggested. Anyway, my personal theory is that someone hijacked the L root server's old IP address, and then posted to Slashdot to figure out what to do with it...
    • by asc99c ( 938635 )
      I thought the root servers were mainly dealing with the kind of typos more like www.google or www.google.con - forgetting or mistyping that top level address. The .com name block and all the others are assigned out to other companies, and it's those others who would see www.goggle.com

      How great it would be to have a top level domain of .con ...
  • Since they seem to be providing valid responses (as suggested in the article), it must be some traffic data that they are collecting. They now have a long list of valid IP addresses with data, consider it a list of targets. They also have some first-hand data on the most popular websites which they could sell to advertisers ("Are you sure you're getting the right billing from your advertising agents?"). It could also have been a set-up - benign now but gearing up to start attacking later. I hate to ment
  • The addresses (and traffic patterns) of the whole world's secondary DNS servers? Can you say DDOS??
  • by analog_line ( 465182 ) on Monday May 19, 2008 @09:24AM (#23462200)

    As Renesys points out, the volume of traffic to a root server is staggering, so the people running these bogus root servers must have had a reason. What did they get out of it?


    A few reasons spring immediately to mind.

    1. Preliminary move with the intent of actual subversion of results at a later date. This gives you an idea of what the traffic looks like, the volume you're going to have to manage, and the technical requirements of managing the subversion on top of recording important information about the systems you just subverted for later exploitation, plus any statistical information you need/want to improve your subversion process.

    2. Preliminary move by a government, corporate entity, or some grouping with the intent of either wresting control of some portion of the DNS infrastructure from ICANN, or setting up a country-specific DNS infrastructure that is legally mandated. Again, you get valuable information about the kind of stuff you need to be dealing with, depending on exactly what you have in mind.

    3. Same as above, but more of an idealistic style intervention, fearing malicious intent from the US government which still controls the DNS system, and trying to prepare for a time when an ICANN-free DNS system may need to be put in place.

    Depending on where this stuff is actually going (and if it's the actual owner of the IP space that is doing this) of course...
  • by colinmcnamara ( 1152427 ) on Monday May 19, 2008 @09:24AM (#23462204) Homepage

    If only 5% of DNS servers hadn't updated their root servers list, and this server is listed as 1 of the 13 root servers, then these people will have .38% of the entire internet's DNS requests coming through them.

    With "control" of a root server (or at least what a DNS client believed was a root server. They would be free to insert whatever records for anything they want. Think banking, finance, email, etc.

    So really, the title of this article should have been if you were in organized crime, what would you do if you could transparent MITM (man in the middle) attack .38% of all web traffic on the internet.

    My guess is all your accounts belong to us.....

    • That is what I was thinking. If you wanted to do a man in the middle attack transparently you would set up lookalike sites for a few financial institutions and only give false records for those sites while giving correct information for the rest of the internet. They don't know this was harmless by checking just a few sites against the rogue servers.
      • Re: (Score:3, Informative)

        by cortana ( 588495 )
        Surely the users wouldn't just ignore the certificate warnings that their browsers presented them with... right?
    • Re: (Score:1, Funny)

      by Anonymous Coward
      Assuming your bank didn't use debian or a derivative to generate their SSL key then banking, etc. should be fine...
  • by Anonymous Coward
    Thank you, thank you!!! I'll get my coat... ;-)
  • I guess I don't see what the big deal is. The ICANN article stated that the old root DNS server would run for 6 more months, and that appears to be all that has happened.
    What am I missing?

    "It is expected that the old address will continue to work for at least six months after the transition, but will ultimately be retired from service."
  • by SaDan ( 81097 ) on Monday May 19, 2008 @09:34AM (#23462334) Homepage
    You can get the your root server hints files from:

    ftp://ftp.internic.net/domain/named.cache [internic.net]

    Slashdot's junk filter won't allow a cut and paste of the file's contents into a post.

    • Re: (Score:3, Insightful)

      The problem is, if you do grab the hints file from there, you have to make sure you keep refreshing it to stay up to date... Otherwise you're just setting yourself up for the same attack the next time this happens...

      That said, I don't know if trusting your upstream provider is any better...
      • Re: (Score:2, Informative)

        by SaDan ( 81097 )
        The file doesn't change all that often, so checking it once a month should keep you up to date. If you needed a more immediate update schedule, I'd subscribe to the ICANN newsletter at:

        http://www.icann.org/newsletter/ [icann.org]
        • Oh, yeah, I realise that. In fact, given that the article states that the transition time is around 6 months, you could probably just update every 3 months, even.

          The point is, you have to have some system in place, either manual or automatic, to perform the update... Because it's easy to copy the file the first time, insert it into your configuration master image, and then forget about it as you roll out machines, and leave them in production for years with out-of-date hints files.

          I know - I've probably don
          • by SaDan ( 81097 )
            At previous jobs, I had a cronjob that would poll the file from InterNIC, and alert me if it had changed or failed to poll the file correctly. Worked great!

            I do not rely on package maintainers to keep this file up to date.
            • Re: (Score:3, Funny)

              Cool, then we are in agreement. :) Cron is really the way to go.
              • by SaDan ( 81097 )
                It is. :-)

                If you really wanted to be paranoid about the whole thing, you could also do a lookup for ftp.internic.net via every root server listed in your current named.cache file, and look for discrepancies there as well before you download the file and update your system.
    • by birdpen ( 584545 )
      Assuming in future when you try to resolve ftp.internic.net, you get the result via real root name servers and thus you can trust ftp://ftp.internic.net/domain/named.cache [internic.net] by itself. DNS works at the thin edge of trust, as the article tried to emphasize. Root name servers are the pivots for the Internet infrastructure, that we don't realize in our day to day activities. Any damage there is always catastrophic that had been proven in the past. The article emphasized what could go wrong, without knowing you
    • by dacut ( 243842 )
      Great! I'll just resolve ftp.internic.net from the address I have on file for the L-root server...
    • by Phroggy ( 441 )
      Assuming, of course, that your DNS server is returning the correct IP address for ftp.internic.net, rather than some other FTP server that happens to have a /domain/named.cache file...
  • Maybe whoever set up the "fake" RNS was trying to hide and appear to be safe until some time when it could collaborate some DDOS. We won't know since they aren't up and running, but having such a highly used server would have been beneficial for whatever the purpose was in the first place, to everyone if it were a positive one or to them if it were negative. But what do I know, I'm purely speculating.
    • Well, if I put my evil hat on, I'd be thinking less in terms of DDOS and more in terms of phishing. I mean, it'd be superb for introducting a MITM style attack on internet banking sites, or whatnot.
  • As Renesys points out, the volume of traffic to a root server is staggering, so the people running these bogus root servers must have had a reason. What did they get out of it?

    So how long has the submitter had this habit of answering his/her own questions before he/she asked them? Staggering amounts of traffic. That IS your answer. Victim machines whose upstream DNS servers didn't update the root server file could be redirected to ad-wrapped versions of "real" websites. If there was far more malicious intent involved, they can redirect, say, baking sites to whatever site they want. Plain and simple.

    /me quickly darts off to make sure his root file is up-to-date

    • Well, they suggest that the rogue root DNS was serving the same results as the legit one, but given that the Renesys guys only did a "very cursory examination of the results", and given that many malvertisement operators take pains to target their malware campaigns to certain geographical regions and to keep their ads hidden from the people who can ultimately block them, it's quite possible that the rogue DNS was only giving bad results for certain targeted domains (or perhaps was only giving bad results to
    • If there was far more malicious intent involved, they can redirect, say, baking sites to whatever site they want.


      Providing recipies for spam flavoured muffins.

      Mmmmm... malicious
    • by argent ( 18001 )
      Victim machines whose upstream DNS servers didn't update the root server file could be redirected to ad-wrapped versions of "real" websites.

      But that doesn't *seem* to have been happening... that is, they didn't see any indication of it happening in a cursory examination of the sites so if they were they'd have to be pretty carefully targeting it.

      One thing that occurred to me is that this would give them a way to scan for common domain typos over a lot of the internet: signals intelligence for later spam ser
  • If the real server went offline May 2, does that mean the "spooky" fake servers would only have been getting traffic after May 2, so in the last two weeks, or were they getting traffic over the last six months? If so, how did that happen?
    • Firstly, there's nothing spooky about the fake servers, the article lists who was running them... Not listing them in the summary was just simple Slashdot sensationalisation...

      And as far as how they got traffic (which they did, as per the graph in the FA), the hosting companies in question, (in the UK, US, and Hong Kong) started advertising the routes through BGP, (the protocol which tells the backbone routers on the Internet which routers host which IP addresses). So routers which were closer to Community
  • Anonymous Coward (Score:1, Informative)

    by Anonymous Coward
    This story is kind of silly actually. On the post available on the ICANN blog, it is clearly stated that the IP address will change on November, 1st and that "It is expected that the old address will continue to work for at least six months after the transition".

    Even a 6 year old child would be able to determine when the IP address would be eventually unused (end of May).

    From the article quoted as the source of the reference, it is clear that no one tried to verify the information. It would have been very s
  • long long ago in the mists of time I worked for PSINet Inc's UK division, which had previously been EUNet GB before it was bought by PSI. One of the old EUNet machines called "nelson", an old Sun Sparc 5 (or maybe it was a 10, I forget), was both a name server and resolver, and had existed since some of the earliest days of the internet in the UK.

    when the old eunet service was finally shut down, there were still a considerable number of people using it as a resolver, and there were still live domains host

  • My uncle used to say that he preferred corrupt judges to incompetent judges, since the corrupt judges would be careful to get things right 95% of the time, so that they would be well placed when the time came to undermine the system. The incompetent judges, on the other hand, would screw things up far more frequently than that, and ruin far more lives than the corrupt judges. A very few redirected queries could get lost in the huge number of correct responses, but still provide big benefits to a criminal.
  • They changed the IP address of the "L" root server, but might have kept the old one active just because not everyone was going to change their configuration in lock step.

    They could have kept the address, but then provided a note that the configuration was incorrect, but that really dones' help a lot. I, as an end user can't do much to change the configuration of my nameserver. Besides, my nameserver might have been using another nameserver which used another before it got to the root server. All that would
  • Not horribly major (Score:3, Informative)

    by Todd Knarr ( 15451 ) on Monday May 19, 2008 @12:02PM (#23464182) Homepage

    Bear in mind that BIND for one doesn't use the root nameserver hints file directly under normal conditions. One of the first things it does is contact one of the servers listed in the hints file and download the real root nameserver list. After that it uses the downloaded list and ignores the hints file. So unless you contacted the L server for that initial download, you'll get the correct root server list and won't ever contact the bogus ones. I'd have to check whether BIND picks a hints entry at random or cycles through starting from the first. If it picks at random the window of vulnerability is small, but if it starts at the first it's virtually nonexistent (most hints files list A, B, C and so on in sequence, and the chance of getting no answer at all from the A-K servers is close to zero).

  • Why indeed... (Score:4, Insightful)

    by blumesa ( 1057600 ) on Monday May 19, 2008 @02:44PM (#23466194)
    why traffic goes to "retired" address space is a difficult question to answer. http://www.caida.org/workshops/wide/0611/ [caida.org] has a pointer to some early work done on the "B" renumbering. There was agreement by the operators of "B","L","J", and "M" to collect data during the DITL-2008 collection to see if any correlation btwn querying nodes. That said, ICANN should have renumbered the node when they took it over. They did not. They have not had permission to use the prefix since 2004 - but for stability sake, I did not make a big fuss.

    bill manning
    • Oh, you're here...

      Can you answer a relevant question which is buzzing around in the background - did CommunityDNS and/or Diyixian have permission to advertise the address space?

      Also, as someone else above asked, why did you choose to set up a server at that address, given the bandwidth load and technical effort involved?
    • Oh, and I should probably also say: thanks for all the work you've done so far to contribute to getting DNS to be as useful as it is...

      Someday I hope you succeed in getting all the IPv6 stuff going - we'd all like to see that...
  • by giminy ( 94188 ) on Monday May 19, 2008 @05:14PM (#23468036) Homepage Journal
    Maybe the reason that the nameserver is providing correct responses is due to something like port-knocking for domain names?

    If a phisher wanted to use this, they would only supply a bogus dns pointer to a query if the query was preceded by some 'primer' query. E.g. first someone tries to resolve alpha.com, then beta.com within a few seconds, only then will the root server give the incorrect response for beta.com. This would be pretty easy to do with some cross-site scripting magic.

    You can never disprove a conspiracy, after all...
  • by Jane Q. Public ( 1010737 ) on Monday May 19, 2008 @10:43PM (#23470728)
    The Internet was originally designed to be a "self-healing" system, able to route around damage like (no joke) a nuclear war.

    However, the system as it currently exists has one SERIOUS flaw: the reliance on root servers.

    We need to switch to a system that does not rely on root servers. There are at least several such systems that are workable. Yes, the U.S. government would lose control over the whole thing. Does ANYBODY in their right mind think that is a bad thing? As long as nobody else can gain root control either, and there are various schemes that can ensure that.

Technology is dominated by those who manage what they do not understand.

Working...