Author Topic: The cat is out of the bag now.... DNS flaw published by mistake!  (Read 12651 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Hi malware fighters,

For the second time now a very dangerous DNS flaw has been published by a security firm, before an official presentation on a coming Blackhat Conference. The man who found it Dan Kaminsky could not do much. The info on the site was taken down, but when the cat is out of the bag (they found the search engine cached info): http://blogs.buanzo.com.ar/2008/07/matasano-kaminsky-dns-forgery.html  it is difficult to get it back in. So everyone update DNS and watch your kernels,

So, is it really THAT bad? Well, yes. Basically, Dan figured out how to poison ANY DNS servers cache. The end result - people using the DNS server will think they are at Paypal, but are really at evilguy.com.
Hope for the big general patch now to come soon....

The patch consists of randomly generating the source port and couple this to the TXID to minimize the chance to get a correctly spoofed reply.
Another way is to run your own private recursive DNS server without forwarders to make these kind of assaults impossible.

polonus
« Last Edit: July 23, 2008, 12:04:05 AM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline .: Mac :.

  • Avast Überevangelist
  • Ultra Poster
  • *****
  • Posts: 5093
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #1 on: July 23, 2008, 04:53:07 AM »
Thanks for posting this polonus! Very scary to know that this works on any DNS server. Good reading indeed.
"People who are really serious about software should make their own hardware." - Alan Kay

Offline Marc57

  • Avast Evangelist
  • Super Poster
  • ***
  • Posts: 1944
  • KISS Rules The World!!!
    • KISS Army
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #2 on: July 23, 2008, 06:22:52 AM »
Very informative as always, thanks polonus.
You Wanted the Best You Got the Best the Hottest Band in the World KISS!!!

Offline bob3160

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 48606
  • 64 Years of Happiness
    • bob3160 Protecting Yourself, Your Computer and, Your Identity
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #3 on: July 23, 2008, 03:53:33 PM »
You can protect yourself by setting yourself to OpenDNS.
This can affect you no matter what computer or operating system you’re using, and no matter what ISP you may have.
If you connect to the Internet, you need to have DNS servers. Your computer needs to know how to match an IP address with a domain name.
Me worry ???  NO, I've been using and promoting OpenDNS for a long time as you can tell from
the following informative link:
http://forum.avast.com/index.php?topic=16849.msg185494#msg185494
Free Security Seminar: https://bit.ly/bobg2023  -  Important: http://www.organdonor.gov/ -- My Web Site: http://bob3160.strikingly.com/ - Win 11 Pro v24H2 64bit, 32 Gig Ram, 1TB SSD, Avast Free 24.4.6112, How to Successfully Install Avast http://goo.gl/VLXdeRepair & Clean Install https://goo.gl/t7aJGq -- My Online Activity https://bit.ly/BobGInternet

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #4 on: July 23, 2008, 09:22:51 PM »
Hello malware fighters,

Polonus would not be polonus, if he did not offer you a site to test your current DNS.
Do it, go here and click and test your DNS Resolvers at: https://www.dns-oarc.net/oarc/services/dnsentropy

Everything GREAT for ye?

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline oldman

  • Avast Evangelist
  • Massive Poster
  • ***
  • Posts: 4142
  • Some days..... MOS...this bug's for you
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #5 on: July 23, 2008, 09:35:53 PM »
Hi Polonus

Yep, all Great.

Offline bob3160

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 48606
  • 64 Years of Happiness
    • bob3160 Protecting Yourself, Your Computer and, Your Identity
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #6 on: July 24, 2008, 05:48:40 AM »
Hi Damien,
Everything here gets reported as "Great" but remember, I use OpenDNS:),
so I didn't expect anything less.
Free Security Seminar: https://bit.ly/bobg2023  -  Important: http://www.organdonor.gov/ -- My Web Site: http://bob3160.strikingly.com/ - Win 11 Pro v24H2 64bit, 32 Gig Ram, 1TB SSD, Avast Free 24.4.6112, How to Successfully Install Avast http://goo.gl/VLXdeRepair & Clean Install https://goo.gl/t7aJGq -- My Online Activity https://bit.ly/BobGInternet

micky77

  • Guest
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #7 on: July 24, 2008, 04:51:27 PM »
 Source Port Randomness: POOR
 Transaction ID Randomness: GREAT
Is this bad ?

wyrmrider

  • Guest
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #8 on: July 24, 2008, 06:05:53 PM »
I got Great and Great
so I think I would inquire about Great and Poor

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #9 on: July 24, 2008, 10:53:30 PM »
Hi micky77,

Your resolver's randomness will be rated either GOOD, FAIR, or POOR,
based on the standard deviation of observed source ports.
In order to receive a GOOD rating, the standard deviation must be at least 10,000.
For FAIR it must be at least 3,000. Anything less is POOR.
The best standard deviation you can expect to see from 26 queries is in the 18,000-20,000 range.

If you see a POOR rating, we recommend that you contact your ISP
and ask if they have plans to upgrade their nameserver software
soon. The CERT cite is "VU#800113 Multiple DNS implementations vulnerable to cache poisioning".

"For those not listening, we can infect a name server in 11 seconds now, which was never true before",

polonus
« Last Edit: July 24, 2008, 11:03:56 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Go Pack Go

  • Guest
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #10 on: July 25, 2008, 02:26:32 AM »
On my pc with OpenDNS , GREAT and GREAT, on my pc with my ISP DNS, Source Port Randomness: POOR, Transaction ID Randomness: GREAT.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33925
  • malware fighter
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #11 on: July 25, 2008, 04:32:09 PM »
Hi malware fighters,

Just a link to another online DNS checker: http://www.doxpara.com/?p=1176

pol
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline FreewheelinFrank

  • Avast Evangelist
  • Ultra Poster
  • ***
  • Posts: 4872
  • I'm a GNU
    • Don't Surf in the Nude!
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #12 on: July 25, 2008, 07:38:36 PM »
Quote
Attacks begin on net address flaw

Attack code that exploits flaws in the net's addressing system are starting to circulate online, say security experts.

http://news.bbc.co.uk/1/hi/technology/7525206.stm
     Bambleweeny 57 sub-meson brain     Don't Surf in the Nude Blog

micky77

  • Guest
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #13 on: July 25, 2008, 08:26:09 PM »
Hi micky77,

Your resolver's randomness will be rated either GOOD, FAIR, or POOR,
based on the standard deviation of observed source ports.
In order to receive a GOOD rating, the standard deviation must be at least 10,000.
For FAIR it must be at least 3,000. Anything less is POOR.
The best standard deviation you can expect to see from 26 queries is in the 18,000-20,000 range.

If you see a POOR rating, we recommend that you contact your ISP
and ask if they have plans to upgrade their nameserver software
soon. The CERT cite is "VU#800113 Multiple DNS implementations vulnerable to cache poisioning".


"For those not listening, we can infect a name server in 11 seconds now, which was never true before",

polonus

Thanks very much Pol,I will take your advice, if I get no joy, I will try Bobs Open DNS ( Thanks Bob )
I tried the Doxpara check, and it said,
Your name server, , may be safe, but the NAT/Firewall in front of it appears to be interfering with its port selection policy. The difference between largest port and smallest port was only 129.
« Last Edit: July 25, 2008, 08:30:29 PM by micky77 »

drhayden1

  • Guest
Re: The cat is out of the bag now.... DNS flaw published by mistake!
« Reply #14 on: July 25, 2008, 09:33:43 PM »
Also use OpenDNS like Bob has mentioned :)
And Damian on this like you posted above https://www.dns-oarc.net/oarc/services/dnsentropy
All the tests came out GREAT :)
1. 208.67.217.4 (bld1.nyc.opendns.com) appears to have GREAT source port randomness and GREAT transaction ID randomness.
2. 208.67.217.17 (bld7.nyc.opendns.com) appears to have GREAT source port randomness and GREAT transaction ID randomness.
as seen below..........
« Last Edit: July 25, 2008, 09:45:27 PM by drhayden1 »