bind9forgery.txt

释放双眼,带上耳机,听听看~!

bind9forgery.txt,,网络安全教程bind9forgery.txt,

A new weakness has been discovered in the BIND 9 DNS server that allows for DNS forgery pharming.

,I discovered a new weakness in BIND 9 DNS server which enables "DNS
Forgery Pharming". An attacker can remotely poison the cache of any BIND
9 caching DNS server and force users who use this DNS server to reach
fraudulent websites each time they try to access real websites. BIND 9
is the most popular DNS server nowadays thus this attack applies to a
big part of Internet users.

The concept of DNS cache poisoning was discussed many times before.
However, this attack was considered impractical for the leading
industrial DNS servers due to the transaction ID mechanism that DNS
servers implement today. The transaction ID is supposed to be a secure,
random number that the attacker must guess in order to poison the DNS
cache. There are 65,536 combinations which make enumeration impractical
in the current network conditions.

I've recently found a weakness in the transaction ID generation
algorithm of BIND 9. By observing a few consecutive transaction IDs from
the same DNS server an attacker can reconstruct the random number
generator's internal state, and/or predict its next value.

This weakness can be turned into a mass attack in the following way: (1)
the attacker lures a single user that uses the target DNS server to
click on a link. No further action other than clicking the link is
required (2) by clicking the link the user starts a chain reaction that
eventually poisons the DNS server?s cache (subject to some standard
conditions) and associates fraudulent IP addresses with real website
domains. (3) All users that use this DNS server will now reach the
fraudulent website each time they try to reach the real website.

The 2 algorithms for predicting the transaction ID (one for the single
next transaction ID, the other for full reconstruction of the internal
state and all future transaction IDs) were coded in Perl and were
demonstrated to work well (and fast!).

The algorithms, as well as the paper, are available Trusteer's website:

Full paper: http://www.trusteer.com/docs/bind9dns.html

Executive version: http://www.trusteer.com/docs/bind9dns_s.html

ISC were informed on May 29th, and patched versions of BIND 9 are now
available on their website, http://www.isc.org/

Thanks,
Amit Klein
CTO
Trusteer

人已赞赏
安全工具

chroot_sshd_linux.pdf

2020-2-6 3:37:34

安全工具

<p>安全性测试企业信息系统.pdf.</p>

2020-2-6 3:37:36

0 条回复 A文章作者 M管理员
    暂无讨论,说说你的看法吧
个人中心
购物车
优惠劵
今日签到
有新私信 私信列表
搜索