Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

Streamyx Streamyx Slowdown due to DNS Servers Patching?, Patching of DNS Cache Poisoning ;)

views
     
TScybpsych
post Aug 1 2008, 07:45 PM, updated 18y ago

---------------------
*********
All Stars
65,306 posts

Joined: Jan 2003
It started from here: http://www.doxpara.com/ ... use the built-in test on the DNS. .. I've tested it last week, our TMnet's DNS servers are affected ... as of now, it's partially patched! thumbup.gif

More tests >> http://3db973cc9d6d630eff58c602.et.dns-oarc.net/

More! >> http://member.dnsstuff.com/tools/vu800113.php


it's been a very *hot* topic for the past few weeks! Since Patch Tuesday this month by Microsoft, it's only been made aware by the common public. Remember MS hotfix KB951748 and causes havoc to your firewall (especially Zonealarm)? MS and other vendors have coordinated their patching to fix the DNS servers!

Read the blogs/postings!


Hopefully, TMnet restore the full functionality of our bandwidth/DNS!!

I't darn slow surfing!
TScybpsych
post Aug 1 2008, 08:31 PM

---------------------
*********
All Stars
65,306 posts

Joined: Jan 2003
let me put it in a simpler terms...

1) When you type an address, e.g. www.google.com, it's being translated to IP address, e.g. 72.14.233.32. Remember, Net "true" addresses are always in IP address.

www.google.com = domain name [easier to remember this, right?]
72.13.233.32 = IP address [who ever can remember each IPs for all the URLs in a bookmark?! doh.gif]

2) Each ISP, e.g. TMnet, has 2 DNS (Domain Name Server) servers. 1 is main and another is redundancy. TMnet's DNS server IPs are 202.188.0.132 and 202.188.1.28.

3) www.google.com -(query)-> DNS -(reply)-> IP address. The DNS is the domain name translator.

4) Each DNS reply (source) always tied to a source port # (0-65535 only) and query ID (QID).

5) Malicious ppl sends out many fake/invalid queries to your DNS server so that it can "guess" what's the next port/QID that follows. Once it's able to guess a specific port and QID for each "query", he/she 'poison' the DNS cache (buffer) and marked it to active for a specific period of time or simply forever!

6) Imagine this: If I poison the DNS cache for www.google.com = 42.16.33.154 (e.g. a link to phishing site, po*n site or hoax page)...

7) The next time you enter www.google.com in your browser (IE, FF, etc.), it'll point to different place! This is because the DNS servers have been 'poisoned' to point to different IP address!

8) What the patching does is to "randomize" the source port # and QID for each IP address replies. This makes it difficult for malicious ppl to guess.


Read the good analogy at Doxpara.com ... it explains how malicious ppl do the 'guessing' and 'poisoning'!

Of course my explanation above is just a crude way explaining this DNS Cache Poison vulnerability. sweat.gif

This post has been edited by cybpsych: Aug 1 2008, 08:41 PM

 

Change to:
| Lo-Fi Version
0.0161sec    0.51    6 queries    GZIP Disabled
Time is now: 9th December 2025 - 07:09 AM