Archived from groups: microsoft.public.win2000.dns (
More info?)
"mcron" <mcron@discussions.microsoft.com> wrote in message
news:7D337020-9A69-46A6-A2F3-83D081FF8E29@microsoft.com...
> Herb, thanks for the additional example. In your scenario, is it true
that
> the malicious response would come from the DNS server for EvilHackers.com?
Yes, or any server in the referral chain -- i.e., a
forwarder or parent of that domain.
Realistically, it's not likely that one of your chosen
forwarders or a top level domain DNS would do this
(maliciously).
The real danger is the EvilHackers.com DNS server,
OR a server that has been taken over by hackers at
newbieDNSadmins.com
Or even OldHandsCantHappentome.com <grin>
> After my last post I realized that the DNS query being intercepted might
not
> be the one from my DNS server to our ISP but (more likely) the query from
our
> ISP's DNS server on up.
The interception can still happen but isn't as likely
as say the following:
DNS request to ns1.InnocousDomain.com
Hacker responds QUICKLY with packet containing
pollution.
Since this is (probably) all UDP, not connection
required and wouldn't matter anyway problably.
Why would that work? ANYONE (including virus
and trojan infected machines) at Innocuous.com or
anywhere else on the path to them could make such
a response.
> At the end of the day, is it fair to say that there is no guarantee that
any
> DNS query to the Internet will result in a valid response?
No. Except in the sense that NO IP traffic is reliable
unless it is authenticated with some sort of security
like IPSec.
But, a response could be returned from an infected
(or just malicious machine) at your ISP as you originally
indicated -- it just isn't as likely.
IP in general, UDP in specific (and TCP is not really
better) is NOT authenticated.
--
Herb Martin
> Thanks again,
> McR
>
>
> "Herb Martin" wrote:
>
> > "mcron" <mcron@discussions.microsoft.com> wrote in message
> > news:F918D9AB-D343-4B9A-BEBA-B5C65466FF9E@microsoft.com...
> > > Deji, thanks for your reply. Is what I am describing referred to as
"DNS
> > > cache poisoning"? I have read a little about it in response to these
> > events.
> > > If I understand correctly, DNS cache poisoning is when someone
> > maliciously
> > > intercepts the forwarded request from my DNS server to my ISP's DNS
server
> > > and substitutes an IP address of their choice and responds to my DNS
> > server's
> > > forwarded query. Is that correct? In your experience, is this rare
or
> > does
> > > it happen often, just not to me? Our ISP is AT&T and I guess I
thought
> > their
> > > DNS servers were protected from such attacks but it is actually the
> >
> > Deji likely knows more about this than I do but
> > that is not my understand of the USUAL mechanism
> > of "cache poisoing" -- although your example would
> > also be possible.
> >
> > Cache poisoning is much more likely this way:
> >
> > 1) You query some arbitrary DNS server for a resolution
> > e.g., www.EvilHackers.com (perfectly normal,
> > happens all the time with users visiting web pages or
> > even receiving HTML email)
> >
> > 2) The DNS server for EvilHackers.com sends back the
> > answer AND it also loads some unrequested resolutions:
> > www.Microsoft.com = somethere really bad
> > windowsupdate.microsoft.com = somewhere worse
> >
> > 3) Evil <GRIN> goes here
> >
> > Without protection from cache poisoning the DNS server accepts
> > and caches those UNREQUESTED resolutions. (This was done
> > in the past when everyone still trusted everyone on the Internet.)
> >
> > With cache polution protection, the unrequested resolutions are
> > discarded.
> >
> > --
> > Herb Martin
> >
> >
> > > communication from my DNS server to theirs that is being compromised
(as
> > DNS
> > > has no authentication mechanism). I do have the cache pollution
option
> > > enabled on both servers (thanks for the tip). In your opinion, is the
> > best
> > > way to deal with this to take the steps I have taken by flushing the
DNS
> > > cache and the local cach on the client?
> > > Thanks for the brainpower...
> > > McR
> > >
> > > "Deji Akomolafe" wrote:
> > >
> > > > There really is nothing hard to believe about this. DNS problems are
not
> > > > limited to small-fry organizations.
> > > >
> > > > You are basically correct in your description of how you expect a
> > forwarding
> > > > DNS to behave with regards to cache, although there are ways to make
a
> > > > forwarding server "unlearn" things pretty fast. As for the "why" of
the
> > > > issue you are seeing, the first thing that comes to mind is that
this
> > may be
> > > > happening on your ISP's side. I would stop forwarding for a while,
> > restart
> > > > DNS service and monitor the server to see if the problem comes back.
> > While
> > > > you are at it, make sure that the option to protect against "cache
> > > > pollution" is enabled on your DNS server.
> > > >
> > > > --
> > > >
> > > >
> > > > Sincerely,
> > > >
> > > > Dèjì Akómöláfé, MCSE+M MCSA+M MCP+I
> > > > Microsoft MVP - Directory Services
> > > > www.readymaids.com - we know IT
> > > > www.akomolafe.com
> > > > Do you now realize that Today is the Tomorrow you were worried about
> > > > Yesterday? -anon
> > > > "mcron" <mcron@discussions.microsoft.com> wrote in message
> > > > news:71E8A931-8431-4275-B179-2AD1FCF19D32@microsoft.com...
> > > > > I have two W2K DNS servers (dns1 and dns2) to support AD (standard
> > zones,
> > > > not
> > > > > AD-integrated) and to resolve Internet names via forwarders. Each
is
> > > > > configured with forwarders to our ISP's two DNS servers. Internal
> > clients
> > > > > point to dns1 first and then dns2. I have had several instances
where
> > a
> > > > user
> > > > > is trying to access a web site and the page that loads is
afternic.com
> > > > (not
> > > > > the requested page) and it indicates that the requested domain is
for
> > > > sale.
> > > > > I examine our DNS server's cache and see that our DNS server does
not
> > have
> > > > > the correct host record for the requested URL. I compare this to
a
> > lab
> > > > > machine that uses a different DNS server and I can successfully
> > navigate
> > > > to
> > > > > the requested URL from this machine. I clear the DNS server cache
and
> > run
> > > > > ipconfig /flushdns and both the user and I can successfully
navigate
> > to
> > > > the
> > > > > requested URL.
> > > > >
> > > > > If I understand how DNS and forwarders work correctly, the only
zones
> > the
> > > > > DNS servers "know" are the forward and reverse lookup zones that I
> > have
> > > > > configured. Everything else it "learns" from the DNS server
> > configured as
> > > > > forwarders (our ISP's DNS servers). After the TTL for the records
> > expire,
> > > > > the DNS server "forgets" what it "learned".
> > > > >
> > > > > It appears that our DNS servers are "learning" an incorrect ip
address
> > for
> > > > > the requested URL . That is hard to believe since we are using a
> > Tier-1
> > > > ISP.
> > > > >
> > > > > Can anyone shed some light on what might be happening here?
> > > > >
> > > > > Thanks in advance for your help.
> > > > >
> > > > > McR
> > > >
> > > >
> > > >
> >
> >
> >