[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[connect24h:01659] bind に問題が残っているのか
- To: connect24h@xxxxxxxxxxxxx
- Subject: [connect24h:01659] bind に問題が残っているのか
- From: Seiichi Nakashima <nakasei@xxxxxxxxxxxx>
- Date: Sun, 25 Feb 2001 18:18:41 +0900
中島です。
DNS hijacking の話題がbinduserで流れていました。英国マクドナルドが
被害を受けているようです。
< bindusers のMailingListから >
More and more systems and networks are seeing 'DNS hijacking' as a means
to disrupt Internet traffic
Yes, I know, your use acl's in BIND to restrict queries and xfers, or go
even further and add specific rules to your firewall, but you cannot keep
'the other guy' from having his DNS corrupted, right?
So, you receive DNS information form upstream (forwarders) or the root
servers get corrupt data and your lusers can see their connecitons
redirected to other sites.
Case in point, the recent 'McHackers':
http://www.theregister.co.uk/content/8/17163.html
"Activists redirected surfers visiting McDonalds.co.uk to an insecure box
in a US university on which they placed a message mocking McDonalds."
The prank was performed not by hacking into the server hosting the
McDonalds site, but by exploiting its domain name servers.
Ironically in the light of recent hack attacks targeting IIS, the
unwitting host to the diatribe against Big Macs was using Linux.