Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?

Ted Lemon <Ted.Lemon@nominum.com> Wed, 13 August 2008 17:32 UTC

Return-Path: <owner-namedroppers@ops.ietf.org>
X-Original-To: ietfarch-dnsext-archive@core3.amsl.com
Delivered-To: ietfarch-dnsext-archive@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 0711E3A6C3A; Wed, 13 Aug 2008 10:32:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.415
X-Spam-Level:
X-Spam-Status: No, score=-5.415 tagged_above=-999 required=5 tests=[AWL=-0.921, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4, RDNS_NONE=0.1]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BbBPkjSWQ+35; Wed, 13 Aug 2008 10:32:07 -0700 (PDT)
Received: from psg.com (psg.com [IPv6:2001:418:1::62]) by core3.amsl.com (Postfix) with ESMTP id E59C63A69AD; Wed, 13 Aug 2008 10:32:06 -0700 (PDT)
Received: from majordom by psg.com with local (Exim 4.69 (FreeBSD)) (envelope-from <owner-namedroppers@ops.ietf.org>) id 1KTK8d-000Pps-Ot for namedroppers-data@psg.com; Wed, 13 Aug 2008 17:27:59 +0000
Received: from [64.18.2.163] (helo=exprod7og105.obsmtp.com) by psg.com with smtps (TLSv1:AES256-SHA:256) (Exim 4.69 (FreeBSD)) (envelope-from <Ted.Lemon@nominum.com>) id 1KTK8U-000Pow-IU for namedroppers@ops.ietf.org; Wed, 13 Aug 2008 17:27:57 +0000
Received: from source ([64.89.228.228]) (using TLSv1) by exprod7ob105.postini.com ([64.18.6.12]) with SMTP; Wed, 13 Aug 2008 10:27:16 PDT
Received: from webmail.nominum.com (webmail.nominum.com [64.89.228.50]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (Client CN "webmail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-ng.nominum.com (Postfix) with ESMTP id A41191A8206; Wed, 13 Aug 2008 10:27:16 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from [10.0.0.252] (66.93.162.128) by exchange-01.win.nominum.com (64.89.228.50) with Microsoft SMTP Server (TLS) id 8.1.278.0; Wed, 13 Aug 2008 10:27:16 -0700
CC: "bmanning@vacation.karoshi.com" <bmanning@vacation.karoshi.com>, Joe Abley <jabley@ca.afilias.info>, "Ray.Bellis@nominet.org.uk" <Ray.Bellis@nominet.org.uk>, Namedroppers WG <namedroppers@ops.ietf.org>
Message-ID: <A3C4FD75-D689-4B7C-8CE6-1728CF924055@nominum.com>
From: Ted Lemon <Ted.Lemon@nominum.com>
To: Eric Rescorla <ekr@networkresonance.com>
In-Reply-To: <20080813172224.D89DC50846@romeo.rtfm.com>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
MIME-Version: 1.0 (Apple Message framework v928.1)
Subject: Re: How do we get the whole world to upgrade to DNSSEC capable resolvers?
Date: Wed, 13 Aug 2008 10:27:14 -0700
References: <B5457C05-D2EA-4A31-94AB-84807AC62843@virtualized.org> <Pine.LNX.4.44.0808121535120.3680-100000@citation2.av8.net> <OF6BFCDCCD.B3B7FD05-ON802574A4.004C3FB5-802574A4.004C6A52@nominet.org.uk> <764E89A0-32D2-4555-B61C-C8B7D88EB9E1@ca.afilias.info> <20080813172224.D89DC50846@romeo.rtfm.com>
X-Mailer: Apple Mail (2.928.1)
Sender: owner-namedroppers@ops.ietf.org
Precedence: bulk
List-ID: <namedroppers.ops.ietf.org>

Eric, one other thing to bear in mind with banks is that the typical  
user goes to http://www.bank.com and types in their password in the  
login form presented to them.   All I (the attacker) have to do to get  
their password is to arrange for the form with which they are  
presented to submit the password to an http:// URL instead of the  
bank's HTTPS:// URL.   SSL doesn't happen, so the user is not told  
about the invalid cert.   And chances are they've disabled the  
"insecure form" warning, because it pops up too often in cases where  
it doesn't matter.

The attacker can then tunnel the rest of the session, presenting the  
user with the illusion that they have in fact completed a transaction  
with the bank, leaving them no wiser to the fact that their login  
information has been compromised.

This will work even if the bank has a policy of presenting password  
forms only on SSL pages, because the average user won't know this, and  
thus won't be suspicious if they are offered a login on a non-https://  
page.

So the dance that's involved in phishing the user is really a lot  
simpler than you think, and the value of subverting the DNS is thus a  
lot higher.


--
to unsubscribe send a message to namedroppers-request@ops.ietf.org with
the word 'unsubscribe' in a single line as the message text body.
archive: <http://ops.ietf.org/lists/namedroppers/>