Internic
Domain Hijacking - "It Happens"
Max
Vision, http://maxvision.net/
OVERVIEW
This
morning, January 2nd 2000, I witnessed an attempted takeover
of one of my domains, MAXVISION.NET. The attacker, calling themself "Mnemonic
of the group KeyRoot", using an AOL.COM address, attempted to spoof a request
from me to change the primary and secondary DNS servers for my domain,
to Network Solutions / Internic. If successful, this request would effectively
give them control of maxvision.net until I could have sorted it out with
my place of registration. The attempt at hijacking the domain was foiled
for several reasons, which I will outline below.
THE
ATTACK
The
attacker sent a forged Domain Modification form to Internic. There were
several incompotent errors in the submission that caused the submission
to fail. Had these errors not been made, and had I relied on the MAIL-FROM
mechanism of Internic, then control of my domain would have been effectively
hijacked.
Overview
of forged email path:
The
first sign that something was going on was an email from Internic, confirming
"my request".
Email
confirmation "response" from Internic |
|
Date:
Sun, 2 Jan 2000 17:19:50 -0500 (EST)
From:
hostmaster@internic.net
To:
Max Vision <vision@HUNGRY.COM>
Subject:
Re: [NIC-000102.b318] Re: MODIFY DOMAIN maxvision.net
This
is an automatic reply from Network Solutions to acknowledge that
your
message has been received. This acknowledgement is NOT a
confirmation
that your request has been processed.
If
you need to correspond with us regarding this request, please be
sure
to reference the tracking number [[NIC-000102.b318]] in the subject
of
your message.
Regards,
InterNIC
Registration Services
...
other standard Internic advertising followed (omited) |
Moments
later I received an error message from Internic (the attacker had made
a mistake), which provided me with the evidence I needed to track the offender.
Email
error "response" from Internic |
|
Date:
Sun, 2 Jan 2000 17:20:29 -0500 (EST)
From:
Domain Registration Role Account <domreg@internic.net>
Reply-To:
hostmaster@internic.net
To:
vision@HUNGRY.COM
Subject:
Re: [NIC-000102.b318] MAXVISION.NET
The
Domain Name Registration Agreement below has been returned to you due
to
the following errors. Please review the Domain Name Registration
Agreement
instructions available at
ftp://www.networksolutions.com/templates/domain-template.txt.
The
glossary of the parser errors is available at
ftp://www.networksolutions.com/templates/domain-parser-errors.txt
Network
Solutions Registration Services
email
hostmaster@networksolutions.com
dreg08
The
attacker had tried to use the same DNS server as primary and secondary
=========================================================================
ERROR:
duplicate item 8 <S-CLUB.4MG.COM>/<209.210.67.126>
Either
the hostname or the IP address of a name server matches that of
another
server in the server list. =========================================================================
The
From header was spoofed, the upper case indicates it was copied from my
whois record
>From
vision@HUNGRY.COM Sun Jan 2 17:17:06 2000
>Received:
from rs.internic.net (bipmx2.lb.internic.net [192.168.120.15])
>
by opsmail.internic.net (8.9.3/8.9.1) with SMTP id RAA28490
>
for <hostmaster@networksolutions.com>; Sun, 2 Jan 2000 17:17:05 -0500
(EST)
>Received:
(qmail 6410 invoked from network); 2 Jan 2000 22:17:05 -0000
This
mail server was used to bounce the message. LAME! See my
mailrelay writeup.
Note
that the attacker used smtp9.gateway.net which seems to forward through
an
internal
"gateway.net" server, thus the 192.168 non-routable address.
>Received:
from relaye.gateway.net (HELO smtp9.gateway.net) (208.230.117.253)
>
by 192.168.119.15 with SMTP; 2 Jan 2000 22:17:05 -0000
This
indicates the attacker sent "HELO HUNGRY.COM" in their email forgery session
however,
their true IP is shown as 152.201.160.206
>Received:
from HUNGRY.COM (98C9A0CE.ipt.aol.com [152.201.160.206])
>
by smtp9.gateway.net (8.9.3/8.9.3) with ESMTP id RAA13460
>
for <hostmaster@networksolutions.com>; Sun, 2 Jan 2000 17:17:03 -0500
(EST)
>Message-ID:
<386FCEFC.9D64F794@HUNGRY.COM>
>Date:
Sun, 02 Jan 2000 17:19:40 -0500
>From:
Max Vision <vision@HUNGRY.COM>
>Organization:
Max Vision
They
set this as part of their use of gateway.net to forge the email
>X-Sender:
"Max Vision" <default@pop.gateway.net> (Unverified)
If
they didn't forge this header, it looks like an outdated Netscape on win98
The
"C-gatewaynet" in the User-Agent field is very curious.
>X-Mailer:
Mozilla 4.06 [en]C-gatewaynet (Win98; I)
>MIME-Version:
1.0
>To:
hostmaster@networksolutions.com
>Subject:
[NIC-000102.b318] Re: MODIFY DOMAIN maxvision.net
>Content-Type:
text/plain; charset=us-ascii
>Content-Transfer-Encoding:
7bit
>X-MTS-Ticket:
000102.b318
>X-MTS-Type:
Domain
>X-MTS-Mode:
Modify
>X-MTS-Priority:
Normal
>X-MTS-Status:
Open
>X-MTS-Timestamp:
000102171706
>
>
>----------------------------------------------------
>This
is the Domain Name Registration Agreement you
>recently
created.
>In
order to complete this modification,
>
>YOU
MUST E-MAIL THIS FORM TO: hostmaster@networksolutions.com
>
>After
you e-mail this form, you should receive an auto-reply
>with
a tracking number. You must use that number in the
>Subject
of any future messages you send regarding
>this
registration action.
>Once
this registration action is completed you will receive
>a
notification via e-mail.
>
>****
PLEASE DO NOT REMOVE Version Number or any of the information below
>when
submitting this template to hostmaster@networksolutions.com. *****
>
>Domain
Version Number: 5.0
>
>*********
Email completed agreement to hostmaster@networksolutions.com
>*********
>
>
>AGREEMENT
TO BE BOUND. By applying for a Network Solutions' service(s)
>through
our online application process or by applying for and registering a
>domain
name as part of our e-mail template application process or by using
>the
service(s) provided by Network Solutions under the Service Agreement,
>Version
5.0, you acknowledge that you have read and agree to be bound by all
>terms
and conditions of this Agreement and any pertinent rules or policies
>that
are or may be published by Network Solutions.
>
>Please
find the Network Solutions Service Agreement, Version 5.0 located
>at
>the
URL <a
>href="http://www.networksolutions.com/legal/service-agreement.html">http://www.networksolutions
.com/legal/service-agreement.html</a>.
>
>
>[URL
<a href="ftp://www.networksolutions.com">ftp://www.networksolutions.com</a>]
>[11/99]
>
>Authorization
The
attacker used the wrong text here, ignorant switching of "Name" for "New"
>0a.
(N)ew (M)odify (D)elete.........: M Name Registration
>0b.
Auth Scheme.....................: MAIL-FROM
>0c.
Auth Info.......................:
>
>1.
Comments........................:
>
>2.
Complete Domain Name............: maxvision.net
>
>Organization
Using Domain Name
Here
they retained my old contact info
>3a.
Organization Name................: Max Vision
>3b.
Street Address..................: 65 Washington Ave Suite 180
>3c.
City............................: Santa Clara
>3d.
State...........................: CA
>3e.
Postal Code.....................: 95050
>3f.
Country.........................: US
>
>Administrative
Contact
and
here they tried to make "themself" the admin contact
>4a.
NIC Handle (if known)...........:
>4b.
(I)ndividual (R)ole?............: Individual
>4c.
Name (Last, First)..............: Stakl, Joe
>4d.
Organization Name...............: Max Vision
there
is no Gate street in this city, AFAIK
>4e.
Street Address..................: 1458 Gate St.
>4f.
City............................: Saint Mary
>4g.
State...........................: MD
>4h.
Postal Code.....................: 20618
>4i.
Country.........................: USA
This
number is invalid
>4j.
Phone Number....................: 401-597-0588
>4k.
Fax Number......................:
>4l.
E-Mailbox.......................: vision@HUNGRY.COM
>
>Technical
Contact
Same
problems as Admin contact info above
>5a.
NIC Handle (if known)...........:
>5b.
(I)ndividual (R)ole?............: Individual
>5c.
Name(Last, First)...............: Stakl, Joe
>5d.
Organization Name...............: Max Vision
>5e.
Street Address..................: 1458 Gate St.
>5f.
City............................: Saint Mary
>5g.
State...........................: MD
>5h.
Postal Code.....................: 20618
>5i.
Country.........................: USA
>5j.
Phone Number....................: 401-597-0588
>5k.
Fax Number......................:
>5l.
E-Mailbox.......................: vision@HUNGRY.COM
>
>Billing
Contact
How
nice of them, leave me the bill
>6a.
NIC Handle (if known)...........: MV777
>6b.
(I)ndividual (R)ole?............: Individual
>6c.
Name (Last, First)..............:
>6d.
Organization Name...............:
>6e.
Street Address..................:
>6f.
City............................:
>6g.
State...........................:
>6h.
Postal Code.....................:
>6i.
Country.........................:
>6j.
Phone Number....................:
>6k.
Fax Number......................:
>6l.
E-Mailbox.......................:
>
These
are the nameservers they intended to use in the hijacking
The
IP addresses resolve to www26.freeservers.com
>Prime
Name Server
>7a.
Primary Server Hostname.........: S-CLUB.4MG.COM
>7b.
Primary Server Netaddress.......: 209.210.67.126
>
>Secondary
Name Server(s)
>8a.
Secondary Server Hostname.......: S-CLUB.4MG.COM
>8b.
Secondary Server Netaddress.....: 209.210.67.126
>
>
>END
OF AGREEMENT
>
>
>For
instructions, please refer to:
>"http://www.networksolutions.com/help/inst-mod.html" |
The
trail of evidence is overwhelming. Here is the breakdown, then I'll discuss
each element:
-
attacker,
using an AOL.COM IP address, send forged email using GATEWAY.NET mail relay.
This is known to be true, since the networksolutions.com mail server (rs.internic.net)
is resistant to TCP spoofing, as is relaye.gateway.net.
-
the AOL.COM
address was inactive, so they must have disconnected immediately after
sending the forged email (AOL absolutely does not care *at all* about this,
and all attempts to reach the abuse or security teams of AOL, Gateway.NET,
and Internic have yielded no reply. NO WONDER.)
-
the contact
information was all false. The only point of control that the attacker
gets is the DNS service.
-
If the
attacker intended Denial of Service, then they might not have control of
the Linux DNS server.
-
If the
attacker intended control of the domain, then they either own/operate the
Linux DNS server, or they have rooted the machine.
-
The Linux
DNS server is a freeservers.com webhosting server - when the HTTP/1.1 hostname
s-club.4mg.com is used, the following webpage appears (indicating
that they do have control of the linux server, and that they intended to
hijack my domain and Nokia's):
Internic's
mail server is not vulnerable to TCP spoofing, which indicates that the
header information is valid - that a mail really did reach their servers
from the relay host, relaye.gateway.net. [Update: note that this machine
is not a Linux box, for those curious about the possibility of other spoofing
methods not involving sequence number prediction]
not
spoofed: rs.internic.net |
|
rs.internic.net
(198.41.0.6)
TCP
Sequence Prediction:
Class=truly random
Difficulty=9999999 (Good luck!)
Sequence numbers: 3763161D 84916A9 979391FC 660A454A 4D3417E0 5DD7DB3B |
relaye.gateway.net
is also not vulnerable to TCP spoofing, which indicates that the header
information is valid - that a mail really did reach their servers from
the attacker, 98C9A0CE.ipt.aol.com [152.201.160.206].
not
spoofed: mail relay host |
|
relaye.gateway.net
(208.230.117.253):
TCP
Sequence Prediction:
Class=random positive increments
Difficulty=50749 (Worthy challenge)
Remote
operating system guess: BSDI BSD/OS 3.0-3.1 |
Based
on this information, the liklihood of the email being truly forged (at
the packet level) are extremely low. This appears to be a straightforward
application-level forgery from the AOL account.
Having
a look at the DNS server that the attacker was trying to substitute for
mine, to control the domain, we see it is an older Linux system, that is
acting as a virtual webserver. I have contacted that rightful administrators
of the system about the attempted attack.
overview:
substitute dns server |
|
FreeServers.com
- www26 Server Provo, Utah - USA
www26.freeservers.com
(209.210.67.126):
Port
State Protocol Service
21
open tcp ftp
23
open tcp telnet
25
open tcp smtp
37
open tcp time
80
open tcp http
111
open tcp sunrpc
113
open tcp auth
513
open tcp login
514
open tcp shell
2049
open tcp nfs
3306
open tcp mysql
TCP
Sequence Prediction:
Class=truly random
Difficulty=9999999 (Good luck!)
Remote operating system guess: Linux 2.0.35-37 |
HOW
TO DEFEND YOURSELF
Internic
offers three authentication methods for domain administrators. MAIL-FROM,
CRYPT-PW, and PGP. Each can be used to effectively protect against this
type of hijacking effect, each with increasing levels of effectiveness.
The following are summaries that discuss how each is used. After each description
I'll briefly discuss their vulnerabilities.
MAIL-FROM
is the most basic type of authentication scheme. Under this level of protection,
Network Solutions will verify that a Domain Name Registration Agreement,
Contact Form or Host Form was submitted from the e-mail address, as listed
in our database, of the administrative or technical contact of the record
to be changed.
MAIL-FROM
checks to see that requests to update your contact record -- or any record
that you are associated with -- are sent from the current E-mail address
of the contact.
By
default, all the contacts in the database have MAIL-FROM protection unless
they have used the Contact Form to associate their contact record with
a PGP key or an encrypted password. MAIL-FROM is the default authentication
scheme. If you are not sure which of the three options to select, choose
MAIL-FROM - it is the default. |
MAIL-FROM
is the default, and weakest security level. Don't follow their advice,
use CRYPT-PW at the minimum.
In
the protection hierarchy, encrypted password, or CRYPT-PW, is the next
highest level of protection for a domain name registration record. CRYPT-PW
allows updates to be submitted from any e-mail address, and, if the correct
password is supplied, Network Solutions will process the Domain Name Registration
Agreement, Contact Form or Host Form.
If
you would like to guard your contact record -- and any other database records
that you are a contact for -- with a password, enter the plain text of
the password in the box below. After you enter the password in the box
below it will be encrypted and entered on the form in the correct place.
Enter the password a second time to verify that you have entered the plain
text of the password correctly.
Do
not lose this password. Updates to database records may be significantly
delayed if this password is lost. |
CRYPT-PW
is a more secure authentication mechanism, as it requires the use of the
correct password to effect a domain change. This may be exceedingly difficult
to guess, as Internic may have anti-password-guessing measures in place
to curb endless "guesses".
PGP
*NetSol may have stopped supporting
PGP* |
|
Pretty
Good Privacy provides the highest level of security. PGP is an encryption
and digital signature scheme. While 100% security can never be guaranteed,
PGP is a very safe scheme. In order to use PGP as your authentication scheme,
the PGP software must be installed on your computer. This software is available
both commercially and as freeware.
If
you wish to protect your contact record -- and all records that you are
a listed contact for -- with Pretty Good Privacy encryption software, choose
this option.
IMPORTANT:
You must obtain the PGP software and install it on your computer before
you can use this security feature. PGP is available commercially and as
shareware. To find out more about getting started with PGP, read our help
files on how to obtain and install PGP. Your PGP key MUST be added to the
Network Solutions' key server before you can use the Contact Form to associate
a PGP public key with this contact. Enter the key ID of your PGP public
key in the box below. If you have installed the PGP software on your machine
but you do not know your key ID, type: pgp -kvc on your local machine to
discover the eight digit key ID of your PGP key.
IMPORTANT:
If you have selected PGP, keep in mind that when the contact template is
generated and E-mailed to you, you must FIRST sign the update request with
your secret PGP key before sending the contact template to NetworkSsolutions. |
PGP
is the strongest security level, as it is virtually impossible for an attacker
to guess the correct private key. PGP is widely held to be one of the more
secure/trusted forms of encryption/authentication.
There
are also settings for "Notification Levels" for updates or usage. If an
attacker is aware of this, they can forge the request email, and then forge
an additional ACK email.
The
administrative and technical contact/agent will each choose when they would
like to be notified to validate a Domain Name Registration Agreement, Contact
Form or Host Form. The options they can choose from are: BEFORE-UPDATE;
AFTER-UPDATE; and NOT-CARE. The administrative and technical contacts are
not required to choose the same option. Network Solutions will act upon
the first reply we receive.
If
the contact selects BEFORE-UPDATE, Network Solutions will send a confirmation
request before any changes are made, even if the request was received from
an authorized source. The contact then has the opportunity to acknowledge
the validity of the request by replying "ACK" or "YES" to the notification.
If the contact does not agree with the change request, replying "NAK" or
"NO" to the notification will prevent any changes from being made. Selecting
BEFORE-UPDATE may delay legitimate changes while Network Solutions waits
for approval to make the requested change.
If
the contact selects AFTER-UPDATE, Network Solutions will send a confirmation
request after changes have been made. Even if AFTER-UPDATE is the selected
level of protection, Network Solutions will only process a Domain Name
Registration Agreement, Contact Form or Host Form if it was received from
an authorized source, or if the registrant gives its express written permission
to make the requested change.
Both
the administrative and technical contacts have the opportunity to acknowledge
the validity of the request by replying "ACK" or "YES" to the notification.
If either one of the contacts does not agree with the change request, replying
"NAK" or "NO" to the notification will usually reverse any changes that
were made. AFTER-UPDATE is the default option if no other type of notification
is selected.
If
the contact selects NOT-CARE, Network Solutions will never send a confirmation
to that contact. By choosing this option, the contact establishes that
they are not concerned about whether or not authorized changes are made
to any domain name registration, contact record or host record with which
he is associated. |
As
stated above, MAIL-FROM is not really enhanced with the BEFORE-UPDATE feature,
as an attacker could forge a corresponding ACK message.
CONCLUSION
There
are some serious security issues with the current Internic Guardian system.
Domain Hijacking is as easy as ever, and many newbie crackers have been
actively using this attack to hijack websites addresses. Over the Y2K weekend
it was rumored that several large sites suffered from this attack. If you
are a domain contact and have not set encryption authentication options
such as CRYPT-PW or PGP, then DO SO NOW!
Max
Vision
http://whitehats.com/
http://maxvision.net/
|
|