Internic Domain Hijacking - "It Happens"
Max Vision, http://maxvision.net/

OVERVIEW

This morning, January 2nd 2000, I witnessed an attempted takeover of one of my domains, MAXVISION.NET. The attacker, calling themself "Mnemonic of the group KeyRoot", using an AOL.COM address, attempted to spoof a request from me to change the primary and secondary DNS servers for my domain, to Network Solutions / Internic. If successful, this request would effectively give them control of maxvision.net until I could have sorted it out with my place of registration. The attempt at hijacking the domain was foiled for several reasons, which I will outline below.

THE ATTACK

The attacker sent a forged Domain Modification form to Internic. There were several incompotent errors in the submission that caused the submission to fail. Had these errors not been made, and had I relied on the MAIL-FROM mechanism of Internic, then control of my domain would have been effectively hijacked.

Overview of forged email path:

Mail Path Diagram

The first sign that something was going on was an email from Internic, confirming "my request".  


Email confirmation "response" from Internic  

Date: Sun, 2 Jan 2000 17:19:50 -0500 (EST)
From: hostmaster@internic.net
To: Max Vision <vision@HUNGRY.COM>
Subject: Re: [NIC-000102.b318] Re: MODIFY DOMAIN maxvision.net

This is an automatic reply from Network Solutions to acknowledge that
your message has been received. This acknowledgement is NOT a
confirmation that your request has been processed.

If you need to correspond with us regarding this request, please be
sure to reference the tracking number [[NIC-000102.b318]] in the subject
of your message.

Regards,
InterNIC Registration Services
... other standard Internic advertising followed (omited)

Moments later I received an error message from Internic (the attacker had made a mistake), which provided me with the evidence I needed to track the offender.
 
Email error "response" from Internic  

Date: Sun, 2 Jan 2000 17:20:29 -0500 (EST)
From: Domain Registration Role Account <domreg@internic.net>
Reply-To: hostmaster@internic.net
To: vision@HUNGRY.COM
Subject: Re: [NIC-000102.b318] MAXVISION.NET

The Domain Name Registration Agreement below has been returned to you due
to the following errors. Please review the Domain Name Registration 
Agreement instructions available at 
ftp://www.networksolutions.com/templates/domain-template.txt.

The glossary of the parser errors is available at 
ftp://www.networksolutions.com/templates/domain-parser-errors.txt

Network Solutions Registration Services
email hostmaster@networksolutions.com

dreg08

The attacker had tried to use the same DNS server as primary and secondary
=========================================================================
ERROR: duplicate item 8 <S-CLUB.4MG.COM>/<209.210.67.126>

Either the hostname or the IP address of a name server matches that of
another server in the server list. =========================================================================

The From header was spoofed, the upper case indicates it was copied from my whois record
>From vision@HUNGRY.COM Sun Jan 2 17:17:06 2000
>Received: from rs.internic.net (bipmx2.lb.internic.net [192.168.120.15])
> by opsmail.internic.net (8.9.3/8.9.1) with SMTP id RAA28490
> for <hostmaster@networksolutions.com>; Sun, 2 Jan 2000 17:17:05 -0500 (EST)
>Received: (qmail 6410 invoked from network); 2 Jan 2000 22:17:05 -0000
This mail server was used to bounce the message. LAME! See my mailrelay writeup.
Note that the attacker used smtp9.gateway.net which seems to forward through an
internal "gateway.net" server, thus the 192.168 non-routable address.
>Received: from relaye.gateway.net (HELO smtp9.gateway.net) (208.230.117.253)
> by 192.168.119.15 with SMTP; 2 Jan 2000 22:17:05 -0000
This indicates the attacker sent "HELO HUNGRY.COM" in their email forgery session
however, their true IP is shown as 152.201.160.206
>Received: from HUNGRY.COM (98C9A0CE.ipt.aol.com [152.201.160.206])
> by smtp9.gateway.net (8.9.3/8.9.3) with ESMTP id RAA13460
> for <hostmaster@networksolutions.com>; Sun, 2 Jan 2000 17:17:03 -0500 (EST)
>Message-ID: <386FCEFC.9D64F794@HUNGRY.COM>
>Date: Sun, 02 Jan 2000 17:19:40 -0500
>From: Max Vision <vision@HUNGRY.COM>
>Organization: Max Vision
They set this as part of their use of gateway.net to forge the email
>X-Sender: "Max Vision" <default@pop.gateway.net> (Unverified)
If they didn't forge this header, it looks like an outdated Netscape on win98
The "C-gatewaynet" in the User-Agent field is very curious.
>X-Mailer: Mozilla 4.06 [en]C-gatewaynet (Win98; I)
>MIME-Version: 1.0
>To: hostmaster@networksolutions.com
>Subject: [NIC-000102.b318] Re: MODIFY DOMAIN maxvision.net
>Content-Type: text/plain; charset=us-ascii
>Content-Transfer-Encoding: 7bit
>X-MTS-Ticket: 000102.b318
>X-MTS-Type: Domain
>X-MTS-Mode: Modify
>X-MTS-Priority: Normal
>X-MTS-Status: Open
>X-MTS-Timestamp: 000102171706
>
>
>----------------------------------------------------
>This is the Domain Name Registration Agreement you
>recently created.
>In order to complete this modification,
>
>YOU MUST E-MAIL THIS FORM TO: hostmaster@networksolutions.com
>
>After you e-mail this form, you should receive an auto-reply
>with a tracking number. You must use that number in the
>Subject of any future messages you send regarding
>this registration action.
>Once this registration action is completed you will receive
>a notification via e-mail.
>
>**** PLEASE DO NOT REMOVE Version Number or any of the information below
>when submitting this template to hostmaster@networksolutions.com. *****
>
>Domain Version Number: 5.0
>
>********* Email completed agreement to hostmaster@networksolutions.com
>*********
>
>
>AGREEMENT TO BE BOUND. By applying for a Network Solutions' service(s)
>through our online application process or by applying for and registering a
>domain name as part of our e-mail template application process or by using
>the service(s) provided by Network Solutions under the Service Agreement,
>Version 5.0, you acknowledge that you have read and agree to be bound by all
>terms and conditions of this Agreement and any pertinent rules or policies
>that are or may be published by Network Solutions.
>
>Please find the Network Solutions Service Agreement, Version 5.0 located
>at
>the URL <a
>href="http://www.networksolutions.com/legal/service-agreement.html">http://www.networksolutions
.com/legal/service-agreement.html</a>.
>
>
>[URL <a href="ftp://www.networksolutions.com">ftp://www.networksolutions.com</a>]
>[11/99]
>
>Authorization
The attacker used the wrong text here, ignorant switching of "Name" for "New"
>0a. (N)ew (M)odify (D)elete.........: M Name Registration
>0b. Auth Scheme.....................: MAIL-FROM
>0c. Auth Info.......................:
>
>1. Comments........................:
>
>2. Complete Domain Name............: maxvision.net
>
>Organization Using Domain Name
Here they retained my old contact info
>3a. Organization Name................: Max Vision
>3b. Street Address..................: 65 Washington Ave Suite 180
>3c. City............................: Santa Clara
>3d. State...........................: CA
>3e. Postal Code.....................: 95050
>3f. Country.........................: US
>
>Administrative Contact
and here they tried to make "themself" the admin contact
>4a. NIC Handle (if known)...........:
>4b. (I)ndividual (R)ole?............: Individual
>4c. Name (Last, First)..............: Stakl, Joe
>4d. Organization Name...............: Max Vision
there is no Gate street in this city, AFAIK
>4e. Street Address..................: 1458 Gate St.
>4f. City............................: Saint Mary
>4g. State...........................: MD
>4h. Postal Code.....................: 20618
>4i. Country.........................: USA
This number is invalid
>4j. Phone Number....................: 401-597-0588
>4k. Fax Number......................:
>4l. E-Mailbox.......................: vision@HUNGRY.COM
>
>Technical Contact
Same problems as Admin contact info above
>5a. NIC Handle (if known)...........:
>5b. (I)ndividual (R)ole?............: Individual
>5c. Name(Last, First)...............: Stakl, Joe
>5d. Organization Name...............: Max Vision
>5e. Street Address..................: 1458 Gate St.
>5f. City............................: Saint Mary
>5g. State...........................: MD
>5h. Postal Code.....................: 20618
>5i. Country.........................: USA
>5j. Phone Number....................: 401-597-0588
>5k. Fax Number......................:
>5l. E-Mailbox.......................: vision@HUNGRY.COM
>
>Billing Contact
How nice of them, leave me the bill
>6a. NIC Handle (if known)...........: MV777
>6b. (I)ndividual (R)ole?............: Individual
>6c. Name (Last, First)..............:
>6d. Organization Name...............:
>6e. Street Address..................:
>6f. City............................:
>6g. State...........................:
>6h. Postal Code.....................:
>6i. Country.........................:
>6j. Phone Number....................:
>6k. Fax Number......................:
>6l. E-Mailbox.......................:
>
These are the nameservers they intended to use in the hijacking
The IP addresses resolve to www26.freeservers.com 
>Prime Name Server
>7a. Primary Server Hostname.........: S-CLUB.4MG.COM
>7b. Primary Server Netaddress.......: 209.210.67.126
>
>Secondary Name Server(s)
>8a. Secondary Server Hostname.......: S-CLUB.4MG.COM
>8b. Secondary Server Netaddress.....: 209.210.67.126
>
>
>END OF AGREEMENT
>
>
>For instructions, please refer to:
>"http://www.networksolutions.com/help/inst-mod.html"

The trail of evidence is overwhelming. Here is the breakdown, then I'll discuss each element:

  • attacker, using an AOL.COM IP address, send forged email using GATEWAY.NET mail relay. This is known to be true, since the networksolutions.com mail server (rs.internic.net) is resistant to TCP spoofing, as is relaye.gateway.net.
  • the AOL.COM address was inactive, so they must have disconnected immediately after sending the forged email (AOL absolutely does not care *at all* about this, and all attempts to reach the abuse or security teams of AOL, Gateway.NET, and Internic have yielded no reply. NO WONDER.) 
  • the contact information was all false. The only point of control that the attacker gets is the DNS service. 
  • If the attacker intended Denial of Service, then they might not have control of the Linux DNS server. 
  • If the attacker intended control of the domain, then they either own/operate the Linux DNS server, or they have rooted the machine. 
  • The Linux DNS server is a freeservers.com webhosting server - when the HTTP/1.1 hostname s-club.4mg.com is used, the following webpage appears (indicating that they do have control of the linux server, and that they intended to hijack my domain and Nokia's):
Complete idiots.

Internic's mail server is not vulnerable to TCP spoofing, which indicates that the header information is valid - that a mail really did reach their servers from the relay host, relaye.gateway.net. [Update: note that this machine is not a Linux box, for those curious about the possibility of other spoofing methods not involving sequence number prediction]
 
not spoofed: rs.internic.net  

rs.internic.net (198.41.0.6)

TCP Sequence Prediction:
  Class=truly random
  Difficulty=9999999 (Good luck!)
  Sequence numbers: 3763161D 84916A9 979391FC 660A454A 4D3417E0 5DD7DB3B

relaye.gateway.net is also not vulnerable to TCP spoofing, which indicates that the header information is valid - that a mail really did reach their servers from the attacker, 98C9A0CE.ipt.aol.com [152.201.160.206].
 
not spoofed: mail relay host  

relaye.gateway.net (208.230.117.253):

TCP Sequence Prediction:
  Class=random positive increments
  Difficulty=50749 (Worthy challenge)
    Remote operating system guess: BSDI BSD/OS 3.0-3.1 

Based on this information, the liklihood of the email being truly forged (at the packet level) are extremely low. This appears to be a straightforward application-level forgery from the AOL account.

Having a look at the DNS server that the attacker was trying to substitute for mine, to control the domain, we see it is an older Linux system, that is acting as a virtual webserver. I have contacted that rightful administrators of the system about the attempted attack. 
 
overview: substitute dns server  

FreeServers.com - www26 Server Provo, Utah - USA
www26.freeservers.com (209.210.67.126):
Port State Protocol Service
21   open tcp ftp 
23   open tcp telnet 
25   open tcp smtp 
37   open tcp time 
80   open tcp http 
111  open tcp sunrpc 
113  open tcp auth 
513  open tcp login 
514  open tcp shell 
2049 open tcp nfs 
3306 open tcp mysql 

TCP Sequence Prediction:
  Class=truly random
  Difficulty=9999999 (Good luck!)
  Remote operating system guess: Linux 2.0.35-37

HOW TO DEFEND YOURSELF 

Internic offers three authentication methods for domain administrators. MAIL-FROM, CRYPT-PW, and PGP. Each can be used to effectively protect against this type of hijacking effect, each with increasing levels of effectiveness. The following are summaries that discuss how each is used. After each description I'll briefly discuss their vulnerabilities.
 
MAIL-FROM  

MAIL-FROM is the most basic type of authentication scheme. Under this level of protection, Network Solutions will verify that a Domain Name Registration Agreement, Contact Form or Host Form was submitted from the e-mail address, as listed in our database, of the administrative or technical contact of the record to be changed.

MAIL-FROM checks to see that requests to update your contact record -- or any record that you are associated with -- are sent from the current E-mail address of the contact. 

By default, all the contacts in the database have MAIL-FROM protection unless they have used the Contact Form to associate their contact record with a PGP key or an encrypted password. MAIL-FROM is the default authentication scheme. If you are not sure which of the three options to select, choose MAIL-FROM - it is the default.

MAIL-FROM is the default, and weakest security level. Don't follow their advice, use CRYPT-PW at the minimum.
 
CRYPT-PW  

In the protection hierarchy, encrypted password, or CRYPT-PW, is the next highest level of protection for a domain name registration record. CRYPT-PW allows updates to be submitted from any e-mail address, and, if the correct password is supplied, Network Solutions will process the Domain Name Registration Agreement, Contact Form or Host Form.

If you would like to guard your contact record -- and any other database records that you are a contact for -- with a password, enter the plain text of the password in the box below. After you enter the password in the box below it will be encrypted and entered on the form in the correct place. Enter the password a second time to verify that you have entered the plain text of the password correctly.
Do not lose this password. Updates to database records may be significantly delayed if this password is lost. 

CRYPT-PW is a more secure authentication mechanism, as it requires the use of the correct password to effect a domain change. This may be exceedingly difficult to guess, as Internic may have anti-password-guessing measures in place to curb endless "guesses".
 
PGP *NetSol may have stopped supporting PGP*  

Pretty Good Privacy provides the highest level of security. PGP is an encryption and digital signature scheme. While 100% security can never be guaranteed, PGP is a very safe scheme. In order to use PGP as your authentication scheme, the PGP software must be installed on your computer. This software is available both commercially and as freeware.

If you wish to protect your contact record -- and all records that you are a listed contact for -- with Pretty Good Privacy encryption software, choose this option.

IMPORTANT: You must obtain the PGP software and install it on your computer before you can use this security feature. PGP is available commercially and as shareware. To find out more about getting started with PGP, read our help files on how to obtain and install PGP. Your PGP key MUST be added to the Network Solutions' key server before you can use the Contact Form to associate a PGP public key with this contact. Enter the key ID of your PGP public key in the box below. If you have installed the PGP software on your machine but you do not know your key ID, type: pgp -kvc on your local machine to discover the eight digit key ID of your PGP key.

IMPORTANT: If you have selected PGP, keep in mind that when the contact template is generated and E-mailed to you, you must FIRST sign the update request with your secret PGP key before sending the contact template to NetworkSsolutions. 

PGP is the strongest security level, as it is virtually impossible for an attacker to guess the correct private key. PGP is widely held to be one of the more secure/trusted forms of encryption/authentication.

There are also settings for "Notification Levels" for updates or usage. If an attacker is aware of this, they can forge the request email, and then forge an additional ACK email.
 
Notification Levels   

The administrative and technical contact/agent will each choose when they would like to be notified to validate a Domain Name Registration Agreement, Contact Form or Host Form. The options they can choose from are: BEFORE-UPDATE; AFTER-UPDATE; and NOT-CARE. The administrative and technical contacts are not required to choose the same option. Network Solutions will act upon the first reply we receive.

If the contact selects BEFORE-UPDATE, Network Solutions will send a confirmation request before any changes are made, even if the request was received from an authorized source. The contact then has the opportunity to acknowledge the validity of the request by replying "ACK" or "YES" to the notification. If the contact does not agree with the change request, replying "NAK" or "NO" to the notification will prevent any changes from being made. Selecting BEFORE-UPDATE may delay legitimate changes while Network Solutions waits for approval to make the requested change.

If the contact selects AFTER-UPDATE, Network Solutions will send a confirmation request after changes have been made. Even if AFTER-UPDATE is the selected level of protection, Network Solutions will only process a Domain Name Registration Agreement, Contact Form or Host Form if it was received from an authorized source, or if the registrant gives its express written permission to make the requested change.

Both the administrative and technical contacts have the opportunity to acknowledge the validity of the request by replying "ACK" or "YES" to the notification. If either one of the contacts does not agree with the change request, replying "NAK" or "NO" to the notification will usually reverse any changes that were made. AFTER-UPDATE is the default option if no other type of notification is selected.

If the contact selects NOT-CARE, Network Solutions will never send a confirmation to that contact. By choosing this option, the contact establishes that they are not concerned about whether or not authorized changes are made to any domain name registration, contact record or host record with which he is associated.

As stated above, MAIL-FROM is not really enhanced with the BEFORE-UPDATE feature, as an attacker could forge a corresponding ACK message.
 

CONCLUSION 

There are some serious security issues with the current Internic Guardian system. Domain Hijacking is as easy as ever, and many newbie crackers have been actively using this attack to hijack websites addresses. Over the Y2K weekend it was rumored that several large sites suffered from this attack. If you are a domain contact and have not set encryption authentication options such as CRYPT-PW or PGP, then DO SO NOW! 

Max Vision
http://whitehats.com/
http://maxvision.net/