I totally agree that this is a feasible attack. It has been seen on a very large scale, Russia did a BGP redirect at a country level in their dispute with Georgia.
DNSSEC on A records alone is practically worthless. There is some value but not a great deal. Most DNS attacks have been persuading registrars to put bad data into the system. On Tue, Sep 13, 2011 at 6:30 PM, Marsh Ray <ma...@extendedsubset.com> wrote: > On 09/13/2011 04:24 PM, davidills...@gmail.com wrote: > >> >> On 13 Sep 2011, at 21:35, Chris Palmer wrote: >> >>> <snip> >>> sites; small sites may have to choose no pinning or potentially >>> bricking their site (up to the maxAge window). This is not worse than >>> the status quo.""" >>> >> >> What about sites which don't currently use https at all? The DNS records >> for theregister.co.uk <http://theregister.co.uk> were redirected the >> >> other week. An attacker who could do that could redirect to https, then >> set a very long max-age pin. At that point, they'd be dependent on the >> browser vendor unpinning affected users, right? >> > > Wouldn't they have to acquire a valid cert first? Not saying that's out of > the realm of possibility, but... > > I think you have a point. The whole premise of this is that there are > circumstances under which some attacker can obtain such a cert. If this > feature translates to a risk of perma-DoS for the (100.0 - epsilon)% of > sites that don't adopt it immediately then it may be more dangerous than > it's worth. > > Consider an adversarial country like, say, Bananastan. They have an ISP or > three, their own CA, and of course, no sense of humor. > > They may one day be subject to some criticisms in the online press which > they perceive as unfair. Or maybe something on a video sharing site is > contrary to their customs and traditions. > > So their local judge orders their local ISP to block the offending media > provider. The ISP does this by advertising more specific BGP routes for the > video site's netblocks(1). > > Being mostly streaming data of little consequence, the video site has not > yet set up HSTS or even has full support for HTTPS (2). > > The ISP also sets the country's DNS resolvers to reply to name requests for > the site with an IP address of a webserver where citizens can receive > educational information(3). > > To be sure they get everybody, they do something I didn't know could be > done with DNS (4). > > In order to save the the misguided users that accidentally used a > subversive https: bookmark, the court orders the local CA to "do what it > takes to make it work"(5). > > And just to be sure the message sticks, they set a long term HSTS pin on > this cert and/or their CA (6). > > Hilarity ensues. > > - Marsh > > > > 1. YouTube - Pakistan - 2008 > http://www.circleid.com/posts/**82258_pakistan_hijacks_** > youtube_closer_look<http://www.circleid.com/posts/82258_pakistan_hijacks_youtube_closer_look> > http://www.ripe.net/internet-**coordination/news/industry-** > developments/youtube-**hijacking-a-ripe-ncc-ris-case-**study<http://www.ripe.net/internet-coordination/news/industry-developments/youtube-hijacking-a-ripe-ncc-ris-case-study> > > 2. http://youtube.com/ > > > 3. http://web.archive.org/web/**20060418030141/http://** > chinadigitaltimes.net/2006/01/**image_of_internet_police_** > jingjing_and_chacha_online_**hon.php<http://web.archive.org/web/20060418030141/http://chinadigitaltimes.net/2006/01/image_of_internet_police_jingjing_and_chacha_online_hon.php> > > > 4. China - 2010 > https://lists.dns-oarc.net/**pipermail/dns-operations/2010-** > March/005260.html<https://lists.dns-oarc.net/pipermail/dns-operations/2010-March/005260.html> > http://www.zdnet.co.uk/news/**networking/2010/10/11/mystery-** > of-web-traffic-redirect-to-**china-remains-unsolved-**40090476/<http://www.zdnet.co.uk/news/networking/2010/10/11/mystery-of-web-traffic-redirect-to-china-remains-unsolved-40090476/> > > > 5. [...] > > > 6. Why wouldn't this attack work? > > > ______________________________**_________________ > websec mailing list > websec@ietf.org > https://www.ietf.org/mailman/**listinfo/websec<https://www.ietf.org/mailman/listinfo/websec> > -- Website: http://hallambaker.com/
_______________________________________________ websec mailing list websec@ietf.org https://www.ietf.org/mailman/listinfo/websec