Jump to content

Is DNSSEC supported by Windows?


Recommended Posts

Guest totojepast
Posted

Is the Windows XP DNS resolver able to check the validity of the DNS

data using DNSSEC? Is this feature turned on by default?

 

And does the Windows Server support DNSSEC for publishing the public

DNS records?

Guest Steve Riley [MSFT]
Posted

No, DNSSEC isn't supported in any version of Windows.

 

--

Steve Riley

steve.riley@microsoft.com

http://blogs.technet.com/steriley

http://www.protectyourwindowsnetwork.com

 

 

 

"totojepast" <totojepast@razdva.cz> wrote in message

news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...<span style="color:blue">

> Is the Windows XP DNS resolver able to check the validity of the DNS

> data using DNSSEC? Is this feature turned on by default?

>

> And does the Windows Server support DNSSEC for publishing the public

> DNS records? </span>

Guest Steve Riley [MSFT]
Posted

Clarification. There is _limited_ support: Windows Server 2003 DNS can act

as a secondary DNS server for an existing DNSSEC-compliant zone. Windows

clients will cache DNSSEC resource records, but perform no cryptography,

authentication, or verification.

 

More information here:

http://technet.microsoft.com/en-us/library/cc728328.aspx

 

--

Steve Riley

steve.riley@microsoft.com

http://blogs.technet.com/steriley

http://www.protectyourwindowsnetwork.com

 

 

 

"Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...<span style="color:blue">

> No, DNSSEC isn't supported in any version of Windows.

>

> --

> Steve Riley

> steve.riley@microsoft.com

> http://blogs.technet.com/steriley

> http://www.protectyourwindowsnetwork.com

>

>

>

> "totojepast" <totojepast@razdva.cz> wrote in message

> news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...<span style="color:green">

>> Is the Windows XP DNS resolver able to check the validity of the DNS

>> data using DNSSEC? Is this feature turned on by default?

>>

>> And does the Windows Server support DNSSEC for publishing the public

>> DNS records?</span>

> </span>

Posted

Will DNSSEC be fully supported in future versions of Windows, Steve? In

addition, will any current versions of Windows be updated to fully support it

via cryptography, authentication and/or verification, Steve including but not

limited to Windows Server 2003?

 

"Steve Riley [MSFT]" wrote:

<span style="color:blue">

> Clarification. There is _limited_ support: Windows Server 2003 DNS can act

> as a secondary DNS server for an existing DNSSEC-compliant zone. Windows

> clients will cache DNSSEC resource records, but perform no cryptography,

> authentication, or verification.

>

> More information here:

> http://technet.microsoft.com/en-us/library/cc728328.aspx

>

> --

> Steve Riley

> steve.riley@microsoft.com

> http://blogs.technet.com/steriley

> http://www.protectyourwindowsnetwork.com

>

>

>

> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

> news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...<span style="color:green">

> > No, DNSSEC isn't supported in any version of Windows.

> >

> > --

> > Steve Riley

> > steve.riley@microsoft.com

> > http://blogs.technet.com/steriley

> > http://www.protectyourwindowsnetwork.com

> >

> >

> >

> > "totojepast" <totojepast@razdva.cz> wrote in message

> > news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...<span style="color:darkred">

> >> Is the Windows XP DNS resolver able to check the validity of the DNS

> >> data using DNSSEC? Is this feature turned on by default?

> >>

> >> And does the Windows Server support DNSSEC for publishing the public

> >> DNS records?</span>

> > </span></span>

Posted

How about the problems on web sites with errors about missing scripts and

lost objects and other stuff?

 

"Steve Riley [MSFT]" wrote:

<span style="color:blue">

> What problem can you solve with DNSSEC that is not already solved with IPsec

> or SSL?

>

> --

> Steve Riley

> steve.riley@microsoft.com

> http://blogs.technet.com/steriley

> http://www.protectyourwindowsnetwork.com

>

>

>

> "Dan" <Dan@discussions.microsoft.com> wrote in message

> news:7571D3C3-6A37-47E9-A937-CD6B198B400B@microsoft.com...<span style="color:green">

> > Will DNSSEC be fully supported in future versions of Windows, Steve? In

> > addition, will any current versions of Windows be updated to fully support

> > it

> > via cryptography, authentication and/or verification, Steve including but

> > not

> > limited to Windows Server 2003?

> >

> > "Steve Riley [MSFT]" wrote:

> ><span style="color:darkred">

> >> Clarification. There is _limited_ support: Windows Server 2003 DNS can

> >> act

> >> as a secondary DNS server for an existing DNSSEC-compliant zone. Windows

> >> clients will cache DNSSEC resource records, but perform no cryptography,

> >> authentication, or verification.

> >>

> >> More information here:

> >> http://technet.microsoft.com/en-us/library/cc728328.aspx

> >>

> >> --

> >> Steve Riley

> >> steve.riley@microsoft.com

> >> http://blogs.technet.com/steriley

> >> http://www.protectyourwindowsnetwork.com

> >>

> >>

> >>

> >> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

> >> news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...

> >> > No, DNSSEC isn't supported in any version of Windows.

> >> >

> >> > --

> >> > Steve Riley

> >> > steve.riley@microsoft.com

> >> > http://blogs.technet.com/steriley

> >> > http://www.protectyourwindowsnetwork.com

> >> >

> >> >

> >> >

> >> > "totojepast" <totojepast@razdva.cz> wrote in message

> >> > news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...

> >> >> Is the Windows XP DNS resolver able to check the validity of the DNS

> >> >> data using DNSSEC? Is this feature turned on by default?

> >> >>

> >> >> And does the Windows Server support DNSSEC for publishing the public

> >> >> DNS records?

> >> > </span></span></span>

Guest Steve Riley [MSFT]
Posted

Signed name resolution records won't address those issues.

 

Say you want to connect to WebServerA. Say you want a way to be assured that

you are, indeed, connecting to WebServerA, not some imposter. Well, there

already exists a mechanism to do that: SSL. SSL authenticates the server to

your computer, because your computer trusts the organization that issued the

server's certificate.

 

Say you want to connect to FileServerB. Say you want a way to be assured

that you are, indeed, connecting to FileServerB, not some imposter. Well,

there already exists a mechanism to do that: IPsec. IPsec authenticates the

server to your computer (and your computer to the server), because both the

server and your computer trust the issuers of their respective certificates.

 

See, this is really what matters. Spoofing DNS is a useless attack if the

servers are protected by SSL or IPsec. Bolting cryptography onto DNS will be

monumentally expensive to deploy across the Internet and doesn't address the

real question. DNSSEC answers this question: "Can I trust the answer given

to my name resolution request?" Yet the more important question is "Can I

trust that I'm going to the right server?" And this question is already

answered by SSL and IPsec.

 

--

Steve Riley

steve.riley@microsoft.com

http://blogs.technet.com/steriley

http://www.protectyourwindowsnetwork.com

 

 

 

"Dan" <Dan@discussions.microsoft.com> wrote in message

news:0A907A01-2DC6-4A22-B075-F2DE8C4BBABA@microsoft.com...<span style="color:blue">

> How about the problems on web sites with errors about missing scripts and

> lost objects and other stuff?

>

> "Steve Riley [MSFT]" wrote:

><span style="color:green">

>> What problem can you solve with DNSSEC that is not already solved with

>> IPsec

>> or SSL?

>>

>> --

>> Steve Riley

>> steve.riley@microsoft.com

>> http://blogs.technet.com/steriley

>> http://www.protectyourwindowsnetwork.com

>>

>>

>>

>> "Dan" <Dan@discussions.microsoft.com> wrote in message

>> news:7571D3C3-6A37-47E9-A937-CD6B198B400B@microsoft.com...<span style="color:darkred">

>> > Will DNSSEC be fully supported in future versions of Windows, Steve?

>> > In

>> > addition, will any current versions of Windows be updated to fully

>> > support

>> > it

>> > via cryptography, authentication and/or verification, Steve including

>> > but

>> > not

>> > limited to Windows Server 2003?

>> >

>> > "Steve Riley [MSFT]" wrote:

>> >

>> >> Clarification. There is _limited_ support: Windows Server 2003 DNS can

>> >> act

>> >> as a secondary DNS server for an existing DNSSEC-compliant zone.

>> >> Windows

>> >> clients will cache DNSSEC resource records, but perform no

>> >> cryptography,

>> >> authentication, or verification.

>> >>

>> >> More information here:

>> >> http://technet.microsoft.com/en-us/library/cc728328.aspx

>> >>

>> >> --

>> >> Steve Riley

>> >> steve.riley@microsoft.com

>> >> http://blogs.technet.com/steriley

>> >> http://www.protectyourwindowsnetwork.com

>> >>

>> >>

>> >>

>> >> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

>> >> news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...

>> >> > No, DNSSEC isn't supported in any version of Windows.

>> >> >

>> >> > --

>> >> > Steve Riley

>> >> > steve.riley@microsoft.com

>> >> > http://blogs.technet.com/steriley

>> >> > http://www.protectyourwindowsnetwork.com

>> >> >

>> >> >

>> >> >

>> >> > "totojepast" <totojepast@razdva.cz> wrote in message

>> >> > news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...

>> >> >> Is the Windows XP DNS resolver able to check the validity of the

>> >> >> DNS

>> >> >> data using DNSSEC? Is this feature turned on by default?

>> >> >>

>> >> >> And does the Windows Server support DNSSEC for publishing the

>> >> >> public

>> >> >> DNS records?

>> >> > </span></span></span>

Guest Paul Adare - MVP
Posted

On Tue, 26 Aug 2008 08:49:01 -0700, Dan wrote:

<span style="color:blue">

> How about the problems on web sites with errors about missing scripts and

> lost objects and other stuff?</span>

 

The error you mentioned on the MSNBC site the other day was simply that, a

coding error on the web site, not some malicious attack as you stated in

your post.

You seem to think that the DNS poisoning issue is currently a big problem

and it simply is not.

You're like the proverbial man with a hammer, to him, everything looks like

a nail.

 

--

Paul Adare

MVP - Identity Lifecycle Manager

http://www.identit.ca

Variables won't; constants aren't. -- Osborn

Guest FromTheRafters
Posted

Yeah, it is important. Akin to the way you should get

programs only from trusted sources. But how can

anyone verify the validity of the data returned? AV

is in place to stopgap the bad information from trusted

source issue when programs are the concern, do you

think it is completely unnecessary to stopgap the same

sort of thing for poisoned DNS data?

 

Sure, if DNS poisoning is not very common, then there

is little risk - and crypto is like a 12gauge flyswatter.

 

"Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

news:840985B2-477A-4757-BBC2-852DD7EBDEF1@microsoft.com...<span style="color:blue">

> Signed name resolution records won't address those issues.

>

> Say you want to connect to WebServerA. Say you want a way to be assured

> that you are, indeed, connecting to WebServerA, not some imposter. Well,

> there already exists a mechanism to do that: SSL. SSL authenticates the

> server to your computer, because your computer trusts the organization

> that issued the server's certificate.

>

> Say you want to connect to FileServerB. Say you want a way to be assured

> that you are, indeed, connecting to FileServerB, not some imposter. Well,

> there already exists a mechanism to do that: IPsec. IPsec authenticates

> the server to your computer (and your computer to the server), because

> both the server and your computer trust the issuers of their respective

> certificates.

>

> See, this is really what matters. Spoofing DNS is a useless attack if the

> servers are protected by SSL or IPsec. Bolting cryptography onto DNS will

> be monumentally expensive to deploy across the Internet and doesn't

> address the real question. DNSSEC answers this question: "Can I trust the

> answer given to my name resolution request?" Yet the more important

> question is "Can I trust that I'm going to the right server?" And this

> question is already answered by SSL and IPsec.

>

> --

> Steve Riley

> steve.riley@microsoft.com

> http://blogs.technet.com/steriley

> http://www.protectyourwindowsnetwork.com

>

>

>

> "Dan" <Dan@discussions.microsoft.com> wrote in message

> news:0A907A01-2DC6-4A22-B075-F2DE8C4BBABA@microsoft.com...<span style="color:green">

>> How about the problems on web sites with errors about missing scripts and

>> lost objects and other stuff?

>>

>> "Steve Riley [MSFT]" wrote:

>><span style="color:darkred">

>>> What problem can you solve with DNSSEC that is not already solved with

>>> IPsec

>>> or SSL?

>>>

>>> --

>>> Steve Riley

>>> steve.riley@microsoft.com

>>> http://blogs.technet.com/steriley

>>> http://www.protectyourwindowsnetwork.com

>>>

>>>

>>>

>>> "Dan" <Dan@discussions.microsoft.com> wrote in message

>>> news:7571D3C3-6A37-47E9-A937-CD6B198B400B@microsoft.com...

>>> > Will DNSSEC be fully supported in future versions of Windows, Steve?

>>> > In

>>> > addition, will any current versions of Windows be updated to fully

>>> > support

>>> > it

>>> > via cryptography, authentication and/or verification, Steve including

>>> > but

>>> > not

>>> > limited to Windows Server 2003?

>>> >

>>> > "Steve Riley [MSFT]" wrote:

>>> >

>>> >> Clarification. There is _limited_ support: Windows Server 2003 DNS

>>> >> can

>>> >> act

>>> >> as a secondary DNS server for an existing DNSSEC-compliant zone.

>>> >> Windows

>>> >> clients will cache DNSSEC resource records, but perform no

>>> >> cryptography,

>>> >> authentication, or verification.

>>> >>

>>> >> More information here:

>>> >> http://technet.microsoft.com/en-us/library/cc728328.aspx

>>> >>

>>> >> --

>>> >> Steve Riley

>>> >> steve.riley@microsoft.com

>>> >> http://blogs.technet.com/steriley

>>> >> http://www.protectyourwindowsnetwork.com

>>> >>

>>> >>

>>> >>

>>> >> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

>>> >> news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...

>>> >> > No, DNSSEC isn't supported in any version of Windows.

>>> >> >

>>> >> > --

>>> >> > Steve Riley

>>> >> > steve.riley@microsoft.com

>>> >> > http://blogs.technet.com/steriley

>>> >> > http://www.protectyourwindowsnetwork.com

>>> >> >

>>> >> >

>>> >> >

>>> >> > "totojepast" <totojepast@razdva.cz> wrote in message

>>> >> > news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...

>>> >> >> Is the Windows XP DNS resolver able to check the validity of the

>>> >> >> DNS

>>> >> >> data using DNSSEC? Is this feature turned on by default?

>>> >> >>

>>> >> >> And does the Windows Server support DNSSEC for publishing the

>>> >> >> public

>>> >> >> DNS records?

>>> >> > </span></span></span>

Guest Steve Riley [MSFT]
Posted

Cache poisoning is only a means to an end. The attacker's _real_ goal is to

get you on his server rather than the one you actually want. So ensuring

authenticity of the legitimate server is the proper defense here, rather

than worrying about the plumbing. And we can accomplish that today with SSL

and IPsec.

 

--

Steve Riley

steve.riley@microsoft.com

http://blogs.technet.com/steriley

http://www.protectyourwindowsnetwork.com

 

 

 

"FromTheRafters" <erratic@ne.rr.com> wrote in message

news:er3ykC#BJHA.1228@TK2MSFTNGP02.phx.gbl...<span style="color:blue">

> Yeah, it is important. Akin to the way you should get

> programs only from trusted sources. But how can

> anyone verify the validity of the data returned? AV

> is in place to stopgap the bad information from trusted

> source issue when programs are the concern, do you

> think it is completely unnecessary to stopgap the same

> sort of thing for poisoned DNS data?

>

> Sure, if DNS poisoning is not very common, then there

> is little risk - and crypto is like a 12gauge flyswatter.

>

> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

> news:840985B2-477A-4757-BBC2-852DD7EBDEF1@microsoft.com...<span style="color:green">

>> Signed name resolution records won't address those issues.

>>

>> Say you want to connect to WebServerA. Say you want a way to be assured

>> that you are, indeed, connecting to WebServerA, not some imposter. Well,

>> there already exists a mechanism to do that: SSL. SSL authenticates the

>> server to your computer, because your computer trusts the organization

>> that issued the server's certificate.

>>

>> Say you want to connect to FileServerB. Say you want a way to be assured

>> that you are, indeed, connecting to FileServerB, not some imposter. Well,

>> there already exists a mechanism to do that: IPsec. IPsec authenticates

>> the server to your computer (and your computer to the server), because

>> both the server and your computer trust the issuers of their respective

>> certificates.

>>

>> See, this is really what matters. Spoofing DNS is a useless attack if the

>> servers are protected by SSL or IPsec. Bolting cryptography onto DNS will

>> be monumentally expensive to deploy across the Internet and doesn't

>> address the real question. DNSSEC answers this question: "Can I trust the

>> answer given to my name resolution request?" Yet the more important

>> question is "Can I trust that I'm going to the right server?" And this

>> question is already answered by SSL and IPsec.

>>

>> --

>> Steve Riley

>> steve.riley@microsoft.com

>> http://blogs.technet.com/steriley

>> http://www.protectyourwindowsnetwork.com

>>

>>

>>

>> "Dan" <Dan@discussions.microsoft.com> wrote in message

>> news:0A907A01-2DC6-4A22-B075-F2DE8C4BBABA@microsoft.com...<span style="color:darkred">

>>> How about the problems on web sites with errors about missing scripts

>>> and

>>> lost objects and other stuff?

>>>

>>> "Steve Riley [MSFT]" wrote:

>>>

>>>> What problem can you solve with DNSSEC that is not already solved with

>>>> IPsec

>>>> or SSL?

>>>>

>>>> --

>>>> Steve Riley

>>>> steve.riley@microsoft.com

>>>> http://blogs.technet.com/steriley

>>>> http://www.protectyourwindowsnetwork.com

>>>>

>>>>

>>>>

>>>> "Dan" <Dan@discussions.microsoft.com> wrote in message

>>>> news:7571D3C3-6A37-47E9-A937-CD6B198B400B@microsoft.com...

>>>> > Will DNSSEC be fully supported in future versions of Windows, Steve?

>>>> > In

>>>> > addition, will any current versions of Windows be updated to fully

>>>> > support

>>>> > it

>>>> > via cryptography, authentication and/or verification, Steve including

>>>> > but

>>>> > not

>>>> > limited to Windows Server 2003?

>>>> >

>>>> > "Steve Riley [MSFT]" wrote:

>>>> >

>>>> >> Clarification. There is _limited_ support: Windows Server 2003 DNS

>>>> >> can

>>>> >> act

>>>> >> as a secondary DNS server for an existing DNSSEC-compliant zone.

>>>> >> Windows

>>>> >> clients will cache DNSSEC resource records, but perform no

>>>> >> cryptography,

>>>> >> authentication, or verification.

>>>> >>

>>>> >> More information here:

>>>> >> http://technet.microsoft.com/en-us/library/cc728328.aspx

>>>> >>

>>>> >> --

>>>> >> Steve Riley

>>>> >> steve.riley@microsoft.com

>>>> >> http://blogs.technet.com/steriley

>>>> >> http://www.protectyourwindowsnetwork.com

>>>> >>

>>>> >>

>>>> >>

>>>> >> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

>>>> >> news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...

>>>> >> > No, DNSSEC isn't supported in any version of Windows.

>>>> >> >

>>>> >> > --

>>>> >> > Steve Riley

>>>> >> > steve.riley@microsoft.com

>>>> >> > http://blogs.technet.com/steriley

>>>> >> > http://www.protectyourwindowsnetwork.com

>>>> >> >

>>>> >> >

>>>> >> >

>>>> >> > "totojepast" <totojepast@razdva.cz> wrote in message

>>>> >> > news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...

>>>> >> >> Is the Windows XP DNS resolver able to check the validity of the

>>>> >> >> DNS

>>>> >> >> data using DNSSEC? Is this feature turned on by default?

>>>> >> >>

>>>> >> >> And does the Windows Server support DNSSEC for publishing the

>>>> >> >> public

>>>> >> >> DNS records?

>>>> >> ></span></span>

>

> </span>

Posted

"Paul Adare - MVP" <pkadare@gmail.com> wrote in message

news:s5kai30oe5ub.tl3rblibm2lf.dlg@40tude.net...<span style="color:blue">

> On Tue, 26 Aug 2008 08:49:01 -0700, Dan wrote:

><span style="color:green">

>> How about the problems on web sites with errors about missing scripts and

>> lost objects and other stuff?</span>

>

> The error you mentioned on the MSNBC site the other day was simply that, a

> coding error on the web site, not some malicious attack as you stated in

> your post.

> You seem to think that the DNS poisoning issue is currently a big problem

> and it simply is not.

> You're like the proverbial man with a hammer, to him, everything looks

> like

> a nail.

>

> --

> Paul Adare

> MVP - Identity Lifecycle Manager

> http://www.identit.ca

> Variables won't; constants aren't. -- Osborn</span>

 

 

Paul,

 

Your web site says "IdentIT is offering public training on ILM 2007

Certificate Management. The course covers the fundamentals of ILM 2007

Certificate Management and provides you with hands-on experience with the

product before deploying ILM 2007 Certificate Management in your

organization.

The following dates have been booked for ILM 2007 Training:

 

a.. Mississauga, Ontario, Canada - November 13 - 16, 2007 - Click here to

register!

 

b.. New York City, NY, USA - TBA"

 

http://www.identit.ca/clm.html

 

I've mentioned this before, but no action has been taken to correct matters

(2007 has long gone!)

 

Would you like to borrow a hammer? <wink>

 

Dave

Posted

<Warning Long Story --- mainly for Steve Riley {MSFT} benefit as well as

anyone interested and caring enough not to give some smart aleck response}:->

 

Thanks BD. I am going to start ignoring Paul because the fact is the

Albuquerque Public School Network was hacked in the middle of 2007 and Paul

continues to be rude to me unlike other mvps. The fact is that my Windows XP

SP 2 fully updated was hacked when connected via VPN (Virtual Private

Networking). The fact is that it was APS's fault due to default and not

secure domain settings on their end and their server(s) end. APS just used

all the default settings and images to set things up. When I worked there in

2006-2007, the Network at the elementary school was a mess. I worked very

hard with Stephanie H. the networking admin. to hack into the computers that

previous staff had left fully in locked mode and unusuable mode by the

students. It was so locked down there that it made me think of being on a

military base kinda. Stephanie H. explained that former workers had left the

computers in such a mess because they were angry at APS for firing them from

their jobs and of course would not hurt the children so hurt the children's

tool for learning which was the computers.

 

Chris Quirke, mvp explained the whole situation very clearly to me of how XP

Home and Professional can be broken if the domain is not safeguarded properly

by custom settings and the appropriate hardware as well. I am glad that

people from southern Africa like Chris Quirke, mvp at least understand

internal safety of the consumer 9x source code which has the consumer

maintenance operating system of disk operating system and is built upon the

rock. Chris explained how with Windows XP Home and Professional the security

is external because it is based on the NT source code. The 9x source code

was completely perfected with Windows NT.

 

However, according to secunia.com and if you go back and research just plain

vanilla Windows NT you will see that it is as secure as 98 Second Edition

which shows us how the problem of extra services including especially remote

access leads to easy hacking capabilities thus showing us that we must go

back in time to the true and tried hardware methods that IBM used back in the

days of the IBM PC in the 1980's. In addition, I am contradicting myself

because I am just searching for the proper solution to the problems of safety

in electronics today. We need Microsoft and hopefully IBM to lead in the

hardware arena again and not just have IBM focus on businesses but start

caring about the little people like BD and I again who are the consumers.

 

Hardware is better than software I feel because software can be broken.

Parts of the NT source code were indeed leaked over the Internet back in the

day. Microsoft has nicely provided us with a 100+ page document on the

proper security and safety of Windows NT and Windows 98 computers. This is a

critical read for those to help understand the proper settings of the

situation we are currently in these days. The question is can hardware be

broken and Gary S. Terhune, mvp of 98 general newsgroup claims correctly that

it can be broken with the proper software and I feel this may be able to be

done by forcing the hardware to overload itself with the properly written

software programs forced unwilling upon the average joe or jill consumer(s).

The external security of NT (New Technology) business source code is great

within Windows Vista but if someone is able to bypass certain procedures one

can still inflict pain and hacking even upon Vista but it is indeed much

harder than XP. Vista does still lack in terms of backwards compatibility.

Even Windows 7 that is coming out is still NT source code based and it looks

like it may be kind of like Windows ME that broke lots of stuff in Windows 98

Second Edition but hopefully Microsoft can fix it well. Thus, we, BD, as

civillians are left with what alternatives. The current alternatives are

open source of course as well as closed source technologies. This shows us

that in my small and weak opinion the only future is harmony between internal

safe and external secure computing. The cloud computing is upon us but

nothing in my opinion beats having your backup on a seperate external hard

drive that you can move at a moment's notice if the situation arises.

 

Thus, I feel that Microsoft will indeed lead the way because Microsoft has

the resources. Microsoft has MAPP coming out in October which I am very

grateful for and it is a nice 3 easy step system which is a nice break for

consumers from DHS's more complicated methods on us-cert.gov.

 

The fault was on APS's side because APS used the "dumb" default settings.

Unfortunately, my Windows 98 Second Edition disappeared during the summer

because APS stupidly phased out Windows 98 Second Edition. They also did not

provide me with my computer. I did erase data on the computer but it is

indeed recoverable with the proper software and that computer did not have

any critical data on it anyway but my home computer with the dual-boot of 98

Second Edition on C:\ in Fat32 and XP Professional in NTFS on D:. Now, so

much for all the supposed external security of Windows XP Professional ---

fully updated on my end mind you. Now, the feds are involved with this

situation thankfully and DOD and DHS are involved as well as lawyers so a

resolution will happen eventually because not only my information but

students information at the Elementary School were compromised. I am indeed

working on a detailed report for the feds but it just takes time. Sorry,

Paul -much to your dismay I am sure-- Windows 98 Second Edition only suffered

a denial of service error which I recently posted here and at the 98 general

newsgroup and interestingly enough no one responded to it on either end

because probably only Bill Gates or the original Windows 98 second edition

team understands the errors involved.

 

Over and Out, Dan W.

 

 

"~BD~" wrote:

<span style="color:blue">

>

> "Paul Adare - MVP" <pkadare@gmail.com> wrote in message

> news:s5kai30oe5ub.tl3rblibm2lf.dlg@40tude.net...<span style="color:green">

> > On Tue, 26 Aug 2008 08:49:01 -0700, Dan wrote:

> ><span style="color:darkred">

> >> How about the problems on web sites with errors about missing scripts and

> >> lost objects and other stuff?</span>

> >

> > The error you mentioned on the MSNBC site the other day was simply that, a

> > coding error on the web site, not some malicious attack as you stated in

> > your post.

> > You seem to think that the DNS poisoning issue is currently a big problem

> > and it simply is not.

> > You're like the proverbial man with a hammer, to him, everything looks

> > like

> > a nail.

> >

> > --

> > Paul Adare

> > MVP - Identity Lifecycle Manager

> > http://www.identit.ca

> > Variables won't; constants aren't. -- Osborn</span>

>

>

> Paul,

>

> Your web site says "IdentIT is offering public training on ILM 2007

> Certificate Management. The course covers the fundamentals of ILM 2007

> Certificate Management and provides you with hands-on experience with the

> product before deploying ILM 2007 Certificate Management in your

> organization.

> The following dates have been booked for ILM 2007 Training:

>

> a.. Mississauga, Ontario, Canada - November 13 - 16, 2007 - Click here to

> register!

>

> b.. New York City, NY, USA - TBA"

>

> http://www.identit.ca/clm.html

>

> I've mentioned this before, but no action has been taken to correct matters

> (2007 has long gone!)

>

> Would you like to borrow a hammer? <wink>

>

> Dave

>

>

>

>

>

>

>

>

> </span>

Posted

You're welcome, Dan.

 

For the most part, I understand your posts - all of them!

 

Stick with it! style_emoticons/

 

Dave

 

--

"Dan" <Dan@discussions.microsoft.com> wrote in message

news:FA0EE75A-8851-4F30-99E7-C763FFC05BFC@microsoft.com...<span style="color:blue">

> <Warning Long Story --- mainly for Steve Riley {MSFT} benefit as well as

> anyone interested and caring enough not to give some smart aleck

> response}:->

>

> Thanks BD.</span>

 

<snip>

Guest FromTheRafters
Posted

Ahhh - I see. In fact it seems so obvious now - the word

"DUH" comes to mind. style_emoticons/)

 

Thanks.

 

"Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

news:46EE9170-67E3-4792-A154-850CEDEF2E7E@microsoft.com...<span style="color:blue">

> Cache poisoning is only a means to an end. The attacker's _real_ goal is

> to get you on his server rather than the one you actually want. So

> ensuring authenticity of the legitimate server is the proper defense here,

> rather than worrying about the plumbing. And we can accomplish that today

> with SSL and IPsec.

>

> --

> Steve Riley

> steve.riley@microsoft.com

> http://blogs.technet.com/steriley

> http://www.protectyourwindowsnetwork.com

>

>

>

> "FromTheRafters" <erratic@ne.rr.com> wrote in message

> news:er3ykC#BJHA.1228@TK2MSFTNGP02.phx.gbl...<span style="color:green">

>> Yeah, it is important. Akin to the way you should get

>> programs only from trusted sources. But how can

>> anyone verify the validity of the data returned? AV

>> is in place to stopgap the bad information from trusted

>> source issue when programs are the concern, do you

>> think it is completely unnecessary to stopgap the same

>> sort of thing for poisoned DNS data?

>>

>> Sure, if DNS poisoning is not very common, then there

>> is little risk - and crypto is like a 12gauge flyswatter.

>>

>> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

>> news:840985B2-477A-4757-BBC2-852DD7EBDEF1@microsoft.com...<span style="color:darkred">

>>> Signed name resolution records won't address those issues.

>>>

>>> Say you want to connect to WebServerA. Say you want a way to be assured

>>> that you are, indeed, connecting to WebServerA, not some imposter. Well,

>>> there already exists a mechanism to do that: SSL. SSL authenticates the

>>> server to your computer, because your computer trusts the organization

>>> that issued the server's certificate.

>>>

>>> Say you want to connect to FileServerB. Say you want a way to be assured

>>> that you are, indeed, connecting to FileServerB, not some imposter.

>>> Well, there already exists a mechanism to do that: IPsec. IPsec

>>> authenticates the server to your computer (and your computer to the

>>> server), because both the server and your computer trust the issuers of

>>> their respective certificates.

>>>

>>> See, this is really what matters. Spoofing DNS is a useless attack if

>>> the servers are protected by SSL or IPsec. Bolting cryptography onto DNS

>>> will be monumentally expensive to deploy across the Internet and doesn't

>>> address the real question. DNSSEC answers this question: "Can I trust

>>> the answer given to my name resolution request?" Yet the more important

>>> question is "Can I trust that I'm going to the right server?" And this

>>> question is already answered by SSL and IPsec.

>>>

>>> --

>>> Steve Riley

>>> steve.riley@microsoft.com

>>> http://blogs.technet.com/steriley

>>> http://www.protectyourwindowsnetwork.com

>>>

>>>

>>>

>>> "Dan" <Dan@discussions.microsoft.com> wrote in message

>>> news:0A907A01-2DC6-4A22-B075-F2DE8C4BBABA@microsoft.com...

>>>> How about the problems on web sites with errors about missing scripts

>>>> and

>>>> lost objects and other stuff?

>>>>

>>>> "Steve Riley [MSFT]" wrote:

>>>>

>>>>> What problem can you solve with DNSSEC that is not already solved with

>>>>> IPsec

>>>>> or SSL?

>>>>>

>>>>> --

>>>>> Steve Riley

>>>>> steve.riley@microsoft.com

>>>>> http://blogs.technet.com/steriley

>>>>> http://www.protectyourwindowsnetwork.com

>>>>>

>>>>>

>>>>>

>>>>> "Dan" <Dan@discussions.microsoft.com> wrote in message

>>>>> news:7571D3C3-6A37-47E9-A937-CD6B198B400B@microsoft.com...

>>>>> > Will DNSSEC be fully supported in future versions of Windows, Steve?

>>>>> > In

>>>>> > addition, will any current versions of Windows be updated to fully

>>>>> > support

>>>>> > it

>>>>> > via cryptography, authentication and/or verification, Steve

>>>>> > including but

>>>>> > not

>>>>> > limited to Windows Server 2003?

>>>>> >

>>>>> > "Steve Riley [MSFT]" wrote:

>>>>> >

>>>>> >> Clarification. There is _limited_ support: Windows Server 2003 DNS

>>>>> >> can

>>>>> >> act

>>>>> >> as a secondary DNS server for an existing DNSSEC-compliant zone.

>>>>> >> Windows

>>>>> >> clients will cache DNSSEC resource records, but perform no

>>>>> >> cryptography,

>>>>> >> authentication, or verification.

>>>>> >>

>>>>> >> More information here:

>>>>> >> http://technet.microsoft.com/en-us/library/cc728328.aspx

>>>>> >>

>>>>> >> --

>>>>> >> Steve Riley

>>>>> >> steve.riley@microsoft.com

>>>>> >> http://blogs.technet.com/steriley

>>>>> >> http://www.protectyourwindowsnetwork.com

>>>>> >>

>>>>> >>

>>>>> >>

>>>>> >> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

>>>>> >> news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...

>>>>> >> > No, DNSSEC isn't supported in any version of Windows.

>>>>> >> >

>>>>> >> > --

>>>>> >> > Steve Riley

>>>>> >> > steve.riley@microsoft.com

>>>>> >> > http://blogs.technet.com/steriley

>>>>> >> > http://www.protectyourwindowsnetwork.com

>>>>> >> >

>>>>> >> >

>>>>> >> >

>>>>> >> > "totojepast" <totojepast@razdva.cz> wrote in message

>>>>> >> > news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...

>>>>> >> >> Is the Windows XP DNS resolver able to check the validity of the

>>>>> >> >> DNS

>>>>> >> >> data using DNSSEC? Is this feature turned on by default?

>>>>> >> >>

>>>>> >> >> And does the Windows Server support DNSSEC for publishing the

>>>>> >> >> public

>>>>> >> >> DNS records?

>>>>> >> ></span>

>>

>> </span></span>

Posted

Steve, what is a network administrator or in my case a desktop support

specialist to do when https:/ is broken because of web errors from hackers

and then the safety and security of average joes and jills is compromised

when they put their personnel information on to the web site because the

informatiton can be viewed and/or redirected to the hackers. I have seen

this just recently and I reported it through responsible disclosure through

us-cert.gov.

 

"Steve Riley [MSFT]" wrote:

<span style="color:blue">

> Cache poisoning is only a means to an end. The attacker's _real_ goal is to

> get you on his server rather than the one you actually want. So ensuring

> authenticity of the legitimate server is the proper defense here, rather

> than worrying about the plumbing. And we can accomplish that today with SSL

> and IPsec.

>

> --

> Steve Riley

> steve.riley@microsoft.com

> http://blogs.technet.com/steriley

> http://www.protectyourwindowsnetwork.com

>

>

>

> "FromTheRafters" <erratic@ne.rr.com> wrote in message

> news:er3ykC#BJHA.1228@TK2MSFTNGP02.phx.gbl...<span style="color:green">

> > Yeah, it is important. Akin to the way you should get

> > programs only from trusted sources. But how can

> > anyone verify the validity of the data returned? AV

> > is in place to stopgap the bad information from trusted

> > source issue when programs are the concern, do you

> > think it is completely unnecessary to stopgap the same

> > sort of thing for poisoned DNS data?

> >

> > Sure, if DNS poisoning is not very common, then there

> > is little risk - and crypto is like a 12gauge flyswatter.

> >

> > "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

> > news:840985B2-477A-4757-BBC2-852DD7EBDEF1@microsoft.com...<span style="color:darkred">

> >> Signed name resolution records won't address those issues.

> >>

> >> Say you want to connect to WebServerA. Say you want a way to be assured

> >> that you are, indeed, connecting to WebServerA, not some imposter. Well,

> >> there already exists a mechanism to do that: SSL. SSL authenticates the

> >> server to your computer, because your computer trusts the organization

> >> that issued the server's certificate.

> >>

> >> Say you want to connect to FileServerB. Say you want a way to be assured

> >> that you are, indeed, connecting to FileServerB, not some imposter. Well,

> >> there already exists a mechanism to do that: IPsec. IPsec authenticates

> >> the server to your computer (and your computer to the server), because

> >> both the server and your computer trust the issuers of their respective

> >> certificates.

> >>

> >> See, this is really what matters. Spoofing DNS is a useless attack if the

> >> servers are protected by SSL or IPsec. Bolting cryptography onto DNS will

> >> be monumentally expensive to deploy across the Internet and doesn't

> >> address the real question. DNSSEC answers this question: "Can I trust the

> >> answer given to my name resolution request?" Yet the more important

> >> question is "Can I trust that I'm going to the right server?" And this

> >> question is already answered by SSL and IPsec.

> >>

> >> --

> >> Steve Riley

> >> steve.riley@microsoft.com

> >> http://blogs.technet.com/steriley

> >> http://www.protectyourwindowsnetwork.com

> >>

> >>

> >>

> >> "Dan" <Dan@discussions.microsoft.com> wrote in message

> >> news:0A907A01-2DC6-4A22-B075-F2DE8C4BBABA@microsoft.com...

> >>> How about the problems on web sites with errors about missing scripts

> >>> and

> >>> lost objects and other stuff?

> >>>

> >>> "Steve Riley [MSFT]" wrote:

> >>>

> >>>> What problem can you solve with DNSSEC that is not already solved with

> >>>> IPsec

> >>>> or SSL?

> >>>>

> >>>> --

> >>>> Steve Riley

> >>>> steve.riley@microsoft.com

> >>>> http://blogs.technet.com/steriley

> >>>> http://www.protectyourwindowsnetwork.com

> >>>>

> >>>>

> >>>>

> >>>> "Dan" <Dan@discussions.microsoft.com> wrote in message

> >>>> news:7571D3C3-6A37-47E9-A937-CD6B198B400B@microsoft.com...

> >>>> > Will DNSSEC be fully supported in future versions of Windows, Steve?

> >>>> > In

> >>>> > addition, will any current versions of Windows be updated to fully

> >>>> > support

> >>>> > it

> >>>> > via cryptography, authentication and/or verification, Steve including

> >>>> > but

> >>>> > not

> >>>> > limited to Windows Server 2003?

> >>>> >

> >>>> > "Steve Riley [MSFT]" wrote:

> >>>> >

> >>>> >> Clarification. There is _limited_ support: Windows Server 2003 DNS

> >>>> >> can

> >>>> >> act

> >>>> >> as a secondary DNS server for an existing DNSSEC-compliant zone.

> >>>> >> Windows

> >>>> >> clients will cache DNSSEC resource records, but perform no

> >>>> >> cryptography,

> >>>> >> authentication, or verification.

> >>>> >>

> >>>> >> More information here:

> >>>> >> http://technet.microsoft.com/en-us/library/cc728328.aspx

> >>>> >>

> >>>> >> --

> >>>> >> Steve Riley

> >>>> >> steve.riley@microsoft.com

> >>>> >> http://blogs.technet.com/steriley

> >>>> >> http://www.protectyourwindowsnetwork.com

> >>>> >>

> >>>> >>

> >>>> >>

> >>>> >> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

> >>>> >> news:5CCD3A14-68B3-471F-9328-D1ED272FD113@microsoft.com...

> >>>> >> > No, DNSSEC isn't supported in any version of Windows.

> >>>> >> >

> >>>> >> > --

> >>>> >> > Steve Riley

> >>>> >> > steve.riley@microsoft.com

> >>>> >> > http://blogs.technet.com/steriley

> >>>> >> > http://www.protectyourwindowsnetwork.com

> >>>> >> >

> >>>> >> >

> >>>> >> >

> >>>> >> > "totojepast" <totojepast@razdva.cz> wrote in message

> >>>> >> > news:4cdf919f-4cba-4940-aead-fb1d460c0fbe@k13g2000hse.googlegroups.com...

> >>>> >> >> Is the Windows XP DNS resolver able to check the validity of the

> >>>> >> >> DNS

> >>>> >> >> data using DNSSEC? Is this feature turned on by default?

> >>>> >> >>

> >>>> >> >> And does the Windows Server support DNSSEC for publishing the

> >>>> >> >> public

> >>>> >> >> DNS records?

> >>>> >> ></span>

> >

> > </span></span>

Guest Paul Adare - MVP
Posted

On Thu, 28 Aug 2008 03:20:01 -0700, Dan wrote:

<span style="color:blue">

> Steve, what is a network administrator or in my case a desktop support

> specialist to do when https:/ is broken because of web errors from hackers

> and then the safety and security of average joes and jills is compromised

> when they put their personnel information on to the web site because the

> informatiton can be viewed and/or redirected to the hackers. I have seen

> this just recently and I reported it through responsible disclosure through

> us-cert.gov.</span>

 

Just because a web site throws errors in the browser does not mean that it

has been hacked. Having said that, to answer your question, identify what

the problem is, fix or patch it, and then if necessary report it.

 

--

Paul Adare

MVP - Identity Lifecycle Manager

http://www.identit.ca

Any sufficiently advanced bug is indistinguishable from a feature. --

Kulawiec

Posted

Thank you Paul. I appreciate your answer.

 

"Paul Adare - MVP" wrote:

<span style="color:blue">

> On Thu, 28 Aug 2008 03:20:01 -0700, Dan wrote:

> <span style="color:green">

> > Steve, what is a network administrator or in my case a desktop support

> > specialist to do when https:/ is broken because of web errors from hackers

> > and then the safety and security of average joes and jills is compromised

> > when they put their personnel information on to the web site because the

> > informatiton can be viewed and/or redirected to the hackers. I have seen

> > this just recently and I reported it through responsible disclosure through

> > us-cert.gov.</span>

>

> Just because a web site throws errors in the browser does not mean that it

> has been hacked. Having said that, to answer your question, identify what

> the problem is, fix or patch it, and then if necessary report it.

>

> --

> Paul Adare

> MVP - Identity Lifecycle Manager

> http://www.identit.ca

> Any sufficiently advanced bug is indistinguishable from a feature. --

> Kulawiec

> </span>

Guest Alun Jones
Posted

"Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

news:840985B2-477A-4757-BBC2-852DD7EBDEF1@microsoft.com...<span style="color:blue">

> Signed name resolution records won't address those issues.

>

> Say you want to connect to WebServerA. Say you want a way to be assured

> that you are, indeed, connecting to WebServerA, not some imposter. Well,

> there already exists a mechanism to do that: SSL. SSL authenticates the

> server to your computer, because your computer trusts the organization

> that issued the server's certificate.

>

> Say you want to connect to FileServerB. Say you want a way to be assured

> that you are, indeed, connecting to FileServerB, not some imposter. Well,

> there already exists a mechanism to do that: IPsec. IPsec authenticates

> the server to your computer (and your computer to the server), because

> both the server and your computer trust the issuers of their respective

> certificates.

>

> See, this is really what matters. Spoofing DNS is a useless attack if the

> servers are protected by SSL or IPsec. Bolting cryptography onto DNS will

> be monumentally expensive to deploy across the Internet and doesn't

> address the real question. DNSSEC answers this question: "Can I trust the

> answer given to my name resolution request?" Yet the more important

> question is "Can I trust that I'm going to the right server?" And this

> question is already answered by SSL and IPsec.</span>

 

You address only the impersonation side of the attack, and even then you're

ignoring the fact that users have been trained by any number of websites to

"just ignore the error and click on through". SSL and IPsec both confirm

(when correctly used) that you're connected to a site with current

credentials to match the site's name.

 

What they don't do is prevent you from being denied access to the correct

site.

 

If I've poisoned an 'upstream' DNS cache from you, whether it's yours, your

ISP's, or the root DNS servers, I now redirect every request you make.

Perhaps you are the sort of iron-willed user who steadfastly clings to the

practice of refusing to connect to systems with incorrect certificates -

even so, you're still not getting to your chosen web server.

 

The denial-of-service element of the DNS poisoning attack cannot be resolved

by IPsec or SSL between the server and the client.

 

If, however, your DNS server, and all those upstream, could somehow

determine that a DNS response was forged and could be thrown away in favour

of a known-correct name to IP mapping, the DoS aspect of this attack could

also be prevented. If a DNSSEC-enabled DNS server received a thousand DNS

responses, and two of them matched the name being requested, the DNS server

could arbitrate between those two responses by discarding the one that

wasn't appropriately signed.

 

Alun.

~~~~

--

Texas Imperial Software | Web: http://www.wftpd.com/

23921 57th Ave SE | Blog: http://msmvps.com/alunj/

Woodinville WA 98072-8661 | WFTPD, WFTPD Pro are Windows FTP servers.

Fax/Voice +1(425)807-1787 | Try our NEW client software, WFTPD Explorer.

Posted

What Paul does not realize and if he followed US-Cert proper procedure and

doxpara website and the Sans Storm Center then he would realize that DNS

Pollution is and was a huge problem. The technology industry is mainly in

denial about Chris Cquirke, mvp's research and now Dan K's research with DNS

Pollution and the biggest reason this is such a big problem is the NT source

code that has been leaked out over the Internet in the past and is solid

external defense but has no true internal safety like DOS (Disk Operating

System). The majority of people here are indeed smart but they have followed

their senses and bought the company line hook line and sinker and did not go

far enough and ask why the individual operating systems cannot be made safer

on the inside and what is the use of all this external security that will

indeed crumble if there is no internal safety of Disk Operating System or an

equivalent and all users are left with is a cheap command.com interface that

may be satisfactory for many but sucks for the individual home consumers who

I represent. Sure, the price of having two lines of source code is expensive

but how does one company have the right to say which line of source code is

superior and if it is so superior how come we suddenly are having so many

problems with security. It is an easy concept because if you want all your

computers linked as one and one gets a virus then all the others can share

that virus and sicken too. Now, remember if we backtrack and have each

computer become a unique individual that creates and learns without the need

of the collective then we are making progress. Do we really need computers

to become like the Borg where all the computers are connected to one super

computer. Why not let man and womankinds creativity flow from each machine

and not have to be so reliant upon the others that the machine can not do

anything without checking what machines b,c,d,e, and f are doing before the

machine is even confident enough to proceed. I am purposely stretching the

truth and exagerrating but I am making a point on how the entire industry

went wrong when the wrong source code was chosen. The only real solution is

for Microsoft to bring the new source code to the market that is internally

safe with a maintenance operating system and also externally secure.

 

"~BD~" wrote:

<span style="color:blue">

> You're welcome, Dan.

>

> For the most part, I understand your posts - all of them!

>

> Stick with it! style_emoticons/

>

> Dave

>

> --

> "Dan" <Dan@discussions.microsoft.com> wrote in message

> news:FA0EE75A-8851-4F30-99E7-C763FFC05BFC@microsoft.com...<span style="color:green">

> > <Warning Long Story --- mainly for Steve Riley {MSFT} benefit as well as

> > anyone interested and caring enough not to give some smart aleck

> > response}:->

> >

> > Thanks BD.</span>

>

> <snip>

>

>

> </span>

Posted

"Alun Jones" <alun@texis.invalid> wrote in message

news:2977A22C-A3A4-429A-B3B4-9005D31E5D7C@microsoft.com...<span style="color:blue">

> "Steve Riley [MSFT]" <steve.riley@microsoft.com> wrote in message

> news:840985B2-477A-4757-BBC2-852DD7EBDEF1@microsoft.com...<span style="color:green">

>> Signed name resolution records won't address those issues.

>>

>> Say you want to connect to WebServerA. Say you want a way to be assured

>> that you are, indeed, connecting to WebServerA, not some imposter. Well,

>> there already exists a mechanism to do that: SSL. SSL authenticates the

>> server to your computer, because your computer trusts the organization

>> that issued the server's certificate.

>>

>> Say you want to connect to FileServerB. Say you want a way to be assured

>> that you are, indeed, connecting to FileServerB, not some imposter. Well,

>> there already exists a mechanism to do that: IPsec. IPsec authenticates

>> the server to your computer (and your computer to the server), because

>> both the server and your computer trust the issuers of their respective

>> certificates.

>>

>> See, this is really what matters. Spoofing DNS is a useless attack if the

>> servers are protected by SSL or IPsec. Bolting cryptography onto DNS will

>> be monumentally expensive to deploy across the Internet and doesn't

>> address the real question. DNSSEC answers this question: "Can I trust the

>> answer given to my name resolution request?" Yet the more important

>> question is "Can I trust that I'm going to the right server?" And this

>> question is already answered by SSL and IPsec.</span>

>

> You address only the impersonation side of the attack, and even then

> you're ignoring the fact that users have been trained by any number of

> websites to "just ignore the error and click on through". SSL and IPsec

> both confirm (when correctly used) that you're connected to a site with

> current credentials to match the site's name.

>

> What they don't do is prevent you from being denied access to the correct

> site.

>

> If I've poisoned an 'upstream' DNS cache from you, whether it's yours,

> your ISP's, or the root DNS servers, I now redirect every request you

> make. Perhaps you are the sort of iron-willed user who steadfastly clings

> to the practice of refusing to connect to systems with incorrect

> certificates - even so, you're still not getting to your chosen web

> server.

>

> The denial-of-service element of the DNS poisoning attack cannot be

> resolved by IPsec or SSL between the server and the client.

>

> If, however, your DNS server, and all those upstream, could somehow

> determine that a DNS response was forged and could be thrown away in

> favour of a known-correct name to IP mapping, the DoS aspect of this

> attack could also be prevented. If a DNSSEC-enabled DNS server received a

> thousand DNS responses, and two of them matched the name being requested,

> the DNS server could arbitrate between those two responses by discarding

> the one that wasn't appropriately signed.

>

> Alun.

> ~~~~

> --

> Texas Imperial Software | Web: http://www.wftpd.com/

> 23921 57th Ave SE | Blog: http://msmvps.com/alunj/

> Woodinville WA 98072-8661 | WFTPD, WFTPD Pro are Windows FTP servers.

> Fax/Voice +1(425)807-1787 | Try our NEW client software, WFTPD Explorer.

>

>

></span>

 

Hi Alun

 

This is all a little beyond me but .............

 

When you said "What they don't do is prevent you from being denied access to

the correct site" - did you really mean to say INcorrect site?

 

If I've got the wrong end of the stick, please forgive me!

 

Dave

 

--

Guest Root Kit
Posted

On Thu, 28 Aug 2008 22:29:00 -0700, Dan

<Dan@discussions.microsoft.com> wrote:

<span style="color:blue">

>The technology industry is mainly in denial about Chris Cquirke,

>mvp's research and now Dan K's research with DNS

>Pollution and the biggest reason this is such a big problem is the NT source

>code that has been leaked out over the Internet in the past and is solid

>external defense but has no true internal safety like DOS (Disk Operating

>System). </span>

 

I don't know what it is you're smoking, but it certainly doesn't seem

healthy for you.

Posted

Here is more evidence:

 

http://www.doxpara.com/

 

and from the final paragraphs or perhaps you guys just don't trust

researchers or want to be in denial about everything and see the 'Net as oh

so secure and safe

 

 

So, does that mean its always better to attack DNS than BGP? Oh, you

competitive people would like things to be so simple, wouldn’t you Pilosov

and I talked for about a half hour at Defcon, and I’ve got nothing but

respect for his work. Lets look at the other side of things for a moment.

First, BGP controls how you route to your name server  if not your recursive

server, which may be inside your organization and thus immune to exterior

routing protocol attack, then the authoritative servers your recursive

servers depend on. Something like this actually happened recently  witness

the curious case of the Unauthorized L Roots, and note the astonishingly

familiar potential attacks being described. Yes, that’s precisely the

scenario of BGP used to hijack root DNS servers  with such hijacking

actually being noticed.

 

More importantly, much of my talk, in which I discuss the impacts of MITM

attacks, applies to Kapela and Pilosov’s work as well. It’s 2008, we still

don’t have secure email, and that’s just as much of a problem in the face of

BGP attacks as it is in the face of DNS attacks.

 

So, in summary, it’s an interesting side discussion regarding the

similarities, differences, and overlaps between DNS and BGP attacks. BGP

has far fewer potential attackers, fewer necessary defenders, is a much less

agile attack, and is way easier to monitor forensically (and indeed, with

companies like Renesys, is being monitored forensically). But so what? It

can work, and when it does, it can do much of the same damage we were afraid

of via DNS.

 

We have now had three attacks, in one year, that underscore the

fundamentally untrustworthy nature of routing. DNS, BGP, and SNMPv3 all

underscore the fact that the network should only be trusted as a best-effort

data transmission system  that if you want to make sure everything’s OK, you

can’t just assume  you need to cryptographically authenticate, you need to

cryptographically encrypt, and you need to do these things to a level of

security beyond “secure unless there’s an attacker.â€Â

 

A lot of us  myself included, when I first started really looking at SSL â€â€

thought we were already distrusting the network. We weren’t. That’s what

Mike Perry’s telling us, that’s what Mike Zusman’s telling us, and that’s

what I’m telling you.

 

There are some real discussions to be had. It’s 2008. Where’s secure

email? Why is almost every autoupdater not from Microsoft thoroughly broken?

What is going on with non-browser network clients that can’t handle traffic

from an untrusted server? How are we going to migrate the web, and indeed

all commercial network activity, to authenticated and encrypted protocols

that respect the fundamentally untrustworthy nature of the network?

 

DNS vs. BGP vs. SNMPv3 is inside baseball. The reality is as follows:

 

Weaknesses in authentication and encryption, some which have been known to

at least some degree for quite some time and many of which are sourced in the

core design of the system, continue to pose a threat to the Internet

infrastructure at large, both by corrupting routing, and making those

corrupted routes problematic.

 

The question is what to do about it.

 

(That all being said, I’ll be writing shortly with an update on defenses

against DNS. There be news.)

 

Share and Enjoy: These icons link to social bookmarking sites where readers

can share and discover new web pages.

 

August 27, 2008 | Filed Under Uncategorized

 

 

"Root Kit" wrote:

<span style="color:blue">

> On Thu, 28 Aug 2008 22:29:00 -0700, Dan

> <Dan@discussions.microsoft.com> wrote:

> <span style="color:green">

> >The technology industry is mainly in denial about Chris Cquirke,

> >mvp's research and now Dan K's research with DNS

> >Pollution and the biggest reason this is such a big problem is the NT source

> >code that has been leaked out over the Internet in the past and is solid

> >external defense but has no true internal safety like DOS (Disk Operating

> >System). </span>

>

> I don't know what it is you're smoking, but it certainly doesn't seem

> healthy for you.

> </span>

Guest Paul Adare - MVP
Posted

On Fri, 29 Aug 2008 04:30:00 -0700, Dan wrote:

<span style="color:blue">

> Here is more evidence:

>

> http://www.doxpara.com/

>

> and from the final paragraphs or perhaps you guys just don't trust

> researchers or want to be in denial about everything and see the 'Net as oh

> so secure and safe</span>

 

<sigh>

 

No one is disputing the _potential_ for the DNS issue to be a big problem.

The simple fact of the matter is that it isn't currently a big problem, and

there are patches available for it.

Your statement, to which root kit responded, claiming that this is a

problem due to source code that leaked 4 years ago is the problem and that

Windows NT (and you really need to stop using that term as it no longer

applies) has "no internal safety like DOS (disk operating system)" is

complete and utter rubbish and shows that simply don't have a clue what

you're talking about. You simply throw around terms and concepts that you

lift from other people's writings and don't have any original thoughts of

your own. The way you use these terms and concepts is a clear demonstration

that you simply don't understand the issues at even a basic level. You're

nothing more than a parrot.

 

--

Paul Adare

MVP - Identity Lifecycle Manager

http://www.identit.ca

You can't go home again, unless you set $HOME.

Posted

<sigh> to each his own Paul -- I take things from the consumer perpective and

I was saying how when XP Pro. SP2 fully updated in September 2007 was hacked

--- the hackers stole it all while connected to the APS intranet via VPN.

Anyway, I have publicly posted the denial of service error that happened at

the same time while connected to Windows 98 Second Edition and that is

because as Chris Quirke, mvp has explained is because of the internal safety

of the 9x consumer source code which has MS-DOS as its maintenance operating

system. It is a fact written in books that Microsoft engineers called the NT

business source code as "Not There even though it is New Technology" because

there was no underlying maintenance operating system like DOS. Microsoft and

others can make Windows NT source code as secure on the outside which is very

true in Vista which remember I helped to beta test the external defense

network within Vista for Microsoft and it is solidly protected on the

outside. It is better protected on the inside as well but the fact is there

is not a MS-DOS replacement in XP and Vista and it is just a command.com

prompt with a text based interface instead of a GUI interface. Microsoft

just made a mistake in choosing NT over 9x and now we as a society and world

are paying for the mistake. end of story

 

You can make 98 SE safe by also using open source technologies like Mozilla

Firefox 2.x which has 256 bit AES cipher strength which IE does not have

until Vista and that is also a fact. You can use software like

SpywareBlaster to prevent baddies from getting on to your machine in the

first place. People like Robear, mvp do understand me and my perspective. I

hope you will broaden your mind as well to at least consider where I am

coming from. Thank you and I appreciate your thoughts despite my harsh

language.

 

"Paul Adare - MVP" wrote:

<span style="color:blue">

> On Fri, 29 Aug 2008 04:30:00 -0700, Dan wrote:

> <span style="color:green">

> > Here is more evidence:

> >

> > http://www.doxpara.com/

> >

> > and from the final paragraphs or perhaps you guys just don't trust

> > researchers or want to be in denial about everything and see the 'Net as oh

> > so secure and safe</span>

>

> <sigh>

>

> No one is disputing the _potential_ for the DNS issue to be a big problem.

> The simple fact of the matter is that it isn't currently a big problem, and

> there are patches available for it.

> Your statement, to which root kit responded, claiming that this is a

> problem due to source code that leaked 4 years ago is the problem and that

> Windows NT (and you really need to stop using that term as it no longer

> applies) has "no internal safety like DOS (disk operating system)" is

> complete and utter rubbish and shows that simply don't have a clue what

> you're talking about. You simply throw around terms and concepts that you

> lift from other people's writings and don't have any original thoughts of

> your own. The way you use these terms and concepts is a clear demonstration

> that you simply don't understand the issues at even a basic level. You're

> nothing more than a parrot.

>

> --

> Paul Adare

> MVP - Identity Lifecycle Manager

> http://www.identit.ca

> You can't go home again, unless you set $HOME.

> </span>

Guest Paul Adare - MVP
Posted

On Fri, 29 Aug 2008 10:26:00 -0700, Dan wrote:

<span style="color:blue">

> <sigh> to each his own Paul -- I take things from the consumer perpective and

> I was saying how when XP Pro. SP2 fully updated in September 2007 was hacked

> --- the hackers stole it all while connected to the APS intranet via VPN. </span>

 

You have offered no proof whatsoever that the APS network was even hacked,

let alone how the hack occurred, nor what the result is. All we have is a

couple of vague statements from you and given your history here and obvious

lack of understanding of the issues, I'm not about to take your word for

much of anything when it comes to computer security.

<span style="color:blue">

> Anyway, I have publicly posted the denial of service error that happened at

> the same time while connected to Windows 98 Second Edition</span>

 

Where? What exactly is a "denial of service" error? What does Windows 98 SE

have to do with this at all?

<span style="color:blue">

> and that is

> because as Chris Quirke, mvp has explained is because of the internal safety

> of the 9x consumer source code which has MS-DOS as its maintenance operating

> system.</span>

 

There is no such thing as a "maintenance operating system". You can't be

seriously stating that Windows 9x is inherently more secure than is Windows

2000, XP, Vista, 2003, or 2008 simply because 9x runs on top of MS-DOS.

That is a ludicrous statement and shows once again that you simply don't

have a clue what you're talking about.

<span style="color:blue">

> It is a fact written in books that Microsoft engineers called the NT

> business source code as "Not There even though it is New Technology" because

> there was no underlying maintenance operating system like DOS.</span>

 

You've stated this before, I called it BS before and I call it BS again.

Prove the above statement. Provide the exact quote and the publication it

occurred in. Simply repeated stating something does not make it magically

come true.

<span style="color:blue">

> Microsoft and

> others can make Windows NT source code as secure on the outside which is very

> true in Vista which remember I helped to beta test the external defense

> network within Vista for Microsoft and it is solidly protected on the

> outside.</span>

 

You really need to stop making up your own terms here. There is no such

thing as an "external defense network within Vista". So what if you beta

tested. I've been beta testing Microsoft operating systems since Windows NT

3.1. Just the fact that you were a beta tester does not mean you understand

anything about computer security.

<span style="color:blue">

> It is better protected on the inside as well but the fact is there

> is not a MS-DOS replacement in XP and Vista</span>

 

So what, that has nothing at all to do with computer security.

<span style="color:blue">

> and it is just a command.com

> prompt with a text based interface instead of a GUI interface.</span>

 

This makes absolutely no sense whatsoever.

<span style="color:blue">

> Microsoft

> just made a mistake in choosing NT over 9x and now we as a society and world

> are paying for the mistake. end of story</span>

 

Oh, so according to Dan, the security expert, Microsoft made a mistake. You

have a very high opinion of yourself if you think you know better than the

security experts who work for Microsoft. Absolutely incredible.

<span style="color:blue">

>

> You can make 98 SE safe by also using open source technologies like Mozilla

> Firefox 2.x which has 256 bit AES cipher strength which IE does not have

> until Vista and that is also a fact. You can use software like

> SpywareBlaster to prevent baddies from getting on to your machine in the

> first place.</span>

 

Windows 98 will never be even half as secure as either XP or Vista or any

operating system released since Windows 98. You are deluding yourself by

believing otherwise. If you want to continue to do so then great, knock

yourself out, but coming in here and trying to convince others who may not

know any better is irresponsible and dangerous.

<span style="color:blue">

> People like Robear, mvp do understand me and my perspective. I

> hope you will broaden your mind as well to at least consider where I am

> coming from. Thank you and I appreciate your thoughts despite my harsh

> language.</span>

 

I will not consider where you're coming from as you simply don't have a

clue what you're talking about. You don't understand the issues involved,

you've simply latched on to a position held by Chris Quirke, which you

don't even clearly understand, and you parrot nonsense here.

You are as dangerous to computer security as most malware and viruses.

 

--

Paul Adare

MVP - Identity Lifecycle Manager

http://www.identit.ca

A CONS is an object which cares. -- Bernie Greenberg

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...