[147716] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: what if...?

daemon@ATHENA.MIT.EDU (Jared Mauch)
Tue Dec 20 12:03:19 2011

From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <20111220133723.cfjv8g999ssoc8gg@fcaglp.fcaglp.unlp.edu.ar>
Date: Tue, 20 Dec 2011 12:00:28 -0500
To: =?iso-8859-1?Q?=22Eduardo_A=2E_Su=E1rez=22?=
 <esuarez@fcaglp.fcaglp.unlp.edu.ar>
Cc: NANOG Operators Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org


On Dec 20, 2011, at 11:37 AM, Eduardo A. Su=E1rez wrote:

> Hi,
>=20
> what if evil guys hack my mom ISP DNS servers and use RPZ to redirect =
traffic from mom_bank.com to evil.com?
>=20
> How can she detect this?

Thankfully mom_bank.com is not valid, as underscores aren't valid in dns =
names :)

Additionally, SSL certificates combined with DNSSEC/DANE can provide =
some protection.  Some of this technology may not be available today, =
but is worth tracking if you are interested in this topic.

- Jared=


home help back first fref pref prev next nref lref last post