[154156] in North American Network Operators' Group
RE: DNS poisoning at Google?
daemon@ATHENA.MIT.EDU (Matthew Black)
Wed Jun 27 01:05:39 2012
From: Matthew Black <Matthew.Black@csulb.edu>
To: Jeremy Hanmer <jeremy.hanmer@dreamhost.com>
Date: Wed, 27 Jun 2012 05:05:01 +0000
In-Reply-To: <00D9D692-17E6-408A-978B-F3E712D4CA9F@dreamhost.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
Google Webtools reports a problem with our HOMEPAGE "/". That page is not r=
edirecting anywhere.
They also report problems with some 48 other primary sites, none of which r=
edirect to the offending couchtarts.
matthew black
information technology services
california state university, long beach
-----Original Message-----
From: Jeremy Hanmer [mailto:jeremy.hanmer@dreamhost.com]=20
Sent: Tuesday, June 26, 2012 9:58 PM
To: Matthew Black
Cc: nanog@nanog.org
Subject: Re: DNS poisoning at Google?
It's not DNS. If you're sure there's no htaccess files in place, check you=
r content (even that stored in a database) for anything that might be alter=
ing data based on referrer. This simple test shows what I mean:
Airy:~ user$ curl -e 'http://google.com' csulb.edu <!DOCTYPE HTML PUBLIC "-=
//IETF//DTD HTML 2.0//EN"> <html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href=3D"http://www.couchtarts.com/media.php">h=
ere</a>.</p>
</body></html>
Running curl without the -e argument gives the proper site contents. =20
On Jun 26, 2012, at 9:24 PM, Matthew Black <Matthew.Black@csulb.edu> wrote:
> Running Apache on three Solaris webservers behind a load balancer. No MS =
Windows!
>=20
> Not sure how malicious software could get between our load balancer and U=
nix servers. Thanks for the tip!
>=20
> matthew black
> information technology services
> california state university, long beach
>=20
>=20
>=20
> From: Landon Stewart [mailto:lstewart@superb.net]
> Sent: Tuesday, June 26, 2012 9:07 PM
> To: Matthew Black
> Cc: nanog@nanog.org
> Subject: Re: DNS poisoning at Google?
>=20
> Is it possible that some malicious software is listening and injecting a =
redirect on the wire? We've seen this before with a Windows machine being =
infected.
> On 26 June 2012 20:53, Matthew Black <Matthew.Black@csulb.edu<mailto:Matt=
hew.Black@csulb.edu>> wrote:
> Google Safe Browsing and Firefox have marked our website as containing ma=
lware. They claim our home page returns no results, but redirects users to =
another compromised website couchtarts.com<http://couchtarts.com>.
>=20
> We have thoroughly examined our root .htaccess and httpd.conf files and a=
re not redirecting to the problem target site. No recent changes either.
>=20
> We ran some NSLOOKUPs against various public DNS servers and intermittent=
ly get results that are NOT our servers.
>=20
> We believe the DNS servers used by Google's crawler have been poisoned.
>=20
> Can anyone shed some light on this?
>=20
> matthew black
> information technology services
> california state university, long beach=20
> www.csulb.edu<http://www.csulb.edu><http://www.csulb.edu>
>=20
>=20
>=20
> --
> Landon Stewart <LStewart@Superb.Net<mailto:LStewart@Superb.Net>>
> Sr. Administrator
> Systems Engineering
> Superb Internet Corp - 888-354-6128 x 4199 Web hosting and more "Ahead=20
> of the Rest":=20
> http://www.superbhosting.net<http://www.superbhosting.net/>
>=20