[154177] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: DNS poisoning at Google?

daemon@ATHENA.MIT.EDU (Ian McDonald)
Wed Jun 27 03:13:01 2012

X-StAndrews-MailScanner-From: iam@st-andrews.ac.uk
From: Ian McDonald <iam@st-andrews.ac.uk>
To: Grant Ridder <shortdudey123@gmail.com>, "nanog@nanog.org"
 <nanog@nanog.org>, Matthew Black <Matthew.Black@csulb.edu>
Date: Wed, 27 Jun 2012 07:11:50 +0000
In-Reply-To: <ED78B1C68B84A14FA706D13A230D7B431954F436@ITS-MAIL01.campus.ad.csulb.edu>
Cc: Jeremy Hanmer <jeremy.hanmer@dreamhost.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Ahh, but how did it get there in the first place. Matthew, meet can of worm=
s. I presume you have an opener.

--
ian
-----Original Message-----
From: Matthew Black
Sent:  27/06/2012, 08:07
To: Grant Ridder; nanog@nanog.org
Cc: Jeremy Hanmer
Subject: RE: DNS poisoning at Google?

We found the aberrant .htaccess file and have removed it. What a mess!

matthew black
information technology services
california state university, long beach

From: Grant Ridder [mailto:shortdudey123@gmail.com]
Sent: Tuesday, June 26, 2012 11:02 PM
To: Matthew Black; nanog@nanog.org
Cc: Jeremy Hanmer
Subject: Re: DNS poisoning at Google?

It also redirects with facebook, youtube, and ebay but NOT amazon.

-Grant

On Wed, Jun 27, 2012 at 12:57 AM, Matthew Black <Matthew.Black@csulb.edu<ma=
ilto:Matthew.Black@csulb.edu>> wrote:
Our web lead was able to run curl. Thanks.

matthew black
information technology services
california state university, long beach

From: Grant Ridder [mailto:shortdudey123@gmail.com<mailto:shortdudey123@gma=
il.com>]
Sent: Tuesday, June 26, 2012 10:53 PM
To: Matthew Black
Cc: Landon Stewart; nanog@nanog.org<mailto:nanog@nanog.org>; Jeremy Hanmer

Subject: Re: DNS poisoning at Google?

Matt, what happens you get on a subnet that can access the webservers direc=
tly and bypass the load balancer.  Try curl then and see if its something w=
/ the webserver or load balancer.

-Grant
On Wed, Jun 27, 2012 at 12:40 AM, Matthew Black <Matthew.Black@csulb.edu<ma=
ilto:Matthew.Black@csulb.edu>> wrote:
Thanks again to everyone who helped. I didn't know what to enter with curl,=
 because Outlook clobbered the line breaks in Jeremy's original message.

Also, curl failed on our primary webserver because of firewall and load bal=
ancer magic settings. The Telnet method worked better!

Our team is now scouring for that hidden redirect to couchtarts.

matthew black
information technology services
california state university, long beach

From: Landon Stewart [mailto:lstewart@superb.net<mailto:lstewart@superb.net=
>]
Sent: Tuesday, June 26, 2012 10:37 PM
To: Matthew Black
Cc: Jeremy Hanmer; nanog@nanog.org<mailto:nanog@nanog.org>
Subject: Re: DNS poisoning at Google?
There is definitely a 301 redirect.

$ curl -I --referer http://www.google.com/ http://www.csulb.edu/
HTTP/1.1<http://www.csulb.edu/%0d%0aHTTP/1.1> 301 Moved Permanently
Date: Wed, 27 Jun 2012 05:36:31 GMT
Server: Apache/2.0.63
Location: http://www.couchtarts.com/media.php
Connection: close
Content-Type: text/html; charset=3Diso-8859-1
On 26 June 2012 22:05, Matthew Black <Matthew.Black@csulb.edu<mailto:Matthe=
w.Black@csulb.edu><mailto:Matthew.Black@csulb.edu<mailto:Matthew.Black@csul=
b.edu>>> wrote:
Google Webtools reports a problem with our HOMEPAGE "/". That page is not r=
edirecting anywhere.
They also report problems with some 48 other primary sites, none of which r=
edirect to the offending couchtarts.

matthew black
information technology services
california state university, long beach




-----Original Message-----
From: Jeremy Hanmer [mailto:jeremy.hanmer@dreamhost.com<mailto:jeremy.hanme=
r@dreamhost.com><mailto:jeremy.hanmer@dreamhost.com<mailto:jeremy.hanmer@dr=
eamhost.com>>]
Sent: Tuesday, June 26, 2012 9:58 PM
To: Matthew Black
Cc: nanog@nanog.org<mailto:nanog@nanog.org><mailto:nanog@nanog.org<mailto:n=
anog@nanog.org>>
Subject: Re: DNS poisoning at Google?
It's not DNS.  If you're sure there's no htaccess files in place, check you=
r content (even that stored in a database) for anything that might be alter=
ing data based on referrer.  This simple test shows what I mean:
Airy:~ user$ curl -e 'http://google.com' csulb.edu<http://csulb.edu><http:/=
/csulb.edu> <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head>
<title>301 Moved Permanently</title>
</head><body>
<h1>Moved Permanently</h1>
<p>The document has moved <a href=3D"http://www.couchtarts.com/media.php">h=
ere</a>.</p>
</body></html>

Running curl without the -e argument gives the proper site contents.
On Jun 26, 2012, at 9:24 PM, Matthew Black <Matthew.Black@csulb.edu<mailto:=
Matthew.Black@csulb.edu><mailto:Matthew.Black@csulb.edu<mailto:Matthew.Blac=
k@csulb.edu>>> wrote:

> Running Apache on three Solaris webservers behind a load balancer. No MS =
Windows!
>
> Not sure how malicious software could get between our load balancer and U=
nix servers. Thanks for the tip!
>
> matthew black
> information technology services
> california state university, long beach
>
>
>
> From: Landon Stewart [mailto:lstewart@superb.net<mailto:lstewart@superb.n=
et><mailto:lstewart@superb.net<mailto:lstewart@superb.net>>]
> Sent: Tuesday, June 26, 2012 9:07 PM
> To: Matthew Black
> Cc: nanog@nanog.org<mailto:nanog@nanog.org><mailto:nanog@nanog.org<mailto=
:nanog@nanog.org>>
> Subject: Re: DNS poisoning at Google?
>
> Is it possible that some malicious software is listening and injecting a =
redirect on the wire?  We've seen this before with a Windows machine being =
infected.
> On 26 June 2012 20:53, Matthew Black <Matthew.Black@csulb.edu<mailto:Matt=
hew.Black@csulb.edu><mailto:Matthew.Black@csulb.edu<mailto:Matthew.Black@cs=
ulb.edu>><mailto:Matthew.Black@csulb.edu<mailto:Matthew.Black@csulb.edu><ma=
ilto:Matthew.Black@csulb.edu<mailto:Matthew.Black@csulb.edu>>>> wrote:
> Google Safe Browsing and Firefox have marked our website as containing ma=
lware. They claim our home page returns no results, but redirects users to =
another compromised website couchtarts.com<http://couchtarts.com><http://co=
uchtarts.com><http://couchtarts.com>.
>
> We have thoroughly examined our root .htaccess and httpd.conf files and a=
re not redirecting to the problem target site. No recent changes either.
>
> We ran some NSLOOKUPs against various public DNS servers and intermittent=
ly get results that are NOT our servers.
>
> We believe the DNS servers used by Google's crawler have been poisoned.
>
> Can anyone shed some light on this?
>
> matthew black
> information technology services
> california state university, long beach
> www.csulb.edu<http://www.csulb.edu><http://www.csulb.edu><http://www.csul=
b.edu><http://www.csulb.edu>
>
>
>
> --
> Landon Stewart <LStewart@Superb.Net<mailto:LStewart@Superb.Net<mailto:LSt=
ewart@Superb.Net><mailto:LStewart@Superb.Net<mailto:LStewart@Superb.Net>>>>
> Sr. Administrator
> Systems Engineering
> Superb Internet Corp - 888-354-6128 x 4199<tel:888-354-6128%20x%204199><t=
el:888-354-6128%20x%204199> Web hosting and more "Ahead
> of the Rest":
> http://www.superbhosting.net<http://www.superbhosting.net/>
>






--
Landon Stewart <LStewart@Superb.Net<mailto:LStewart@Superb.Net<mailto:LStew=
art@Superb.Net>>>
Sr. Administrator
Systems Engineering
Superb Internet Corp - 888-354-6128 x 4199<tel:888-354-6128%20x%204199>
Web hosting and more "Ahead of the Rest": http://www.superbhosting.net<http=
://www.superbhosting.net/>




home help back first fref pref prev next nref lref last post