[163906] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: This is a coordinated hacking. (Was Re: Need help in flushing DNS)

daemon@ATHENA.MIT.EDU (Jimmy Hess)
Thu Jun 20 20:23:00 2013

In-Reply-To: <m2ip18v2lu.wl%randy@psg.com>
Date: Thu, 20 Jun 2013 19:22:33 -0500
From: Jimmy Hess <mysidia@gmail.com>
To: Randy Bush <randy@psg.com>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 6/20/13, Randy Bush <randy@psg.com> wrote:
> netsol screwed up.  they screwed up bigtime.  they are shoveling kitty
> litter over it as fast as they can, and they have a professional kitty
> litter, aka pr, department.
> but none of this is surprising.
> and dnssec did not save us.  is there anything which could have?

What's puzzling is  the "How the heck did they do that?"

The registrar doesn't maintain the .COM database that contains the
list of nameservers....
they had to submit changes to all those records.

So, why weren't there security controls to make sure that the
registrar could not submit changes without appropriate authorization
from the Administrative/Tech contact?


> randy
--
-JH


home help back first fref pref prev next nref lref last post