[24464] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: FW: Root Domain Server Hacked.

daemon@ATHENA.MIT.EDU (bmanning@vacation.karoshi.com)
Fri Jul 2 22:31:38 1999

From: bmanning@vacation.karoshi.com
To: SEAN@SDG.DRA.COM (Sean Donelan)
Date: Fri, 2 Jul 1999 19:37:50 -0700 (PDT)
Cc: nanog@merit.edu
In-Reply-To: <990702195648.423d@SDG.DRA.COM> from "Sean Donelan" at Jul 2, 99 07:56:48 pm
Errors-To: owner-nanog-outgoing@merit.edu


> rmeyer@mhsc.COM (Roeland M.J. Meyer) writes:
> >That's not what Paul said.
> >> Randy Bush writes:
> >> this is false and specious garbage
> 
> Both statements are true.  You can hijack domain names and insert
> bogus data in caches without hacking any root servers.  It is much
> easier to just e-mail a domain modify template to NSI, and insert
> some bogus IP addresses for certain names.  Similar to what happened
> to AOL last year (actually it appears to be a glue issue on some NS
> records).
> 
> I think some people are getting too wrapped up in some really exotic
> attacks on DNS, when the simple ones still work. 

	Who was it that said, "never attribute to malice..."
	While the clever pranks/attacks are interesting and
	potentially very disruptive, simple mistakes and 
	social manipulation can/do cause lots of highly
	visable impact.  Somewhat akin to tossing a lighted
	match into a powder keg.  I hope these "fireworks"
	prove to be a dud and that our respective holidays
	are safe, quiet, and productive.

--bill


home help back first fref pref prev next nref lref last post