请输入您要查询的百科知识:

 

词条 Dan Kaminsky
释义

  1. Flaw in DNS

  2. Sony rootkit

  3. Earthlink and DNS lookup

  4. Automated detection of Conficker

  5. Flaws in Internet X.509 Infrastructure

  6. Attack by "Zero for 0wned"

  7. References

  8. External links

{{About|the American computer security researcher|the American actor and singer born Daniel Kaminsky|Danny Kaye}}{{Infobox person
|name = Dan Kaminsky
|image = Dan Kaminsky2015portrait.jpg
|caption = Kaminsky in 2015
|birth_date =
|birth_place =
|death_date =
|death_place =
|other_names =
|known_for = Discovering the 2008 DNS cache poisoning vulnerability
|occupation = Computer security researcher
|nationality =
}}Dan Kaminsky is an American security researcher. He is the Chief Scientist of White Ops, a firm specializing in detecting malware activity via JavaScript. He has worked for Cisco, Avaya, and IOActive, where he was the Director of Penetration Testing.[1][2] He is known among computer security experts for his work on DNS cache poisoning, and for showing that the Sony Rootkit had infected at least 568,200 computers[3] and for his talks at the Black Hat Briefings.[2]

In June 2010, Kaminsky released Interpolique,[4][5] a beta framework for addressing injection attacks such as SQL injection and cross-site scripting in a manner comfortable to developers.

On June 16, 2010, he was named by ICANN as one of the Trusted Community Representatives for the DNSSEC root.[6]

Flaw in DNS

In July 2008, the CERT Coordination Center announced that Kaminsky had discovered a fundamental flaw in the Domain Name System (DNS) protocol. The flaw could allow attackers to easily perform cache poisoning attacks on most nameservers[7] (djbdns, PowerDNS, MaraDNS, Secure64 and Unbound were not vulnerable).[8]

With most Internet-based applications depending on DNS to locate their peers, a wide range of attacks became feasible, including web site impersonation, email interception, and authentication bypass via the "Forgot My Password" feature on many popular websites.

Kaminsky worked with DNS vendors in secret to develop a patch to make exploiting the vulnerability more difficult, releasing it on July 8, 2008.[9] The vulnerability itself has not been fully fixed, as it is a design flaw in DNS itself.[10]

Kaminsky had intended not to publicize details of the attack until 30 days after the release of the patch, but details were leaked on July 21, 2008.[11] The information was quickly pulled down, but not before it had been mirrored by others.[12]

Kaminsky received a substantial amount of mainstream press after disclosing his vulnerability,[13][14] but experienced some backlash from the computer security community for not immediately disclosing his attack.[15]

The actual vulnerability was related to DNS only having 65,536 possible transaction IDs, a number small enough to simply guess given enough opportunities. Dan Bernstein, author of djbdns, had reported this as early as 1999.[16] djbdns dealt with the issue using Source Port Randomization, in which the UDP port was used as a second transaction identifier, thus raising the possible ID count into the billions. Other more popular name server implementations left the issue unresolved due to concerns about performance and stability, as many operating system kernels simply weren't designed to cycle through thousands of network sockets a second. Instead, other implementers assumed that DNS's time to live (TTL) field would limit a guesser to only a few attempts a day.[17]

Kaminsky's attack bypassed this TTL defense by targeting "sibling" names like "83.example.com" instead of "www.example.com" directly. Because the name was unique, it had no entry in the cache, and thus no TTL. But because the name was a sibling, the transaction-ID guessing spoofed response could not only include information for itself, but for the target as well. By using many "sibling" names in a row, he could induce a DNS server to make many requests at once. This provided enough opportunities to guess the transaction ID to successfully spoof a reply in a reasonable amount of time.

To fix this, all major DNS servers implemented Source Port Randomization, as both djbdns and PowerDNS had before. This fix is widely seen as a stopgap measure, as it only makes the attack up to 65,536 times harder. An attacker willing to send billions of packets can still corrupt names. DNSSEC has been proposed as the way to bring cryptographic assurance to results provided by DNS, and Kaminsky has spoken in favor of it.[18]

Sony rootkit

During the Sony BMG CD copy protection scandal, Kaminsky used DNS cache snooping to find out whether or not servers had recently contacted any of the domains accessed by the Sony rootkit. He used this technique to estimate that there were at least 568,200 networks that had computers with the rootkit.[3]

Earthlink and DNS lookup

In April 2008 Kaminsky realized a growing practice among ISPs potentially represented a security vulnerability. Various ISPs have experimented with intercepting return messages of non-existent domain names and replacing them with advertising content. This could allow hackers to set up phishing schemes by attacking the server responsible for the advertisements and linking to non-existent subdomains of the targeted websites. Kaminsky demonstrated this process by setting up Rickrolls on Facebook and PayPal.[1][19] While the vulnerability used initially depended in part that Earthlink was using Barefruit to provide its advertising, Kaminsky was able to generalize the vulnerability to attack Verizon by attacking its ad provider, Paxfire.[20]

Kaminsky went public after working with the ad networks in question to eliminate the immediate cross-site scripting vulnerability.[21]

Automated detection of Conficker

On March 27, 2009, Kaminsky discovered that Conficker-infected hosts have a detectable signature when scanned remotely.[22] Signature updates for a number of network scanning applications are now available including NMap[23] and Nessus.[24]

Flaws in Internet X.509 Infrastructure

In 2009, in cooperation with Meredith L. Patterson and Len Sassaman, Kaminsky discovered numerous flaws in the SSL protocol. These include the use of the weak MD2 hash function by Verisign in one of their root certificates and errors in the certificate parsers in a number of Web browsers that allow attackers to successfully request certificates for sites they don't control.[25][26]

Attack by "Zero for 0wned"

On July 28, 2009, Kaminsky, along with several other high-profile security consultants, experienced the publication of their personal email and server data by hackers associated with the "Zero for 0wned" online magazine.[27][28][29] The attack appeared to be designed to coincide with Kaminsky's appearance at the Black Hat Briefings and DEF CON conferences.

References

1. ^{{cite news |author=Ryan Singel |title=ISPs' Error Page Ads Let Hackers Hijack Entire Web, Researcher Discloses |url=http://blog.wired.com/27bstroke6/2008/04/isps-error-page.html |publisher=Wired |date=2008-04-19 |accessdate=2008-05-19 |language= |quote= }}
2. ^{{cite web |url=http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1313632,00.html |title=Kaminsky on DNS rebinding attacks, hacking techniques |accessdate=2008-05-19 |author= Michael S. Mimoso |date= 2008-04-14|publisher=Search Security}}
3. ^{{cite news|author=Quinn Norton |title=Sony Numbers Add Up to Trouble |url=https://www.wired.com/politics/security/news/2005/11/69573 |publisher=Wired |date=2005-11-15 |accessdate=2008-05-19 |deadurl=yes |archiveurl=https://web.archive.org/web/20080423212131/http://www.wired.com/politics/security/news/2005/11/69573 |archivedate=2008-04-23 |df= }}
4. ^{{cite web|title=Interpolique Home Page |url=http://www.recursion.com/interpolique.html |deadurl=yes |archiveurl=https://web.archive.org/web/20100618112825/http://recursion.com/interpolique.html |archivedate=2010-06-18 |df= }}
5. ^{{cite web|title=Kaminsky Issues Developer Tool to Kill Injection Bugs|url=http://www.darkreading.com/database_security/security/app-security/showArticle.jhtml?articleID=225700088&cid=RSSfeed_DR_News}}
6. ^{{cite web |title=TCR Selection 2010|url=http://www.root-dnssec.org/tcr/selection-2010/}}
7. ^{{cite web|url=http://www.kb.cert.org/vuls/id/800113|title=CERT Vulnerability Note VU#800113: Multiple DNS implementations vulnerable to cache poisoning|date=2008-07-08|accessdate=2008-11-27|publisher=United States Computer Emergency Readiness Team}}
8. ^{{cite web|url=https://lwn.net/Articles/289138/|title=Dan Kaminsky Discovers Fundamental Issue In DNS: Massive Multivendor Patch Released}}
9. ^{{cite web|url=http://www.circleid.com/posts/87143_dns_not_a_guessing_game/ |title=Not a Guessing Game |publisher=Circleid.com |date=2008-07-14 |accessdate=2013-01-25}}
10. ^{{cite web|url=http://www.linux.com/feature/141080 |title=Patches coming today for DNS vulnerability |publisher=Linux.com |date= |accessdate=2013-01-25}}
11. ^{{cite web|url=http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html|title=Kaminsky's DNS Issue Accidentally Leaked?|date=2008-07-21|accessdate=2008-07-30|publisher=Invisible Denizen blog}}
12. ^{{cite web|url=http://beezari.livejournal.com/141796.html |title=DNS bug leaks by matasano |date=2008-07-22 |publisher=beezari's LiveJournal |accessdate=2008-07-30 |deadurl=yes |archiveurl=https://web.archive.org/web/20080917221438/http://beezari.livejournal.com/141796.html |archivedate=2008-09-17 |df= }}
13. ^{{cite web|url=https://news.google.com/news?hl=en&um=1&tab=wn&nolr=1&q=%22Dan+Kaminsky%22&btnG=Search+News |title=news.google.com |publisher=news.google.com |date= |accessdate=2013-01-25}}
14. ^{{cite news| url=http://www.seattlepi.com/local/373426_insecure04.html | work=Seattle Post-Intelligencer | first1=Daniel | last1=Lathrop | first2=Paul | last2=Shukovsky | title=Seattle security expert helped uncover major design flaw on Internet | date=2008-08-03}}
15. ^Pwnie Award Nominees {{webarchive|url=https://web.archive.org/web/20080730055502/http://pwnie-awards.org/2008/awards.html |date=2008-07-30 }}
16. ^{{cite web|url=http://cr.yp.to/djbdns/forgery.html |title=DNS forgery |publisher=Cr.yp.to |date= |accessdate=2013-01-25}}
17. ^{{cite web|url=http://ds9a.nl/rfc/dns-anti-spoofing.html#anchor10 |title=Measures to prevent DNS spoofing |publisher=Ds9a.nl |date=2006-11-02 |accessdate=2013-01-25}}
18. ^https://www.blackhat.com/presentations/bh-dc-09/Kaminsky/BlackHat-DC-09-Kaminsky-DNS-Critical-Infrastructure.pdf
19. ^{{cite web|last=McFeters |first=Nathan |url=http://blogs.zdnet.com/security/?p=1040 |title=ToorCon Seattle 2008: Nuke plants, non-existent sub domain attacks, muffin diving, and Guitar Hero | Zero Day | ZDNet.com |publisher=Blogs.zdnet.com |date=2008-04-21 |accessdate=2013-01-25}}
20. ^{{cite news |author=Brian Krebs |title=More Trouble With Ads on ISPs' Error Pages |url=http://blog.washingtonpost.com/securityfix/2008/04/more_trouble_with_ads_on_isps.html?nav=rss_blog |publisher=Washington Post |date=2008-04-30 |accessdate=2008-05-19 |deadurl=yes |archiveurl=https://web.archive.org/web/20110503222333/http://blog.washingtonpost.com/securityfix/2008/04/more_trouble_with_ads_on_isps.html?nav=rss_blog |archivedate=2011-05-03 |df= }}
21. ^{{cite news |author= Robert McMillan |title=EarthLink Redirect Service Poses Security Risk, Expert Says |url=https://www.pcworld.com/article/144849/earthlink_redirect_service_poses_security_risk_expert_says.html |publisher= PC World |date=2008-04-19 |accessdate=2008-05-19 |language= |quote= }}
22. ^{{Cite book|url = http://theregister.co.uk/2009/03/30/conficker_signature_discovery|first = Dan|last = Goodin|title = Busted! Conficker's tell-tale heart uncovered|date = 2009-03-30|publisher= The Register|accessdate = 2009-03-31}}
23. ^{{Cite book|url = http://www.skullsecurity.org/blog/?p=209|title = Scanning for Conficker with Nmap|date = 2009-03-30|publisher = Skullsecurity.org|accessdate = 2009-03-31|first = Ronald|last = Bowes}}
24. ^{{Cite book|url = http://blog.tenablesecurity.com/2009/04/updated-conficker-detection-plugin-released.html|title = Updated Conficker Detection Plugin Released|date= 2009-04-01|accessdate = 2009-04-02|first = Paul|last = Asadoorian|publisher = Tenable Security}}
25. ^{{cite web|author=Rodney |url=http://www.semiaccurate.com/2009/08/02/dan-kaminsky-feels-disturbance-internet/ |title=Dan Kaminsky Feels a disturbance in The Internet |publisher=SemiAccurate |date=2009-08-02 |accessdate=2013-01-25}}
26. ^https://www.theregister.co.uk/2009/07/30/universal_ssl_certificate/
27. ^Ries, Ulie "Crackers publish hackers' private data", heise online, 2009-7-31. Retrieved on 2009-7-31.
28. ^Goodin, Dan [https://www.theregister.co.uk/2009/07/29/kaminsky_hacked/ "Security elite pwned on Black Hat eve"], The Register, 2009-7-29. Retrieved on 2009-7-31.
29. ^Zetter, Kim [https://www.wired.com/threatlevel/2009/07/kaminsky-hacked/ "Real Black Hats Hack Security Experts on Eve of Conference"], Wired.com, 2009-7-29. Retrieved on 2009-7-31.

External links

{{commons}}
  • {{official}}
  • [https://www.wired.com/techbiz/people/magazine/16-12/ff_kaminsky Wired article on the Dan Kaminsky DNS story]
  • [https://web.archive.org/web/20101225140056/http://www.infoblox.com/graphics/images/DNSSEC_FINAL_PDF.pdf Dan Kaminsky, Cricket Liu and Scott Rose on DNSSEC]
  • Website of security company White Ops, of which Dan Kaminsky is a founder
{{Authority control}}{{DEFAULTSORT:Kaminsky, Dan}}

4 : Living people|Computer security specialists|Avaya employees|Year of birth missing (living people)

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/22 3:43:48