• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    Prevent Server Cache Poisoning And Domain Name Hijacking

    2008/6/19 12:45:00 32

    Prevent Server Cache Poisoning And Domain Name Hijacking

    When it comes to network security, you may be familiar with the risk of Web fraud, but do you know the threat of pharming?

    For a On-Line Company, this risk is fatal.


    In a nutshell, domain deception is the use of original access to a website.


    Households, unwittingly, hijacked to counterfeit websites, such as users ready to visit a well-known brand online store, hackers can take them to fake online stores by means of domain deception, while collecting user ID information and passwords.


    This kind of crime is usually achieved through DNS server's cache poisoning or domain name hijacking.

    In recent months, hackers have shown the harm of this attack.

    In March of this year, SANS Institute discovered a cache poisoning attack that changed the direction of 1300 famous brand names. These brands included ABC, American Express, Citi and Verizon Wireless. In January, the domain name of Panix was hijacked by an Australian hacker; in April, the IP address of Hushmail's main domain name server was modified to connect to a website made by hackers.


    Statistics for tracking domain spoofing events are not yet available.

    However, the anti web fraud task force (APWG) has classified domain deception into the key tasks of the recent work.


    Experts say that the problem of cache poisoning and domain name hijacking has already attracted the attention of relevant organizations. Moreover, with the increasing number of online brands and increasing turnover, this problem is becoming more prominent. People have reason to worry that fraudsters will soon use this hacking technology to deceive large numbers of users, thus obtaining valuable personal information and causing confusion in the online market.


    Although domain deception is technically and organized, it is very complicated.

    But under the current circumstances, we can still take some measures to protect the DNS servers and domain names of enterprises without being manipulated by domain name swindlers.


    Crack dilemma


    The root of the DNS security problem lies in the Berkeley Internet Domain (BIND).

    BIND is full of security issues that have been widely reported over the past 5 years.

    Ken Silva, chief security officer of VeriSign, said that if you use BIND based DNS servers, follow the best practices of DNS management.


    Johannes, chief research officer at SANS, said: "there are some fundamental problems in the current DNS. The most important thing is to unremittingly repair the DNS server to keep it up to date."


    Paul Mockapetris, chief scientist of Nominum company and DNS protocol author, said that upgrading to BIND 9.2.5 or implementing DNSSec would eliminate the risk of caching.

    However, if there is no interface provided by DNS management devices from Cisco, F5 Networks, Lucent and Nortel, it is very difficult and time-consuming to complete such migration.

    Some companies, such as Hushmail, chose to use open source code TinyDNS instead of BIND.

    Software alternatives to DNS include products from Microsoft, PowerDNS, JH Software, and other manufacturers.


    No matter what kind of DNS you use, please follow the following best practices provided by Michael Networks, President of BlueCat Networks:


    1, running separate domain name servers on different networks to achieve redundancy.


    2, separate the external and internal domain servers (physically separate or run BIND Views) and use the pponder (Forwarders).

    The external domain name server should accept queries from almost any address, but the pponder will not accept it.

    They should be configured to accept queries from internal addresses only.

    Close the recursive function on the external domain name server (starting from the root server to locate the DNS record down).

    This can restrict which DNS servers are contacted with Internet.


    3, when possible, restrict dynamic DNS updates.


    4, restrict regional pmission to authorized devices.


    5, using paction signature to digitally sign the region pfer and region update.


    6, hide the BIND version on the server.


    7, delete unnecessary services running on the DNS server, such as FTP, telnet and HTTP.


    8, use firewall services on network peripherals and DNS servers.

    Restrict access to those ports / services required by DNS functions.


    Let the Registrar take the responsibility.


    The problem of domain deception is also an important part of organization.

    Not long ago, a hacker defrauded the customer service representative to modify the IP address of the Hushmail's main domain name server.

    At this point, Hushmail's CTO Brian Smith has been very angry. It's really annoying that hackers have easily deceived the customer service representatives of their domain name registrars.


    "This is really bad for us," Smith said.

    I would like to see the Registrar formulate and publish better safety policies.

    However, I can not find a registrar to do so. Since this happened, I have been looking for such a registrar. "


    Alex Resin, President of Panix.com, also felt the same strong dissatisfaction when the Panix domain name was hijacked in January this year.

    First, his registrar sold his domain name to a reseller without prior notice.

    The reseller then pferred the domain name to a social engineer who did not inform Resin.


    Resin said: "domain name system needs systematic and fundamental reform.

    There are many suggestions, but things are not moving fast enough. "


    It will take a long time to wait for market demand and the ICANN leadership to force the Registrar to adopt a safe pfer policy.

    Therefore, Resin, Smith and ICANN chief registrar liaison officer Tim Cole have proposed the following risk reduction recommendations:


    1, ask your registrar to produce written and executable policy statements.

    If you need to pfer the domain name, ask them to contact you in time in the written document.


    2, locking the domain name, asking the Registrar to get the unlocked password or other identity letters? Script src=>

    • Related reading

    YAHOO Ji Mo Joint Revenue Is Expected To Jump Three

    Market network
    |
    2008/6/19 12:45:00
    28

    E-Commerce Industry Standards Promulgated Recently

    Market network
    |
    2008/6/19 12:44:00
    23

    Professional Search Opens A New Chapter In B2B E-Commerce

    Market network
    |
    2008/6/19 12:44:00
    20

    Virtual Tools Can Simplify Disaster Recovery Strategy

    Market network
    |
    2008/6/19 12:43:00
    29

    Five Steps To Select Saas Services

    Market network
    |
    2008/6/19 12:43:00
    21
    Read the next article

    How To Ensure Information Security In Intranet?

    How to ensure information security in Intranet?

    主站蜘蛛池模板: 91精品国产9l久久久久| 日韩色日韩视频亚洲网站| 少妇高潮喷水久久久久久久久久 | 国产免费拔擦拔擦8x| 久久天天躁狠狠躁夜夜躁2014| 久久久久人妻精品一区三寸 | yellow视频免费看| 亚洲精品第一国产综合野| 欧美国产日韩1区俺去了| 女人十八黄毛片| 日本大片在线看黄a∨免费| 男生的肌肌插入女生的肌肌| 亚洲欧美一区二区三区| 国产乱人伦偷精精品视频| 性护士movievideobest| 精品国产一区二区三区免费| 欧美国产中文字幕| 美国一级毛片免费| 色yeye在线观看| 欧美jizz18欧美| 精品一区二区三区在线播放视频| 美女内射无套日韩免费播放| 6080新视觉| 色噜噜狠狠狠综合曰曰曰| 日本精品少妇一区二区三区| 青青青青青草原| 男人的好在线观看免费视频| 成人免费视频软件网站| 全免费a级毛片免费看不卡 | bbbbbbbw日本| 香港黄页亚洲一级| 一本大道香蕉在线影院| 亚洲美女免费视频| 国产性夜夜春夜夜爽| 思思久久99热只有频精品66| 欧美亚洲一区二区三区| 777国产偷窥盗摄精品品在线| 一级毛片免费的| 中文精品字幕电影在线播放视频 | 最近中文字幕更新8| 蜜桃导航一精品导航站|