## page was renamed from DNS/ManagedDNS/awsdns/darkreading ## page was renamed from DNS/ManagedDNS/awsdns/tweet ## page was copied from DnsTemplate ##master-page:HelpTemplate == awsdns 脆弱性記事 == <> <> blackhat Las Vegasで発表される。資料はいつ公開されるか。 briefings/archives に見えるようになるか。 awsdnsでは任意の名前のゾーンが作れる。それも複数個(異なるNSのもとに) 2012年には親子ゾーンの同居だけが禁止されているようであった。 2016年にOrphaned Domainの名で脆弱性が指摘された。 awsdnsを指すlame delegationが乗取れるとの話である。 [[/forwarder]] が鍵のような気がしている。-- ToshinoriMaeno <> https://blackhat.com/us-21/briefings/schedule/#a-new-class-of-dns-vulnerabilities-affecting-many-dns-as-service-platforms-23563 https://twitter.com/0xdabbad00/status/1408081823968600067?s=20 awsの中のひとのtweet というか、awsからの報告はこれだけ。 {{{ Up until February this year it was possible to register hosted zones on AWS associated with Route53 name servers, allowing you to see DNS queries of other AWS customers. Issue impacts other providers that have not fixed it yet. Found by @shirtamari from http://wiz.io. }}} 他の業者も道連れに。(さくらのときの対応に似ている。) == きっかけのtweet == https://twitter.com/kjhiggins/status/1407818627068350472?s=20 {{{ Researchers executed the so-called DNS Name Server Hijack attack in one simple step while registering a DNS domain. }}} https://heimdalsecurity.com/blog/corporate-and-government-customers-data-exposed-by-dns-vulnerabilities/ == なにが起きたのか。 == 参照されるはずのないゾーンが参照された。(awsで使われているリゾルバーについての動作らしい。) 共用DNSゾーンサービスでの脆弱性というよりは「awsで提供されるリゾルバーの管理不良」ではないか。 https://twitter.com/Tekneek/status/1407829571538505729?s=20 awsの提供するリゾルバーに問題があると考える。 Blackhat Las Vegasでの発表で分かるかも。-- ToshinoriMaeno <> ---- https://www.darkreading.com/vulnerabilities---threats/new-dns-name-server-hijack-attack-exposes-businesses-government-agencies/d/d-id/1341377?utm_content=170954766&utm_medium=social&utm_source=twitter&hss_channel=tw-2572020625 一読しただけでは、なにを言っているのかわからない状態。徐々に見えてきた。 なぜ、参照してはいけないゾーンを参照するリゾルバーが存在したのかは、説明されていない。(伏せたのか) -- ToshinoriMaeno <> == DarkReading == {{{ 6/23/2021 03:37 PM Kelly Jackson Higgins New DNS Name Server Hijack Attack Exposes Businesses, Government Agencies Researchers found a "novel" class of DNS vulnerabilities in AWS Route53 and other DNS-as-a-service offerings that leak sensitive information on corporate and government customers, with one simple registration step. }}} {{{ Cloud security researchers from Wiz.io were poking around at Amazon Web Services' Route53 Domain Name Service (DNS) earlier this year when they suddenly realized that its self-service domain registration system let them set up a new hosted zone with the same name as the real AWS name server it was using. }}} awsdnsでは任意のドメイン名でゾーンが作れる。(一部、制限がある。) この部分は鍵ではあるが、自明だった。 awsdns で使われているNS名と同じドメイン名でゾーンを作成できたということだ。 そして、ns-852.awsdns-42.net のIPアドレスを自分の管理下のサーバーにした。 net レジストリの欠陥とは関係なし。 {{{ In theory, if you register a name server name … it shouldn’t have any impact. }}} このゾーン、レコードが参照されなければ、問題はないはずだったが、... == from other AWS clients’ networks == 問題はそのあとにある。 -- ToshinoriMaeno <> 驚いたことには多くのqueryが流れてきたこと、とある。 なにが起きたのか。 awsdns系の問題だ。 aws系のホストからだけだということで、awsが提供しているリゾルバーを疑う。 でも、リゾルバーにしては、問い合わせ元が多すぎる。 {{{ Within seconds, they watched in shock as their phony name server got flooded with DNS queries from other AWS customers' networks: external and internal IP addresses, computer names for finance, human resources, production servers, and organization names. }}} aws 界のリゾルバーが腐っていることはあり得るが、数が多すぎる。 aws提供のリゾルバーだけではないのか。なぜこれらが間違ったIPアドレスにqueryを送るのか。 それよりはawsdns管理下のホストが、なにを参照しているかが問題か。-- ToshinoriMaeno <> {{{ All told, they got traffic from more than 15,000 different AWS customers and a million endpoint devices, all after registering a phony AWS name server as ns-852.awsdns-42.net, the same name as an actual AWS name server. }}} "We were trying figure out how break DNS and we had no idea what traffic we were getting" at first, says Ami Luttwak, co-founder and CTO of Wiz.io as well as a former member of Microsoft's cloud security team. "In theory, if you register a name server name ... it shouldn't have any impact." こんなことが起きるとは思っていなかったのだから、驚いただろう。 {{{ DNS services such as AWS Route53 let customers update their domain name and the name server to which their domains point for DNS queries. The researchers say they just created a new hosted zone inside ns-852.awsdns-42.net with the same moniker and pointed it to their IP address. }}} {{{ Then they received DNS queries from Route53 customers' devices to their rogue and same-named server. }}} この部分が問題なのだ。-- ToshinoriMaeno <> == 見えたもの == どこからのqueryかを追跡した。(当然) The researchers were able to use that traffic to gather a treasure trove of information on Fortune 500 firms including a commodities-trading firm, 45 US government agencies, and 85 government agencies overseas. They gleaned from that traffic data details such as the physical locations of offices and employees at some of the organizations. "We understood then that we were on top of an unbelievable set of intelligence, just by tapping for a few hours into a small portion of the network," Luttwak says. "I called it a nation-state intelligence capability using a simple domain registration." The researchers were, for instance, able to use the DNS query data to drill down into office locations and numbers of employees at the trading firm as well as that of a large credit union subsidiary with a branch office in Iran, and other organizations. == fix ? == AWS fixed the hole in mid-February, shortly after the researchers alerted it back in January, but at least two other providers the researchers contacted about the flaw have not yet fixed it in their DNS services. An AWS spokesperson did not provide any details but confirmed that Route53 "is not affected by this issue," adding that the service "prevents the creation of Hosted Zones for DNS names associated to Route53 name servers." {{{ All it took to close the vulnerability in AWS Route53 was placing the official AWS name-server name on a so-called "ignore" list, explains Shir Tamari, head of Wiz.io's security research team. "The problem was anyone could register the official name servers on the platform, so they put the list of their name servers on an 'ignore' list so" attackers can't register them anymore. "It was a very quick and efficient fix," Tamari adds. }}} この修正は目先の脆弱性を塞ぐが、それで十分だろうか。 まともな対応になっていない。場当たり的修正だ。-- ToshinoriMaeno <> Two other DNS-as-a-service providers harbor the vulnerability - which is basically an implementation flaw, according to the researchers. The Wiz.io team has alerted the affected vendors but would not disclose their names since the issues have not yet been fixed. {{{ Luttwak and Tamari will present their findings in August at Black Hat USA in Las Vegas. }}} == "O.G." DNS Meets DNSaaS == The attack takes advantage of a gray area in the DNS infrastructure: an unintended and unexpected consequence of the combination of traditional, old-school DNS technology on some Windows machines and today's cloud DNS service features. Traditional DNS client software is old — some of which was written 20 years ago — and not built for cloud-based enterprise infrastructures, but instead for trusted internal enterprise domains. Endpoints reveal sensitive information when they query the DNS server, the researchers say, and much of this is a result of the complexity of DNS itself. "DNS clients perform non-standard queries, and DNS providers allow customers to enter their own DNS zones in their server," which creates a risky combination, Luttwak says. The clients reveal details via their Dynamic DNS updates that would be fine in an internal DNS infrastructure environment but when operating within a cloud-based DNS service could leak to other customers of that service provider. "So, when an endpoint working from home … is no longer using an [internal] DNS resolver and is accessing the network from their DNS server," it updated the researchers' rogue name server instead of its own, he explains. "It's a combination of the new world where you are able to do registration of shared domains, and in all of the algorithms put into Windows 20 years ago that [use] logic built for when there was no Internet problem — that wasn't for shared DNS servers. So, the endpoints register their locations with the" cloud-based name servers, he says. There's also the IPv6 factor: The researchers found some devices using the newer version of the Internet Protocol (IP) were exposed and thus accessible to an attacker. "Out of the millions of endpoints that sent us Dynamic DNS data, we noticed that internal IPv6 endpoints are accessible," notes Tamari. For that reason, users working from home or outside the office and running on IPv6 risk exposing their devices to the Internet. Tamari says the researchers found that some 6% of IPv6 devices are exposed via HTTP, RDP (Remote Desktop Protocol), and SMB, for example. The researchers say they can't confirm whether any attackers have employed this weakness in the DNS, but they are sounding the alarm that it could also exist in other DNS providers' services. "It's important for all DNS providers" to ensure they're not leaving their customers exposed via this vulnerable DNS setup, Luttwak says. The vuln is different from other flaws the research team has seen in cloud services. It's not a classic software bug: "The logic flows lead to unexpected results," he says. "They are hard to find, these new types of vulnerabilities. It's in the logic of how you build the [DNS] service." DNS providers should use the DNS RFC's specifications for reserved domain names, validate domains, and verify ownership of domains, the researchers note. == Defending Your DNS == Organizations also have options for protecting their DNS traffic from DNS hijacking: "There are specific things organizations can do to ensure that DynamicDNS doesn't go to a malicious server," Tamari says, such as firewalls, and tools that monitor DNS traffic to and from endpoints. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio }}} == history == {{{ }}} ---- CategoryDns CategoryWatch CategoryTemplate