[dns-operations] BGP Hijack of Amazon DNS

Jared Mauch jared at puck.nether.net
Fri Apr 27 16:59:47 UTC 2018



> On Apr 27, 2018, at 11:51 AM, Paul Ebersman <list-dns-operations at dragon.net> wrote:
> 
> ebersman> A rather crucial point... If I'm going to cache poison, I'm
> ebersman> going to set really really large TTLs on the bad records.
> 
> tale> Yes and no.
> 
> tale> If I'm doing a well-informed spear phishing attack, I'm going to
> tale> put a really short TTL on address records, so any evidence will
> tale> quickly expire from the cache and likely be much harder or even
> tale> impossible to find elsewhere.
> 
> Fair enough. Depends on the goal of the attack. Though it sounds like
> this wasn't all that well informed, as it required users to be oblivious
> to warnings. Which isn't *always* a given. ;)
> 
> But there are certain attacks where having fake auth servers and cache
> poisoning makes it much more effective and DNSSEC is a good defense
> against cache poisoning.
> 
> Point still is defense in depth isn't a waste of time.

Yup.

I’m surprised they didn’t just use ACME to get a real certificate.

- Jared





More information about the dns-operations mailing list