02.11.2014 Views

untangling_the_web

untangling_the_web

untangling_the_web

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DID: 4046925<br />

UNCLASSIFIEDJJr;OR or;r;ICI,o,b US!! ONb¥<br />

ownership of panix.com was moved to a company in Australia, <strong>the</strong> actual ONS<br />

records were moved to a company in <strong>the</strong> United Kingdom, and Panix.com's mail has<br />

been redirected to yet ano<strong>the</strong>r company in Canada." How was this accomplished?<br />

According to Ed Ravin, systems administrator at Panix, "Our registrar, Ootster, told<br />

us that according to <strong>the</strong>ir system, <strong>the</strong> domain had not been transferred, even though<br />

<strong>the</strong> global registry was pointing at Melbourne IT. Something went wrong with <strong>the</strong><br />

Internet registry system at <strong>the</strong> highest levels." This particular pharming attack<br />

involved a domain hijack, but it's not <strong>the</strong> latest type of possible pharming attack.<br />

The newest browser vulnerability could enable even more sinister and harder to<br />

detect pharming attacks primarily because it is not a true vulnerability but ra<strong>the</strong>r<br />

simply an unintended side effect of a new browser feature designed to implement<br />

International Domain Names (ION).<br />

This pharming attack does not involve a domain hijack. Ra<strong>the</strong>r, it is a spoofing attack<br />

that works by displaying fake addresses (uris) in <strong>the</strong> browser's address bar, <strong>the</strong><br />

status bar, <strong>the</strong> hyperlinks, and even in <strong>the</strong> SSL Certificate. It is almost impossible to<br />

detect with <strong>the</strong> naked eye. The problem stems from <strong>the</strong> implementation of ION, <strong>the</strong><br />

standard that allows users to register domain names in different languages and<br />

different encodings. The flaw was first reported at ShmooCon, a hacking/computer<br />

security convention held in Washington, D.C., in January 2005. The Shmoo Group<br />

issued an advisory along with a demonstration of <strong>the</strong> attack using <strong>the</strong> domain for<br />

PayPal, in which <strong>the</strong>y substituted an alternate Unicode character for <strong>the</strong> first "a." The<br />

address looks like <strong>the</strong> real PayPal url-http://www.paypal.com-but with a slightly<br />

smaller "a." With <strong>the</strong> implementation of ION, <strong>the</strong>re are now a huge number of ways<br />

to display domain names, many of which look very much like <strong>the</strong> original Latin<br />

character set.<br />

The vulnerability affects IE7 (but not IE6 because ION was not implemented before<br />

version 7). Firefox 1.0.6, Firefox 1.5 beta, Netscape 8.0.3.3, and Mozilla 1.7.11. The<br />

Firefox 1.5 release of November 2005 corrected <strong>the</strong> problem, so be sure you are<br />

using version 1.5 or later if you use Firefox. Previous versions of <strong>the</strong>se browsers<br />

may also be affected. Mozilla released a self-installing patch that disables <strong>the</strong><br />

International Domain Name (ION) processing that makes <strong>the</strong> vulnerability possible.<br />

Mozilla 1.7.12<br />

Firefox<br />

http://www.mozilla.org/products/mozilla1.x/<br />

http://www.mozilla.com/firefox/<br />

"The State of Homograph Attacks," by Eric Johanson, The Shmoo Group, 31 Jan<br />

2005 http://www.shmoo.com/idn/homograph.txt<br />

Secunia's Multiple Browsers ION Spoofing Test<br />

http://secunia.com/multiple browsers idn spoofing test!<br />

If you use a Mozilla-based browser or simply don't want to install <strong>the</strong> patch, <strong>the</strong>re is<br />

a very simple workaround that negates <strong>the</strong> vulnerability:<br />

556 UNCLASSIFIEDHFOR OFFIOIAL USE ONLY

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!