19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threats Catalogue Deliberate Acts Remarks<br />

____________________________________________________________________ .........................................<br />

T 5.78 DNS spoofing<br />

To be able to communicate with another computer in the Internet, one needs to<br />

know its IP address. This address consists of 4 sets of numbers between 0 and<br />

255, e.g. 194.95.176.226. As such numbers are not very easy to memorise,<br />

almost all IP addresses are assigned names. This method is termed DNS<br />

(Domain Name System). Consequently, the WWW server of the BSI can be<br />

addressed under http://www.bsi.bund.de as well as http://194.95.176.226,<br />

because the name is converted into the IP address during polling.<br />

<strong>The</strong> databases in which computer names are assigned IP addresses, and vice<br />

versa, are located on name servers. Two databases are available for allocation<br />

of names to IP addresses. <strong>The</strong> first database allocates IP addresses to names,<br />

while the second database allocates names to IP addresses. <strong>The</strong>se databases<br />

need not be mutually consistent! DNS spoofing is said to occur when an<br />

intruder becomes successful in forging an allocation between a computer<br />

name and an IP address, i.e. assigning a name to a false address, or vice versa.<br />

This allows the following types of intrusion:<br />

- r-services (rsh, rlogin, rsh)<br />

<strong>The</strong>se services allow authentication on the basis of client names. <strong>The</strong><br />

server knows the IP address of the client and requests its name via the<br />

DNS.<br />

- Web spoofing<br />

An intruder could assign the address www.bsi.bund.de to a wrong<br />

computer, which would then be addressed each time<br />

http://www.bsi.bund.de is entered.<br />

<strong>The</strong> ease with which DNS spoofing can be performed depends on how the<br />

attacked network has been configured. As no computer can hold all the DNS<br />

information existing in the world, it always has to rely on information from<br />

other computers. To reduce the volume of DNS requests, most name servers<br />

temporarily store information which they have received from other name<br />

servers.<br />

Once someone has infiltrated a name server, they are also able to modify the<br />

information it holds. Direct intrusion into a name server is not considered<br />

further here. Instead, the principal shortcomings of DNS are mentioned.<br />

<strong>The</strong> two examples below are intended to describe different techniques of DNS<br />

spoofing.<br />

1. A user on the computer named pc.customer.de first intends to access<br />

www.company-x.de and then the competitor's server www.company-y.de.<br />

To allow access to www.company-x.de, the corresponding IP address needs<br />

to be requested from the name server ns.customer.de. This server does not<br />

know the address either, and then requests it from the name server of<br />

ns.company-x.de. This server returns the IP address, which is forwarded by<br />

ns.customer.de to the user and stored. If, in addition to the IP address of<br />

www.company-x.de, the response from ns.company-x.de also contains any<br />

other IP address for the computer name www.company-y.de, it is also<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!