syslog
The scope of security vulnerabilities seems to get bigger every
day. Various Web sites and lists (e.g., SANS Top 20) frequently
identify the most common areas of weakness. These vulnerabilities
include databases, Web servers, wireless networks, misconfiguration
of enterprise services, and (topping the SANS list) the BIND Domain
Name System. (See http://www.sans.org/top20/ for the complete
list of both Unix and Windows vulnerabilities.)
Within these varied topics, the threats range from simple to sophisticated,
and the configuration complexities are infinite. Recently, however,
a specific threat known as "pharming", which exploits weaknesses
in DNS software, has received a lot of media attention.
A pharm attack redirects a user's request for a legitimate URL
to a false Web site set up by the hacker. "Pharming is possible
because all URLs have to be translated into IP addresses, which
is the job of the DNS. A hacker who poisons a DNS server will cause
that server to answer a correct URL request with a phony IP address
and hijack a user's Web interaction, usually for nefarious purposes,"
says Mark Leon in "The Looming Threat of Pharming" for InfoWorld
(http://www.infoworld.com/article/05/06/06/23FEpharm_1.html).
Hacking into a DNS server's cache memory and adding those false
IP addresses is called DNS "cache poisoning." One good way to protect
against such attacks is to make sure you (and your ISP) are running
BIND Version 9. Leon says "the first, best defense is to make sure
you have all the latest DNS software and all security patch updates
in place. The best, most succinct advice: If you're running BIND,
upgrade to Version 9 because it's pretty much impossible to poison
compared with earlier versions."
Another weapon to use against pharming attacks is DNSSEC. According
to Leon's article, "most experts agree that DNSSEC, the DNS security
protocol hammered out by the IETF 10 years ago, would make DNS close
to bulletproof." Implementing DNSSEC, however, is easier said than
done. For a good introduction, see "The Basics of DNSSEC" by Ibrahim
Haddad and David Gordon at OnLAMP.com (http://www.onlamp.com/pub/a/onlamp/2004/10/14/dnssec.html).
For more detailed information about DNSSEC, see http://www.dnssec.net/.
Pharming may be the threat of the week, but the vulnerabilities
that allow such attacks to occur should not be underestimated. Sys
admins need to understand how these various attacks occur and take
steps to eliminate as many weaknesses as possible. This issue of
Sys Admin includes articles on using Nessus and Nmap to conduct
vulnerability assessments and tuning SELinux for your specific security
needs.
Please consider submitting an article detailing your own experiences
solving a tricky problem or implementing a useful tool. We're currently
looking for articles within the topics of Networking, Software Tools,
Open Source, and Security.
Sincerely yours,
Amber Ankerholz
Editor in Chief |