LISTSERV mailing list manager LISTSERV 16.5

Help for AFRIK-IT Archives


AFRIK-IT Archives

AFRIK-IT Archives


AFRIK-IT@LISTSERV.HEANET.IE


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

AFRIK-IT Home

AFRIK-IT Home

AFRIK-IT  January 1999

AFRIK-IT January 1999

Subject:

DNS spoofing

From:

David Lush <[log in to unmask]>

Reply-To:

African Network of IT Experts and Professionals (ANITEP) List

Date:

Thu, 14 Jan 1999 21:37:20 +0200

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (84 lines)

>X-From_: [log in to unmask] Wed Jan 13 22:12:40 1999
>Envelope-to: [log in to unmask]
>Date: Wed, 13 Jan 1999 15:36:25 -0500
>To: [log in to unmask]
>From: [log in to unmask]
>Subject: File 'jan99/pr001321.txt' from NEWSdesk
>Reply-To: [log in to unmask]
>
>HdomoReply
>
>A Serious Threat to the Internet Community: One in Every Three On-line
>Organizations Risks Un-Authorized Parties Gaining Access to Their Outgoing
>Email, According to Men & Mice
>
>REYKJAVIK, Iceland, Jan. 5 /PRNewswire/NEWSdesk -- Software developer Men
>& Mice
>discovered, while testing the latest version of DNS Expert, its DNS (Domain
>Name Server) analysis tool, that approximately one in every three on-line
>organizations is vulnerable to a serious Internet security problem called DNS
>spoofing.  These organizations run the risk of un-authorized parties gaining
>access to their outgoing e-mail or their employees being directed to Internet
>sites run by hackers.
>    Says Cricket Liu, DNS consultant and co-author of the books "DNS & BIND"
>and "DNS on Windows NT":  "DNS spoofing is a very real threat to the integrity
>of activity on the Internet, whether commercial or casual.  A successful
>spoofing attack could cause significant damage to an organization's
>reputation, to its customers and correspondents.  It's almost a wonder that we
>haven't seen more such attacks on the network."
>    Most top-level business managers are not aware of the financial and
>security risks associated with DNS spoofing.  The good news is that this
>security problem can easily be diagnosed and solved.  Information on tools to
>diagnose the problem and some available solutions may be found at
>http://www.menandmice.com.
>
>    What is DNS spoofing?
>    DNS spoofing is a term used when a DNS server accepts and uses incorrect
>information from a host that has no authority supplying that information.
>Spoofing attacks can cause serious security problems for companies vulnerable
>to such attacks, for example causing e-mails to be routed to non-authorized
>mail servers, or users to be directed to wrong Internet sites.  "To picture
>the potential damage," Cricket Liu points out, "envision visiting your bank's
>web site  to transfer funds from one account to another.  Unfortunately, the
>web site seems to be having problems: After entering your account information
>and PIN, you still can't access your account data.  The web site reports a
>'temporary failure' and invites you to try again later.  What you don't
>realize is that the web site you see is actually a near-exact replica of your
>bank's web site -- startlingly easy to create -- and that you've just sent
>your account number and PIN to hackers in another part of the world.  Though
>you entered the correct URL, your local name server had been spoofed into
>believing that the bank's domain name corresponded to the address of a web
>server run by hackers."
>
>    What can be done?
>    In order to prevent many sources of Internet attacks, it is necessary to
>have the security built into the DNS systems.  It is a misconception that
>firewalls prevent such attacks.  To minimize the risk of a spoofing attack,
>every organization or individual responsible for a domain should first check
>which type of name server they are using and consult with its developer
>whether it is secure against DNS spoofing or not.  It is also important to
>find out whether cooperating parties are using spoofable name servers in order
>to prevent important incoming email being transferred to un-authorized
>parties.
>    The latest version of DNS Expert (v.1.3) can be used to check the
>vulnerability of all types of DNS servers to DNS spoofing and other DNS
>problems.  Besides, it is convenient to use DNS Expert 1.3 to test the
>security status of cooperating parties.
>    Cricket Liu, at Acme Byte & Wire, has also provided guidelines on how to
>solve the spoofing problem for BIND and the Microsoft DNS Server in his
>presentation "Securing Your Name Server" which can be found at
>http://www.acmebw.com/securing/index.htm.
>    Further information is also available at  http://www.menandmice.com.
>
>    About Men & Mice
>    Men & Mice, headquartered in Reykjavik, Iceland, is a leading developer of
>DNS software.  The company is committed to the development of new innovative
>DNS and Internet related software for Windows and Mac OS.
>

David Lush
Freelance Journalist
PO Box 8828, Bachbrecht, Windhoek, Namibia
Tel. +264 61 252946
e-mail: [log in to unmask]

Top of Message | Previous Page | Permalink

Advanced Options


Options

Log In

Log In

Get Password

Get Password


Search Archives

Search Archives


Subscribe or Unsubscribe

Subscribe or Unsubscribe


Archives

January 2012
December 2011
November 2011
March 2011
February 2011
January 2011
September 2010
June 2010
May 2010
April 2010
March 2010
February 2010
October 2009
September 2009
July 2009
June 2009
March 2009
February 2009
January 2009
November 2008
October 2008
August 2008
July 2008
April 2008
March 2008
November 2007
August 2007
July 2007
February 2007
January 2007
December 2006
November 2006
October 2006
September 2006
August 2006
July 2006
June 2006
May 2006
April 2006
March 2006
February 2006
January 2006
November 2005
October 2005
August 2005
July 2005
June 2005
May 2005
April 2005
March 2005
February 2005
December 2004
November 2004
October 2004
September 2004
August 2004
July 2004
June 2004
May 2004
April 2004
March 2004
February 2004
January 2004
December 2003
November 2003
September 2003
August 2003
July 2003
June 2003
May 2003
April 2003
March 2003
February 2003
January 2003
December 2002
November 2002
October 2002
September 2002
August 2002
July 2002
June 2002
May 2002
April 2002
March 2002
February 2002
January 2002
December 2001
November 2001
October 2001
September 2001
August 2001
July 2001
June 2001
May 2001
April 2001
March 2001
February 2001
January 2001
December 2000
November 2000
October 2000
September 2000
August 2000
July 2000
June 2000
May 2000
April 2000
March 2000
February 2000
January 2000
December 1999
November 1999
October 1999
September 1999
August 1999
July 1999
June 1999
May 1999
April 1999
March 1999
February 1999
January 1999
December 1998
November 1998
October 1998
September 1998
August 1998
July 1998
June 1998
May 1998
April 1998
March 1998
February 1998
January 1998
December 1997
November 1997
October 1997
September 1997
August 1997
July 1997
June 1997
May 1997
April 1997
March 1997
February 1997
January 1997
December 1996
November 1996
October 1996
September 1996
August 1996
July 1996
June 1996
May 1996
April 1996
March 1996
February 1996
January 1996
December 1995
November 1995
October 1995
September 1995
August 1995
July 1995
June 1995
May 1995

ATOM RSS1 RSS2



LISTSERV.HEANET.IE

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager