Now I am not one to panic about malware on the web. I have always prided myself on smart & safe browsing. But when I first heard about the new DNS Poisoning problem on the Nosillacast podcast a couple of weeks ago, it scared me. This could be a problem affecting everyone, no matter what safety precautions they take while surfing the Internet.
The subject is so complicated, and I won’t pretend to understand it fully, but I think I understand it enough to explain the situation to my family and friends, which is what I am trying to do with this blog article.
Okay, bottom line is there is a type of flaw that can be exploited by the bad guys, which enables them hijack vulnerable unpatched systems at your Internet Service Provider (Comcast for example) and change the path of traffic to their own web pages. So, if you are trying to go to amazon.com, your browser address bar will display “http://www.amazon.com” but you might be redirected to the hijacker’s site who has created a web site that looks very similar to Amazon. From there, it could be possible to install malware to your computer or to trick you into giving your personal info like credit cards or passwords.
This vulnerability can also affect your email, which is even scarier. A bad guy could intercept your email message(s) and insert a malware attachment or web site link. And you wouldn’t even know it was happening.
The Security Now podcast lists several links to sites that will “test” your site for the vulnerability:
http://www.grc.com/sn/notes-155.htm
I ran the test @ DoxPara and the following message appeared:
“Your ISP’s name server, xxxxx, has other protections above and beyond port randomization against the recently discovered DNS flaws. There is no reason to be concerned about the results seen below.”
I have heard that similar messages are appearing for other Comcast users. Since the information I am finding online concerning Comcast is vague and unclear, I am not 100% sure I trust Comcast to deal with this. So, I am taking matters into my own hands until I am sure.
I have read that other ISPs like Time Warner and AT&T have NOT patched, so there are still a lot of people out there that are in trouble!
The good news is, you can bypass your ISP’s DNS computers, and use another. Open DNS is a very secure and highly recommended DNS server that offers use of its servers for FREE! All you need to do is change a couple of settings in your router.
Not using a router? If your computer is attached directly to a high speed modem (ie DSL, Cable, satellite) then you are highly vulnerable to this flaw, as well as many other attacks.
Using a router keeps you safe behind a “hardware” firewall, and that firewall can thwart most attacks…so do yourself a favor and head to Staples, Walmart, Target, or Amazon and buy a Linksys, Netgear, or DLink router. It is an absolutely necessary tool in today’s times!
It is very easy to change your router settings to use Open DNS servers instead of your ISP’s.
Note: Don’t worry, you aren’t changing to a new Internet Service Provider, you will still be using the same ISP, it’s just the DNS computer information that you are changing.
There are detailed instructions on the Open DNS site, but I will walk through the instructions for changing a Linksys router.
First you need to access your router’s settings. Linksys router users can use this link: http://192.168.1.1/.
A password window will appear. The user name is “admin” and unless you previously changed the access password, the default password will be “admin”.
Important note: in the router settings, your password should be changed for extra security. To learn more about configuring your router for better security, please read my prior article.
Once you have logged into your router, you should be on the “Setup” page/tab.
Toward the bottom of the page, there is a setting called “Network Address
Server Settings (DHCP)”. Locate “Static DNS 1” and “Static DNS 2” and type in Open DNS’s server numbers, which are:
208.67.222.222 and 208.67.220.220
NOTE: If you have current DNS settings, then write them down just in case you need to revert back.
Once the new DNS numbers have been entered, click the “Save Settings” button. And that is it!
Okay, next, a word or two about Open DNS. Besides free use of their DNS servers, they also offer all sorts of parental controls and other security. I haven’t really delved into their offerings, but from what I gather, it’s all free. How can all this be free? Well to offset their costs, they have advertising revenues. Keep in mind, that whenever you type in a wrong address into your browser, Open DNS will take you to a custom search page, usually with your corrected web site URL on top.
For instance, if you type “ebay” instead of “ebay.com”, your browser will take you to a search page for “ebay”. Some have complained that this isn’t fair, wah wah wah…but who cares. They have to make money somehow. I don’t mind that they make a little on searches.
To learn more about Open DNS and all their offerings, check out the Typical Mac User podcast for a special 3 part series on all the details.
Besides your ISP computers, personal home computers, as well as business computers also need to be patched.
As far as I can tell, Microsoft issued a security patch a week or two ago, so make sure you are 100% up to date with all your Vista or XP critical patches.
As for Mac users, there was a patch issued, but it looks like it doesn’t fix everything, so when I am out from behind my router, I think I am still vulnerable if I connect to an open wifi spot. I am still a bit foggy on that issue, so more research is needed.
Since I am still learning about this vulnerability, I still have additional questions that I haven’t found answers to.
For example, are cell phones that connect to the Internet still vulnerable? What about if you use a VPN (virtual private network)? What about web based email like gmail?
There is also a problem with routers being vulnerable too, but the issue isn’t as dire, because they would only be attacking your small network. Initially, I think routers will be okay, and the bigger networks like ISPs will be attacked first. I would like to find out more about the router issues, and whether firmware patches will be issued.
Hopefully I can find the answers online soon.
Helpful sites if you want to learn more about the DNS Flaw:
Thank you for producing such a simple to understand article on the DNS vulnerability and explaining how easy it is to protect our systems from attack.
Comment by Jane on August 11th, 2008Thanks Jane.
It is such a scary situation. I am still trying to get it all sorted out. I have the Nosillacast set up as my next podcast to listen to tomorrow on the way to work.
I will probably update this again, once I get it straight in my head.
I guess you also need to change the DNS settings in your computer as well.
http://news.cnet.com/8301-13554_3-10000341-33.html
Even dialup people are vulnerable I think.
And I have a help-email sent into my VPN provider to ask about their security.
So many things to think about. I am glad you stopped by!
Comment by debbie T on August 11th, 2008