This year saw several presentations on a number of core vulnerabilities in the internet's architecture, which have served to highlight the folly of believing that anything on the internet is secure these days.
Did anyone ever believe that anyway?
Now Dan Kaminsky, who discovered a fundamental flaw in the Domain Name System earlier this year, has written a post on his blog that puts these security vulnerabilities into context – including the Debian Non-Random Number Generator issue, the SNMPv3 bug and the BGP issue. He looks at how some of these vulnerabilities could be combined for effective attacks and also addresses the likelihood that a BGP attack, as demonstrated by Anton Kapela and Alex Pilosov at the DefCon hacker conference earlier this month, could succeed without being observed.
In comparison to the DNS flaw, he writes that "BGP has far fewer potential attackers, fewer necessary defenders, is a much less agile attack, and is way easier to monitor forensically (and indeed, with companies like Renesys, is being monitored forensically). But so what? It can work, and when it does, it can do much of the same damage we were afraid of via DNS."
But more importantly, he provides a much needed overview of what all of these issues are telling us:
(Photo: Quinn Norton)
See also:
- Revealed: The Internet's Biggest Security Hole
- More on BGP Attacks
- Black Hat: DNS Flaw Much Worse Than Previously Reported
- Details of DNS Flaw Leaked; Exploit Expected by End of Today
- Kaminsky on How He Discovered DNS Flaw and More
- DNS Exploit in the Wild – Update: 2nd More Serious Exploit Released
- Experts Accuse Bush administration of Foot-Dragging on DNS Security Hole