DNS researcher convinces skeptics that bug is serious
'It is way more serious than we had imagined,' says critic after closed briefing
Computerworld - Once-skeptical security researchers now agree that the critical bug in the Internet's Domain Name System (DNS) protocol is the real deal.
Dan Kaminsky, the researcher who uncovered the design flaw in DNS and then led a months-long effort to coordinate the large-scale, multivendor patching that was unveiled Tuesday, acknowledged he had made a mistake in not reaching out to the security research community earlier.
"I screwed up," said Kaminsky, director of penetration testing at Seattle-based IOActive Inc., in an interview Thursday. "I'm the DNS guy in the Black Hat community, so if I'm saying it's bad, then it's bad. It didn't occur to me that people would question it.
"My concern the entire time was that the public would panic, so I was thinking, 'How do we get an orderly patch when this has never happened before?'" Kaminsky said. "I needed the vendors behind me and the DNS community. And I had that in spades."
But what he didn't have was the support of security researchers, including some notable names who, after the Tuesday announcement, were dubious about Kaminsky's claims.
Thomas Ptacek of Matasano Security led the charge, saying that the DNS cache poisoning attack that Kaminsky alluded to was old news. "Saying it here first: doubting there's really any meat to this DNS security announcement," said Ptacek on Tuesday on Twitter.
Dino Dai Zovi, another security researcher -- who is perhaps best known for walking off with a cool $10,000 after hacking a Mac last year in the inaugural "Pwn to Own" contest -- also was skeptical.
In a conference call yesterday that was arranged by security analyst Rich Mogull of Securosis, who Kaminsky had asked to help organize the Tuesday announcement, Kaminsky briefed Ptacek, Dai Zovi and at least one other researcher on the details of his findings.
"I broke a huge rule: I didn't bring in anyone else from the research community," said Kaminsky in explaining why he felt he needed to deviate from his plan to withhold technical details until early next month, when he presents at the Black Hat security conference. "I forgot that, no, you don't get to make a whole bunch of noise without some technical details to back it up," Kaminsky said. "[As] security researchers, we need the ability to call 'bullshit' on people."
Essentially, that's what Ptacek, Dai Zovi and others did. After the conference call, however, both Ptacek and Dai Zovi said they were convinced the DNS flaw was as significant as Kaminsky had promised.
"Dan's got the goods," said Ptacek in an entry on the Matasano blog Wednesday.
"Dan explained the full details and scope of his attack and both of us were impressed and agreed that it is way more serious than we had imagined," said Dai Zovi on his blog. "When the full details of Dan's attack come out, you will most likely be impressed. I definitely was."
- Fight Malware, Malfeasance and Malingering Every year brings more extreme sets of threats than the last. The good news is that there are a range of mitigation options....
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts