lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <C06C5416.3051%thor@hammerofgod.com>
Date: Wed, 19 Apr 2006 20:54:46 -0700
From: "Thor (Hammer of God)" <thor@...merofgod.com>
To: "Geo." <geoincidents@....net>,
	Bugtraq <bugtraq@...urityfocus.com>
Subject: Re: [Full-disclosure] Microsoft DNS resolver: deliberately
 sabotagedhosts-file lookup



>> I agree that there should have been better documentation of this, but I
>> think the noted objections are a bit hyperbolic.
> 
> While I don't disagree with what you said, I think there are some things you
> didn't consider.
> 
> First, why is anything besides what is required for windows update being
> bypassed? Why MSN.COM? Why NOT Symantec.com? I mean this looks more like a
> way to keep passport functional than as a way to foil trojans.

Because, as many users choose to use MSN as their portal to the internet via
the MSN browser included in many OEM installations (just like many use AOL.)
Many people log on to email, passport, music purchases, etc via portal on
MSN and MSDN.  It is to keep hosts file entries from taking users to
phishing sites where they may enter credentials that could be stolen.

It's not Microsoft's job to protect Symantec customers.  That's Symantec's
job.  Microsoft is not in control of Symantec assets or hostnames.  They are
in control of Microsoft's assets and hostnames.  It would make no sense to
build in host list exceptions for hostnames you have no control over.  And
we both know that if they DID include other exceptions for assets that they
did not control that everyone with cry foul over that as well, because it's
Microsoft.
 
> Second, why is it that it's darn near impossible to screw with media player
> or Messenger (both are protected by Windows file protection) yet hosts file
> changes don't even popup a dialog box to ask the user if the change is ok? I
> mean this is a really sneaky way of "fixing" things. Also before you say WFP
> or a popup could be disabled by a trojan, so could this fix.

Because "hosts" is a simple text file that is designed to be edited and
maintained by the administrator of the machine.  It's supposed to change.
Wmplayer.exe automatically replaces itself with an authoritative cached copy
to ensure that it is not Trojaned.  It's a good thing.  And so what if a
Trojan could disable it (even though dnsapi.dll is also protected)?? Let
it-- but make it have to do it - more for it to do.  A kernel mode rootkit
could disable everything it wanted to - why not just give up and turn off
your machine?  

This is really simple.  MyDoom altered the hosts file so people couldn't hit
go.microsoft.com, so they added an exception list for their sites.  The
reason it wasn't documented was so that malware authors wouldn't know to
bypass it, but now some do.  Oh well, worked for a while.

> Third, this appears to me to be just more half witted fixes imo. The problem
> is a trojan modifying hosts then fix the problem instead of ignoring hosts.
> Provide a locking mechanism for hosts, remove the trojan, there are a
> hundred ways to fix this that are far more proper ways to do things than
> this.

They do.  There is more information on how to secure a Windows box than
anything else out there.  They give you free malware removal tools.  They'll
be giving you free AV.  They DO all these things, yet people continue to
open .exe's in email attachments.  It's defense in depth.  It's good.

t




Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ