lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060420020254.3D6F0B65585@gateway.mailvault.com>
Date: Thu Apr 20 04:26:34 2006
From: 123privacy_advisory at mailvault.com (123 Privacy Advisories)
Subject: [123Privacy] Findnot.com DNS Privacy Breach,
	DNS Spoofing Exposure, and ISP Monitoring Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----

Findnot.com DNS Privacy Breach, DNS Spoofing Exposure, and ISP
Monitoring Vulnerability

Advisory ID:	FN15398

Release Date:	2006-04-18

Last Update:	2006-04-18

Severity:	Critical

IMPACT:
	
Website locations visited are viewable by users on local wireless
connection, local network, and ISP. User is exposed to possible
local/ISP DNS spoofing. Internet sites accessed easily monitored by ISP
operating DNS server.

Where:		From localnetwork, and from remote servers.

Solution Status:	Unpatched

Software:	Findnot.com's SSH Proxy Service.

Related Advisories:	FN15294

DESCRIPTION:

Several vulnerabilities have been reported in Findnot.com's SSH Proxy
Service which can cause all DNS requests for lookup of sites visited to
be resolved using local DNS servers.

* Exposing the location of all sites visited to local wireless, network,
sysadmin snoopers or to an ISP that is monitoring their DNS server.

* A local attacker may also spoof a DNS request and send the user to a
site specifically tailored for a hack/phishing attempt.

This vulnerability is caused due to a problem with the SSH Proxy
infrastructure using only a SOCKS server which for most all Internet
applications causes DNS leaks. The issue of SOCKS servers leaking DNS
requests is well known and documented on the net as a Google search for
"socks dns leaks" will reveal.

The vulnerability has been reported by many users of the Findnot.com
system while sniffing their network connections while using the
service.

These vulnerabilities nullify the specifically claimed features of the
service: "Protects you from DNS spoofing", "When on our system, you are
using our secured DNS system" and "Our encryption guards all your data
from the time it leaves your computer until it reaches our server."

VALIDATION:

Load etherape and sniff on your local internet connection interface.
Connect to the Findnot.com SSH Proxy service, configure IE to use the
Proxies. Load up a few Internet Explorer windows. Visit a few websites
you normally visit. Notice your DNS queries are bypassing your encrypted
SSH Proxy connection and traveling directly to your local ISP or gateway
machine revealing what sites you are accessing to the operator of the
DNS server or anyone inbetween that may also be running etherape or
another sniffer.

SUGGESTED SOLUTION:

1) When Findnot.com SSH Proxy service is used, NEVER use an application
directly pointing to the local SOCKS tunnel.
2) Use SOCKSCAP software that supports 'remote dns lookups'.
3) SOCKSIFY all applications you desire to use with the service with the
SOCKSCAP software.

or

Install Privoxy HTTP proxy, chain it to the Findnot.com SSH Proxy SOCKS
connection, and only use applications that support HTTP Proxy and point
them to the Privoxy software.

or

ONLY use Firefox 1.5.0.2, go to about:config and set
network.proxy.socks_remote_dns to true. This method only protects
Firefox from the problem.

Endnote:	Please note that for readability we have adopted a 'Secunia
Advisories' like format but that this is not a Secunia advisory.

-----BEGIN PGP SIGNATURE-----
Version: MailVault 2.2 from MailVault Corporation http://www.mailvault.com

iQA/AwUAREbrhJmYJws4aHIREQIDGgCfWYqm7VUB+XQj8So0HdoADJ/co7YAoJTj
Iv2es2j7tNOh0RB+l2nbyxM8
=3AFN
-----END PGP SIGNATURE-----


PGP Public Key for "123 Privacy Advisories" <123privacy_advisory@...lvault.com>:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: MailVault 2.2 from MailVault Corporation http://www.mailvault.com
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=F3GJ
-----END PGP PUBLIC KEY BLOCK-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ