pwshub.com

Rogue WHOIS server gives researcher superpowers no one should ever have

WHEN ABANDONED INFRASTRUCTURE LIVES ON —

.mobi top-level-domain managers changed the location of its WHOIS server. No one got the memo.

Rogue WHOIS server gives researcher superpowers no one should ever have

Aurich Lawson | Getty Images

It’s not every day that a security researcher acquires the ability to generate counterfeit HTTPS certificates, track email activity, and execute code of his choice on thousands of servers—all in a single blow that cost only $20 and a few minutes to land. But that’s exactly what happened recently to Benjamin Harris.

Harris, the CEO and founder of security firm watchTowr, did all of this by registering the domain dotmobilregistry.net. The domain was once the official home of the authoritative WHOIS server for .mobi, a top-level domain used to indicate that a website is optimized for mobile devices. At some point—it’s not clear precisely when—this WHOIS server, which acts as the official directory for every domain ending in .mobi, was relocated, from whois.dotmobiregistry.net to whois.nic.mobi. While retreating to his Las Vegas hotel room during last month’s Black Hat security conference in Las Vegas, Harris noticed that the previous dotmobiregistry.net owners had allowed the domain to expire. He then scooped it up and set up his own .mobi WHOIS server there.

Misplaced trust

To Harris’s surprise, his server received queries from slightly more than 76,000 unique IP addresses within a few hours of setting it up. Over five days, it received roughly 2.5 million queries from about 135,000 unique systems. The entities behind the systems querying his deprecated domain included a who’s who of Internet heavyweights comprising domain registrars, providers of online security tools, governments from the US and around the world, universities, and certificate authorities, the entities that issue browser-trusted TLS certificates that make HTTPS work.

“watchTowr’s research has demonstrated that trust placed in this process by governments and authorities worldwide should be considered misplaced at this stage, in [our] opinion,” Harris wrote in a post documenting his research. “watchTowr continues to hold concern around the basic reality: watchTowr found this on a whim in a hotel room while escaping the Vegas heat surrounding Black Hat, while well-resourced and focused nation-states look for loopholes like this every day. In watchTowr’s opinion, they are not likely to be the last to find inexcusable flaws in such a crucial process.”

WHOIS has played a key role in Internet governance since its earliest days, back when it was still called the ARPANET. Elizabeth Feinler, an information scientist working for the Augmentation Research Center, became the principal investigator for NIC, short for the Network Information Center project, in 1974. Under Feinler’s watch, NIC developed the top-level domain naming system and the official host table and published the ARPANET Directory, which acted as a directory of phone numbers and email addresses of all network users. Eventually, the directory evolved into the WHOIS system, a query-based server that provided a comprehensive list of all Internet host names and the entities that had registered them.

Despite its antiquated look and feel, WHOIS today remains an essential resource with tremendous consequences. Lawyers pursuing copyright or defamation claims use it to determine the owner of a domain or IP address. Spam services depend on it to determine the true owner of email servers. Certificate authorities rely on it to determine the official administrative email address of a domain. The list goes on.

Page: 1 2 3 Next →

Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Dan is based in San Francisco. Follow him at @dangoodin on Mastodon.

Source: arstechnica.com

Related stories
1 month ago - Plus: Three-year-old ProxyLogon flaw added to CISA's exploited bugs list Microsoft says it's investigating issues with a patch intended to plug a two-year-old flaw in the GRUB open source boot loader that is crashing some dual-boot...
1 week ago - Peer says government needs to learn lessons from Post Office scandal The UK Parliament's second chamber is set to launch a bill designed to regulate the use of algorithms and automated decision-making by public bodies.…
1 month ago - While the broadband options in Baton Rouge are a bit limited, we've found the top internet service providers with the fastest speeds and cheapest prices for your home.
2 weeks ago - NASA estimates that trillions of rogue planets could be hidden within a single galaxy, including our own Milky Way. A team of researchers at Johns Hopkins University recently discovered six new wandering worlds by focusing the powerful...
1 week ago - The excellent Rogue One famously used CGI to recreate Grand Moff Tarkin. Horror legend Peter Cushing, who played the character in 1977's Star Wars: Episode IV – A New Hope, died in 1994 aged 81.Read Entire Article
Other stories
11 minutes ago - Santa Ana doesn't have a lot of internet providers, but most areas can still get fast internet speeds with fiber connections available.
1 hour ago - Here's today's Connections answer and hints for groups. These clues will help you solve New York Times' popular puzzle game, Connections, every day!
1 hour ago - Here's today's Wordle answer, plus a look at spoiler-free hints and past solutions. These clues will help you solve New York Times' popular puzzle game, Wordle, every day!
1 hour ago - Here's today's Strands answers and hints. These clues will help you solve The New York Times' popular puzzle game, Strands, every day.
1 hour ago - There aren't many providers in the City of 100 Lakes, but most households can get service through Spectrum, Frontier or T-Mobile. Let's dive in.