TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Bitsquatting Windows.com

258 pointsby vikrumabout 4 years ago

20 comments

axaxsabout 4 years ago
One rather insidious one I&#x27;d never considered prior was that lowercase n is one bit from &#x27;.&#x27;. So you can also bitsquat on things like, say, wwwngoogle.com or mailngoogle.com.<p>A researcher brought this to my attention years ago with a set of domains in particular I won&#x27;t name. What was most interesting to me is just how frequent bit errors must happen. According to the research, they&#x27;d basically received thousands of emails destined for the correct domain. Really makes you think.
评论 #26341729 未加载
评论 #26344373 未加载
评论 #26340685 未加载
评论 #26373546 未加载
评论 #26350863 未加载
评论 #26343307 未加载
ayabout 4 years ago
DoD address range is not so mysterious: it’s 11.0.0.0&#x2F;8, and it’s not been seen on the internet. So it is extremely tempting to take one’s 10.0.0.0&#x2F;8 and turn it into 10.0.0.0&#x2F;7.<p>I would bet this is what is going on there - a large network who decided to take a shortcut with addressing, no evilz haxxorz.
评论 #26342783 未加载
vermilinguaabout 4 years ago
The buried lede here is what&#x27;s going on with Baidu. Presumably the initial erroneous request was typed into a browser, does Baidu operate a browser in China? Do they operate a portion of the backbone network infrastructure, and are inspecting traffic?<p>If not, how could they possibly have identified this as a target for crawling, unless perhaps they are being fed traffic by the Great Firewall?
评论 #26342840 未加载
评论 #26339414 未加载
评论 #26342023 未加载
评论 #26339889 未加载
评论 #26343748 未加载
knorkerabout 4 years ago
Oh snap, this was news to MSFT? How did they not register bitflips of windows.com and microsoft.com?<p>I think I checked this like 10 years ago, and Google had. (well, except the infinite set of subdomains where a dot and an n are one bit away)<p>And this is why ECC RAM should obviously be the default.
评论 #26373231 未加载
评论 #26342515 未加载
FDSGSGabout 4 years ago
&gt;X-Forwarded-For that attempts to make the request appear as if it originated from an IP belonging to the US Department of Defense.<p>Networking newbies always get spooked by this <a href="https:&#x2F;&#x2F;blog.erratasec.com&#x2F;2013&#x2F;12&#x2F;dod-address-space-its-not-conspiracy.html" rel="nofollow">https:&#x2F;&#x2F;blog.erratasec.com&#x2F;2013&#x2F;12&#x2F;dod-address-space-its-not...</a><p>Hundreds of ISPs out there utilizing DoD space for their internal addresses.
评论 #26341982 未加载
AdamJacobMullerabout 4 years ago
I did this years ago with the DNS name for a large CDN (think akadns.net but it wasn&#x27;t Akamai) and also saw lots of interesting stuff behind it.<p>Its hard (maybe impossible) to identify identify scale, so I don&#x27;t know if it was 1%, .1% or .0001% of traffic, but I was seeing hundreds of requests per second.
评论 #26373241 未加载
mywacadayabout 4 years ago
McAfee is flagging site as follows URL: <a href="https:&#x2F;&#x2F;remyhax.xyz&#x2F;posts&#x2F;bitsquatting-windows&#x2F;" rel="nofollow">https:&#x2F;&#x2F;remyhax.xyz&#x2F;posts&#x2F;bitsquatting-windows&#x2F;</a> URL Categories: Malicious Sites Reputation: High Risk
评论 #26350642 未加载
gsichabout 4 years ago
The NTP conclusion is wrong.<p>chrony also uses randomized transmit timestamps:<p>Transmit Timestamp: Feb 2, 2045 15:47:48.317625828 UTC<p>As per [0] this is a security feature:<p>[0] <a href="https:&#x2F;&#x2F;chrony.tuxfamily.org&#x2F;comparison.html" rel="nofollow">https:&#x2F;&#x2F;chrony.tuxfamily.org&#x2F;comparison.html</a>
viraptorabout 4 years ago
What I&#x27;d love to see is a split by which bit is affected and are any versions more popular in the truly benign cases (like ntp).<p>Although it was confirmed with idle devices that we do see bitflips, I keep wondering if in real world we get more changes due to memory overflows than cosmic rays &#x2F; failed ram refresh.
nneonneoabout 4 years ago
The “US DoD” IP could simply be a mobile network operator’s internal IP address leaking via the XFF header. Mobile network operators are known to use public but unadvertised IP ranges such as 25.0.0.0&#x2F;8 (UK MoD: <a href="https:&#x2F;&#x2F;blog.wireshark.org&#x2F;2010&#x2F;04&#x2F;t-mobile-clever-or-insane&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.wireshark.org&#x2F;2010&#x2F;04&#x2F;t-mobile-clever-or-insane...</a>) for their internal networks in order to avoid clashes with actual private IPs. For example, by using a “public” IP address, any private IP address requests from a client will route through e.g. WiFi instead of through the cell network. It would not surprise me if a Chinese mobile network operator was using chunks of unadvertised US DoD IP address for the same purpose.
nobrainsabout 4 years ago
And how many of these would be typos and not bit flips caused by cosmic rays?
评论 #26344129 未加载
oxymoronabout 4 years ago
Semi-related: I remember a story from HN a few years ago where someone started experiencing crashes and tracked it down to a single flipped bit in memory which went away when he purged his page cache so the binary was reloaded from disk. Does anyone happen to have a link to it?
评论 #26359172 未加载
评论 #26346820 未加载
cmeacham98about 4 years ago
&gt; 199,180 NTP Client connections from 626 unique IP addresses<p>This seems like an abnormally high connections&#x2F;IP, even if we assume some of the IPs represent multiple clients. Perhaps it&#x27;s because of retrying as the author does not seem to have sent NTP replies back?
评论 #26339903 未加载
评论 #26339127 未加载
wooptooabout 4 years ago
Somewhat related: I run an http server on the local network for various services. Due to the large number of bogus requests I set up a honeypot vhost which responds only to requests sent without a Host header, i.e. received directly on the IP address. It also logs these requests separately.<p>It&#x27;s fun to check the logs once in a while and see all sorts of exploit attempts. Wordpress and PHP seem to attract a lot of attention.
评论 #26342223 未加载
评论 #26342179 未加载
djrogersabout 4 years ago
The behavior seen here seems to indicate typos more than bit flipping - ex, look at the NTP requests: it works out to roughly 1 request&#x2F;hr from the ~600 IPs that are hitting them, that&#x27;s not an in-memory bit-flip.
评论 #26345298 未加载
rambojazzabout 4 years ago
Oh goodness! After domain squatting, one more squatting to think about! Do I have to worry about these things? How likely is it that a solar flare modifies a computer memory right when typing a domain?
评论 #26341585 未加载
评论 #26344299 未加载
jyr0sabout 4 years ago
aren&#x27;t Ethernet frames CRC&#x27;d? Are there other checksums down the call stack, or up the stack at the other end, that would reject such bit flips in the raw data?
评论 #26342465 未加载
0898about 4 years ago
Wha? Can somebody explain to a non-programmer now one character can &quot;flip&quot; in a computer and become another one? Is this quite common?
评论 #26343195 未加载
评论 #26343424 未加载
walrus01about 4 years ago
the use of the department of defense IP there is most likely because it&#x27;s a ISP using one of the DoD&#x27;s ipv4 &#x2F;8 blocks internally. There&#x27;s more than a few (and not just all in China) that have done that, in an attempt to shovel back the tide of needing to fully migrate to ipv6, or due to lack of other ipv4 resources for unique customer numbering.
WarOnPrivacyabout 4 years ago
I wish I had kids so geeky that this was a regular bedtime story.