So you point your nameservers at a third party, let your account with that third party expire, then someone later on can create an account at third party and resume control of the DNS zone? I mean yeah, but you mustn't care much about the domain and any credibility it has will evaporate quickly.
From TFA:<p><i>> There is a frequently updated list published on GitHub called “Can I take over DNS,” which has been documenting exploitability by DNS provider over the past several years.</i><p><a href="https://github.com/indianajson/can-i-take-over-dns">https://github.com/indianajson/can-i-take-over-dns</a><p>Whoa, names like Digital Ocean, Google Cloud, Linode, Hurricane Electric - all classified as fully vulnerable.
UK.GOV has a good guide on "Keeping your domain name secure."
<a href="https://www.gov.uk/guidance/keeping-your-domain-name-secure" rel="nofollow">https://www.gov.uk/guidance/keeping-your-domain-name-secure</a>
This is how I understand the exploit, can someone please confirm if I have the right idea?<p>1. I register a domain name -- example.com -- with a registrar like NameCheap. They tell Network Solutions (the .com registry) to add records on my behalf like below, which means the rest of the internet asks NameCheap's nameservers when they want to look up my domain.<p><pre><code> example.com. 172800 IN NS ns1.namecheaphosting.com
example.com. 172800 IN NS ns2.namecheaphosting.com
</code></pre>
2. For no reason, I ask NameCheap to change those NS records to another company's nameservers, such as Hurricane Electric, <i>which I am NOT a customer of</i><p><pre><code> example.com. 172800 IN NS ns1.he.net
example.com. 172800 IN NS ns2.he.net
</code></pre>
3. Hurricane Electric (HE) are "exploitable"; one of their customers claims to be tranferring a domain to HE, example.com (my domain!), HE doesn't verify the actual ownership and they let it happen.<p>4. Now this HE customer has control over my domain... because <i>I</i> told my registrar to change the NS records to HE's nameservers. Why would I ever do that?<p>My understanding is this should never happen, I have no reason why I'd want to make such a change. ICANN have a policy on domain transfer between registrars: <a href="https://www.icann.org/resources/pages/transfer-policy-2016-06-01-en" rel="nofollow">https://www.icann.org/resources/pages/transfer-policy-2016-0...</a> -- and transferring a domain should <i>only</i> be done with the gaining registrar (HE in my example) putting an explicit request to the losing registar (NameCheap in my example), and the losing registrar getting to decide yes or no to the transfer.<p>So... how are there a million or more domains at risk this way? Is it old practises that haven't been corrected? How would this work?
Part of this problem is authoritative dns server operators not sharding their zones.<p>The only provider I know who does this correctly is AWS Route 53. Your zone gets assigned 4 unique authoritative servers from a set of namespaced shards.
eg ns-2048.awsdns-64.com<p>Someone else can create a zone for the same domain but will map to different shard so no real world effect.<p>Always surprising to me that hardly any providers do it.
I've just launched a DNS hosting provider ( <a href="https://www.ptrdns.net" rel="nofollow">https://www.ptrdns.net</a> ) and this is one of the problems I'm worried about. With the PowerDNS backend I'm using, once a zone is added PowerDNS will respond to queries for its record regardless of the nameserver the queries are sent to. One can, for example, query the IP address of the nameserver to get a response.<p>The Route 53 technique of assigning random server names looks a bit like the technique of creating virtual hosts in a nginx server, but it looks like this is a custom AWS implementation and not something that comes out of the box in any DNS server software I know.
Somewhat related question: I have a (obscure) domain that I'm planning to let expire soon. Is there anything I could / should do to stop it being used for questionable purposes?
What happens if you set your name servers to e.g. Digital Ocean then go to Digital Ocean and try to add your domain name there but you find that an attacker has already created that domain name under their account? They were watching the name server records on your domain.
From TFA:<p>> DNSMadeEasy founder and senior vice president Steve Job<p>That name surprised me. I thought it couldn't possibly be real. I looked it up and apparently that's actually his name; presumably no relation to the plural one who ran Apple. Most articles seem to write his first name with an N to make it more believable.
The Gell-Mann Amnesia is strong in this story and thead.<p>As I posted on Krebs' article:<p>This is neither news nor new. There have been prior panics around this “water is wet” type issue going back at least a decade.<p>(Search up “Floating Domains – Taking Over 20K DigitalOcean Domains via a Lax Domain Import System” – and others).<p>I also wrote about this on CircleID from the DNS operator’s perspective (“Nameserver Operators Need the Ability to “Disavow” Domains”) – after this same issue was used to DDoS attack another DNS provider by delegating a domain to their DNS servers without having setup an account there, and then doing a DNS reflection attack on that domain. That was <i>over</i> ten years ago.<p>The fact that people can delegate their own domains to somebody else’s nameservers without ever properly setting up a zone on those nameservers, or ever keeping track of where THEIR OWN DOMAINS point is 100% the responsibility of the domain owner – and to varying degrees a function of their REGISTRAR – who is the only entity that has any control over it.<p>It’s a weird flex for corporate registrars who purport to be “high touch” and exclusive, to simply shrug their shoulders and turn a blind eye to their own clients’ obviously broken and vulnerable nameserver delegations.<p>For our part this is specifically one of things we actively monitor and alert our clients about.