TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Don’t let your domain name become a sitting duck

232 pointsby mfkp10 months ago

12 comments

Neil4410 months ago
So you point your nameservers at a third party, let your account with that third party expire, then someone later on can create an account at third party and resume control of the DNS zone? I mean yeah, but you mustn't care much about the domain and any credibility it has will evaporate quickly.
评论 #41131677 未加载
metadat10 months ago
From TFA:<p><i>&gt; There is a frequently updated list published on GitHub called “Can I take over DNS,” which has been documenting exploitability by DNS provider over the past several years.</i><p><a href="https:&#x2F;&#x2F;github.com&#x2F;indianajson&#x2F;can-i-take-over-dns">https:&#x2F;&#x2F;github.com&#x2F;indianajson&#x2F;can-i-take-over-dns</a><p>Whoa, names like Digital Ocean, Google Cloud, Linode, Hurricane Electric - all classified as fully vulnerable.
评论 #41126650 未加载
评论 #41129688 未加载
Brajeshwar10 months ago
UK.GOV has a good guide on &quot;Keeping your domain name secure.&quot; <a href="https:&#x2F;&#x2F;www.gov.uk&#x2F;guidance&#x2F;keeping-your-domain-name-secure" rel="nofollow">https:&#x2F;&#x2F;www.gov.uk&#x2F;guidance&#x2F;keeping-your-domain-name-secure</a>
评论 #41126771 未加载
评论 #41126954 未加载
amiga38610 months ago
This is how I understand the exploit, can someone please confirm if I have the right idea?<p>1. I register a domain name -- example.com -- with a registrar like NameCheap. They tell Network Solutions (the .com registry) to add records on my behalf like below, which means the rest of the internet asks NameCheap&#x27;s nameservers when they want to look up my domain.<p><pre><code> example.com. 172800 IN NS ns1.namecheaphosting.com example.com. 172800 IN NS ns2.namecheaphosting.com </code></pre> 2. For no reason, I ask NameCheap to change those NS records to another company&#x27;s nameservers, such as Hurricane Electric, <i>which I am NOT a customer of</i><p><pre><code> example.com. 172800 IN NS ns1.he.net example.com. 172800 IN NS ns2.he.net </code></pre> 3. Hurricane Electric (HE) are &quot;exploitable&quot;; one of their customers claims to be tranferring a domain to HE, example.com (my domain!), HE doesn&#x27;t verify the actual ownership and they let it happen.<p>4. Now this HE customer has control over my domain... because <i>I</i> told my registrar to change the NS records to HE&#x27;s nameservers. Why would I ever do that?<p>My understanding is this should never happen, I have no reason why I&#x27;d want to make such a change. ICANN have a policy on domain transfer between registrars: <a href="https:&#x2F;&#x2F;www.icann.org&#x2F;resources&#x2F;pages&#x2F;transfer-policy-2016-06-01-en" rel="nofollow">https:&#x2F;&#x2F;www.icann.org&#x2F;resources&#x2F;pages&#x2F;transfer-policy-2016-0...</a> -- and transferring a domain should <i>only</i> be done with the gaining registrar (HE in my example) putting an explicit request to the losing registar (NameCheap in my example), and the losing registrar getting to decide yes or no to the transfer.<p>So... how are there a million or more domains at risk this way? Is it old practises that haven&#x27;t been corrected? How would this work?
评论 #41130670 未加载
评论 #41130707 未加载
评论 #41130779 未加载
everfrustrated10 months ago
Part of this problem is authoritative dns server operators not sharding their zones.<p>The only provider I know who does this correctly is AWS Route 53. Your zone gets assigned 4 unique authoritative servers from a set of namespaced shards. eg ns-2048.awsdns-64.com<p>Someone else can create a zone for the same domain but will map to different shard so no real world effect.<p>Always surprising to me that hardly any providers do it.
评论 #41131440 未加载
ChrisArchitect10 months ago
Actual report: <a href="https:&#x2F;&#x2F;blogs.infoblox.com&#x2F;threat-intelligence&#x2F;who-knew-domain-hijacking-is-so-easy&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blogs.infoblox.com&#x2F;threat-intelligence&#x2F;who-knew-doma...</a><p>(<a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41120214">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=41120214</a>)
quicksilver0310 months ago
I&#x27;ve just launched a DNS hosting provider ( <a href="https:&#x2F;&#x2F;www.ptrdns.net" rel="nofollow">https:&#x2F;&#x2F;www.ptrdns.net</a> ) and this is one of the problems I&#x27;m worried about. With the PowerDNS backend I&#x27;m using, once a zone is added PowerDNS will respond to queries for its record regardless of the nameserver the queries are sent to. One can, for example, query the IP address of the nameserver to get a response.<p>The Route 53 technique of assigning random server names looks a bit like the technique of creating virtual hosts in a nginx server, but it looks like this is a custom AWS implementation and not something that comes out of the box in any DNS server software I know.
Joeboy10 months ago
Somewhat related question: I have a (obscure) domain that I&#x27;m planning to let expire soon. Is there anything I could &#x2F; should do to stop it being used for questionable purposes?
评论 #41128161 未加载
评论 #41130084 未加载
评论 #41130790 未加载
评论 #41127224 未加载
评论 #41130403 未加载
评论 #41127416 未加载
loopdoend10 months ago
Isn’t this the same as the spammy bear attack?
octopoc10 months ago
What happens if you set your name servers to e.g. Digital Ocean then go to Digital Ocean and try to add your domain name there but you find that an attacker has already created that domain name under their account? They were watching the name server records on your domain.
评论 #41130018 未加载
评论 #41131931 未加载
256_10 months ago
From TFA:<p>&gt; DNSMadeEasy founder and senior vice president Steve Job<p>That name surprised me. I thought it couldn&#x27;t possibly be real. I looked it up and apparently that&#x27;s actually his name; presumably no relation to the plural one who ran Apple. Most articles seem to write his first name with an N to make it more believable.
评论 #41152681 未加载
StuntPope10 months ago
The Gell-Mann Amnesia is strong in this story and thead.<p>As I posted on Krebs&#x27; article:<p>This is neither news nor new. There have been prior panics around this “water is wet” type issue going back at least a decade.<p>(Search up “Floating Domains – Taking Over 20K DigitalOcean Domains via a Lax Domain Import System” – and others).<p>I also wrote about this on CircleID from the DNS operator’s perspective (“Nameserver Operators Need the Ability to “Disavow” Domains”) – after this same issue was used to DDoS attack another DNS provider by delegating a domain to their DNS servers without having setup an account there, and then doing a DNS reflection attack on that domain. That was <i>over</i> ten years ago.<p>The fact that people can delegate their own domains to somebody else’s nameservers without ever properly setting up a zone on those nameservers, or ever keeping track of where THEIR OWN DOMAINS point is 100% the responsibility of the domain owner – and to varying degrees a function of their REGISTRAR – who is the only entity that has any control over it.<p>It’s a weird flex for corporate registrars who purport to be “high touch” and exclusive, to simply shrug their shoulders and turn a blind eye to their own clients’ obviously broken and vulnerable nameserver delegations.<p>For our part this is specifically one of things we actively monitor and alert our clients about.