DNSSEC...not a bang but a whimper?
Tonight is the night that DNSSEC is enabled between the DNS root servers. I am not going to go into detail since the good people at the other ISC have already done a wonderful job of that in their posting.
Lots of the usual hype in the usual places including The Register, slashdot, etc. The fact is that this really only affects the way your ISPs talk DNS to the root servers. I suspect most users are using their ISPs DNS servers which will continue to talk to their customers the old way. It may cause problems for some users who are hosting their own DNS servers behind antiquated firewalls, but for the most part this will be a non-event.
What I find interesting is that using the resolver test at RIPE, my OpenDNS provided resolvers fail.
Hopefully that will be fixed before the big event.
Update: OpenDNS responded to my query with a pointer to a forum article. It seems they are just fine.
-- Rick Wanner - rwanner at isc dot sans dot org
Malicious iFrame on US Treasury and other sites?
We have received a number of emails from readers pointing us to news articles indicating that the US Treasury is in the process of cleaning up malicious iFrame that have infected a number of their sites. We have also received one report that this particular iFrame redirect has also been found at other sites and that perhaps this may be another registrar related compromise.
If anyone has any further information on whether or not this is bigger than just the US Treasury, we would love to hear it.
As usual you can send us feedback through the comments to this diary, or via our contact page.
-- Rick Wanner - rwanner at isc dot sans dot org
SIFT review in the ISSA Toolsmith
Russ McRee over at holisticinfosec.org has once again written an excellent ISSA Toolsmith article. This article is a review/tutorial of SIFT - SANS Investigative Forensic Toolkit. SIFT is Rob Lee's open source forensic toolkit used for the SANS SEC 508. Daniel Wesemann announced the availability of SIFT in a previous diary.
As usual Russ provides good insight into the high points of SIFT including how to install and configure SIFT. He then walks you through some of the features of SIFT by performing a basic investigation of a memory image.
While the article only scratches the surface it is definitely worth the read if you are interested in forensics using open source tools.
-- Rick Wanner - rwanner at isc dot sans dot org
Comments