Return-Path: <sentto-279987-3887-1005841265-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Thu, 15 Nov 2001 08:24:08 -0800 (PST) Received: (qmail 2625 invoked by uid 510); 15 Nov 2001 16:21:20 -0000 Received: from n5.groups.yahoo.com (216.115.96.55) by all.net with SMTP; 15 Nov 2001 16:21:20 -0000 X-eGroups-Return: sentto-279987-3887-1005841265-fc=all.net@returns.groups.yahoo.com Received: from [10.1.1.222] by n5.groups.yahoo.com with NNFMP; 15 Nov 2001 16:21:05 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 15 Nov 2001 16:21:05 -0000 Received: (qmail 31345 invoked from network); 15 Nov 2001 16:21:05 -0000 Received: from unknown (216.115.97.172) by m4.grp.snv.yahoo.com with QMQP; 15 Nov 2001 16:21:05 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta2.grp.snv.yahoo.com with SMTP; 15 Nov 2001 16:21:05 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fAFGLpV26120 for iwar@onelist.com; Thu, 15 Nov 2001 08:21:51 -0800 Message-Id: <200111151621.fAFGLpV26120@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Thu, 15 Nov 2001 08:21:51 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Experts:.Insiders.Biggest.Cyberterror.Threat] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Internet could be shut down by hackers, warn experts Reuters, 11/15/2001 <a href="http://news.zdnet.co.uk/story/0,,t269-s2099170,00.html">http://news.zdnet.co.uk/story/0,,t269-s2099170,00.html> Researchers at the ICANN security conference warn that the Internet is still vulnerable to attack It would not take much for a malicious hacker to shut down the Internet, researchers at a meeting of the body that oversees Web address allocation have warned. An attack designed to flood the Web's master directory servers with traffic "is capable of bringing down the Internet", Paul Vixie, a speaker at the Internet Corporation for Assigned Names and Numbers (ICANN) annual meeting, told Reuters on Wednesday. After the 11 September attacks on New York and Washington, non-profit corporation ICANN pushed other agenda items aside to concentrate the discussion on ways to keep the Internet safe. Adding to the impetus for the change in focus were the Code Red and Nimda internet worms, which cast more attention on network security issues. Researchers said they were worried that malicious hackers could attack the 13 "root" servers that direct computers to Web addresses, or domain names, or the 10 top-level domain servers, all of which serve as a kind of directory for the Internet. To mount a so-called denial-of-service attack a malicious hacker would break into numerous PCs or Web servers and instruct them to send so much traffic to a target server that it would overload it, preventing people from accessing the Web. Such attacks are attempted all the time but usually on single Web sites and not on a scale that seriously interferes with overall internet traffic, experts said. Another trouble spot is security at registrars, the companies which sell domain names, or Web addresses, experts said. "Registrars are the weakest link," Steven Bellovin, an AT&T fellow, said during his presentation. "If the registrar is hacked and the database tampered with, (it would be difficult for a domain name owner to prove ownership of a domain)." Researchers would also like to prevent attacks that redirect Web traffic to a dummy site and email to someone other than the intended recipient, said Paul Mockapetris, the inventor of the Domain Name System protocol and chairman of Nominum, which handles directory services for registrars. "The Internet is very fragile," said Vixie, who was one of the developers of the Berkeley Internet Name Domain (BIND) software that translates Web server names into numerical Internet Protocol addresses. "It would be very easy for an angry teenager with a $300 (£208) computer to create almost unlimited pain for anyone on the Internet and not get caught. We've got to have attention focused on this." At the sessions engineers said they have taken steps to secure the computers that run the Internet. They have contingency plans for outages at the root servers -- the 13 master domain name computers around the world -- and are keeping them safe from unauthorised physical access, said Lars-Johan Liman, a senior systems specialist at Autonomica AB in Stockholm. The operators of the root server in Japan also are stepping up security according to Kenji Kosaka, a senior vice minister at the posts and telecommunications ministry. "I was unpleasantly surprised to learn that ICANN decided to hold a meeting focused on the security of the Internet only after the tragic events of September 11," Kosaka said during his keynote speech. There was also scrutiny of security at VeriSign, the sole overseer of the .com, .net and .org master databases and provider of authentication technology to the root servers and most other registries of top-level domains. "I am deeply troubled by the complacency of the ICANN leadership on the subject of security," Paul-Jean Jouve, president of Los Angeles-based network security company Brinx, wrote in a letter to ICANN directors. "It took worldwide fears to stimulate the dialogue on this issue." While some criticised ICANN for taking so long to make security a priority, others said the subject should be left to engineers and not bureaucrats. Switching the focus to security is "opportunistic", Rodney Joffe, chairman and chief technical officer at Ultra DNS, which provides Internet directory services to companies, told Reuters. "It's relevant in general, but I don't think ICANN needs to focus on it," Joffe said. "Security is, after all, a technical issue, not an administrative one." ICANN chairman Vint Cerf dismissed the concerns, saying board members need to hear about the technical issues from engineers to know what recommendations to make. "For policymakers this is a valuable opportunity to have access to this kind of primary source input," Cerf said. In addition to engineers, other attendees and even Cerf said they were concerned about ICANN going beyond its scope, with some asking the group to formally restate its mission and even restructure. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Universal Inkjet Refill Kit $29.95 Refill any ink cartridge for less! Includes black and color ink. http://us.click.yahoo.com/Vv.L9D/MkNDAA/ySSFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:59 PST