Remix.run Logo
tptacek 3 hours ago

Explain the "wormable attack" DNSSEC addresses? I feel pretty well read into wormability, having done a product in the space.

cyberax 2 hours ago | parent [-]

The vast majority of Let's Encrypt installations don't use CAA records or anything in DNS. Or they host the DNS along with the HTTPS servers.

So if the router between the web server and the Internet is compromised, it can just get trusted certs for all the HTTPS traffic going through it, enabling transparent MITM to inject its payload.

gzread an hour ago | parent | next [-]

This happened: https://notes.valdikss.org.ru/jabber.ru-mitm/

akerl_ 20 minutes ago | parent [-]

I touched on this in the parallel comment where you linked this, but worth noting that DNSSEC does not solve this threat model, because re-routing the destination of legitimate IP addresses does not rely on modifying DNS responses.

tptacek 2 hours ago | parent | prev [-]

"The web server"? Which web server? Are the HTTP flows with executable content going to the web server or coming from it? I'm sorry, you haven't really cleared this up.