Conversation

Unless I'm mis-reading the domain history, this domain was (and is) DNSSEC signed and that did not prevent the takeover. The attackers move is to hi-jack the HTTP endpoints instead of DNS servers, get the cert through HTTP upload verification, and then MiTM.
Quote Tweet
Replying to @danielcormier and @campuscodi
Good question. With BGP hijack in progress, seems the hackers were able to obtain a valid TLS cert for developers.kakao.com, see crt.sh/?q=developers. (now revoked).
3
37
Replying to
You're seeing them right, and I'm seeing something different and now wonder if they are rolling out DNSSEC and I caught an experiment? It doesn't really change the dynamic ... hi-jack to HTTP works regardless :(
3
2
CAA doesn't really need to permit even one CAA most of the time, only when you're doing renewal. Ideally you have a CA which supports accounturi/validationmethods. I don't understand why Let's Encrypt still has those features in staging. Can have secure HTTP validation with it.
1
1
Show replies