Conversation

Unless I'm mis-reading the domain history, this domain was (and is) DNSSEC signed and that did not prevent the takeover. The attackers move is to hi-jack the HTTP endpoints instead of DNS servers, get the cert through HTTP upload verification, and then MiTM.
Quote Tweet
Replying to @danielcormier and @campuscodi
Good question. With BGP hijack in progress, seems the hackers were able to obtain a valid TLS cert for developers.kakao.com, see crt.sh/?q=developers. (now revoked).
3
37
Replying to
You're seeing them right, and I'm seeing something different and now wonder if they are rolling out DNSSEC and I caught an experiment? It doesn't really change the dynamic ... hi-jack to HTTP works regardless :(
3
2
Let's Encrypt has supported accounturi/validationmethods for something like 2 years on their staging server. It works fine from our testing and we deployed it already ourselves for both their staging/production infrastructure. It doesn't do anything for production yet though...
1
3
Show replies