[AfrICANN-discuss] Google blames DNS insecurity for Web site defacements

Dr Yassin Mshana ymshana2003 at gmail.com
Sat May 16 13:36:22 SAST 2009


Now we can see how end-to-end security measures by as proposed for/by DNSSEC
could be handy.
It is common to having to be redirected when one uses Google engines: that
is how it should be but, the issue of security and authenticity of the
"redirecting to where?" concerns me.

I am not very sure but ISPs need to invest heavily on Security as well: It
costs but hey! better safe than saving money.

The same goes to "Internet Security Advisers/Consultants who provide the
service: there a need regular update in skills and re-tooling as it may be
necessary since security is becoming a major preoccupation us the usage
increases (another cost?)

It is true that the business volume in the continent is still growing (or
emerging) mostly targeting clients in the Public Sector (that's how it has
been) BUT security and stability is global community issue (big and small
are equally affected)

 My 2 cents

Yassin




2009/5/16 Anne-Rachel Inné <annerachel at gmail.com>

>  May 15, 2009
> http://www.infoworld.com/t/authentication-and-authorization/google-blames-dns-insecurity-web-site-defacements-722
>  Google blames DNS insecurity for Web site defacements Traffic to Google
> sites in Uganda, Morocco and Kenya was disrupted this week By Rebecca
> Wanjiku | Computerworld Kenya
>
>  Domain Name System (DNS) insecurity caused the defacing of Google Web
> sites in Uganda and Morocco, according to a Google spokesperson.
>
> Earlier this week, both Google Uganda and Google Morocco were redirecting
> traffic to different sites.
>
> *[ Learn how to secure your systems with Roger Grimes' Security Adviser
> blog <http://www.infoworld.com/blogs/roger-grimes?source=fssr> and Security
> Central newsletter<http://www.infoworld.com/newsletters/subscribe?showlist=infoworld_sec_rpt&source=fssr>,
> both from InfoWorld. ]*
>
> "Google was not hacked, the problem occurred at the DNS level where someone
> redirected the Internet Protocol to other sites. We contacted the registry
> managers in Uganda and Morocco about the DNS attack," said Jay Nancarrow,
> Google Global Communications Public Affairs officer.
>
> "Yes, someone got hold of the DNS and interrupted service by redirecting
> [the] Google Web site and a few other Web sites," said Charles Musisi,
> managing director of Computer Frontiers, the operators of the .ug domain
> registry.
>
> Google services in Kenya were also temporarily disrupted, though Nancarrow
> said the cause of disruption is yet to be identified.
>
> The Google interruption has led to debate about whether Internet service
> providers and registry operators were monitoring the security threats posed
> by hackers and other malicious attackers.
>
> "Issues of DNS cache poisoning are common in East Africa. ISPs do not take
> security seriously, which makes it easier for malicious hackers," said Tyrus
> Kamau, a network security consultant.
>
> John Gichuki, a security expert who has helped set up security safeguards
> for companies in East Africa, says that the level of security depends on the
> security policies set by the information security department in an
> organization.
>
> "ISPs should have security assessments done; physical and operational
> security; they should be in a position to monitor traffic going through
> their routers and servers," said Gichuki.
>
> _______________________________________________
> AfrICANN mailing list
> AfrICANN at afrinic.net
> https://lists.afrinic.net/mailman/listinfo.cgi/africann
>
>


-- 
c/o DFID-Nigeria
No. 10 Bobo Street
Maitama
Abuja
Nigeria

Skype: yassinmshana1
Mobile: +234-803 970 5117

Do You really NEED TO PRINT THIS? Sure?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://lists.afrinic.net/pipermail/africann/attachments/20090516/6a9d1287/attachment.htm


More information about the AfrICANN mailing list