{"id":687,"date":"2012-05-04T17:40:44","date_gmt":"2012-05-04T17:40:44","guid":{"rendered":"http:\/\/microsoftgeek.com\/?p=687"},"modified":"2012-05-04T17:42:08","modified_gmt":"2012-05-04T17:42:08","slug":"opendns-cloudflare-dnschanger-solution-or-how-to-not-lose-internet-on-july-9","status":"publish","type":"post","link":"https:\/\/microsoftgeek.com\/?p=687","title":{"rendered":"CloudFlare &#038; OpenDNS Work Together to Save the Web"},"content":{"rendered":"<p>More than a year ago, some bad guys on the Internet wrote a piece of  malware inartfully dubbed DNSChanger. About a year ago, law enforcement  tracked down the bad guys behind the malware, arrested them, and took  over the servers they were using to cause Internet mayhem.<\/p>\n<p>The FBI has continued to run the former malware servers for the last  year. However, since the FBI isn&#8217;t in the business of running servers,  the servers are scheduled to be shut down on July 9, 2012. When that  happens, nearly half a million Internet users who are still infected  could lose access to the web, email, and anything else that depends on  DNS.\u00a0This is the story of how two Internet infrastructure startups &#8212;  CloudFlare and OpenDNS &#8212; worked together to solve the problem and help  save the web.<\/p>\n<p><strong>A Bit of DNS Background<\/strong><\/p>\n<p>Up front, in order to understand this story, you need to understand  there are two types of DNS servers: recursive and authoritative.  Everyone who surfs the web needs two recursive DNS servers. These are  usually provided by your ISP or you can use a provider like OpenDNS to  handle your recursive DNS queries.<\/p>\n<p>On the other hand, every domain needs at least two authoritative DNS  servers. These are the record of where a particular domain&#8217;s various  records are hosted. Many domain registrars provide authoritative DNS  servers, or you can use a service like CloudFlare and we provide  authoritative DNS.<\/p>\n<p>When a web surfer types an address into their browser, or clicks on a  link, or sends an email, their computer queries their recursive DNS  provider. If the recursive DNS provider has the answer then it responds.  If it doesn&#8217;t have the answer, or if the answer it has is stale, then  the recursive DNS server queries the authoritative DNS server.<\/p>\n<p>As mentioned above, OpenDNS provides recursive DNS. Their customers  are web surfers and they provide a terrific service that helps speed up  Internet browsing and protect people on the web from malware. CloudFlare  provides authoritative DNS. Our customers are websites and we make  those sites faster and protect sites from attacks directed at them.<\/p>\n<p><strong>How Bad Guys Use DNS to Do Bad Things<\/strong><\/p>\n<p>The DNSChanger malware was designed to change the recursive DNS on  any computers that were affected. Instead of pointing DNS queries at  your ISP or a responsible recursive DNS provider like OpenDNS, the virus  routed queries to recursive DNS servers controlled by the bad guys.<\/p>\n<p>The job of DNS is to translate a domain like bankwebsite.com, which  humans can read, into an IP address, like 157.252.10.251, which servers  and routers can read. If you are a bad guy and you can gain control over  recursive DNS then you can direct queries to certain sites to a fake  version. Once DNSChanger had web surfers querying a rogue recursive DNS  server, all requests for legitimate websites could be directed to a fake  phishing website where usernames and passwords could be stolen. For  example, even if you typed your bank&#8217;s domain into your browser, if the  bad guys control recursive DNS then they can send you to a malicious  site and steal your information.<\/p>\n<p>More than half a million computers were infected with the DNSChanger  malware. Thankfully, law enforcement was able to track down the bad guys  behind the malware, arrest them, and seize control of the rogue  recursive DNS servers. The problem is that hundreds of thousands of  computers are still using the formerly rogue recursive DNS servers. On  July 9, 2012 the FBI is scheduled to shut the servers down. When they  do, all the computers that are still infected will effectively be cut  off from the Internet.<\/p>\n<p><strong>Getting the Word Out<\/strong><\/p>\n<p>The DNSChanger Working Group has been working to get the word out about the problem. They launched a website (<a href=\"http:\/\/dcwg.org\" target=\"_blank\">dcwg.org<\/a>)  to provide information about the malware and let people test whether  they are infected. CloudFlare first became involved when the folks at  DCWG.org reached out to us because their site was under heavy load after  attention from\u00a0major media outlets. CloudFlare helped keep the dcwg.org  website online under the load caused by media attention over the last  10 days. We offloaded more than 95% of the traffic to the site, ensuring  the site ran fast and stable even when it was being featured on the  front page of <a href=\"http:\/\/www.cnn.com\/2012\/04\/23\/tech\/web\/fbi-malware-dns\/index.html\" target=\"_blank\">CNN.com<\/a>.<\/p>\n<p>The problem with the dcwg.org website was the test was only run by  people who were paying attention. What you needed was something akin to  an emergency broadcast system that would inform people who were infected  that they had a problem as they surfed the web normally. In the process  of working with the DCWG, we realized we were in a position to do more.<\/p>\n<p>Several engineers from our team worked to create the equally inartfully named\u00a0<a href=\"https:\/\/www.cloudflare.com\/apps\/dnschanger_detector\" target=\"_blank\">Visitor DNSChanger Detector App<\/a>. Any website on CloudFlare can enable the app with a single click from our <a href=\"https:\/\/www.cloudflare.com\/apps\" target=\"_blank\">apps marketplace<\/a>.  The app installs a small bit of Javascript on the page that tests  visitors to see if they&#8217;re infected. If they are not infected, then  nothing happens. If they are, we display a banner across the top of the  page and direct visitors to instructions on how to clean up the  infection (more on that in a second).<\/p>\n<div><a href=\"http:\/\/blog.cloudflare.com\/cloudflare-opendns-work-together-to-save-the#\"><img loading=\"lazy\" decoding=\"async\" id=\"mainImage\" src=\"http:\/\/getfile0.posterous.com\/getfile\/files.posterous.com\/temp-2012-05-03\/tmGasawDhCspjxIhnquHGgGbuJjElyufCiyECqBiADFodEdcDEAsgwsCkljz\/banner_example.png.scaled500.png\" alt=\"\" width=\"500\" height=\"105\" \/><\/a><\/div>\n<p>More than 470 million people pass through CloudFlare&#8217;s network on a  monthly basis. Our data indicate that more than half of the people  infected with DNSChanger visit at least one site on CloudFlare. The  power of the app is that as CloudFlare publishers enable it then there  is an increasing likelihood that people who are infected will get  information about their infection before they are cut off from the  Internet on July 9, 2012.<\/p>\n<p>While we&#8217;ve made it  extremely easy for publishers on CloudFlare&#8217;s network to help get the  word out, we didn&#8217;t want to restrict participation to those sites using  our service. We therefore decided to release the code for the checks  publicly and open source so anyone who can install a few lines of  Javascript will be able to install it on their own sites to inform their  potentially infected users. You can access the code from the following <a href=\"https:\/\/github.com\/cloudflare\/dnschanger_detector\" target=\"_blank\">GitHub Repo<\/a>.  We&#8217;re hopeful that sites large and small will take the time to install  the code in order to help inform any of their visitors who may be  infected.<\/p>\n<p><strong>So I&#8217;m Infected&#8230; Now What?<\/strong><\/p>\n<p>CloudFlare sits in a  terrific position to inform web surfers they have an infection, but we  don&#8217;t provide the tools necessary to solve the problem. I&#8217;ve been  friends with David Ulevitch, the CEO of OpenDNS, for several years and  long admired his company. They were an obvious choice to provide the  tools necessary to fix the DNSChanger malware for users that are  infected. I reached out to David and he saw this as a great opportunity  to further OpenDNS&#8217;s mission of helping build a better Internet.<\/p>\n<p>By default, the app or the Javascript code includes a link to an <a href=\"http:\/\/www.opendns.com\/dns-changer\" target=\"_blank\">OpenDNS page<\/a> with instructions on how infected users can clean up their problem. By  definition, OpenDNS&#8217;s active users aren&#8217;t infected with the DNSChanger  malware. Together, I&#8217;m excited that CloudFlare and OpenDNS have been  able to work together to both inform users with a problem and steer them  to the resources they need to solve it.<\/p>\n<p><strong>CloudFlare + OpenDNS FTW<\/strong><\/p>\n<p>This incident all  illustrates to me the importance and power of the DNS system that  underpins the Internet. The bad guys were able to take over DNS to do  harm. CloudFlare uses authoritative DNS in order to provision powerful  tools to make sites faster and even help create a sort of emergency  warning system for the Internet. Similarly, OpenDNS provides recursive  DNS that keeps web surfers safer from malware and ensures they have a  fast experience as they cruise the web. In the end, both our companies  have complementary missions to build great Internet infrastructure in an  ongoing effort to save the web.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than a year ago, some bad guys on the Internet wrote a piece of malware inartfully dubbed DNSChanger. About a year ago, law enforcement tracked down the bad guys behind the malware, arrested them, and took over the servers they were using to cause Internet mayhem. The FBI has continued to run the former [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,7],"tags":[],"class_list":["post-687","post","type-post","status-publish","format-standard","hentry","category-sec-secops","category-computer-tech-stuff"],"_links":{"self":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=687"}],"version-history":[{"count":3,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/687\/revisions"}],"predecessor-version":[{"id":692,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/687\/revisions\/692"}],"wp:attachment":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}