Anonymous ID: 99cda7 May 22, 2021, 1:12 a.m. No.13725977   🗄️.is 🔗kun   >>5990 >>6172 >>6190 >>6201 >>6211 >>6215 >>6252 >>6293 >>6342 >>6351 >>6362 >>6373 >>6377

Heads up on the DNS fuckery

 

I haven't posted about this for a while and now I can't even point back to my previous reports on the matter because the breads have disappeared. What's up with the archive? Anyway, this is an important topic mostly because a great many anons are still unaware of the issue.

 

In order to not have to deal with my reports disappearing, I have decided to put them on my own board. The reports should be reposted on other boards but I won't be doing that myself. For this board, maybe somebody could make a pinned thread so that the issue can be discussed. Collecting problem reports would sure be nice so we can see how many anons are affected and to give advice on what to do about it.

 

While the DNS fuckery seems merely inconvenient right now, we can't afford to be complacent about it. The black hats have something in store for us. As far as I know, only 8kun is being targeted but what if they start targeting Bitchute or Rumble or any other "objectionable" site? Much chaos is potentially on the horizon.

 

I am reposting my reports here. Important updates will be posted here as well.

 

https://8kun.top/alleycat/res/968.html

Anonymous ID: 99cda7 May 22, 2021, 1:14 a.m. No.13725979   🗄️.is 🔗kun   >>5990 >>6172 >>6201 >>6211 >>6215 >>6252 >>6293 >>6342 >>6351 >>6362 >>6373 >>6377

DNS fuckery is still in progress

 

This report was last posted on May 2. This is an updated version.

 

This is serious. The situation is stable right now but there is clearly a plan to open a can of worms on the anons here. DNS servers worldwide are being seeded with invalid IP addresses for all of the 8kun subdomains. Apparently, this is being done through an exploit and many (possibly all) servers are affected to some degree. You can use the links below to monitor the situation. Note that "8kun.top", "media.8kun.top", "nerv.8kun.top" and "softserve.8kun.top" all share the same IP addresses so they do not need to be tested separately.

 

https://dnspropagation.net/A/8kun.top

https://dnspropagation.net/A/sys.8kun.top

 

Refresh the page a few times and look through it to see if some servers are showing a wrong IP address for the subdomain. For "8kun.top", there should be a set of 7 IP addresses. The bad DNS lookups occur randomly. This is happening with my own ISP and also with Google and OpenDNS. I am still trying to determine if Cloudflare is vulnerable. Although I have spotted an issue with Google and OpenDNS on just two occasions each, the fact that this has happened even once indicates that they are vulnerable.

 

Now, the key to this is what is called the TTL which means "Time To Live". It is normally 60 seconds for this site. This means that, if your DNS server gets seeded with an invalid IP address then you need to wait till the TTL runs out for your DNS cache to refresh and get a new address. I have observed that the TTL for the bad IP addresses exceeds 60 seconds (up to 300 seconds, it seems). Note that this TTL is not necessarily adhered to. Some DNS servers (meaning the one supplied by your ISP) may ignore this value. That is, it may take a longer period of time for the bad IP address to get flushed out of the cache. I don't know this but you should keep it in mind if the site seems to go down for a long period.

 

There are three critical subdomains involved: "8kun.top", "media.8kun.top" and "sys.8kun.top". If "8kun.top" fails, auto-updates will fail and the catalog will fail (the site will become inaccessible). If "media.8kun.top" fails, images and other media will not load. The two will almost never fail at the same time. This is another reason why it may look like just a temporary glitch. If "sys.8kun.top" fails, posting and captchas will not work. Board administration also runs through this subdomain.

 

I have seen very few problem reports so it is impossible to gauge just how many people are affected. Most of the time, a bad IP address will be unresponsive and your access to 8kun will fail silently. It is possible that you may get an error message from your web browser about an invalid security certificate. Some of the IP addresses belong to Facebook and a few anons have reported getting what appears to be an error message from Facebook. When you see an error message, just close it and try again in a minute or few.

 

There could be hundreds of bad IP addresses being circulated. I am no expert on DNS or Internet security so I have no conclusion to make about the distribution. I will note that a cursory examination suggests to me that the addresses are all under the control of possibly just one Internet authority. Look here:

 

https://en.wikipedia.org/wiki/List_of_assigned_/8_IPv4_address_blocks

 

Next post: what might be coming and some hints on how to prepare.

Anonymous ID: 99cda7 May 22, 2021, 1:15 a.m. No.13725983   🗄️.is 🔗kun   >>5998 >>6192 >>6201 >>6211 >>6215 >>6252 >>6268 >>6293 >>6342 >>6362 >>6373 >>6377

DNS fuckery: what is to come and how to prepare

 

If you perform the DNS Propagation Test as suggested in the previous post, you will notice that some servers exhibit the problem regularly but others seem to be unaffected. The DNS attacks may not be totally random. There may be a purposeful pattern which targets some more than others. If the frequency of attack on a particular server is very low then you may never spot it. I have seen two instances of a bad IP address from Google but separated by days. OpenDNS gave me two in the same day but that was after weeks of testing. On the other hand, my ISP will feed me a bad IP address several times a day. This is all very circumstantial but I'm not inclined to write a bot to hit the DNS servers in order to gather statistics.

 

There are thousands of DNS servers spread around the globe, each serving a specific market. If the ultimate target of the attack is YOU then only certain upstream servers feeding the local ISP market would need to be targeted. I don't have any idea what upstream server my ISP uses but I can say that it is not Google or Cloudflare or OpenDNS. Since most people accept whatever default DNS server is assigned by their ISP then the targeting makes sense. Switching away from your default DNS is a good idea but you shouldn't expect that to keep you safe if the black hats decide to put on a full-scale assault. All DNS servers should be considered suspect until proven otherwise.

 

Here is what we need to be prepared for:

 

The exploit which is being used to seed bad IP addresses can clearly be used to modify the TTL (Time To Live). Simply extending the TTL to an hour or so could take down the site or at least reduce the traffic considerably. The site operators and Vanwanet would not even know what happened. This would work like a valve. Open the valve to let the traffic through and then close it for any desired period of time. This could be controlled geographically like a wave sweeping across the globe. As it is right now, the TTL is low enough that the fuckery looks like a temporary glitch. In addition, bad IP addresses could be seeded more frequently but, judging from I'm already seeing from my ISP, the frequency is already high enough. Bumping up the TTL could lock me out of 8kun indefinitely if I were to rely on my default DNS server.

 

Savvy anons know exactly what to do because we've been through this before. For now, you should change your DNS server but this is not a long-term solution if the attack escalates. Think logically: if they REALLY want to take us down then no DNS server is safe. In the event that you do get hit with a bad IP address and the TTL is set to a long period then you should know how to flush your system DNS cache (though this won't help if your DNS server is still holding the bad IP address in its own cache). The ultimate solution is to not rely on the DNS servers at all. Most anons have probably (by now) learned the trick of modifying the "hosts" file. These are the currently valid IP addresses for the site:

 

sys.8kun.top: 185.165.190.88

 

8kun.top, media.8kun.top, nerv.8kun.top, softserve.8kun.top:

94.103.81.80, 94.103.82.74, 94.103.94.73, 109.234.38.4, 193.178.169.19, 195.2.92.96, 195.2.93.193

 

DNS server IP addresses:

Cloudflare - 1.1.1.1 and 1.0.0.1, Google - 8.8.8.8 and 8.8.4.4, OpenDNS - 208.67.222.222 and 208.67.220.220

 

I am not providing any instructions on how to implement these solutions because that depends on what operating system you are on. Also, I have zero familiarity with phonefagging and I have no idea what can be done in that context. Do your own research to prepare yourself.

Anonymous ID: 99cda7 May 22, 2021, 1:16 a.m. No.13725989   🗄️.is 🔗kun   >>5998 >>6172 >>6201 >>6211 >>6215 >>6252 >>6293 >>6342 >>6362 >>6373 >>6377

DNS fuckery: possible attack vectors

 

So what exploit could the black hats be using to target the DNS servers? I have no idea. I'm not an Internet expert so I can only take a guess. These two articles might be helpful:

 

https://en.wikipedia.org/wiki/dns_cache_poisoning

An anon posted this one: https://kb.isc.org/docs/cve-2021-25216

 

Interesting thing about the second article is the post date (April 28). This is just two days before I started noticing the fuckery. Holy hell. Is that a coincidence? To make matters even more spoopy, Dan Kaminsky died recently. He was an Internet security researcher and he gained prominence for his work on patching a DNS "cache poisoning" vulnerability in 2008. What was he working on recently? Something that somebody did not want to become public?

 

https://en.wikipedia.org/wiki/Dan_Kaminsky

 

That's it for now.

Anonymous ID: 99cda7 May 22, 2021, 3:50 a.m. No.13726260   🗄️.is 🔗kun   >>6271 >>6276 >>6280

>>13726249

19 hours. Before I got a good rest, I think it was over 28 hours (programming binge).

I'll probably be paying for it later with 12-hour rest periods, kek.

Got a LOT of sleep last week though. The perils of being retired with no job to wake up for.

Anonymous ID: 99cda7 May 22, 2021, 4:01 a.m. No.13726289   🗄️.is 🔗kun

>>13726271

>when I get too tired, I start to see rabbits in the corner of my vision

Kek. Reminds me of when I started doing night shift as a cleaner. Couldn't get used to the idea of sleeping during the day so I would often go without sleep. I would hallucinate paper clips everywhere on the carpet. I knew that they weren't real when they didn't make a clattering noise as they went up the vacuum wand.

Anonymous ID: 99cda7 May 22, 2021, 4:07 a.m. No.13726307   🗄️.is 🔗kun

>>13726280

Be careful what you wish for. Oversleeping can be as bad as undersleeping. Oversleeping when you don't need it is bad. If you need it then take it. Depends on the individual. I have a fucked up sleeping pattern (been that way all of my life) so don't take advice from me, kek. My record is 16 years of sleep without even waking up to pee. Fucked if I know why I did that.

Anonymous ID: 99cda7 May 22, 2021, 4:40 a.m. No.13726371   🗄️.is 🔗kun

>>13726361

Hmm, I think I should correct that. I think the anon was using clearnet over TOR and not straight TOR. Don't exactly remember. Until more info comes in, we don't know for sure if TOR is safe.

Anonymous ID: 99cda7 May 22, 2021, 5:15 a.m. No.13726452   🗄️.is 🔗kun

>>13726437

Nobody here believes you therefore nobody on the outside will be convinced.

You could tell the whole world yourself and nobody would believe.

The secrecy is unnecessary. You lie.