10669015 2003-09-09 22:52 -0400 /302 rader/ Chris Brenton <cbrenton@chrisbrenton.org>
Importerad: 2003-09-10 19:47 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <28920>
Ärende: Permitting recursion can allow spammers to steal name server resources
------------------------------------------------------------
From: Chris Brenton <cbrenton@chrisbrenton.org>
To: bugtraq@securityfocus.com
Message-ID: <3F5E9202.5030004@chrisbrenton.org>

Hi Dave,

Sorry this post is so long but I wanted to make sure testing and how
to  fix the problem was spelled out exactly so people are more likely
to fix  their servers.

Credits
Many thanks to William Stearns and Tanya Baccam for helping to pull 
together this information.


_Executive Summary_ The default configuration of many domain name
servers (DNS) can leave  you vulnerable to cache spoofing attacks as
well as allow spammers to  steal resources from your servers. To
protect against these attacks, it  is strongly recommended that any
name server exposed to the Internet be  configured to act
non-recursively for all but trusted networks.

_Vulnerable Software_
Bind (at default settings)
Microsoft DNS (at default settings, but less so than Bind)
Probably many others

_Background_
There are three primary factors that attribute to the spammers ability 
to steal your DNS resources:
1) Exposed name server configured to act recursively
2) DNS susceptibility to cache poisoning attacks
3) Poor validation by domain name registrars

First, a recursive name server is described to be a name server that
is  willing to do the work in answering a DNS query. If the name
server does  not have the answer to the query in cache, a recursive
name server will  go out to the Internet and find an answer. A
non-recursive name server  will only answer queries based on the
information in its cache. If the  server does not know the answer to
the question being asked, the source  is redirected to another
server, or an error code is returned.

For example, most people configure their internal name servers to act
recursively so they will lookup DNS information for the local user
base.  The root name servers however are configured to act
non-recursively.  They don't answer questions about specific hosts,
but rather re-direct  you to the server that can answer the query

Second,  DNS cache poisoning attacks are not a new problem. Excellent 
papers have been written on these attacks over the years. Some good 
examples are:

"Addressing Weaknesses in the Domain Name Protocol" by Christoph
Schuba
http://ftp.cerias.purdue.edu/pub/papers/christoph-schuba/schuba-DNS-msthesis.pdf

"Using the Domain Name System for system Break-ins" by Stephen
M. Bellovin ftp://ftp.research.att.com/dist/smb/dnshack.ps

"DNS Cache Poisoning - The Next Generation" by by Joe Stewart, GCIH
http://www.securityfocus.com/guest/17905

Additionally, there are a large number of tools out on the Internet
that  permit an attacker to perform a variety of DNS attacks. One of
the more  popular is ADMIDpack available at
http://www.securiteinfo.com/

Rather than re-invent the wheel by describing cache poisoning and how
it  is done, we'll refer readers that require that information to the
above  references. Instead, we will focus on what appears to be a new
trend  with spammers, how it can impact your network, and what you
can do to  protect yourself.

Finally, the fact that domain name registries perform extremely poor 
validation of the information associated with a given domain name is 
also well know. A good article on the subject can be found here:
http://news.com.com/2100-1025_3-5071523.html

_The Problem_ Just about everyone hates receiving spam and it is not
uncommon for  people to lash out at the source of these
messages. Spammers know this,  which is why they go to such great
lengths to hide their tracks.  Spammers that set up legitimate
domains frequently find themselves to be  the recipient of Denial of
Service (DoS) attacks, or  discover that  their Internet connectivity
is quickly terminated by their upstream ISP.  One of the stealthy
tricks spammers have developed is to find  mis-configured mail
servers that will permit them to relay their spam  messages (this is
a well known technique). If the mail server gets  attacked or blocked
by the Internet community, the spammer simply moves  on to another
open mail relay. Of course the legitimate owner of the  mail server
is not so lucky.

In an escalation of arms, it appears that some people also take
action  against the spammer's name servers as well. The thought
process is that  if the Internet community can take out the spammer's
DNS (note we are  not advocating this practice, just describing it),
click though links in  their spam messages as well as Web bugs and
the like may no longer  function. This can severely hinder the
spammers ability to figure out  which messages were actually
received, as well as the amount of interest  generated by the
message. Unfortunately, spammers have found a way  around this
problem in a similar fashion to the open SMTP relay method  described
above. Instead of targeting mis-configured mail relays  however, they
target mis-configured name servers.

Here's how it works. The spammer registers a domain name using name
servers that are under their control. Note that we found no
consistency  in the amount of time that spammers use when registering
a domain name.  It could be anywhere from a year to 10 years. Also,
we found no  consistency with the registrar authority being used. The
spammers we  tracked used a range of authorities.

Next the spammer seeks out name servers on the Internet that have
been  mis-configured to act recursively for anyone. Unfortunately,
this  appears to be a fairly easy task as testing we performed showed
that an  overwhelming majority of the exposed name servers on the
Internet act  recursively.

After that, the spammer populates the recursive name server with host
information regarding their spam domain. We prefer not to go into a
whole lot of detail as to how this is done, as we prefer not to train
script kiddie spammers on how to leverage this attack. Suffice to say
that once the spammer is finished, the target server contains cached
information about the spam domain. The amount of time this
information  will be cached varies depending on the time to live
(TTL) values used by  the spammer.

Next the spammer goes back to their registry authority and changes
their  authoritative name servers to be the recursive name servers
they  populated in the last step. Since it appears that registry
authorities  no longer validate if a customer has permission to use
the name server  they specify (note that this used to be done way
back when domain names  were free), the record is quickly updated and
users on the Internet are  directed to this populated name server
when querying information about  the spammer's domain. The spammer is
now free to push out their spam and  if the Internet community
decides to attack, the name server being  attacked actually belongs
to someone else.

There is a limiting factor in all of this. Most name server software
allows you to specify a maximum amount of time that the server will
cache information. In other words, if the spammer attempts to set a
TTL  cache value of 90 days, the name server doing the caching may
quietly  truncate the TTL value to a lower setting.

For example, the maximum TTL cache time with Microsoft DNS is set
through the MaxCacheTtl registry key value. The default value is one
day. This gives a very small window of time that the spammer could
use  to populate the name server, change their registry information,
send out  their spam, and expect replies to come back. This makes
Microsoft DNS  far less susceptible to this attack (by default) than
other name servers.

Bind limits this cache time though the max-cache-ttl parameter. The
default setting is seven days. Given that most registry authorities
make  changes in 24 hours or less, this is still ample time to push
out spam  messages and see who replies.

Please note that the root cause of the problem is not how long the 
information is being cached. The real problem is that the server is 
acting recursively by default. The above information has been included 
in order to help identify the magnitude of the problem with different 
name server software packages. Longer caching is actually preferred as 
it helps to improve performance.

_How to fix the problem_
Fixing the problem varies depending on whether you are running Bind, 
Microsoft DNS, or some other software. Regardless of what you are 
running, testing to see if you are vulnerable is a consistent process.

Run the following command from a remote UNIX or Windows system. You
want  to run this from a system that *should not* have recursive
access to  your exposed name servers. DO NOT try this from an
internal host first,  as it will skew your results. Good choices are
an external shell  account, your home system, or possibly have a
trusted friend do the  testing for you.

Here is the command to run:
nslookup bogus.spam-free-zone.com <IP address of the server to test>

If the command returns similar to the following:

Non-authoritative answer:
*** Can't find bogus.spam-free-zone.com: No answer

You name server is configured properly. Pass directly to "GO" and 
collect $200.  :-)

If however you get back an answer similar to:

Name:	bogus.spam-free-zone.com
Address: 172.29.217.137

your name server is improperly configured to act recursively for 
everyone on the Internet, and needs to be changed.

_Fixing the problem with Bind_
Changing Bind so that it will not act recursively for all hosts on the 
Internet is a relatively simple process. Edit the /etc/named.conf file 
to add in the "allow-recursion" parameter similar to the following:

options {
         directory "/var/named";
         allow-recursion {localnets; };
};

Note that you may already have additional options defined, which is
just  fine. The important thing is to add in the allow-recursion line
as  shown. The above command tells Bind to only act recursively for
systems  that are part of the same logical subnet as the Bind
server. This way if  there is a local SMTP or HTTP server than needs
to do name resolution,  this functionality will continue to work. All
other subnets however will  be blocked from doing recursive
queries. Users on the Internet will only  be permitted to look up
information you are authoritative for (like your  Web server's IP
address, your MX record, etc.). This will protect you  from the
current round of spammers stealing name server resources.

If you need to have the Bind server act recursively for multiple 
subnets, simply specify them in CIDR format, separated by commas. For 
example:

allow-recursion {172.16.1.1, 10.0.0.0/8, 192.168.1.0/24;};

_Fixing the problem with Microsoft DNS_
Unfortunately, Microsoft DNS is not quite as configurable as Bind when 
it comes to tweaking recursion. Your options are to either enable or 
disable recursion; you cannot make exceptions for certain subnets like 
we could with Bind using the allow-recursion parameter.

This can cause problems if there is a local SMTP, HTTP, etc. server
that  relies on the Microsoft DNS server to perform recursive
queries.  Disabling recursion will break this required
functionality. If you are  in this situation, you may need to do one
or more of the following  additional steps along with disabling
recursion on your exposed  Microsoft DNS server:

1) Re-configure these systems to direct recursive queries though some
other name server, such as your upstream ISP 2) Run a local DNS
process on each of these systems but do not make  TCP/53 and UDP/53
directly accessible from the Internet to these systems.  3) Replace
the server with a Bind server and use the allow-recursion  parameter.

To disable recursion on a Microsoft DNS server from the command line, 
run the following command while having Administrator level  access to 
the system:

dnscmd <server name> /config /NoRecursion 1

If you prefer to use the GUI interface, open Administrative Tools and 
then DNS, and click on the following:
Properties--> Advanced --> Server Options --> Disable recursion --> OK

_Verifying that recursion is now disabled_
If you believe you have recursion properly disabled, you can test it 
from an outside host in a similar fashion to the testing we performed 
earlier:

nslookup bogus1.spam-free-zone.com <IP address of the server to test>

The IP address of this host is 172.29.217.138. Again, if you get a
failed lookup, the test is successful and your DNS server is safe
from  recursive attacks. You can verify that recursion is working
properly by  running the same command from an internal host. If the
command returns  the above IP address, the name server is functioning
properly.

_Additional testing_
If you would like to verify that a domain's name server is acting as a 
proper authoritative name server, rather than serving up cached 
information only, the host command works quite nicely:

$host -C spam-free-zone.com
Nameserver host2.spam-free-zone.net:
	spam-free-zone.com SOA host2.spam-free-zone.net. 
postmaster.spam-free-zone.net. 200309091 28800 900 1209600 86400
Nameserver dns1.chrisbrenton.org:
	spam-free-zone.com SOA host2.spam-free-zone.net. 
postmaster.spam-free-zone.net. 200309091 28800 900 1209600 86400

A server that is suppose to be authoritative for a domain, but is only 
serving up the information via cache would return no information.

You can configure Sendmail to reject SMTP messages when the name
servers  for the domain are supposed to be authoritative, but are
actually  serving up information from cache. Simply edit your
sendmail.mc file and  comment out (add dnl to the beginning of the
line) the  "accept_unresolvable_domains" option, similar to the
following:

dnl FEATURE(`accept_unresolvable_domains')dnl

Then just rebuild a new sendmail.cf file, restart Sendmail, and you
are  cooking with gas. Rejected e-mails will get logged with the
following  error code:

reject=451 4.1.8 Domain of sender address mail@iamastinkyspammer.com 
does not resolve)

In our testing this tweak resulted in zero legitimate e-mails getting
dropped, but your mileage may vary. We are unable to come up with a
legitimate reason as to why someone would configure their domain this
way on purpose, and in fact it's in violation of the RFCs. It's
possible  however that someone you communicate with has incorrectly
configured  their domain this way, so watch your logs to see if you
start rejecting  legitimate e-mails.
(10669015) /Chris Brenton <cbrenton@chrisbrenton.org>/(Ombruten)
Kommentar i text 10669829 av Mark Johnston <mjohnston@skyweb.ca>
Kommentar i text 10669862 av Greg A. Woods <woods@weird.com>
Kommentar i text 10670297 av Dan Harkless <bugtraq@harkless.org>
Kommentar i text 10691052 av Devin Nate <devin.nate@bridgecomm.net>
10669829 2003-09-10 13:21 -0500 /48 rader/ Mark Johnston <mjohnston@skyweb.ca>
Importerad: 2003-09-10 22:45 av Brevbäraren
Extern mottagare: Chris Brenton <cbrenton@chrisbrenton.org>
Extern kopiemottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <28938>
Kommentar till text 10669015 av Chris Brenton <cbrenton@chrisbrenton.org>
Ärende: Re: Permitting recursion can allow spammers to steal name server resources
------------------------------------------------------------
From: Mark Johnston <mjohnston@skyweb.ca>
To: Chris Brenton <cbrenton@chrisbrenton.org>
Cc: bugtraq@securityfocus.com
Message-ID: <20030910182154.GA1788@omoikane.mb.skyweb.ca>

Chris Brenton <cbrenton@chrisbrenton.org> wrote:
> Changing Bind so that it will not act recursively for all hosts on the 
> Internet is a relatively simple process. Edit the /etc/named.conf file 
> to add in the "allow-recursion" parameter similar to the following:
> 
> options {
>         directory "/var/named";
>         allow-recursion {localnets; };
> };
> 
>                                           All other subnets however will 
> be blocked from doing recursive queries. Users on the Internet will only 
> be permitted to look up information you are authoritative for (like your 
> Web server's IP address, your MX record, etc.).

That's not entirely true.  BIND (9, at least) is still vulnerable to
cache poisoning by local users, after which it will serve up the
cached answers to anyone that can query (not just
recursion-authorized clients.)  Try looking up a domain you aren't
authoritative for from a recursion-authorized client, then from an
unauthorized one.  You'll get the cached answer with the unauthorized
client.  Of course, given an ISP or corporation, it's trivial to make
one of their users look up your hostname.

The rationale, as I understand it, is that returning a cached answer
doesn't require recursion, so allow-recursion doesn't apply.

The proper way to avoid this problem is to configure BIND to deny all
queries except ones you specifically want to answer:

options {
    allow-query { localnets; };
    allow-recursion { localnets; };
};

zone "example.com" {      # An authoritative zone
    allow-query { any; };
    # other example.com statements
};

Mark
(10669829) /Mark Johnston <mjohnston@skyweb.ca>/(Ombruten)
10669862 2003-09-10 15:14 -0400 /83 rader/ Greg A. Woods <woods@weird.com>
Importerad: 2003-09-10 22:54 av Brevbäraren
Extern mottagare: Chris Brenton <cbrenton@chrisbrenton.org>
Extern kopiemottagare: bugtraq@securityfocus.com
Externa svar till: woods@planix.com
Mottagare: Bugtraq (import) <28939>
Kommentar till text 10669015 av Chris Brenton <cbrenton@chrisbrenton.org>
Ärende: Re: Permitting recursion can allow spammers to steal name server resources
------------------------------------------------------------
From: "Greg A. Woods" <woods@weird.com>
To: Chris Brenton <cbrenton@chrisbrenton.org>
Cc: bugtraq@securityfocus.com
Message-ID: <m19xAPq-000B1TC@proven.weird.com>

[ On Tuesday, September 9, 2003 at 22:52:50 (-0400), Chris Brenton wrote: ]
> Subject: Permitting recursion can allow spammers to steal name server resources
>
> _Executive Summary_
> The default configuration of many domain name servers (DNS) can leave 
> you vulnerable to cache spoofing attacks

Note such attacks can still come from within your "trusted" networks
so I'm not sure there's too much point to discussing this problem in
relation to allowing global recursion.

Often those same servers which are the target of spammers will also be
specifically designed to supply recursive caching DNS for vast numbers
of customer machines, some of which may already be "owned" by spammers
who have employed cracker tools for this very purpose.

The real problem here of course lies with the registrars, just as
you've described.  All registrars really must make 100% certain that
they're not being fooled by what may only be in a server's cache when
they check that a server is authoritative for the zone being
delegated to it.  Perhaps this can be done by instituting a policy to
revoke registrar licenses when they fail to implement such checks
properly.  After all this is a much more important security issue
than it is an anti-spam issue.


> as well as allow spammers to 
> steal resources from your servers.

No kidding!  ;-)


> Next the spammer seeks out name servers on the Internet that have been 
> mis-configured to act recursively for anyone. Unfortunately, this 
> appears to be a fairly easy task as testing we performed showed that an 
> overwhelming majority of the exposed name servers on the Internet act 
> recursively.

This is because there is tremendous utility in allowing arbitrary
persons to query a cache -- the lack of this ability makes debugging
certain kinds of DNS related problems very difficult since it turns a
two-second job into something that can stretch into days while people
play telephone tag and such.  As I'll show below I don't think there's
any need to employ such drastic measures as completely disabling
recursive lookups from public networks -- only limiting their impact.


Note that spammers will also simply (ab)use third party open DNS
servers to resolve MX records for the domains they are spamming to.
This is happening on an increasing frequency and while it's usually
very easy for the operators of the abused server(s) to block the
offending spammer, such things to take time to discover and diagnose
and may trigger customer complaints and dissatisfaction in the mean
time.


I've been hoping to find time soon to implement response rate
limiting for BIND such that only a very limited number of queries per
minute will be answered for all non-trusted networks.

In the mean time it may be sufficient to use traffic shaping
mechanisms to limit the amount of abuse to open cache servers while
still allowing normal debugging efforts to procede un-hindered.

Of course all this depends on the registrars implementing better
checks to guarantee that their domains are only ever delegated to
truly authoritative nameservers.  As I point out at the beginning
this really has to happen somehow regardless.


Thank you very much for raising this issue in such a well written
report!

-- 
						Greg A. Woods

+1 416 218-0098                  VE3TCP            RoboHack <woods@robohack.ca>
Planix, Inc. <woods@planix.com>          Secrets of the Weird <woods@weird.com>
(10669862) /Greg A. Woods <woods@weird.com>/(Ombruten)
10670297 2003-09-10 12:29 -0700 /45 rader/ Dan Harkless <bugtraq@harkless.org>
Importerad: 2003-09-11 00:50 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <28950>
Kommentar till text 10669015 av Chris Brenton <cbrenton@chrisbrenton.org>
Ärende: Re: Permitting recursion can allow spammers to steal name server resources
------------------------------------------------------------
From: "Dan Harkless" <bugtraq@harkless.org>
To: bugtraq@securityfocus.com
Message-ID: <200309101929.h8AJTvLq017076@www.harkless.org>


On September 9, 2003, Chris Brenton <cbrenton@chrisbrenton.org> wrote:
[...]
> "DNS Cache Poisoning - The Next Generation" by by Joe Stewart, GCIH
> http://www.securityfocus.com/guest/17905
[...]
> _Fixing the problem with Bind_

You aren't making any distinction between different versions of BIND,
but you probably should be.  The traditional easy cache poisoning
attack using extra records in the "ADDITIONAL" section is resisted by
BIND 9, but BIND 4 and 8 are still vulnerable, IIRC.  Against BIND 9
you'd have to use address, port, and transaction ID spoofing, as Joe
Stewart discusses in his article, which raises the bar for entry
quite a bit.

> Changing Bind so that it will not act recursively for all hosts on the 
> Internet is a relatively simple process. Edit the /etc/named.conf file 
> to add in the "allow-recursion" parameter similar to the following:
> 
> options {
>          directory "/var/named";
>          allow-recursion {localnets; };
> };
[...]
> allow-recursion {172.16.1.1, 10.0.0.0/8, 192.168.1.0/24;};

As has been pointed out before, this still leaves you potentially
open to cache poisoning if the attacker can spoof those addresses
(and again, the attacker will need to be spoofing anyway, if
attacking BIND 9).

The safest setup is to run authoritative nameservers on separate
machines (or at least IPs) from caching recursive servers, as
discussed, e.g. here:

    http://cr.yp.to/djbdns/separation.html

--
Dan Harkless
bugtraq@harkless.org
http://harkless.org/dan/
(10670297) /Dan Harkless <bugtraq@harkless.org>/(Ombruten)
Kommentar i text 10670287 av Mike Hoskins <mike@adept.org>
10670287 2003-09-10 15:00 -0700 /51 rader/ Mike Hoskins <mike@adept.org>
Importerad: 2003-09-11 00:45 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <28949>
Kommentar till text 10670297 av Dan Harkless <bugtraq@harkless.org>
    Sänt:     2003-09-11 00:50
Ärende: Re: Permitting recursion can allow spammers to steal name server resources
------------------------------------------------------------
From: Mike Hoskins <mike@adept.org>
To: bugtraq@securityfocus.com
Message-ID: <20030910144350.S48700@fubar.adept.org>

On Wed, 10 Sep 2003, Dan Harkless wrote:
> On September 9, 2003, Chris Brenton <cbrenton@chrisbrenton.org> wrote:
> [...]
> > "DNS Cache Poisoning - The Next Generation" by by Joe Stewart, GCIH
> > http://www.securityfocus.com/guest/17905
> [...]
> > _Fixing the problem with Bind_
<snip>
> > allow-recursion {172.16.1.1, 10.0.0.0/8, 192.168.1.0/24;};
> As has been pointed out before, this still leaves you potentially open to
> cache poisoning if the attacker can spoof those addresses (and again, the
> attacker will need to be spoofing anyway, if attacking BIND 9).

luckily more providers have began properly filtering at ingress.
granted, spoofing is still quite possible from a large percentage of
IPv4 space.

> The safest setup is to run authoritative nameservers on separate machines
> (or at least IPs) from caching recursive servers, as discussed, e.g. here:

FWIW, i think this can be derived from Joe's article as well.  also,
anyone configuring BIND should see Rob Thomas' _Secure BIND Template_,

http://www.cymru.com/Documents/secure-bind-template.html

everything discussed here relating to BIND configuration (and more) is
covered there.

i'd also like to point out that the title of this thread is a bit
misleading, or at least not 100% accurate wrt the suggestions being
given.  yes, we can arrive at a relatively secure DNS implementation
using BIND or other alternatives...  however, even with a secure
implementation, h4x0rz can 'steal name server resources'; if you have
a resolver (recursive or not) attached to the public Internet, it can
be bombarded with queries.  that, like many forms of 'legitimate
use', is 'steal[ing] ... resources' and can't be easily avoided (only
mitigated). ;)  it's also one of the more frequent things i see
reported on mailing lists these days...  particularly thanks to M$.

-mrh

--
From: "Spam Catcher" <spam-catcher@adept.org>
To: spam-catcher@adept.org
Do NOT send email to the address listed above or
you will be added to a blacklist!
(10670287) /Mike Hoskins <mike@adept.org>/(Ombruten)
10691052 2003-09-13 21:15 -0600 /31 rader/ Devin Nate <devin.nate@bridgecomm.net>
Importerad: 2003-09-15 18:42 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <29004>
Kommentar till text 10669015 av Chris Brenton <cbrenton@chrisbrenton.org>
Ärende: Re: Permitting recursion can allow spammers to steal name server resources
------------------------------------------------------------
From: Devin Nate <devin.nate@bridgecomm.net>
To: bugtraq@securityfocus.com
Message-ID: <3F63DD4F.2080001@bridgecomm.net>

Nice work Chris & Team;

For folks that want to check if an email sender domain is being
served  by an authoritative nameserver, don't have sendmail, and have
SpamAssassin, I've submitted patches to the SpamAssassin project to
add  this check.

For those interested in adding this, the SA bug link is:

http://bugzilla.spamassassin.org/show_bug.cgi?id=2432

Thanks,
Devin Nate

-- 

____________________________________________________________

Devin Nate
Chief Consultant & General Manager
BridgeComm Corporation
http://www.bridgecomm.net/
mailto:devin.nate@bridgecomm.net
____________________________________________________________
(10691052) /Devin Nate <devin.nate@bridgecomm.net>/(Ombruten)
Bilaga (application/x-pkcs7-signature) i text 10691053
10691053 2003-09-13 21:15 -0600 /20 rader/ Devin Nate <devin.nate@bridgecomm.net>
Bilagans filnamn: "smime.p7s"
Importerad: 2003-09-15 18:42 av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Mottagare: Bugtraq (import) <29005>
Bilaga (application/x-pkcs7-signature) till text 10691052
Ärende: Bilaga (smime.p7s) till: Re: Permitting recursion can allow spammers to steal name server resources
------------------------------------------------------------
0€	*†H†÷
 €0€10	+0€	*†H†÷
 ‚
²0‚00‚™ ENµÿùÙžÃÉƒÙ:#0
	*†H†÷
0_10	UUS10U
VeriSign, Inc.1705U.Class 1 Public Primary Certification Authority0
020122000000Z
070121235959Z0«10U
Soltrus10UVeriSign Trust Network1:08U1Terms of use at https://www.soltrus.com/rpa (c)021:08U1Soltrus Class 1 Consumer Individual Subscriber CA0Ÿ0
	*†H†÷
0‰¼šöæHvCwX+SåÞWBQÚ‚ eÍµBûooÿú?“˜øFÈÕ\-¹¶–ÀÃÅüÚ‚x‹·ùx®SSŽN±2ÝSë3møFpÊ&P7ÿÁô†.2æÔ¶¦]QÙN¨þ«ÊíêDw"µf
uüÞÿñÿâœ™Å&Øó£Ÿ0œ0U0ÿ0CU <0:08`†H†øE0)0'+https://www.soltrus.com/rpa0U0	`†H†øB0$U0¤010UClass1-2-1-50
	*†H†÷
cÒ¶éÔ©Ÿ¾ÞŽ"j°VÎ’¶Åó§cmÄ{CS}d
ÓŒ­‰E–ô'Må`gß=Á[zŠÍk”Ì÷»ßüŸŒý—m»µ	p¡á|DÇdHerôÈ¤¬«æÓ´¦–¾ø²¹¿Öøœ²|ü3wQ$-‡
ø÷Ð7H»=â]0‚;0‚¤ *ŠXãWÑŒ,Â‘ždIÔ®0
	*†H†÷
0«10U
Soltrus10UVeriSign Trust Network1:08U1Terms of use at https://www.soltrus.com/rpa (c)021:08U1Soltrus Class 1 Consumer Individual Subscriber CA0
030907000000Z
040906235959Z0‚>10U
Soltrus1(0&UConsumer Service Center Class
11200U)Terms of use at www.soltrus.com/rpa
(c)021'0%UAuthenticated by Soltrus,
Inc.1'0%UMember, VeriSign Trust
Network10UPersona Not
Validated10UDigital ID Class 110U Devin
Nate1(0&
*†H†÷

devin.nate@bridgecomm.net0‚"0

*†H†÷
‚0‚
‚®äÕBã³#ÒçÒ²7…$„4µÉiÏã9€”;Å5êQéþÖ¿¾^k’žfæ+ÀÎd›ÌÅyà›^Å¦¾Á:_³‹f`e6ä%[‰wZÂ=¹´ï¿Ë«õÕ¬N…ï;óå_°:õÒP¤C«åiÉ4"fÂ=T°`RÂY«û7êsÎdö¨S-Å¶3çv^É«ßcÑ6Ç~Œ<À‰BŸÔsM›Û:Ü¸Š"ÐoÂ ÊÇoË,D$ˆ+Ip1»1ü›¨‡ËÍ~ôÌhŽA'žªé•ô,JËhP= ¥‘Á,UduP‡Û†×t7ÉíâAN5ìÚÕ¥-ÒS +£‚D0‚@0	U00^UW0U0S Q O†Mhttp://onsitecrl.soltrus.com/SoltrusConsumerServiceCenterClass1/LatestCRL.crl0¬U ¤0¡0ž`†H†øE0Ž0(+https://www.verisign.com/CPS0b+0V0VeriSign, Inc.0=VeriSign's CPS incorp. by reference liab. ltd. (c)97 VeriSign0	`†H†øB€0
`†H†øE	ÿ0
	*†H†÷
ž‚î¥Õ„à@î¿W¦…Ø<ú¬g® #/]âœXƒ¦ÃyÖ—íX‡$WáY<óA	‡†ãzGÃù"-@N}åb3/“9pÛ?ˆ
“°ä7¤ÓGy~©-Ç3Ú$Lm:)68<3»½½Õúî VõR$¿å¯ŸDîù­£ð0‚;0‚¤ *ŠXãWÑŒ,Â‘ždIÔ®0
	*†H†÷
0«10U
Soltrus10UVeriSign Trust Network1:08U1Terms of use at https://www.soltrus.com/rpa (c)021:08U1Soltrus Class 1 Consumer Individual Subscriber CA0
030907000000Z
040906235959Z0‚>10U
Soltrus1(0&UConsumer Service Center Class
11200U)Terms of use at www.soltrus.com/rpa
(c)021'0%UAuthenticated by Soltrus,
Inc.1'0%UMember, VeriSign Trust
Network10UPersona Not
Validated10UDigital ID Class 110U Devin
Nate1(0&
*†H†÷

devin.nate@bridgecomm.net0‚"0

*†H†÷
‚0‚
‚®äÕBã³#ÒçÒ²7…$„4µÉiÏã9€”;Å5êQéþÖ¿¾^k’žfæ+ÀÎd›ÌÅyà›^Å¦¾Á:_³‹f`e6ä%[‰wZÂ=¹´ï¿Ë«õÕ¬N…ï;óå_°:õÒP¤C«åiÉ4"fÂ=T°`RÂY«û7êsÎdö¨S-Å¶3çv^É«ßcÑ6Ç~Œ<À‰BŸÔsM›Û:Ü¸Š"ÐoÂ ÊÇoË,D$ˆ+Ip1»1ü›¨‡ËÍ~ôÌhŽA'žªé•ô,JËhP= ¥‘Á,UduP‡Û†×t7ÉíâAN5ìÚÕ¥-ÒS +£‚D0‚@0
U00^UW0U0S Q O†Mhttp://onsitecrl.soltrus.com/SoltrusConsumerServiceCenterClass1/LatestCRL.crl0¬U
¤0¡0ž`†H†øE0Ž0(+https://www.verisign.com/CPS0b+0V0VeriSign,
Inc.0=VeriSign's CPS incorp. by reference liab. ltd. (c)97
VeriSign0	`†H†øB€0
`†H†øE
ÿ0

*†H†÷
ž‚î¥Õ„à@î¿W¦…Ø<ú¬g® #/]âœXƒ¦ÃyÖ—íX‡$WáY<óA
‡†ãzGÃù"-@N}åb3/“9pÛ?ˆ
“°ä7¤ÓGy~©-Ç3Ú$Lm:)68<3»½½Õúî VõR$¿å¯ŸDîù­£ð1‚G0‚C0À0«10U
Soltrus10UVeriSign Trust Network1:08U1Terms of use at https://www.soltrus.com/rpa (c)021:08U1Soltrus Class 1 Consumer Individual Subscriber CA*ŠXãWÑŒ,Â‘ždIÔ®0	+ ‚[0	*†H†÷
	1	*†H†÷
0	*†H†÷
	1
030914031527Z0#	*†H†÷
	1ŠyÅXp
ü~¿ŽöÓvHM/0R	*†H†÷
	1E0C0
*†H†÷
0*†H†÷
€0
*†H†÷
@0+0
*†H†÷
(0Ñ	+‚71Ã0À0«10U
Soltrus10UVeriSign Trust Network1:08U1Terms of use at https://www.soltrus.com/rpa (c)021:08U1Soltrus Class 1 Consumer Individual Subscriber CA*ŠXãWÑŒ,Â‘ždIÔ®0Ó*†H†÷
	1Ã À0«10U
Soltrus10UVeriSign Trust
Network1:08U1Terms of use at https://www.soltrus.com/rpa
(c)021:08U1Soltrus Class 1 Consumer Individual Subscriber
CA*ŠXãWÑŒ,Â‘ždIÔ®0

*†H†÷
‚Œ¦‹s‡íÜh¥÷èÜ…uW+A¿Ï˜.òö•ËÚkåÅ¤«”¥!Ü¤³]W`±–Æ–øÝ²O_b#K­„Ð
Ïò¤Ð—5ã'l]­L‘ P‘Äyà1Ðï¢nÕ*‹ãZ9—¸ŠõûûÉ?N½fn9zé—“s—œt¾æ<Þa³ø°Æ¥÷ÐGUëär
Þç0~²]bº¢
s1;}`L¹ÝV£ŒúuÕû¥r(7@Ì÷ËÅ*fM
Ä‰3uQº–Èì_+¡¡$®ap])`ýè©yWK]ë©Ý:ëöp.±t2L=î¡¶êÓ=\Þê£BWB1$¸6Ò"OÌkz
(10691053) /Devin Nate <devin.nate@bridgecomm.net>/(Ombruten)