Dan Kaminsky, a Web expert, with a list of vulnerabl servers.
By JOHN MARKOFF
SinceSince a secret emergency meeting of computer security experts at Microsoft’s headquarters in March, Dan Kaminsky has been urging companies around the world to fix a potentially dangerous flaw in the basic plumbing of the Internet.
While Internet service providers are racing to fix the problem, which makes it possible for criminals to divert users to fake Web sites where personal and financial information can be stolen, Mr. Kaminsky worries that they have not moved quickly enough.
By his estimate, roughly 41 percent of the Internet is still vulnerable. The problem is a global one, and the length of time required to fix it could leave many Web users vulnerable for weeks or months. And there are millions of places around the world where people might find themselves vulnerable to potential attacks, whether in their workplaces or in an airport lounge or Internet cafe.
Mr. Kaminsky, a technical consultant who first discovered the problem, has been increasing the pressure on companies and organizations to make the software changes before criminal hackers take advantage of the flaw.
He planned to publicly lay out the details of the flaw at a security conference in Las Vegas. That should force computer network administrators to fix millions of affected systems. But his explanation of the flaw will also make it easier for criminals to exploit it, and steal passwords and other personal information.
Mr. Kaminsky walks a fine line between protecting millions of computer users and eroding consumer confidence in Internet banking and shopping. But he is among those experts who think that full disclosure of security threats can push network administrators to take action. “We need to have disaster planning, and we need to worry,” he said.
The flaw is in the Domain Name System, a kind of automated phone book that converts humanfriendly addresses like google.com into machine-friendly numeric counterparts. The flaw could allow a criminal to redirect Web traffic secretly, so that a person typing a bank’s actual Web address would be sent instead to an impostor site set up to steal the user’s name and password. The user might have no clue about the misdirection. Unconfirmed reports in the Web community indicate that attempted attacks are already under way.
Some computer systems are immune to the flaw. About 15 percent of domain name servers in the United States and 40 percent in Europe, including those at major Internet providers like America Online and Deutsche Telekom, use software from a Dutch company called PowerDNS, which is not vulnerable.
Still, much of the Internet remains vulnerable. “I’m watching people patch, and I realize this is not an easy thing to do,” Mr. Kaminsky said .
댓글 안에 당신의 성숙함도 담아 주세요.
'오늘의 한마디'는 기사에 대하여 자신의 생각을 말하고 남의 생각을 들으며 서로 다양한 의견을 나누는 공간입니다. 그러나 간혹 불건전한 내용을 올리시는 분들이 계셔서 건전한 인터넷문화 정착을 위해 아래와 같은 운영원칙을 적용합니다.
자체 모니터링을 통해 아래에 해당하는 내용이 포함된 댓글이 발견되면 예고없이 삭제 조치를 하겠습니다.
불건전한 댓글을 올리거나, 이름에 비속어 및 상대방의 불쾌감을 주는 단어를 사용, 유명인 또는 특정 일반인을 사칭하는 경우 이용에 대한 차단 제재를 받을 수 있습니다. 차단될 경우, 일주일간 댓글을 달수 없게 됩니다.
명예훼손, 개인정보 유출, 욕설 등 법률에 위반되는 댓글은 관계 법령에 의거 민형사상 처벌을 받을 수 있으니 이용에 주의를 부탁드립니다.
Close
x