HOME

TheInfoList



OR:

Daniel Kaminsky (February 7, 1979 – April 23, 2021) was an American
computer security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
researcher. He was a co-founder and chief scientist of Human Security (formerly White Ops), a computer security company. He previously worked for
Cisco Cisco Systems, Inc. (using the trademark Cisco) is an American multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, s ...
,
Avaya Avaya LLC(), formerly Avaya Inc., is an American multinational technology company headquartered in Morristown, New Jersey, that provides cloud communications and workstream collaboration services. The company's platform includes unified commun ...
, and IOActive, where he was the director of
penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
ing. ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' labeled Kaminsky an "Internet security savior" and "a digital
Paul Revere Paul Revere (; December 21, 1734 O.S. (January 1, 1735 N.S.)May 10, 1818) was an American silversmith, military officer and industrialist who played a major role during the opening months of the American Revolutionary War in Massachusetts, ...
". Kaminsky was known among computer security experts for his work on DNS cache poisoning, for showing that the Sony rootkit had infected at least 568,000 computers, and for his talks at the
Black Hat Briefings Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together ...
. On June 16, 2010, he was named by
ICANN The Internet Corporation for Assigned Names and Numbers (ICANN ) is a global multistakeholder group and nonprofit organization headquartered in the United States responsible for coordinating the maintenance and procedures of several dat ...
as one of the Trusted Community Representatives for the
DNSSEC The Domain Name System Security Extensions (DNSSEC) is a suite of extension specifications by the Internet Engineering Task Force (IETF) for securing data exchanged in the Domain Name System ( DNS) in Internet Protocol ( IP) networks. The protoco ...
root.


Early life

Daniel Kaminsky was born in San Francisco on February 7, 1979, to Marshall Kaminsky and Trudy Maurer. His mother told ''
The New York Times ''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'' that after his father bought him a
RadioShack RadioShack (formerly written as Radio Shack) is an American electronics retailer that was established in 1921 as an amateur radio mail-order business. Its parent company was purchased by Tandy Corporation in 1962, which shifted its focus from ma ...
computer at age four, Kaminsky had taught himself to code by age five. At 11, his mother received a call from a government security administrator who told her that Kaminsky had used
penetration test A penetration test, colloquially known as a pentest, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment. The test is perform ...
ing to intrude into military computers, and that the family's Internet would be cut off. His mother responded by saying if their access was cut, she would take out an advertisement in the ''
San Francisco Chronicle The ''San Francisco Chronicle'' is a newspaper serving primarily the San Francisco Bay Area of Northern California. It was founded in 1865 as ''The Daily Dramatic Chronicle'' by teenage brothers Charles de Young and M. H. de Young, Michael H. ...
'' to publicize the fact that an 11-year-old could break military computer security. Instead, a three-day Internet "timeout" for Kaminsky was negotiated. In 2008, after Kaminsky found and coordinated a fix for a fundamental DNS flaw, he was approached by the administrator, who thanked him and asked to be introduced to his mother. Kaminsky attended St. Ignatius College Preparatory and
Santa Clara University Santa Clara University is a private university, private Jesuit university in Santa Clara, California, United States. Established in 1851, Santa Clara University is the oldest operating institution of higher learning in California. The university' ...
. After graduating from college, he worked for Cisco,
Avaya Avaya LLC(), formerly Avaya Inc., is an American multinational technology company headquartered in Morristown, New Jersey, that provides cloud communications and workstream collaboration services. The company's platform includes unified commun ...
, and IOActive, before founding his own firm White Ops (later renamed Human Security).


Career


Sony rootkit

During the Sony BMG copy protection rootkit scandal, where
Sony BMG Sony BMG Music Entertainment was an American record company owned as a 50–50 joint venture between Sony Corporation of America and Bertelsmann. The venture's successor, the revived Sony Music, is wholly owned by Sony, following their buyout o ...
was found to be covertly installing anti-piracy software onto PCs, Kaminsky used DNS cache snooping to discover whether servers had recently contacted any of the domains accessed by the Sony rootkit. He used this technique to estimate that there were at least 568,000 networks that had computers with the rootkit. Kaminsky then used his research to bring more awareness to the issue while Sony executives were trying to play it down.


Earthlink and DNS lookup

In April 2008, Kaminsky realized a growing practice among ISPs potentially represented a security vulnerability. Various ISPs have experimented with intercepting return messages of non-existent domain names and replacing them with advertising content. This could allow hackers to set up
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
schemes by attacking the server responsible for the advertisements and linking to non-existent subdomains of the targeted websites. Kaminsky demonstrated this process by setting up
Rickroll The Rickroll is an Internet meme involving the unexpected appearance of the music video to the 1987 hit song "Never Gonna Give You Up", performed by English singer Rick Astley. The aforementioned video has over 1.6 billion views on YouTube. Th ...
s on
Facebook Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and
PayPal PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support E-commerce payment system, online money transfers; it serves as an electronic alter ...
. While the vulnerability used initially depended in part on the fact that
Earthlink EarthLink is an American Internet service provider. Earthlink went public on NASDAQ in January 1997. Much of the company's growth was via acquisition. In 2000, ''The New York Times'' described it as the "second largest Internet service provider ...
was using Barefruit to provide its advertising, Kaminsky was able to generalize the vulnerability to attack
Verizon Verizon Communications Inc. ( ), is an American telecommunications company headquartered in New York City. It is the world's second-largest telecommunications company by revenue and its mobile network is the largest wireless carrier in the ...
by attacking its ad provider, Paxfire. Kaminsky went public after working with the ad networks in question to eliminate the immediate cross-site scripting vulnerability.


Flaw in DNS

In 2008, Kaminsky discovered a fundamental flaw in the
Domain Name System The Domain Name System (DNS) is a hierarchical and distributed name service that provides a naming system for computers, services, and other resources on the Internet or other Internet Protocol (IP) networks. It associates various information ...
(DNS) protocol that could allow attackers to easily perform cache poisoning attacks on most nameservers ( djbdns,
PowerDNS PowerDNS is a Name server, DNS server program, written in C++ and licensed under the GNU General Public License, GPL. It runs on most Unix derivatives. PowerDNS features a large number of different ''backends'' ranging from simple BIND style z ...
, MaraDNS, Secure64 and Unbound were not vulnerable). With most Internet-based applications depending on DNS to locate their peers, a wide range of attacks became feasible, including website impersonation, email interception, and authentication bypass via the "Forgot My Password" feature on many popular websites. After discovering the problem, Kaminsky initially contacted
Paul Vixie Paul Vixie is an American computer scientist whose technical contributions include Domain Name System (DNS) protocol design and procedure, mechanisms to achieve operational robustness of DNS implementations, and significant contributions to open s ...
, who described the severity of the issue as meaning "everything in the digital universe was going to have to get patched." Kaminsky then alerted the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
and executives at Cisco and
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
to work on a fix. Kaminsky worked with DNS vendors in secret to develop a patch to make exploiting the vulnerability more difficult, releasing it on July 8, 2008. Kaminsky had intended not to publicize details of the attack until 30 days after the release of the patch, but details were leaked on July 21, 2008. The information was quickly pulled down, but not before it had been mirrored by others. He later presented his findings at the Black Hat Briefings, at which he wore both a suit and rollerskates. Kaminsky received a substantial amount of mainstream press after disclosing this vulnerability, but experienced some backlash from the computer security community for not immediately disclosing his attack. When a reporter asked him why he had not used the DNS flaw for his own financial benefit, Kaminsky responded that he felt it would be morally wrong, and he did not wish for his mother to visit him in prison. The actual vulnerability was related to DNS only having 65,536 possible transaction IDs, a number small enough to simply guess given enough opportunities. Dan Bernstein, author of djbdns, had reported this as early as 1999. djbdns dealt with the issue using Source Port Randomization, in which the UDP port was used as a second transaction identifier, thus raising the possible ID count into the billions. Other more popular name server implementations left the issue unresolved due to concerns about performance and stability, as many operating system kernels simply weren't designed to cycle through thousands of
network socket A network socket is a software structure within a network node of a computer network that serves as an endpoint for sending and receiving data across the network. The structure and properties of a socket are defined by an application programming ...
s a second. Instead, other implementers assumed that DNS's
time to live Time to live (TTL) or hop limit is a mechanism which limits the lifespan or lifetime of data in a computer or network. TTL may be implemented as a counter (digital), counter or timestamp attached to or embedded in the data. Once the prescribed ev ...
(TTL) field would limit a guesser to only a few attempts a day. Kaminsky's attack bypassed this TTL defense by targeting "sibling" names like "83.example.com" instead of "www.example.com" directly. Because the name was unique, it had no entry in the cache, and thus no TTL. But because the name was a sibling, the transaction-ID guessing spoofed response could not only include information for itself, but for the target as well. By using many "sibling" names in a row, he could induce a DNS server to make many requests at once. This tactic provided enough opportunities to guess the transaction ID to successfully spoof a reply in a reasonable amount of time. To fix this issue, all major DNS servers implemented Source Port Randomization, as djbdns and PowerDNS had done before. This fix makes the attack up to 65,536 times harder. An attacker willing to send billions of packets can still corrupt names.
DNSSEC The Domain Name System Security Extensions (DNSSEC) is a suite of extension specifications by the Internet Engineering Task Force (IETF) for securing data exchanged in the Domain Name System ( DNS) in Internet Protocol ( IP) networks. The protoco ...
, which Kaminsky spoke in favor of, has since been widely (but not universally) deployed, bringing cryptographic assurance to results provided by DNS.


Automated detection of Conficker

On March 27, 2009, Kaminsky discovered that Conficker-infected hosts have a detectable signature when scanned remotely. Signature updates for a number of network scanning applications are now available, including NMap and Nessus.


Flaws in Internet X.509 infrastructure

In 2009, in cooperation with Meredith L. Patterson and
Len Sassaman Leonard Harris Sassaman (April 9, 1980 – July 3, 2011) was an American technologist, information privacy advocate, and the maintainer of the Mixmaster anonymous remailer code and operator of the ''randseed'' remailer. Much of his career gravi ...
, Kaminsky discovered numerous flaws in the SSL protocol. These include the use of the weak MD2 hash function by
Verisign Verisign, Inc. is an American company based in Reston, Virginia, that operates a diverse array of network infrastructure, including two of the Internet's thirteen root nameservers, the authoritative registry for the , , and generic top-level d ...
in one of their root certificates and errors in the certificate parsers in a number of Web browsers that allow attackers to successfully request certificates for sites they do not control.


Attack by "Zero for 0wned"

On July 28, 2009, Kaminsky, along with several other high-profile security consultants, experienced the publication of their personal email and server data by hackers associated with the "Zero for 0wned" online magazine. The attack appeared to be designed to coincide with Kaminsky's appearance at the Black Hat Briefings.


Interpolique

In June 2010, Kaminsky released Interpolique, a beta framework for addressing injection attacks such as
SQL injection In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injec ...
and
cross-site scripting Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be ...
in a manner comfortable to developers.


Personal life and death

''The New York Times'' wrote that "in a community known for its biting, sometimes
misogynistic Misogyny () is hatred of, contempt for, or prejudice against women or girls. It is a form of sexism that can keep women at a lower social status than men, thus maintaining the social roles of patriarchy. Misogyny has been widely practis ...
discourse on
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
, Mr. Kaminsky stood out for his empathy." He was known for regularly paying for hotels or travel bills for other people going to Black Hat, and once paid for a plane ticket for a friend of his after she had broken up with her boyfriend; the pair later married. At various points in his career, Kaminsky shifted his focus to work on projects related to his friends' and family's health, developing an app that helps colorblind people, working on
hearing aid A hearing aid is a device designed to improve hearing by making sound audible to a person with hearing loss. Hearing aids are classified as medical devices in most countries, and regulated by the respective regulations. Small audio amplifiers ...
technology, and developing telemedicine tools related to
AIDS The HIV, human immunodeficiency virus (HIV) is a retrovirus that attacks the immune system. Without treatment, it can lead to a spectrum of conditions including acquired immunodeficiency syndrome (AIDS). It is a Preventive healthcare, pr ...
among refugees for Academic Model Providing Access to Healthcare (AMPATH). According to his mother, "he did things because they were the right thing to do, not because they would elicit financial gain." Kaminsky was also an outspoken
privacy rights The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 185 national constitutions mention the right to privacy. Since the global ...
advocate. During the FBI–Apple encryption dispute, he criticized comments by then-FBI director
James Comey James Brien Comey Jr. (; born December 14, 1960) is an American lawyer who was the seventh director of the Federal Bureau of Investigation (FBI) from 2013 until Dismissal of James Comey, his termination in May 2017. Comey was a registered Repub ...
, saying "what is the policy of the United States right now? Is it to make things more secure or to make them less secure?" In a 2016 interview, Kaminsky said, "the Internet was never designed to be secure. The Internet was designed to move pictures of cats ... We didn’t think you’d be moving trillions of dollars onto this. What are we going to do? And here’s the answer: Some of us got to go out and fix it." Kaminsky died on April 23, 2021, of
diabetic ketoacidosis Diabetic ketoacidosis (DKA) is a potentially life-threatening acute complication of diabetes mellitus. Signs and symptoms may include vomiting, abdominal pain, deep gasping breathing, increased urination, weakness, confusion and occasionally ...
at his home in San Francisco. He had been frequently hospitalized for the disease in prior years. After his death, he received tributes from the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
, which called him a "friend of freedom and embodiment of the true hacker spirit", and from Jeff Moss, who said Kaminsky should be in the
Internet Hall of Fame The Internet Hall of Fame is an honorary lifetime achievement award administered by the Internet Society (ISOC) in recognition of individuals who have made significant contributions to the development and advancement of the Internet. Overview ...
. On December 14, 2021, that wish came to fruition.


Works

*


References


External links

* * * * Dan Kaminsky; Scott Rose; Cricket Liu; (June 2009
DNSSEC: What it Means for DNS Security and Your Network
!-- Dept. of Homeland Security Science & Technology Directorate Domain Name System Security (DNSSEC) CA CISO Lecture Series Sacramento, CA December 15, 2009 Douglas Maughan, Ph.D. Program Manager, CCI https://docplayer.net/8675003-Domain-name-system-security-dnssec.html -->
Human Security
- security company, of which Dan Kaminsky was a founder {{DEFAULTSORT:Kaminsky, Dan 1979 births 2021 deaths Activists from San Francisco American computer specialists Avaya employees Cisco people Computer systems researchers Deaths from diabetes in California Ethical hackers Internet activists Privacy activists Santa Clara University alumni St. Ignatius College Preparatory alumni