Podcast
Root Causes 428: .MOBI Attack Puts WHOIS-based DCV into Question


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
October 4, 2024
White hat researchers managed to take over WHOIS for the .mobi TLD. Among other things, this discovery foretells the death of WHOIS as a valid email source for Domain Control Validation (DCV).
Podcast Transcript
And, we could spend several podcasts just explaining what some of those terms mean, but suffice to say, that is a very, very old type of service which has been around since just about the beginning of the internet, and it lists basically, some ownership information about domains. And one of those things is an email address, which typically looks like something Tim, [email protected]. That's what it would look like. And if you said, well, I own Timswebsite.MOBI, a Certificate Authority, some Certificate Authorities might, might say, well, I will send an email to the address - -
And that's what these guys at watchtower Labs achieved. They achieved administrator. They basically became the administrators of the .MOBI WHOIS.
And I just go into the record for that, and I put in whatever address I want, and then the DCV comes to me. I say, yep, that's me. I use the shared secret, click on the link and now domain control validation could have occurred for a DV certificate from a legitimate CA who did not do anything wrong, who is not corrupt, who is not malicious, who follows the process, and now you have that, and you can use that for whatever nefarious purpose you want to have. So that's the potential that exists here.
Basically, this type of attack that watchTowr Labs was able to achieve, it could potentially affect other smaller TLDs. Like, I don't see this happening against .com or other major TLDs, but some of the smaller TLDs, obviously it happened for one, maybe a vulnerability could be found for another. So let's keep our eyes open for that.
But also, Tim, I think this is where I’d like to bring the podcast - -
So, obviously, this WHOIS look up, something is going to change here. This very suddenly became a very active topic of discussion and CA/Browser Forum/WebPKI community. And I'm certain that at minimum, the range of permitted activity for DCV using WHOIS records will go down and it could be that who is records as a source of email addresses for DCV might just plain be eliminated as an option, and that's a very reasonable potential outcome of this, just to get around problems like this. So that's happening. That's already in discussion, and I think there will probably be a ballot fairly quickly. I think it will move. I think it will pass. And I think that's going to be a new change that is coming and that sometime, not too far in the future, you and I will be on this podcast saying, hey, we're announcing that the following ballot has passed, and this is what's happening to WHOIS. I think that is coming. Like take it to the bank. If you look more broadly, email in general is a very problematic medium for this kind of thing.
Emails are in the clear. Emails disappear. Emails may not be delivered. There's no reliable return circuit, so you don't know that your email was seen, necessarily, and there's no real response for how email-based DCV is going to get around the BGP problem.
But it's not gonna last. It's not gonna make it. Let's just talk about, how would you deal with the BGP problem. Like, literally, would I send you emails from seven different places around the globe?
And so, another thing, listeners, I know that a lot of our listeners are sort of working IT leaders. Listeners, it's only a matter of time before email-based DCV goes away, and maybe you want to be starting to think about what you're going to do procedurally and technically so when it does go away, it's not causing you these problems.

