We spent $20 to achieve RCE and accidentally became the admins of .mobi
Overall reaction to the research
- Many found the write-up highly entertaining, “journey-like,” and scary in its implications.
- People are struck by how a $20 expired domain and a legacy WHOIS server name can yield massive attack surface, including potential RCE inside CA tooling.
- Some readers initially misread the intro as if the researchers were injecting vulnerabilities; after reading carefully, they clarified it was about exploiting existing bugs.
WHOIS, PKI, and TLS trust chain fragility
- WHOIS is criticized as plaintext, unsigned, and still inexplicably used by CAs for domain verification via email/phone/fax to WHOIS contacts.
- Several note that these issues are not “TLS bugs” but weaknesses in the roots of trust: WHOIS, DNS, BGP, and email.
- Certificate Authorities still have “blessed” methods that depend on WHOIS; some see this as negligent given modern threats.
- Certificate Transparency and multi-perspective validation are mentioned as partial mitigations, but doubts remain about effectiveness against sophisticated BGP hijacks.
DNS, DNSSEC, BGP, and unfinished infrastructure
- DNS is seen as a systemic weak link: susceptible to BGP hijacking, lacking universal DNSSEC, and essential to DV certificates.
- DNSSEC is debated: some view it as failed or marginal due to low adoption; others say it helps but isn’t required by the CA Baseline Requirements.
- IPv6, DNSSEC, QUIC, RPKI, etc. are cited as “half-finished” global migrations stalled by politics, legacy gear, and weak incentives.
- There’s disagreement on whether the current DNS+PKI system is “very trustworthy” or only “adequately trustworthy” for consumer use.
PHP, eval, and software quality
- The phpWhois
eval-based parsing is widely mocked as egregious; commenters note safer language features and patterns existed even in PHP. - Broader debate: some say modern PHP is fine and stigma is outdated; others cite long-standing design flaws and libraries with security landmines.
- Parallel concerns are raised about other ecosystems (C/C++, JavaScript) and the general tendency to shove untrusted strings into interpreters or shells.
Domain lifecycle and expiration risk
- Letting important domains expire is widely labeled negligent, especially when used in protocols or tooling.
- Several argue that once a domain is used in production, you are effectively committed to paying for it “forever,” due to hardcoded references and user expectations.
- Others point out real-world cases where expired domains were taken over and repurposed (ads, porn, SEO spam), harming reputation and security.
Security philosophy and realism
- Some claim “there is no such thing as computer security” on the Internet; all connected data should be treated as at least semi-public.
- Others strongly disagree, arguing that security has improved over decades and that well-run organizations can maintain robust defenses.
- There is shared concern that threat models are often too optimistic, and that the effort required to break systems is trending down while attack automation rises.