Summary: | net-dns/bind*: New BIND already vulnerable to cache poissoning | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Emanuele Gentili <gentili> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED INVALID | ||
Severity: | major | CC: | bind+disabled |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://tservice.net.ru/~s0mbre/blog/devel/networking/dns/2008_08_08.html | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- |
Description
Emanuele Gentili
2008-08-10 03:43:14 UTC
Detecting brute force attacks from inside the daemon with high enough reliability would require techniques as described in this article: http://blog.netherlabs.nl/articles/2008/08/05/calculating-the-chance-of-spoofing-an-agile-source-port-randomised-resolver Is there a statement by ISC (BIND upstream) whether they intend to do so? (In reply to comment #1) > > Is there a statement by ISC (BIND upstream) whether they intend to do so? > No, they will not do anything. This issue is invalid. This URL is not serious, the only goal of its author is to receive media coverage. Mitre has not assigned any CVE id. What he is talking about is entirely linked to the DNS protocol itself. That URL uses nothing new, and is not related to Kaminsky's attack (which relies on the ability to force a caching resolver to generate many requests). Kaminsky does not use Gigabit links, and previous BIND/DNS randomness issues did not use Gigabit links either. That weakness is limited to the LAN, and is an architecture issue. DNS can't do anything against that without a cryptographic support like DNSSEC. Since this attack can only realisticly be performed from the local network; - put your caching resolver in a DMZ, if you do not trust your LAN users - implement rate limiting on your DMZ with your best firewall box, or network monitoring. This kind of attack mostly behaves like a (D)DoS. |