Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 13 Mar 1999 14:04:28 -0500
From:      Alan <security@unixpower.org>
To:        Brett Glass <brett@lariat.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: bind 8.1.2 cache poisoning
Message-ID:  <19990313140428.A26796@unixpower.org>
In-Reply-To: <4.1.19990313072602.00a6b430@localhost>; from Brett Glass on Sat, Mar 13, 1999 at 07:29:26AM -0700
References:  <Pine.BSF.4.05.9903130520380.7303-100000@leaf.lumiere.net> <4.1.19990313072602.00a6b430@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Mar 13, 1999 at 07:29:26AM -0700, Brett Glass wrote:
> It can't be hard to poison the cache. Many daemons do reverse lookups
> on hosts which connect to them, presenting a perfect opportunity to
> send a spoofed response that gets into the cache. If the "claimed"
> name and the spoofed one match, they can get stuck for a very long
> time (just make the time to live very long on purpose).
> 
> For a standard that holds the Internet together, it is amazing just 
> how weak and awkward DNS really is.
> 
> --Brett
>

The main server people are hitting is a.root-servers.net, they use this for
non-existant domains.  Messing with the root-servers is just wrong.

-- 
|           Alan L. * Webmaster of www.UnixPower.org           |
| Windsor Unix Users Group Founder: http://unix.windsor.on.ca/ |
|       Personal Page:  http://www.unixpower.org/alanp/        |


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990313140428.A26796>