Date: Sat, 13 Mar 1999 14:04:28 -0500 From: Alan <security@unixpower.org> To: Brett Glass <brett@lariat.org> Cc: freebsd-security@freebsd.org Subject: Re: bind 8.1.2 cache poisoning Message-ID: <19990313140428.A26796@unixpower.org> In-Reply-To: <4.1.19990313072602.00a6b430@localhost>; from Brett Glass on Sat, Mar 13, 1999 at 07:29:26AM -0700 References: <Pine.BSF.4.05.9903130520380.7303-100000@leaf.lumiere.net> <4.1.19990313072602.00a6b430@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Mar 13, 1999 at 07:29:26AM -0700, Brett Glass wrote: > It can't be hard to poison the cache. Many daemons do reverse lookups > on hosts which connect to them, presenting a perfect opportunity to > send a spoofed response that gets into the cache. If the "claimed" > name and the spoofed one match, they can get stuck for a very long > time (just make the time to live very long on purpose). > > For a standard that holds the Internet together, it is amazing just > how weak and awkward DNS really is. > > --Brett > The main server people are hitting is a.root-servers.net, they use this for non-existant domains. Messing with the root-servers is just wrong. -- | Alan L. * Webmaster of www.UnixPower.org | | Windsor Unix Users Group Founder: http://unix.windsor.on.ca/ | | Personal Page: http://www.unixpower.org/alanp/ | To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?19990313140428.A26796>