Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 22 Jul 2008 09:39:20 -0700
From:      Doug Barton <dougb@FreeBSD.org>
To:        cpghost <cpghost@cordula.ws>
Cc:        freebsd-stable@FreeBSD.ORG
Subject:   Re: FreeBSD 7.1 and BIND exploit
Message-ID:  <48860D38.6060209@FreeBSD.org>
In-Reply-To: <20080722160542.GA14592@epia-2.farid-hajji.net>
References:  <200807212219.QAA01486@lariat.net>	<200807221552.m6MFqgpm009488@lurza.secnetix.de> <20080722160542.GA14592@epia-2.farid-hajji.net>

next in thread | previous in thread | raw e-mail | index | archive | help
cpghost wrote:
> Yes indeed. If I understand all this correctly, it's because the 
> transaction ID that has to be sent back is only 2 bytes long,

2 bits, 16 bytes.

> and if the query port doesn't change as well with every query, that
> can be cracked in milliseconds: sending 65536 DNS queries to a
> constant port is just way too easy! The namespace is way too small,
> and there's no way to fix this by switching to, say, 4 bytes or
> even more for the transaction ID without breaking existing
> resolvers; actually without breaking the protocol itself.

That's more or less accurate, yes.

Doug

-- 

     This .signature sanitized for your protection




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?48860D38.6060209>