how to protect name servers against cache corruption

Ben Black black at zen.cypher.net
Wed Jul 30 01:19:54 UTC 1997


> > Noone in the security field has any right to expect any implementation of
> > DNS to be secure until DNSSEC is widely implemented.
> 

this statement bothers me.  certainly without DNSSEC there can be no 
*assurances* of security, but there is a gaping chasm between the current 
system and DNSSEC that could be closed significantly with proper design.

simply stating that until DNSSEC arrives these attacks are going to be 
allowed is a copout.


ben


> > I'm sorry if something I said misled you to believe otherwise.
> 
> So BIND 8.1.1 is NOT "immune" to the poisoned resource-record attack? I
> ask because you specifically stated that it was. Sorry to nag, I'd just
> like to see this clarified to the operations community.
> 
> Again, thanks for your time and patience!
> 
> ----------------
> Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [tqbf at enteract.com]
> ----------------
> "If you're so special, why aren't you dead?"
> 
> 



More information about the NANOG mailing list