off-topic (Re: how to protect name servers against cache corruption )

Ben Black black at zen.cypher.net
Wed Jul 30 09:58:14 UTC 1997


well, the router comment wasn't mine so i don't think it really needs 
explanation.

as for the childish attempt to imply that somehow the statement of a 
problem is tantamount to insanity, well...i guess i thought you could do 
better.

there *is* a problem with query ID spoofing, as you have known for years, 
*but* there is a way to significantly harden a nameserver against this 
sort of attack *without* going against RFC and without rewriting it in 
C++ with the help of Jim Phlegming.

i did not come up with the algorithm to win the spoof race, so i will 
leave that in the capable hands of tom ptacek.


ben

ps - perry, you can get off your knees now.

On Tue, 29 Jul 1997, Paul A Vixie wrote:

> if you want to know how to configure your router, hit "D" now.
> 
> > > > Noone in the security field has any right to expect any implementation of
> > > > DNS to be secure until DNSSEC is widely implemented.
> > 
> > this statement bothers me.  certainly without DNSSEC there can be no 
> > *assurances* of security, but there is a gaping chasm between the current 
> > system and DNSSEC that could be closed significantly with proper design.
> 
> please explain further.  perhaps i've been in this trench too long, i'm
> just not getting what you mean.  (how do i configure my router for that?)
> 
> > simply stating that until DNSSEC arrives these attacks are going to be 
> > allowed is a copout.
> 
> better yet, send diffs.  perhaps the bind-workers group are all idiots and
> this could actually be done better if we'd just rewrite it all in C++.  jim
> fleming keeps saying that that's the problem.  perhaps you and he could work
> together on a robust replacement for BIND.
> 



More information about the NANOG mailing list