[128073] in cryptography@c2.net mail archive
Re: Kaminsky finds DNS exploit
daemon@ATHENA.MIT.EDU (John Levine)
Mon Jul 14 10:36:13 2008
Date: 14 Jul 2008 14:22:30 -0000
From: John Levine <johnl@iecc.com>
To: cryptography@metzdowd.com
In-Reply-To: <87od51r536.fsf@mid.deneb.enyo.de>
Cc: fw@deneb.enyo.de
>CERT/CC mentions this:
>
>| It is important to note that without changes to the DNS protocol, such
>| as those that the DNS Security Extensions (DNSSEC) introduce, these
>| mitigations cannot completely prevent cache poisoning.
Why wouldn't switching to TCP lookups solve the problem?  It's
arguably more traffic than DNSSEC, but it has the large practical
advantage that they actually work with deployed servers today.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com