[106150] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (David Conrad)
Wed Jul 23 19:00:53 2008

From: David Conrad <drc@virtualized.org>
To: "Robert D. Scott" <robert@ufl.edu>
In-Reply-To: <002e01c8ed16$a1891c40$e49b54c0$@edu>
Date: Wed, 23 Jul 2008 16:00:39 -0700
Cc: nanog@merit.edu
Errors-To: nanog-bounces@nanog.org

Hi,

On Jul 23, 2008, at 3:51 PM, Robert D. Scott wrote:
> Actually you are not missing anything. It is a brute force attack.

I haven't looked at the exploit code, but the vulnerability Kaminsky  
found is a bit more than a brute force attack. As has been pointed out  
in various venues, it takes advantage of a couple of flaws in the DNS  
architecture. No, not simply the fact that the QID space is only 16  
bits.  That's part of it, but there is more. Really.  I'm sure you can  
find the 'leaked' Matasano Chargen description of the attack on the  
net somewhere.

> But other than just muck things up where is the motivation for a  
> poisoning?

Man-in-the-middle attacks directed at ISPs serving end users who want  
to (say) get to their banks?

Regards,
-drc




home help back first fref pref prev next nref lref last post