[11410] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: how to protect name servers against cache corruption

daemon@ATHENA.MIT.EDU (Paul A Vixie)
Tue Jul 29 21:36:06 1997

To: tqbf@enteract.com
cc: nanog@merit.edu
In-reply-to: Your message of "Tue, 29 Jul 1997 19:49:43 CDT."
             <199707300049.TAA17418@enteract.com> 
Date: Tue, 29 Jul 1997 18:08:50 -0700
From: Paul A Vixie <vixie@vix.com>

> > Noone in the security field has any right to expect any implementation of
> > DNS to be secure until DNSSEC is widely implemented.
> 
> > I'm sorry if something I said misled you to believe otherwise.
> 
> So BIND 8.1.1 is NOT "immune" to the poisoned resource-record attack? I
> ask because you specifically stated that it was. Sorry to nag, I'd just
> like to see this clarified to the operations community.

BIND 4.9.6 and 8.1.1 are immune to all known attacks, including the one
Eugene Kashpureff copied and put into wide public use recently.

I know of attacks we are not immune to, which cannot be stopped without
DNSSEC.  My paper, whose URL I gave in the previous message, alludes to
some of these without exactly giving a road map for their use.

home help back first fref pref prev next nref lref last post