[11420] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: how to protect name servers against cache corruption

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Jul 29 22:33:11 1997

To: tqbf@enteract.com
cc: vixie@vix.com (Paul A Vixie), nanog@merit.edu
In-reply-to: Your message of "Tue, 29 Jul 1997 20:30:18 CDT."
             <199707300130.UAA22939@enteract.com> 
Reply-To: perry@piermont.com
Date: Tue, 29 Jul 1997 22:13:23 -0400
From: "Perry E. Metzger" <perry@piermont.com>


Paul has made it clear that there are holes in the DNS protocols that
cannot be fixed without DNSSEC. He isn't papering anything over -- he
is merely describing reality. If you want to be sarcastic to him for
doing his best and being honest in public, well, that's fine, but
frankly I think you are doing the community a serious disservice by
attacking Paul.

.pm

"Thomas H. Ptacek" writes:
> > BIND 4.9.6 and 8.1.1 are immune to all known attacks, including the one
> 
> [ splice ]
> 
> > I know of attacks we are not immune to, which cannot be stopped without
> 
> Um. I hate to play semantic games, but if you know of attacks that BIND
> 8.1.1 is not immune to, then BIND 8.1.1 is not immune to all known
> attacks.
> 
> Since this is not a security list, I'll refrain from (rhetorically)
> informing you that history doesn't back up your assertion of the existence
> of "holes that only the good guys know".
> 
> Oops. Sorry about that.
> 
> Thanks for clearing this up!
> 
> ----------------
> Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [tqbf@enteract.com]
> ----------------
> "If you're so special, why aren't you dead?"
> 
> 

home help back first fref pref prev next nref lref last post