[11463] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: how to protect name servers against cache corruption

daemon@ATHENA.MIT.EDU (Paul A Vixie)
Wed Jul 30 14:32:29 1997

To: nanog@merit.edu
Date: Wed, 30 Jul 1997 11:09:24 -0700
From: Paul A Vixie <vixie@vix.com>

someone asked me a question in private e-mail that deserves a public answer.

> 1) How exactly did Eugene Kashperuff propogate this "RR poisoning" across
> the Internet? From NANOG's previous mailings I can deduce that it was along
> the lines of dig @victim -t ns www.alternic.net. Where www.alternic.net had
> duff A records.

yes.

> 2) What were/are the symptoms of this attack? www.internic.net resolving to
> www.alternic.net? 

yes.

> 3) If it was that easy to do, why hasn't it happened again?

because that particular attack only works if you are willing to get caught.
since eugene did this as a publicity stunt (which, i understand, has now
begun to backfire on him since his victims didn't interpret it that way),
he _needed_ to be caught.

> 3a) What measures were taken (other than discussion of DNSSEC, or lack of
> it) to 'cure' affected servers?

upgrade to bind-4.9.6 or bind-8.1.1.

> 4) How can I check for cache corruption?

"dig @0 www.netsol.com a" and "dig @cache00.ns.uu.net www.netsol.com a" and
check for differences.

> Apologies if any of the above sound moronic or ill-informed; extracting
> facts from reams of "what is a backhoe" mail list is a painfully slow task.
> Time for some filters I think...

no apologia needed.  public explainations of this attack have been poor, even
and especially by me.  i'm grateful for the opportunity to improve on that.

home help back first fref pref prev next nref lref last post