[11474] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: how to protect name servers against cache corruption

daemon@ATHENA.MIT.EDU (Deepak Jain)
Wed Jul 30 16:25:22 1997

Date: Wed, 30 Jul 1997 16:02:04 -0400 (EDT)
From: Deepak Jain <deepak@jain.com>
To: tqbf@enteract.com
cc: chris@netmonger.net, nanog@merit.edu
In-Reply-To: <19970730043859.20924.qmail@smtp.enteract.com>


Wouldn't a behavior like this be able to be used to bring name servers 
down by simply killing CPU time? 

-Deepak.

On 30 Jul 1997 tqbf@smtp.enteract.com wrote:

> In article <19970730001246.22933@netmonger.net>, you wrote:
> >_details_.  Paul has written papers on DNS security, along with BIND
> >itself, and I'm inclined to believe him when he says there are no more
> >trivial fixes.  If you know of one, why don't you share it?  I'm not
> 
> Fair enough.
> 
> Here's a simple piece of input. If BIND 8.1.1 receives a DNS query
> response with an invalid query ID, it logs it and drops the packet.
> However, the invalid query ID is evidence of an attack in progress. Why
> doesn't BIND parse the packet, find out what question is being answered,
> and immediately re-issue the query with a different ID?
> 
> In other words, it's possible for BIND to detect that it is under attack
> (in a response-forged query-ID guessing situation). BIND doesn't do
> anything about this. Why?
> 
> Just the simplest suggestion I can come up with (without having this go
> into multiple pages) to convey the idea that I am trying to be
> constructive here. 
> 
> I'm not sure this is the appropriate forum for this discussion 
> (*copout*Ididn'tstartthisthread*copout*), but if you want further details
> as to my harebrained suggestions, I'm happy to give them!
> 
> -- 
> ----------------
> Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [tqbf@enteract.com]
> ----------------
> exit(main(kfp->kargc, argv, environ));
> 
> 

home help back first fref pref prev next nref lref last post