[79939] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Jonathan Yarden @ TechRepublic: Disable DNS caching on workstations

daemon@ATHENA.MIT.EDU (Florian Weimer)
Mon Apr 18 15:49:32 2005

From: Florian Weimer <fw@deneb.enyo.de>
To: Jason Frisvold <xenophage0@gmail.com>
Cc: Daniel Golding <dgolding@burtongroup.com>,
	Chris Adams <cmadams@hiwaay.net>, nanog@merit.edu
Date: Mon, 18 Apr 2005 21:45:54 +0200
In-Reply-To: <924f292805041812052803616c@mail.gmail.com> (Jason Frisvold's
	message of "Mon, 18 Apr 2005 15:05:55 -0400")
Errors-To: owner-nanog@merit.edu


* Jason Frisvold:

> I think this is more of a question of who to trust.  Caching, in
> general, isn't a bad thing provided that TTL's are adhered to.  If the
> poisoning attack were to inject a huge TTL value, then that would
> compromise that cache.  (Note, I am no expert on dns poisoning, so I'm
> not sure if the TTL is "attackable")

I'm not sure if you can poison the entire cache of a stub resolver
(which can't do recursive lookups on its own).  I would expect that
the effect is limited to a particular DNS record, which in turn should
expire after the hard TTL limit (surely there is one).

home help back first fref pref prev next nref lref last post