[12562] in bugtraq

home help back first fref pref prev next nref lref last post

Re: your mail

daemon@ATHENA.MIT.EDU (Alan Brown)
Sat Nov 13 21:24:13 1999

Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id:  <Pine.LNX.4.05.9911130841140.7131-100000@mailhost.manawatu.net.nz>
Date:         Sat, 13 Nov 1999 08:41:49 +1300
Reply-To: Alan Brown <alan@MANAWATU.GEN.NZ>
From: Alan Brown <alan@MANAWATU.GEN.NZ>
X-To:         Brian Wellington <bwelling@TISLABS.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.10.9911111415130.18963-100000@spiral.gw.tislabs.com>

On Thu, 11 Nov 1999, Brian Wellington wrote:

> Caching-only servers are also vulnerable.  The NXT record is no different
> that any other DNS record in this case.  If someone is able to make your
> server fetch a maliciously-constructed NXT record, it will cause problems.
> A query to a caching server will force the server to send a recursive
> query, which makes the caching server vulnerable.

All the more reason to define local IP ranges and restrict allow-query
to those ranges only by default.

AB

home help back first fref pref prev next nref lref last post