[dns-operations] [dns-wg] "DNS Vulnerabilities" paper hits the mainstream
Jim Reid
jim at rfc1035.com
Mon May 1 01:00:10 UTC 2006
On May 1, 2006, at 01:15, Bill Larson wrote:
> How can the "security of the DNS system" be considered as any
> better than
> the security of the parent servers?
Because the parent is not usually authoritative for its children.
Sure, the parent could insert bogus delegation info: a fake glue or
NS record. But this is little different from a slave server for the
child that tells lies about the zone. If anything, a lying slave is
probably much worse because the cache poisoning heuristics in a
decent implementation will give more credence to what an
authoritative child has to say than a non-authoritative parent.
> Using an example from the paper. If the FBI has a delegated server
> that can be easily hijacked, then this would mean that a significant
> number of queries for information in the "fbi.gov" domain could be
> subverted with invalid info. This is a security issue and it is
> not an
> issue under the direct control of the FBI (except for their
> decision to
> base their operation on a third party service).
One would hope that if someone outsources DNS service to a third
party, that will be subject to a contract which includes performance
levels, problem escalation, response to security incidents as well as
criminal or civil penalties for non-compliance. I'd get those
safeguards buying a cup of coffee, so why not when buying DNS service?
> Isn't this the same type of security issue evaluated with COPS?
I don't think so.
More information about the dns-operations
mailing list