[dns-operations] CERT VU#800113 Multiple DNS implementations vulnerable to cache poisoning
Paul Vixie
vixie at isc.org
Fri Jul 11 14:17:22 UTC 2008
> > If BCP38 were implemented Internet-wide, how exactly would you poison
> > a recursive name server?
>
> spoofing is utterly and completely irrelevant to poisoning a nameserver.
> please show how it is at all needed.
whoa. same planet, different worlds. did you read amit klein's papers?
did you read forgery-resilience? it is necessary, in order to get a cache
to accept something, to correctly match its expectation in the tuple
<servaddr,cliport,qname,qclass,qtype,qid> for some outstanding query that
it has made and is waiting an answer to. i know of no way to match this
tuple with an attack-o-gram unless i can spoof <servaddr>. that's how
cache poisoning works. that's how it's always worked.
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
More information about the dns-operations
mailing list