[dns-operations] Massive DNS poisoning attacks in Brazil
Jim Reid
jim at rfc1035.com
Mon Nov 7 14:18:41 UTC 2011
On 7 Nov 2011, at 13:20, Michele Neylon :: Blacknight wrote:
> So would RPKI etc., have helped in that instance?
Maybe. Though obviously this would depend on whether the routes
announced from the cracked router(s) had ROAs and how many ISPs were/
are using Secure BGP. However let's not go down that rat-hole.
Securing the routing infrastructure and reducing the scope/impact of
DNS cache poisioning attacks are two very different things. Both need
to be done. RPKI helps* with the former and DNSSEC with the latter.
The impact of route spoofing on this cache poisoning is hard to assess
from the info that's been provided. It doesn't look as if the bad guys
are redirecting DNS traffic or getting the DNS to return answers which
point at spoofed addresses/routes. If http://threatpost.com/en_us/blogs/major-dns-cache-poisoning-attack-hits-brazilian-isps-110711
is true, the attack appears to be a vanilla cache poisoning attack
which gets the gullible to install a naughty Java applet.
*For some definition of help that does not need to be debated here.
More information about the dns-operations
mailing list