[dns-operations] summary of recent vulnerabilities in DNS security.

Jim Reid jim at rfc1035.com
Mon Oct 21 16:20:54 UTC 2013

On 21 Oct 2013, at 16:54, Keith Mitchell <keith at smoti.org> wrote:

> Applying the same 5-years' now-outside hindsight to this, the benefits
> of all that port randomization work seem murky at best -

There was/is a vulnerability and it's been (sort of) plugged. Surely that's a Good Thing? Even if it just means the bar has been raised for an attacker. And only for those who have installed new-ish DNS code.

> The Herzberg/Shulman attacks seem even harder to exploit in
> a real (as opposed to la) environment

Maybe. OTOH knowing about this weakness and doing little to counteract it -- save for the universal deployment of DNSSEC -- seems irresponsible to me. YMMV.

That said, there are other vulnerabilities that are probably more significant than cache poisoning attacks: eg the probably intractable reflector/amplification problems.

More information about the dns-operations mailing list