[dns-operations] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

Viktor Dukhovni ietf-dane at dukhovni.org
Wed Aug 18 01:04:08 UTC 2021


> On 17 Aug 2021, at 8:55 pm, Andrew Sullivan <ajs at anvilwalrusden.com> wrote:
> 
>> Sadly, while getdnsapi looks somewhat natural to a Python programmer, it
>> is a rather poor C API
> 
> I recognize that this is true; but honestly, if we're trying to make something safe we're not aiming at C programmers in the first place.  If you're writing C programs today and you're not checking every single input and output for malicious content, then you're a hazard to everyone and not just your users.  The idea that such a problem could be solved by "better resolvers" is just fatuous: all that will do is make better malware.
> 
> This is not an attempt to dump on C or applications in C or anything like that.  It is rather, IMO, to point out that people who are operating the table saw without a blade guard are already undertaking dangerous operations, and insisting on safety googles for "cross-cuts with a finish blade while standing behind the multi-cm thick workpiece" is not really going to help.

This is why for me, C is now only for maintaining legacy code bases and
FFI from a modern language to some system interface.  For new code, I'm
now using Haskell.

-- 
	Viktor.





More information about the dns-operations mailing list