[dns-operations] Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
Viktor Dukhovni
ietf-dane at dukhovni.org
Wed Aug 18 01:04:08 UTC 2021
> On 17 Aug 2021, at 8:55 pm, Andrew Sullivan <ajs at anvilwalrusden.com> wrote:
>
>> Sadly, while getdnsapi looks somewhat natural to a Python programmer, it
>> is a rather poor C API
>
> I recognize that this is true; but honestly, if we're trying to make something safe we're not aiming at C programmers in the first place. If you're writing C programs today and you're not checking every single input and output for malicious content, then you're a hazard to everyone and not just your users. The idea that such a problem could be solved by "better resolvers" is just fatuous: all that will do is make better malware.
>
> This is not an attempt to dump on C or applications in C or anything like that. It is rather, IMO, to point out that people who are operating the table saw without a blade guard are already undertaking dangerous operations, and insisting on safety googles for "cross-cuts with a finish blade while standing behind the multi-cm thick workpiece" is not really going to help.
This is why for me, C is now only for maintaining legacy code bases and
FFI from a modern language to some system interface. For new code, I'm
now using Haskell.
--
Viktor.
More information about the dns-operations
mailing list