Full Disclosure mailing list archives
Re: DNS spoofing issue. Thoughts on
From: Valdis.Kletnieks () vt edu
Date: Sat, 26 Jul 2008 00:58:02 -0400
On Fri, 25 Jul 2008 23:16:18 CDT, Paul Schmehl said:
Just apply the Microsoft patches and you'll be fine. The patches make the attack essentially impossible.
Paul, don't make me take you out back and smack you around. :) First off - SBC probably doesn't run Windows on the server(s) that they do the external for RandallMan's site, so the Microsoft patches are going to do squat-all for that side of the problem. And RandallMan most certainly *DOES* need to worry about SBC getting patched - that's the *biggest* threat now, is mass poisoning of an ISP's DNS servers affecting *all* their customers. Paul Vixie already pointed out that on an unpatched system, the DNS can get poisoned in about 11 seconds. And we *also* know that by iteratively trying new bogus names, the attacker can keep trying over and over till it works or they get bored. And all the current patches do is make it *harder* to hit. The attack isn't "impossible", it's more like "1% chance *per hour* that your IDS doesn't notice and stop the attempts". Big difference...
Attachment:
_bin
Description:
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- DNS spoofing issue. Thoughts on RandallMan (Jul 25)
- Re: DNS spoofing issue. Thoughts on Paul Schmehl (Jul 25)
- Re: DNS spoofing issue. Thoughts on Valdis . Kletnieks (Jul 25)
- Re: DNS spoofing issue. Thoughts on Paul Schmehl (Jul 26)
- Re: DNS spoofing issue. Thoughts on coderman (Jul 28)
- Re: DNS spoofing issue. Thoughts on Valdis . Kletnieks (Jul 25)
- Re: DNS spoofing issue. Thoughts on Paul Schmehl (Jul 25)