Re: Windows DNS Cache Poisoning by Forwarder DNS Spoofing

看板Bugtraq作者時間18年前 (2007/04/19 05:40), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串7/8 (看更多)
Hello Makoto, > Thank you for the clarification, Tim. > That is exactly what I wanted to say. :) > > By the way, as regards recent Bind 9, birthday attack is much more > difficult to conduct because even if the attacker sends multiple > simultaneous recursive queries, Bind 9 aggregates these queries. Aggregating queries would definitely help if you assume the attacker can make recursive queries. However, it was my understanding (which could be completely wrong) that BIND 9 reuses sockets for multiple queries, unlike previous versions, and this makes spoofed attacks easier in another respect. (Of course this all has nothing to do with the Windows-specific flaw.) > In addition, there is a patch written by Jinmei-san for Bind 9.4.0 > (current release) to randomize source ports. > > http://www.jinmei.org/bind-9.4.0-portpool.patch > http://member.wide.ad.jp/tr/wide-tr-dns-bind9-portpool-01.txt > (technical report from WIDE project in Japanese) That's good, that at least someone is trying to do this in BIND. thanks for the info, tim
文章代碼(AID): #169f1g00 (Bugtraq)
討論串 (同標題文章)
文章代碼(AID): #169f1g00 (Bugtraq)