Serious vulnerability discovered in the DNS protocol

Meesterlijk

Verified User
Joined
Jan 19, 2007
Messages
69
Location
Netherlands
http://www.sidn.nl/ace.php/c,728,5906,,,,Serious_vulnerability_discovered_in_the_DNS_protocol.html

SIDN is responsible for the functional stability and development of the .nl Internet domain. As well as registering and allocating .nl domain names.

Below is a quote from the url above.

Serious vulnerability discovered in the DNS protocol

11/07/2008


SIDN advises patching DNS software

On 8 July 2008, various DNS software suppliers made a joint, coordinated announcement regarding a serious vulnerability in the DNS protocol. At the same time, software patches were made available for various DNS products. SIDN advises all DNS Service Providers (hosting service providers, ISPs and registrars) to take serious note of this announcement and to patch their DNS software at the earliest opportunity.

Patches
Almost all software publishers have included the necessary patches in their general update programmes. In most cases, therefore, the updates can be rolled out in the usual way. However, it should be noted that the rollout could have implications for firewall settings in some cases. We therefore advise consulting the information made available by the software supplier if you are in any doubt.

DNS
The DNS (Domain Name System) translates easily remembered domain names into the corresponding IP addresses. The detected vulnerability could be put to malicious use to direct people to incorrect websites.

Further information
The vulnerability is in the DNS protocol, rather than any particular DNS software product. It affects only ‘recursive’ DNS servers, also known as ‘caching resolvers’. On 6 August, security expert Dan Kaminsky will publish further details of this vulnerability. Once the information becomes public, it is liable to be put to malicious use, if this has not happened already.

For further technical details, see http://www.kb.cert.org/vuls/id/800113. where extensive information about the various DNS software suppliers is also available.

A tool for testing the vulnerability of your systems is available at www.doxpara.com.
 
Last edited:
It affects only ‘recursive’ DNS servers, also known as ‘caching resolvers’.

:)
 
And we all know we shouldn't be using our DNS servers as recursive servers, don't we :).

Those of us who do should probably switch to using separate recursive servers; they're usually provided by your upstream provider.

To make the switch simply add the IP#s of at least two separate recursive servers to your /etc/resolv.conf file, and remove any IP#s which reference your own server.

It's not necessary to restart anything.

Be sure to test.

Jeff
 
Back
Top