|
Full Disclosure
mailing list archives
Re: DNS Cache Dan Kamikaze (Actual Exploit Discussion)
From: Mark Andrews <Mark_Andrews () isc org>
Date: Wed, 16 Jul 2008 02:14:42 +1000
--On Tuesday, July 15, 2008 09:14:39 +1000 Mark Andrews <Mark_Andrews () isc org
wrote:
And the best solution to this attack is to deploy DNSSEC.
You don't care where the response comes from provide the
signatures are good.
Except that DNSSEC is going to have to improve dramatically to achieve
widespread adoption. Right now it's a PITA to understand and implement and
then 30 days later you have to do it all over again. Frankly, it's not worth
the effort until the technology improves enough to make it easier to implemen
t
and maintain.
Have you actually tried to sign a zone?
Have you actually tried to re-sign a zone?
Just use the defaults and don't try to control every aspect.
It really is not that difficult and yes it is getting easier
still. If you can manage a zone, you can manage a signed
zone.
If you are writing a nameserver there is a lot you need to
know but to administer a signed zone there is very little
you need to know.
http://www.isc.org/sw/bind/docs/DNSSEC_in_6_minutes.pdf
I know you don't want to hear that, but that's the truth.
--
Paul Schmehl
As if it wasn't already obvious,
my opinions are my own and not
those of my employer.
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
--
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742 INTERNET: Mark_Andrews () isc org
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
(Thread continues...)
|