At 10:55 +0000 2/19/07, Tony Finch wrote:
On Mon, 19 Feb 2007, Edward Lewis wrote:

 3) I don't buy this as a security risk.  I don't think there is a problem
 here.

It allows you to use a DNS server to tunnel past a firewall. It allows you
to use a DNS server to probe a private network.

How?

Let's say I am an iterating server.

I send out a query

I get a referral effectively saying to go to 10.1.1.1.

I try my query (again) to that address

Either I will have a 10.1.1.1 locally and it has a port 53 resident DNS
or
I have a 10.1.1.1-enclosing subnet locally
or
I have a default route to the Internet

case 1 - the server will probably reply with a lame indication
case 2 - the UDP's will dry up in the ether
case 3 - the UDP will be dropped at a border router or the ISP's router

How would the person that put the 10.1.1.1 address into the DNS benefit from this in the sense that it compromises my security?

--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Edward Lewis                                                +1-571-434-5468
NeuStar

"Two years ago you said we had 5-7 years, now you are saying 3-5.  What I
need from you is a consistent story..."

_______________________________________________
DNSOP mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dnsop

Reply via email to