On Mon, 4 Aug 2008 12:30:47 EDT, Ed Finnell <[EMAIL PROTECTED]> 
wrote:

>...
>>[EMAIL PROTECTED] writes:
>>
>>Recursion is the norm for DNS. I've never seen a DNS set up any 
>>other  way.
>...

>But isn't that out of ignorance or  pre-exploitation? ...

I don't think it's "out of ignorance" at all.  As I understand it, the
whole concept of DNS lookups is built around recursion - "I don't 
know, but know does".  The only 2 real choices are "I'll go ask
him" or "You go ask him".  (Maybe only the first is considered
recursive.  I don't know DNS processing that well.  I'm not even 
sure the 2nd option is part of standard DNS processing.)

I thought this newly surfaced vulnerability was based on "I don't
know, but he knows something that's close" processing - something
I'd never heard of before this past weekend. 

In any case it sounds like the vulnerability is not due to a bug
but due to the DNS architecture.  I can't imagine what the "fix"
is unless it is disabling the "in-bailiwick" processing.

BTW, a forwarding/caching name server on MVS is not directly
vulnerable, but will, of course, cache the bad address resolved
by a name server that has been corrupted.  And then it's cache
is just as poisoned as a vulnerable server's.  Clearing the cache
often lessens even that problem, but it sort of lessens the value
of a DNS cache, too.

Pat O'Keefe
      

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to