"David Higgs" <[EMAIL PROTECTED]> writes:

> At any rate, OpenBSD developers likely believe (or know from firsthand
> experience) that there are already satisfactory measures that can be
> taken by concerned admins to secure DNS or other traffic.  

My very superficial reading of the paper left me with the impression
that actually capturing enough data to successfully inject the desired
bad (or 'crafted') data would take on the order of several thousand
DNS queries *and* the successful calculation of the data to be
inserted with a matching checksum during something like a 90 second
window of opportunity.

Feel free to correct my impression, but if it's even approximately
right, there *are* better ways to deal with kiddies who try this
particular attack, several well known with the somewhat desirable
property that they are actually good for a number of other things too.

-- 
Peter N. M. Hansteen, member of the first RFC 1149 implementation team
http://bsdly.blogspot.com/ http://www.bsdly.net/ http://www.nuug.no/
"Remember to set the evil bit on all malicious network traffic"
delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to