On Fri, Feb 22, 2002 at 02:09:50PM -0800, Tom Marshall wrote:
> On Fri, Feb 22, 2002 at 08:27:48PM +0100, Patrick Schaaf wrote:
> > On Fri, Feb 22, 2002 at 10:32:10AM -0800, Tom Marshall wrote:
> > > DNS uses UDP.  TCP is normally only used for zone transfers.  There is
> > > significant philosophical discussion about this issue every time it is
> > > raised.. apparently some version(s) of AIX always use TCP for DNS requests. 
> > > But it works for about 99.999% of all requests.
> > 
> > It's not a philosophical question, but a technical question about whether
> > you support the standard. You can make up rationalisations about why
> > your standard violation won't affect you, but those self-justifications
> > are irrelevant. Your implementation is either standard-conforming, or not.
> > Blocking TCP DNS requests isn't, plain and simple. Face it. Say it out loud:
> >  
> > You are free to call that philosophy. I chose to call it stupidity.
> 
> Call it what you like.  When the next bind exploit comes out, my machine
> isn't going to get hacked.  If that means that someone with an old version
> of AIX cannot lookup my domain names, then that's just fine with me.  If
> that means that someone is going to argue with me on a mailing list, that's
> fine too.  It's not worth enabling TCP when the valid-request-to-hacker
> ratio is so close to zero.  Sure, it's not a technical reason.  It's a
> security reason.

I'm neither agreeing or disagreeing here, but your statement assumes
that the next BIND exploit will only be possible over TCP. How do you
know this?
-- 
Nate

"Smash forehead on keyboard to continue."  -Anon.  


Reply via email to