North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: how to protect name servers against cache corruption

  • From: Ben Black
  • Date: Tue Jul 29 22:37:29 1997

so a statement from paul that the internet is effectively broken until 
DNSSEC is acceptable to you even if there are known ways to combat known 
attacks?

stop worshipping long enough to think about the ramifications of this.


ben


On Tue, 29 Jul 1997, Perry E. Metzger wrote:

> 
> Paul has made it clear that there are holes in the DNS protocols that
> cannot be fixed without DNSSEC. He isn't papering anything over -- he
> is merely describing reality. If you want to be sarcastic to him for
> doing his best and being honest in public, well, that's fine, but
> frankly I think you are doing the community a serious disservice by
> attacking Paul.
> 
> .pm
> 
> "Thomas H. Ptacek" writes:
> > > BIND 4.9.6 and 8.1.1 are immune to all known attacks, including the one
> > 
> > [ splice ]
> > 
> > > I know of attacks we are not immune to, which cannot be stopped without
> > 
> > Um. I hate to play semantic games, but if you know of attacks that BIND
> > 8.1.1 is not immune to, then BIND 8.1.1 is not immune to all known
> > attacks.
> > 
> > Since this is not a security list, I'll refrain from (rhetorically)
> > informing you that history doesn't back up your assertion of the existence
> > of "holes that only the good guys know".
> > 
> > Oops. Sorry about that.
> > 
> > Thanks for clearing this up!
> > 
> > ----------------
> > Thomas Ptacek at EnterAct, L.L.C., Chicago, IL [[email protected]]
> > ----------------
> > "If you're so special, why aren't you dead?"
> > 
> > 
>