Russ Allbery wrote:
> So far as I understand the additional protection provided by duplicate
> query merging, the attack that protects against practically requires
> direct access to the caching resolver, so listening only on localhost (or
> the equivalent) would make dnscache equivalently secure to any other DNS
> caching resolver.

i think this is a rather tenuous assertion.  it's only really true if
the resolver only performs lookups directly approved by the user sitting
at the machine, but on modern systems there are plenty of ways to
remotely induce queries to a caching resolver that only listens on the
loopback interface: HTTP resource loading in web browsers; DNS
prefetching in web browsers; MTAs which generate DNS lookups for HELO,
RCPT, etc.; DNS-based checks in email content filters.

the problem of identical outbound queries was identified well before
CVE-2008-4392; e.g., see VU#457875 from 2002:

    http://www.kb.cert.org/vuls/id/457875

-- 
Robert Edmonds
edmo...@debian.org

Attachment: signature.asc
Description: Digital signature

Reply via email to