* Gerrit Pape:

> The attack under discussion is a bruteforce attack.

No, it's not, it's about 100 times faster than brute force.

> o Don't apply a patch against the djbdns binary package, but document the
> fact more prominently.  In fact it's already documented for years by
> upstream, and again detailled in his 'Februar 2009 comments'.

This is incorrect, the old version cannot be reasonably interpreted to
mean that a resolver running dnscache can be poisoned within
20 minutes.

> o Apply a patch to dbndns, the Debian fork of djbdns, that limits
> concurrent outgoing SOA queries to 20.  I'm of the opinion that this
> makes the attack significantly harder.

No, it doesn't.  Any cache miss will do.  There is just a slight
inefficiency when you have to switch names to get the next round of
cache misses.

> AFAIK from private discussion, the Debian security team doesn't agree
> with my assessment.  I don't know what their plans are for stable.

I still hope to get a better patch.



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to