Kaminsky's DNS hack
2008-07-23 19:20![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
beezari posted a copy of the leaked Matasano explanation of Kaminsky's new DNS attack. I believe the explanation isn't quite right. In his interview in the WIRED Threat Level blog Kaminsky mentions that the attack relies on CNAMEs. This means that it does not depend on glue nor on additional section processing, which is what Matasano described. I believe the real explanation is...
$ md5 <~/doc/kaminsky ef96f2d9e973a36e825793ddeff48ae5
no subject
Date: 2008-07-23 20:46 (UTC)(The other problem is that md5 is no longer strong enough for this kind of thing.)
no subject
Date: 2008-07-23 21:14 (UTC)no subject
Date: 2008-07-24 10:20 (UTC)ef96f2d9e973a36e825793ddeff48ae5
no subject
Date: 2008-07-24 10:27 (UTC)On the other hand, if he deleted the comments, who would miss them? More useful to me is that I've now been e-mailed a copy of your reply to my comment. (-8
no subject
Date: 2008-07-23 21:27 (UTC)no subject
Date: 2008-07-24 12:10 (UTC)no subject
Date: 2008-07-23 21:51 (UTC)http://metasploit.com/dev/trac/browser/framework3/trunk/modules/auxiliary/spoof/dns/baliwicked_host.rb
no subject
Date: 2008-07-24 09:55 (UTC)I wonder how many other problems are going to be spotted…
no subject
Date: 2008-07-24 11:44 (UTC)Note that in the example they are attacking a name that doesn't exist in the public DNS and which isn't in the cache before they run the attack. I believe Kaminsky's exploit is more powerful than this.
no subject
Date: 2008-07-23 23:59 (UTC)If I understand correctly, that is definitely in-bailiwick since the additional RR is for the answer to the original query (it's equivalent to the normal use of additional RRs for NS glue) and will successfully poison Alice's cache for WWW.VICTIM.COM.
I don't expect you can confirm nor deny that this is what Kaminsky is getting at if you're in possession of the canonical explanation however :-P
no subject
Date: 2008-07-24 10:24 (UTC)Your description of the attack agrees with mine. The interesting bit is why CNAME is necessary, and additional RRs aren't enough.
no subject
Date: 2008-07-24 10:03 (UTC)In this day and age caching answers to questions you didn't ask does some patently stupid.
no subject
Date: 2008-07-24 10:27 (UTC)no subject
Date: 2008-07-24 13:32 (UTC)> various useful optimisations.
If these optimisations necessarily break security they must be dropped, however useful. If "useful" means that the internet will melt without them then we need a new system and to retire DNS.
> DNSSEC is the answer :-)
I take the smiley to mean that I shouldn't go ahead and use DNSSEC on my machines (at least not yet).
no subject
Date: 2008-07-24 13:37 (UTC)