Fasten your seatbelts, it's going to be a bumpy ride!

A

Alun Jones

Kayman said:
DNS flaw discoverer says more permanent fixes will be needed
Current patch options merely stopgaps; worst attacks likely on the way
http://www.computerworld.com/action...ewArticleBasic&articleId=9110284&pageNumber=1

Eagerly awaiting ZA's reaction :)

Well, good, because I'd hate to think the current state of patches are the
best we can do.

On Windows, we have an over-full netstat display, because DNS reserves 2500
ports; some services that haven't set the ReservedPorts registry key find
that their ports are sometimes (randomly) blocked by DNS reserving those
ports first.

On Linux, or other platforms using BIND, we have UDP-based daemons receiving
DNS responses on a random basis, because the DNS server accidentally picks
their port to send from.

"needs a little work" is a good description.

Alun.
~~~~
 
K

Kayman

Well, good, because I'd hate to think the current state of patches are the
best we can do.

On Windows, we have an over-full netstat display, because DNS reserves 2500
ports; some services that haven't set the ReservedPorts registry key find
that their ports are sometimes (randomly) blocked by DNS reserving those
ports first.

On Linux, or other platforms using BIND, we have UDP-based daemons receiving
DNS responses on a random basis, because the DNS server accidentally picks
their port to send from.

"needs a little work" is a good description.

Just a quick note...
http://www.doxpara.com/

Stay tuned :)
 
A

Anteaus

By the sound of things it's probably better NOT to apply these patches to
internal, non-internet-facing DNS servers, as if I read correctly they could
randomly interfere with other unrelated functions of the server.

Would you agree?
 
A

Alun Jones

Anteaus said:
By the sound of things it's probably better NOT to apply these patches to
internal, non-internet-facing DNS servers, as if I read correctly they
could
randomly interfere with other unrelated functions of the server.

I wouldn't say "yes" or "no" to any patch this soon after it's released,
without knowing your environment and the systems that will be patched.

As with all significant behaviour changes, you should test it in your
environment, and follow appropriate workarounds.

It's a good idea, in general, to indicate to the operating system that
certain applications have reserved ports using the ReservedPorts registry
key - whether you apply or don't apply this patch. That way other
applications besides DNS won't try to poach a port that's already in use -
as is shown by the example of BIND DNS servers, an application can quite
easily cause traffic to be directed to a service, if it isn't kept away from
reusing that socket, and ReservedPorts is the Windows way to do that across
multiple applications.

Test the patch in your environment, if you have multiple DNS servers, make
sure it doesn't adversely affect your operations, and then deploy the patch.

Expect another patch to DNS - but it might not be this month, or for a
couple of months. Don't hold off patching because "there might be another
patch", use this as an opportunity to solidify your DNS testing methodology,
so that you can test more quickly with the next patch, whenever that might
occur.

DNS is starting to really show its age.

Alun.
~~~~
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top