Article 5S0YS Linux has a serious security problem that once again enables DNS cache poisoning

Linux has a serious security problem that once again enables DNS cache poisoning

by
Dan Goodin
from Ars Technica - All content on (#5S0YS)
digital-thing-800x534.jpeg

Enlarge (credit: Getty Images)

As much as 38 percent of the Internet's domain name lookup servers are vulnerable to a new attack that allows hackers to send victims to maliciously spoofed addresses masquerading as legitimate domains, like bankofamerica.com or gmail.com.

The exploit, unveiled in research presented today, revives the DNS cache-poisoning attack that researcher Dan Kaminsky disclosed in 2008. He showed that, by masquerading as an authoritative DNS server and using it to flood a DNS resolver with fake lookup results for a trusted domain, an attacker could poison the resolver cache with the spoofed IP address. From then on, anyone relying on the same resolver would be diverted to the same imposter site.

A lack of entropy

The sleight of hand worked because DNS at the time relied on a transaction ID to prove the IP number returned came from an authoritative server rather than an imposter server attempting to send people to a malicious site. The transaction number had only 16 bits, which meant that there were only 65,536 possible transaction IDs.

Read 14 remaining paragraphs | Comments

index?i=yz3Y2JF6Rms:EQ6oOKGDDAw:V_sGLiPB index?i=yz3Y2JF6Rms:EQ6oOKGDDAw:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments