|
A fundamental flaw in the design of the Domain Name System (DNS) was found earlier this year by security researcher Dan Kaminsky, renowned Internet Security expert. Researchers say they will fully describe the vulnerability in 30 days, after companies that operate web sites or Internet service providers can put the patches in place. The flaw is big enough that Kaminsky and other companies involved brought in government agencies such as the Department of Homeland Security and the U.S. Computer Emergency Response Team. Until the announcement today, experts had been quietly working on coordinating a massive patch affecting all types DNS implementation. Experts emphasized during the press conference today that the flaw is within the DNS protocol and in no way specific to any particular vendor.
Sources:
• A related DNS checker tool is available on Kaminsky's website located on the top right hand corner.
• Vulnerability announcement from CERT: Multiple DNS implementations vulnerable to cache poisoning
• ISC Press Release on BIND: ISC acts quickly to shield BIND user base
• Related podcast interview with Dan Kaminsky
• OpenDNS service recommended as a safe alternative DNS service to those of ISPs
• DNSstuff Freeware Detects Vulnerable DNS Servers
• Black Hat Webcast
Updates:
• Alliance forms to fix DNS poisoning flaw 7/8/2009 - SecurityFocus
• Mulitple Vendors DNS Spoofing Vulnerability 7/8/2008 - Internet Storm Center
• Related discussions on Slashdot 7/8/2008 - Slashdot
• Major DNS flaw could disrupt the Internet 7/8/2008 - Network World
• Kaminsky and Ptacek comment on DNS flaw 7/8/2008 - ZDNet
• An Astonishing Collaboration 7/9/208 - CircleID
• Internet Bug Fix Spawns Backlash From Hackers 7/9/2008 - PC World
• Who's Really at Risk From the DNS Flaw? 7/10/2008 - InternetNews
• DNS researcher convinces skeptics that bug is serious 7/11/2008 - ComputerWorld
• The man who changed Internet security 7/14/2008 - CNet
• Not a Guessing Game 7/14/2008 - CircleID
• RHN Bind Update Brings Down RHEL Named 7/18/2008 - Slashdot
• Has Halvar figured out super-secret DNS vulnerability? 7/21/2008 - ZDNet
• Kaminsky's DNS Attack Disclosed, Then Pulled 7/21/2008 - Slashdot
• DNS Security Flaw Secret Leaked Prior to Set Date: Patch DNS as Fast as Possible 7/21/2008 - CircleID
• DNS Attack Code Has Been Published 7/23/2008 - CircleID
• Kaminsky suggests long-term fix will still have to be determined 7/24/2008 - ZDNet
• Day 30: Kaminsky DNS Bug Disclosure 8/6/2008 - CircleID
Read full story: External Source
To post your comments, please login or create an account.
Sponsored byAppdetex
Sponsored byVerisign
Sponsored byAfilias
Sponsored byThreat Intelligence Platform
Sponsored byIPv4.Global
Sponsored byAfilias
Sponsored byWhoisXML API
Sponsored byVerisign
Is this the DNS bug that was patched today by Microsoft?
Larry, yes according this and probably other sources which I havn't had time to look into:
One of the Microsoft fixes for Windows DNS was part of a group of patches issued today by software vendors to plug a multi-platform hole. The researcher who uncovered the vulnerability called the group patch effort the "largest synchronized security update in the history of the Internet."
Larry — Yes it was.
http://blog.opendns.com/ has some of our perspective. :-)
Quite the big news yesterday! Not everyone was vulnerable, as I bet the previous commenter points out via his URL.
Here's my attempt to describe the problem to a broader audience:
http://cparente.wordpress.com/2008/07/09/its-tuesday-must-be-time-to-fix-dns/