[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: The Impact of RFC Guidelines on DNS Spoofing Attacks
- To: bugtraq@xxxxxxxxxxxxxxxxx
- Subject: RE: The Impact of RFC Guidelines on DNS Spoofing Attacks
- From: have2Banonymous <a637831@xxxxxxxxx>
- Date: Sun, 18 Jul 2004 06:38:00 -0700 (PDT)
Hi,
The DNS paper is not at the mentioned URL since it was published in phrack
instead, and can be
found at the URL http://www.phrack.org/show.php?p=62&a=3
> -----Original Message-----
> From: have2Banonymous [mailto:a637831@xxxxxxxxx]
> Sent: Monday, July 12, 2004 5:46 AM
> To: bugtraq@xxxxxxxxxxxxxxxxx
> Subject: The Impact of RFC Guidelines on DNS Spoofing Attacks
>
>
> EXECUTIVE SUMMARY
>
> This paper provides a brief overview of basic Domain Name System (DNS)
> spoofing attacks against DNS client resolvers. Technical challenges are
> proposed that should help to both identify attempted attacks and prevent
> them from being successful. Relevant Request for Comments (RFC)
> guidelines, used by programmers to help ensure their DNS resolver code
> meets specifications, are reviewed. This results in the realisation
> that the RFC guidelines are not adequately specific or forceful to help
> identify or prevent DNS spoofing attacks against DNS client resolvers.
> Furthermore, the RFC guidelines actually simplify such attacks to a
> level that has not previously been discussed in the public domain until
> now.
>
> To highlight the consequences of merely conforming to the RFC guidelines
> without considering security ramifications, an example DNS spoofing
> attack against the DNS resolver in Microsoft Windows XP is provided.
> This illustrates serious weaknesses in the Windows XP DNS resolver
> client implementation. For example, Windows XP will accept a DNS reply
> as being valid without performing a thorough check that the DNS reply
> actually matches the DNS request. This allows an attacker to create a
> malicious generic DNS reply that only needs to meet a couple of criteria
> with predictable values in order to be accepted as a valid DNS reply by
> the targeted user.
>
> This paper discusses the practical impact of the issues raised, such as
> the ability to perform a successful and reasonably undetectable DNS
> spoofing attack against a large target base of Windows XP users, without
> the attacker requiring knowledge of the DNS requests issued by the
> targeted users. Finally, a comparison with the DNS resolver in Debian
> Linux is supplied.
>
>
> The paper can be found at the following URL:
> http://members.ozemail.com.au/~987654321/impact_of_rfc_on_dns_spoofing.p
> df
>
__________________________________
Do you Yahoo!?
Vote for the stars of Yahoo!'s next ad campaign!
http://advision.webevents.yahoo.com/yahoo/votelifeengine/