BIND 9 cache posioning exploit discoverd -- not the one on OpenBSD

近期发现BIND9存在新漏洞,攻击者可远程利用此漏洞进行缓存中毒。OpenBSD版BIND9因采用线性同余发生器而非线性反馈移位寄存器,故不受该漏洞影响。
as some of you may have noticed, a new weakness in BIND 9 has recently been discovered.  using this weakness, an attacker can remotely poison the cache of any BIND 9 server.  the attacker can do this due to a weakness in the transaction ID generation algorithm used.
when BIND 9 was first imported into OpenBSD, we decided not to use the default ID generation algorithm (LFSR, Linear Feedback Shift
Register) but to use a more proven algorithm (LCG, Linear Congruential Generator) instead.  thanks to this wise decision, the BIND 9 shipped with OpenBSD does not have this weakness.

the proactive security of OpenBSD strikes again,
 jakob
==============================================================================
A glance at the README.OpenBSD file for 4.1 in /usr/src/usr.sbin/bind shows (among other things):
- add LCG (Linear Congruential Generator) implementation to libisc
- use LCG instead of LFSR for ID generation until LFSR is proven reliable
- strlcpy/strlcat/snprintf fixes

Without digging into things deeper, it looks like this is unlikely to be an issue since the OBSD version doesn't rely on LFSR.
==============================================================================
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值