On 21 Oct 2013, at 16:54, Keith Mitchell <ke...@smoti.org> wrote:

> Applying the same 5-years' now-outside hindsight to this, the benefits
> of all that port randomization work seem murky at best -

There was/is a vulnerability and it's been (sort of) plugged. Surely that's a 
Good Thing? Even if it just means the bar has been raised for an attacker. And 
only for those who have installed new-ish DNS code.

> The Herzberg/Shulman attacks seem even harder to exploit in
> a real (as opposed to la) environment

Maybe. OTOH knowing about this weakness and doing little to counteract it -- 
save for the universal deployment of DNSSEC -- seems irresponsible to me. YMMV.

That said, there are other vulnerabilities that are probably more significant 
than cache poisoning attacks: eg the probably intractable 
reflector/amplification problems.

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to