On Dec 14, 2014, at 12:28 PM, Matthew Ghali <mgh...@snark.net> wrote:
> How many different responses did we see to the recent recursion cve?

What I've seen so far:

Vulnerable:
- BIND 9, Unbound, PowerDNS Recursor

Not Vulnerable:
- Nominum, dnsmasq, djbdns, BIND 8

Haven't heard about Microsoft's recursor yet.

> How does code diversity fix protocol vulns?

Because different people implement the protocol differently (as evidenced by 
the above)?

Of course, one might argue that the fact that there were different behaviors 
might suggest a bug in the protocol specification, but that doesn't argue 
against code diversity.  Code diversity is to help mitigate implementation bugs.

Regards,
-drc

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
dns-operations mailing list
dns-operations@lists.dns-oarc.net
https://lists.dns-oarc.net/mailman/listinfo/dns-operations
dns-jobs mailing list
https://lists.dns-oarc.net/mailman/listinfo/dns-jobs

Reply via email to