> On Jul 3, 2024, at 9:00 PM, Wall, Stephen <stephen.w...@redcom.com> wrote:
> 
>> From: Dag-Erling Smørgrav <d...@freebsd.org>
>> The base system unbound is meant to be used with a configuration generated by
>> `local-unbound-setup`, which never enables the `ede` option which is a
>> prerequisite for the DoS attack described in CVE-2024-1931.
> 
> Thanks for your reply.
> 
> Local_unbound_setup supports dropping additional config files in 
> /var/unbound/conf.d, which will be loaded by unbound.  Files in this 
> directory are not altered by local_unbound_setup.  This implies, to me, that 
> customization of the base unbound is specifically supported, meaning any 
> FreeBSD site could potentially have ede enabled, and therefore by vulnerable 
> to this CVE.
> It's my opinion that this warrants at least an advisory cautioning users of 
> FreeBSD not to enable ede, if not a patch to address it.

Local DoS’s do not get security advisories (logic here is a local user has a 
million ways to DoS a system). If the user has messed with the configuration of 
the local_unbound resolver to open it up to the network and get DoS’d from the 
remote network, I don’t feel this is something secteam is responsible for 
responding to.

Unbound exists as a port/pkg for the purposes of someone setting up a non-local 
resolver.

Best regards,
Gordon
Hat: security-officer

Attachment: signature.asc
Description: Message signed with OpenPGP

Reply via email to