<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<meta content="text/html;charset=ISO-8859-1" http-equiv="Content-Type">
</head>
<body bgcolor="#ffffff" text="#000000">
Interestingly,<br>
<br>
You can't actually escape this problem/vulnerability, you can only
reduce the chances of it happening to a level where is not practical
to attempt on the basis of success. <br>
<br>
The chances are determined by the number of tcp ports available.<br>
<br>
P.<br>
<br>
<br>
<br>
Jason Ede wrote:
<blockquote
cite="mid:4CAB0118AEC63A4FAAE77E6BCBDF760C65717C4A0D@server02.bhl.local"
type="cite">
<meta http-equiv="Content-Type" content="text/html; ">
<meta name="Generator" content="Microsoft Word 12 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<style>
<!--
/* Font Definitions */
@font-face
        {font-family:"Cambria Math";
        panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
        {font-family:Calibri;
        panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
        {font-family:Tahoma;
        panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
        {font-family:Consolas;
        panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
        {margin:0cm;
        margin-bottom:.0001pt;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";
        color:black;}
a:link, span.MsoHyperlink
        {mso-style-priority:99;
        color:blue;
        text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
        {mso-style-priority:99;
        color:purple;
        text-decoration:underline;}
p
        {mso-style-priority:99;
        mso-margin-top-alt:auto;
        margin-right:0cm;
        mso-margin-bottom-alt:auto;
        margin-left:0cm;
        font-size:12.0pt;
        font-family:"Times New Roman","serif";
        color:black;}
pre
        {mso-style-priority:99;
        mso-style-link:"HTML Preformatted Char";
        margin:0cm;
        margin-bottom:.0001pt;
        font-size:10.0pt;
        font-family:"Courier New";
        color:black;}
span.HTMLPreformattedChar
        {mso-style-name:"HTML Preformatted Char";
        mso-style-priority:99;
        mso-style-link:"HTML Preformatted";
        font-family:"Consolas","serif";
        color:black;}
span.EmailStyle21
        {mso-style-type:personal-reply;
        font-family:"Calibri","sans-serif";
        color:#1F497D;}
.MsoChpDefault
        {mso-style-type:export-only;
        font-size:10.0pt;}
@page Section1
        {size:612.0pt 792.0pt;
        margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.Section1
        {page:Section1;}
-->
</style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
<div class="Section1">
<p class="MsoNormal"><span
style="font-size: 11pt; font-family: "Calibri","sans-serif"; color: rgb(31, 73, 125);">Does
anyone know if there are any patches available for this for
FC7 or do I just need to download and compile a new version of bind?<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size: 11pt; font-family: "Calibri","sans-serif"; color: rgb(31, 73, 125);"><o:p> </o:p></span></p>
<p class="MsoNormal"><span
style="font-size: 11pt; font-family: "Calibri","sans-serif"; color: rgb(31, 73, 125);">Jason<o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size: 11pt; font-family: "Calibri","sans-serif"; color: rgb(31, 73, 125);"><o:p> </o:p></span></p>
<p class="MsoNormal"><span
style="font-size: 11pt; font-family: "Calibri","sans-serif"; color: rgb(31, 73, 125);"><o:p> </o:p></span></p>
<div
style="border-style: none none none solid; border-color: -moz-use-text-color -moz-use-text-color -moz-use-text-color blue; border-width: medium medium medium 1.5pt; padding: 0cm 0cm 0cm 4pt;">
<div>
<div
style="border-style: solid none none; border-color: rgb(181, 196, 223) -moz-use-text-color -moz-use-text-color; border-width: 1pt medium medium; padding: 3pt 0cm 0cm;">
<p class="MsoNormal"><b><span
style="font-size: 10pt; font-family: "Tahoma","sans-serif"; color: windowtext;"
lang="EN-US">From:</span></b><span
style="font-size: 10pt; font-family: "Tahoma","sans-serif"; color: windowtext;"
lang="EN-US">
<a class="moz-txt-link-abbreviated" href="mailto:mailscanner-bounces@lists.mailscanner.info">mailscanner-bounces@lists.mailscanner.info</a>
[<a class="moz-txt-link-freetext" href="mailto:mailscanner-bounces@lists.mailscanner.info">mailto:mailscanner-bounces@lists.mailscanner.info</a>] <b>On Behalf Of </b>Randal,
Phil<br>
<b>Sent:</b> 10 July 2008 23:53<br>
<b>To:</b> MailScanner discussion<br>
<b>Subject:</b> RE: Watch it: Multiple DNS
implementationsvulnerableto cachepoisoning<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">It
looks like this vulnerability is rather serious:</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;"><a
moz-do-not-send="true"
href="http://securosis.com/2008/07/09/more-on-the-dns-vulnerability/">http://securosis.com/2008/07/09/more-on-the-dns-vulnerability/</a><o:p></o:p></span></p>
<div>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;"> <o:p></o:p></span></p>
</div>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">RedHat
has released updated packages for RedHat 5.x:</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;"><a
moz-do-not-send="true"
href="http://rhn.redhat.com/errata/RHSA-2008-0533.html">http://rhn.redhat.com/errata/RHSA-2008-0533.html</a></span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif";">"[Updated
10th July 2008]<br>
We have updated the Enterprise Linux 5 packages in this advisory. The<br>
default and sample caching-nameserver configuration files have been
updated<br>
so that they do not specify a fixed query-source port. Administrators<br>
wishing to take advantage of randomized UDP source ports should check
their<br>
configuration file to ensure they have not specified fixed query-source
ports."</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">Hooray!</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">I've
posted comments on Dan Kaminsky's blog and elsewhere drawing
people's attention to the need to check BIND config files.</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">Cheers,</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">Phil</span><o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<div class="MsoNormal" style="text-align: center;" align="center"><span
lang="EN-US">
<hr align="center" size="2" width="100%"></span></div>
<p class="MsoNormal" style="margin-bottom: 12pt;"><b><span
style="font-size: 10pt; font-family: "Tahoma","sans-serif";"
lang="EN-US">From:</span></b><span
style="font-size: 10pt; font-family: "Tahoma","sans-serif";"
lang="EN-US">
<a class="moz-txt-link-abbreviated" href="mailto:mailscanner-bounces@lists.mailscanner.info">mailscanner-bounces@lists.mailscanner.info</a>
[<a class="moz-txt-link-freetext" href="mailto:mailscanner-bounces@lists.mailscanner.info">mailto:mailscanner-bounces@lists.mailscanner.info</a>]
<b>On Behalf Of </b>Randal, Phil<br>
<b>Sent:</b> 10 July 2008 13:21<br>
<b>To:</b> MailScanner discussion<br>
<b>Subject:</b> RE: Watch it: Multiple DNS
implementationsvulnerableto
cachepoisoning</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">query-source
defines the IP address (IPv4 or IPv6) and optional
port to be used as the source for <strong><span
style="font-family: "Arial","sans-serif";">outgoing</span></strong>
queries from the server</span><span
style="font-size: 10pt; font-family: "Arial","sans-serif";">.</span><o:p></o:p></p>
<div>
<p class="MsoNormal"> <o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">The
default is a random unprivileged port.</span><o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"> <o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">There
may, of course, be over-zealous firewall rules (or SELinux
policies) which mistakenly insist that the source and destination ports
are
both 53, but that's plain wrong.</span><o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"> <o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">And
dangerous.</span><o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"> <o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">Cheers,</span><o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"> <o:p></o:p></p>
</div>
<div>
<p class="MsoNormal"><span
style="font-size: 10pt; font-family: "Arial","sans-serif"; color: blue;">Phil</span><o:p></o:p></p>
</div>
<p><span style="font-size: 10pt; font-family: "Arial","sans-serif";">--</span>
<br>
<span style="font-size: 10pt; font-family: "Arial","sans-serif";">Phil
Randal</span>
<br>
<span style="font-size: 10pt; font-family: "Arial","sans-serif";">Networks
Engineer</span> <br>
<span style="font-size: 10pt; font-family: "Arial","sans-serif";">Herefordshire
Council</span> <br>
<span style="font-size: 10pt; font-family: "Arial","sans-serif";">Hereford,
UK</span>
<o:p></o:p></p>
<div>
<p class="MsoNormal"> <o:p></o:p></p>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<div class="MsoNormal" style="text-align: center;" align="center"><span
lang="EN-US">
<hr align="center" size="2" width="100%"></span></div>
<p class="MsoNormal" style="margin-bottom: 12pt;"><b><span
style="font-size: 10pt; font-family: "Tahoma","sans-serif";"
lang="EN-US">From:</span></b><span
style="font-size: 10pt; font-family: "Tahoma","sans-serif";"
lang="EN-US">
<a class="moz-txt-link-abbreviated" href="mailto:mailscanner-bounces@lists.mailscanner.info">mailscanner-bounces@lists.mailscanner.info</a>
[<a class="moz-txt-link-freetext" href="mailto:mailscanner-bounces@lists.mailscanner.info">mailto:mailscanner-bounces@lists.mailscanner.info</a>] <b>On Behalf Of </b>Peter
Farrow<br>
<b>Sent:</b> 10 July 2008 13:07<br>
<b>To:</b> MailScanner discussion<br>
<b>Subject:</b> Re: Watch it: Multiple DNS implementations
vulnerableto
cachepoisoning</span><span lang="EN-US"><o:p></o:p></span></p>
<p class="MsoNormal">If you're running a public DNS server or a DNS
server for
your LAN clients then these lines are an extremely good idea...<br>
<br>
P.<br>
<br>
<br>
Randal, Phil wrote: <o:p></o:p></p>
<pre>Have you made sure that in named.conf there are no<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre> query-source port 53; <o:p></o:p></pre>
<pre> query-source-v6 port 53;<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>lines?<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Cheers,<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Phil<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>--<o:p></o:p></pre>
<pre>Phil Randal<o:p></o:p></pre>
<pre>Networks Engineer<o:p></o:p></pre>
<pre>Herefordshire Council<o:p></o:p></pre>
<pre>Hereford, UK<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>-----Original Message-----<o:p></o:p></pre>
<pre>From: <a moz-do-not-send="true"
href="mailto:mailscanner-bounces@lists.mailscanner.info">mailscanner-bounces@lists.mailscanner.info</a><o:p></o:p></pre>
<pre>[<a moz-do-not-send="true"
href="mailto:mailscanner-bounces@lists.mailscanner.info">mailto:mailscanner-bounces@lists.mailscanner.info</a>] On Behalf Of Jason<o:p></o:p></pre>
<pre>Ede<o:p></o:p></pre>
<pre>Sent: 10 July 2008 11:15<o:p></o:p></pre>
<pre>To: MailScanner discussion<o:p></o:p></pre>
<pre>Subject: RE: Watch it: Multiple DNS implementations vulnerable to<o:p></o:p></pre>
<pre>cachepoisoning<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>I've patched some servers and they're showing good, but on one behind a<o:p></o:p></pre>
<pre>firewall its still showing as poor despite the update being run... Its<o:p></o:p></pre>
<pre>running Centos5.1<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Jason<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre><o:p> </o:p></pre>
<pre> <o:p></o:p></pre>
<blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
<pre>-----Original Message-----<o:p></o:p></pre>
<pre>From: <a moz-do-not-send="true"
href="mailto:mailscanner-bounces@lists.mailscanner.info">mailscanner-bounces@lists.mailscanner.info</a> [<a
moz-do-not-send="true" href="mailto:mailscanner">mailto:mailscanner</a>- <o:p></o:p></pre>
<pre><a moz-do-not-send="true"
href="mailto:bounces@lists.mailscanner.info">bounces@lists.mailscanner.info</a>] On Behalf Of shuttlebox<o:p></o:p></pre>
<pre>Sent: 10 July 2008 09:42<o:p></o:p></pre>
<pre>To: MailScanner discussion<o:p></o:p></pre>
<pre>Subject: Re: Watch it: Multiple DNS implementations vulnerable to <o:p></o:p></pre>
<pre>cache poisoning<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>On Thu, Jul 10, 2008 at 3:54 AM, Ken A <a
moz-do-not-send="true" href="mailto:ka@pacific.net"><ka@pacific.net></a> wrote:<o:p></o:p></pre>
<pre> <o:p></o:p></pre>
<blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
<pre>They are probably not random enough. You can look at them with<o:p></o:p></pre>
<pre> <o:p></o:p></pre>
</blockquote>
<pre>netstat or<o:p></o:p></pre>
<pre> <o:p></o:p></pre>
<blockquote style="margin-top: 5pt; margin-bottom: 5pt;">
<pre>lsof -i<o:p></o:p></pre>
<pre> <o:p></o:p></pre>
</blockquote>
<pre>OK, it's the standard deviation that is key to the result. Unique <o:p></o:p></pre>
<pre>ports but all in a row for example is of course not good.<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>I have now patched one server and it shows GOOD with a high std dev.<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>/peter<o:p></o:p></pre>
<pre>--<o:p></o:p></pre>
<pre>Robert Benchley - "Drawing on my fine command of the English <o:p></o:p></pre>
<pre>language, I said nothing."<o:p></o:p></pre>
<pre>--<o:p></o:p></pre>
<pre>MailScanner mailing list<o:p></o:p></pre>
<pre><a moz-do-not-send="true"
href="mailto:mailscanner@lists.mailscanner.info">mailscanner@lists.mailscanner.info</a><o:p></o:p></pre>
<pre><a moz-do-not-send="true"
href="http://lists.mailscanner.info/mailman/listinfo/mailscanner">http://lists.mailscanner.info/mailman/listinfo/mailscanner</a><o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Before posting, read <a moz-do-not-send="true"
href="http://wiki.mailscanner.info/posting">http://wiki.mailscanner.info/posting</a><o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Support MailScanner development - buy the book off the website!<o:p></o:p></pre>
<pre> <o:p></o:p></pre>
</blockquote>
<pre>--<o:p></o:p></pre>
<pre>MailScanner mailing list<o:p></o:p></pre>
<pre><a moz-do-not-send="true"
href="mailto:mailscanner@lists.mailscanner.info">mailscanner@lists.mailscanner.info</a><o:p></o:p></pre>
<pre><a moz-do-not-send="true"
href="http://lists.mailscanner.info/mailman/listinfo/mailscanner">http://lists.mailscanner.info/mailman/listinfo/mailscanner</a><o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Before posting, read <a moz-do-not-send="true"
href="http://wiki.mailscanner.info/posting">http://wiki.mailscanner.info/posting</a><o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Support MailScanner development - buy the book off the website! <o:p></o:p></pre>
<pre>--<o:p></o:p></pre>
<pre>MailScanner mailing list<o:p></o:p></pre>
<pre><a moz-do-not-send="true"
href="mailto:mailscanner@lists.mailscanner.info">mailscanner@lists.mailscanner.info</a><o:p></o:p></pre>
<pre><a moz-do-not-send="true"
href="http://lists.mailscanner.info/mailman/listinfo/mailscanner">http://lists.mailscanner.info/mailman/listinfo/mailscanner</a><o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Before posting, read <a moz-do-not-send="true"
href="http://wiki.mailscanner.info/posting">http://wiki.mailscanner.info/posting</a><o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre>Support MailScanner development - buy the book off the website!<o:p></o:p></pre>
<pre><o:p> </o:p></pre>
<pre> <o:p></o:p></pre>
<p class="MsoNormal"><br>
-- <br>
This message has been scanned for viruses and <br>
dangerous content by the <a moz-do-not-send="true"
href="http://www.inexcom.co.uk/"><b>Inexcom</b></a>
system scanner, <br>
and is believed to be clean. <br>
Advanced heuristic mail scanning server [-]. <o:p></o:p></p>
</div>
</div>
<br>
--
<br>
This message has been scanned for viruses and
<br>
dangerous content by the <a moz-do-not-send="true"
href="http://www.inexcom.co.uk/"><b>Inexcom</b></a> system scanner,
<br>
and is believed to be clean.
<br>
Advanced heuristic mail scanning server [0].
</blockquote>
</body>
<br />--
<br />This message has been scanned for viruses and
<br />dangerous content by the
<a href="http://www.inexcom.co.uk/"><b>Inexcom</b></a> system scanner,
<br />and is believed to be clean.
<br />Advanced heuristic mail scanning server [-].
</html>