From: "Richard Hartmann" <richih.mailinglist@gmail.com>
To: Thomas Jacob <jacob@internet24.de>
Cc: netfilter@vger.kernel.org
Subject: Re: iptables, NAT, DNS & Dan Kaminsky
Date: Wed, 30 Jul 2008 19:19:23 +0200 [thread overview]
Message-ID: <2d460de70807301019y68e592f1x8e00af9fabff1ff6@mail.gmail.com> (raw)
In-Reply-To: <1217435970.14516.17.camel@enterprise.ims-firmen.de>
On Wed, Jul 30, 2008 at 18:39, Thomas Jacob <jacob@internet24.de> wrote:
> One of the main points of the Kaminsky exploits allegedly is
> (but who knows for sure, it hasn't been published yet)
The exploit _has_ been published and Dan confirmed it. The
current Metasploit implementation is not as fast as Dan's
version, but it works. Several people reported expoits in
the wild that are actively abusing said security hole.
> The question therefore is if you will really gain a lot
> of security with respect to the exploit in question. Hmm..
Yes. You increase the entropy from 2^16 to 2^32 - 1025.
This is not great security and DNSSEC is the only viable
long-term solution, but right now, I am concerned to fully
understand the impact of the exploit with regards to my
three questions.
> We'll know next week :)
We know right now. You have a chance of approximately
1/3000 to successfully exploit an old DNS caching server.
But you have to sit off the TTL each time so the attack
vector is impractical for most uses. Now, you can mount
a hundred attacks per second. That means you can
chew through the 3000 tries you need on average in less
than a minute.
With the higher entropy, I don't know the chances for a
successful exploit, but they are so low as to provide
some protection.
I am especially concerned about question 2:
Do all versions of iptables available in kernels 2.4 and 2.6
use the original source port for their NAT traffic, by default?
If not, what are the earliest versions that did this?
Thanks,
Richard
next prev parent reply other threads:[~2008-07-30 17:19 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-07-30 14:53 iptables, NAT, DNS & Dan Kaminsky Richard Hartmann
2008-07-30 16:39 ` Thomas Jacob
2008-07-30 17:19 ` Richard Hartmann [this message]
2008-07-30 18:17 ` Thomas Jacob
2008-07-31 3:06 ` Michael Rash
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2d460de70807301019y68e592f1x8e00af9fabff1ff6@mail.gmail.com \
--to=richih.mailinglist@gmail.com \
--cc=jacob@internet24.de \
--cc=netfilter@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox