Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security IT

Dan Bernstein Confirms Security Flaw In Djbdns 66

secmartin writes "Dan Bernstein has just admitted that a security issue has been found in the djbdns software, one of most popular alternatives for the BIND nameserver. As part of the djbdns security guarantee, $1000 will be paid to Matthew Dempsky, the researcher that found the bug. The bug allows a nameserver running djbdns to be poisoned using just a single packet. Other researchers have found a separate issue that allows dnscache, the DNS cache that is also part of the djbdns package, to be poisoned within just 18 minutes when using the default configuration. Anyone using djbdns is strongly encouraged to patch their servers immediately." Reader emad contributes a link to the djbdns mailing list post containing both a patch and a sample exploit, and adds: "In the words of Dan Kaminsky (of recent DNS security fame): 'However, Dempsky's bug in djb's tinydns is way more surprising, if only because ... holy crap, he pulled an exploitable scenario out of THAT?!'"
This discussion has been archived. No new comments can be posted.

Dan Bernstein Confirms Security Flaw In Djbdns

Comments Filter:

We are each entitled to our own opinion, but no one is entitled to his own facts. -- Patrick Moynihan

Working...