Dan Bernstein Confirms Security Flaw In Djbdns 66
secmartin writes "Dan Bernstein has just admitted that a security issue has been found in the djbdns software, one of most popular alternatives for the BIND nameserver. As part of the djbdns security guarantee, $1000 will be paid to Matthew Dempsky, the researcher that found the bug. The bug allows a nameserver running djbdns to be poisoned using just a single packet. Other researchers have found a separate issue that allows dnscache, the DNS cache that is also part of the djbdns package, to be poisoned within just 18 minutes when using the default configuration. Anyone using djbdns is strongly encouraged to patch their servers immediately."
Reader emad contributes a link to the djbdns mailing list post containing both a patch and a sample exploit, and adds: "In the words of Dan Kaminsky (of recent DNS security fame): 'However, Dempsky's bug in djb's tinydns is way more surprising, if only because ... holy crap, he pulled an exploitable scenario out of THAT?!'"
Do not use for anything important (Score:5, Funny)
Why would anyone trust critical internet infrastructure to a piece of software that averages a security flaw every decade?
Real admins stick to a proven solution such as Bind.
Re: (Score:2)
*laugh* Yes, such a low security flaw rate is highly suspicious, and worse yet doesn't create enough work for admins! Bind is much, much better in this regard.
Re: (Score:1)
Real admins stick to a proven solution such as Bind.
Yep. We like getting paid. ;)
Re: (Score:2)
How does Address Space Layout Randomization (ASLR) affect total memory usage and its implications for counter values?
4 GB per process is what they were talking about. Really, seems improbable to me. Isn't that a bit like too many coops in one basket?
Hell must have frozen over (Score:5, Interesting)
I run qmail by the way. DJB writes good stable software but I get the impression he is not a good listener.
Re: (Score:2)
DJB writes good stable software but I get the impression he is not a good listener.
Agreed. I have issues with his 'fuck what the rest of the community does, it's my way or the high way' mentality. One of the reasons I opted for MaraDNS instead of djbdns at one of our smaller sites.
Re: (Score:1)
'fuck what the rest of the [world] does, it's my way or the high way'
Why does that attitude seem so familiar? There was a guy with that attitude I'd heard about once before...S....t....uart? No....S...t..an? No......S...t...e...
Aw, hell, I can't think of it. Anyhow, last name started with 'J'.
Re: (Score:3, Funny)
I recently saw a blog post contemplating what it would be like if Jorg Schilling (cdrtools/cdrecord) got in an argument with Daniel Bernstein.
I figure for real entertainment, add in ESR, the XFree86 guys and Tuomov (Ion WM)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Me too. DJBs documentation and configuration approach is also highly confusing. I have run Qmail for 4 years now on what used to be my main machine. When it runs, it runs fine, but it was a real adventure getting there. For new intallations I now use Postfix. Far, far less obscure to configure.
The oder problem with DJBs software that actually broke thing, is his ideas about time handling. I had to drop his ntp software because of that.
My bottom line is that with regard to security and stability DJBs stuff i
Re: (Score:3, Insightful)
Re:Hell must have frozen over (Score:5, Insightful)
I hear that DJB never visits his father for years at a stretch. What does that tell you about his upbringing?
Yeah, well, I heard that he eats babies. If you want to smear the guy's reputation go with the part that most people here actually care about: his work. There's ample opportunity in that department to bash him, sometimes even rightly so.
Re: (Score:1)
If you want to smear the guy's reputation
I really don't want to smear/spear his reputation. Just explaining the origins of his reputation as someone who disregards suggestions
the part that most people here actually care about: his work.
A person's influence doesn't end with his work. His actions and arrogance are important too.
Re: (Score:2, Informative)
Re: (Score:2)
He's actually a fairly nice guy when you meet him in person.
His students might disagree [slashdot.org].
Re: (Score:1)
So I heard that you beat your wife. Guess that I can't trust you either.
Re: (Score:1)
So I heard that you beat your wife. Guess that I can't trust you either.
Ok, but do you still beat your wife?
Re: (Score:2)
He's a collage professor. If he "listened" his head would explode from all the bad information he receives from young college students that think they know everything.
It's survival instinct to stop listening once you become a teacher, otherwise the results could be catastrophic. The teacher could become aware that all the students are idiots that make garden snails look like PhD candidates and attempt mass murder of the student body.
News Flash: Teacher listens to students and climbs bell tower with high pow
Re: (Score:2)
collage professor
young college students
Tee hee =p
Re: (Score:1)
In my sister's college application essays (one of them, at least), she outlined her reasons for wanting to attend a "four-year collage." Will always make me chuckle.
(But then, my brother teased me for years for pronouncing "pier" identically to "pyre.")
timothy
Re: (Score:2)
Damn art school know it alls!
Yay! (Score:2, Interesting)
DJBDNS now has 1/3 as many exploits as OpenBSD for the past decade+.
How's Microsoft doing on that front?
Oh wait.
Re: (Score:1)
To be fair, Windows is probably proportionally about as much larger than (the default install of) OpenBSD as OpenBSD is than DJBDNS.
So you ought to allow Windows about 9 vulnerabilities in that time ;-)
Seriously though, I wonder what sort of rate expected number of vulnerabilities should increase with respect to size of a codebase, given somehow equivalent levels of "correctness". Intuitively, i suspect it'd be at least O(size^2), if not much, much faster.
This should be front page news (Score:5, Funny)
Finding a security flaw in anything Dan Bernstein writes is definitely worthy of being on the front page, even if almost everybody uses Bind instead.
Re:This should be front page news (Score:4, Funny)
oh, _that_'s the bug? (Score:5, Insightful)
Since I'm one of the admins who's enjoyed having an vulnerability-free djbdns installation for years, I thought I'd look more into the vuln.
Say what you will about DJB, other than being seemingly ornery he appears to be forthright and focused on correctness. In under a week he confirms the vuln and posts a patch and awards the security guarantee money. This is the kind of behavior I want from the people who build my software. http://article.gmane.org/gmane.network.djbdns/13864 [gmane.org]
Here's the bug:
If the administrator of example.com publishes the example.com DNS data
through tinydns and axfrdns, and includes data for sub.example.com
transferred from an untrusted third party, then that third party can
control cache entries for example.com, not just sub.example.com.
How many of you are running domains like this? It's not something I need to bother patching for. Ah, I guess that's another great thing about the relative rarity of bugs. If one is found it's less likely to be relevant for your particular situation.
The article submitter says:
"Anyone using djbdns is strongly encouraged to patch their servers immediately."
I think "anyone" is a bit strong here.
what about the man's attitude? (Score:5, Insightful)
I just realized this:
The next release of djbdns will be backed by a new security guarantee.
In the meantime, if any users are in the situation described above,
those users are advised to apply Dempsky's patch and requested to accept
my apologies.
He's apologizing. How's that for forthright behavior? He's not being evasive. He's not pointing fingers. He's owning up to personal error, and expressing what appears to be compunction. For one bug in a decade.
Yeah, tell me how you don't like his attitude. I think it's fine.
Mr. Bernstein, good work I say. Thank you very much for your efforts and skill and honesty.
Re: (Score:3, Informative)
Well yeah, I am amazed!
When someone (Fyodor iirc) found an exploit in qmail way back, Dan was in complete denial and was quite disingenuous about the whole thing.
Re: (Score:2)
(George Guninski.)
As I'm very interested in knowing the truth of claims regarding Bernstein's misbehavior, it would help me very much if you could point to specific quotes or actions of his that show "complete denial" and being "disingenuous". Thanks!
Re: (Score:2)
To quote: Nobody gives gigabytes of memory to each qmail-smtpd process, so there is no problem with qmailâ(TM)s assumption that allocated array lengths fit comfortably into 32 bits.
Re: (Score:2)
Oh, that's what you mean by "complete denial". I thought you meant denial as in
Denial is a defense mechanism postulated by Sigmund Freud, in which a person is faced with a fact that is too uncomfortable to accept and rejects it instead, insisting that it is not true despite what may be overwhelming evidence.
I didn't realize you meant it in the simple sense of "to state that something is not true".
But maybe you actually do mean the defense mechanism version? I guess then that there would have to be overwhelming evidence. Do you see it as likely or possible that qpopd would be given 4 GB of (even virtual) memory? I'm not familiar with how it's normally run. Anyone?
What about the disingenuous part? Is that also for denying the fe
Re: (Score:1)
I agree with DJB. If you worked for me and setup qmail with gigs of memory for each qmail-smptd, I'd fire you. That's an intentional mis-config, not to mention bad practice.
Re: (Score:2)
A simple Google search for Fyodor qmail exploit should do it. Its not hard to find references to.
Re: (Score:2)
George Guninski, I'll say again.
I'm pretty sure that's the exploit in question. If you disagree, could you link please?
Re: (Score:1)
Yep, most of what you hear about DJB is nothing more than internet myth and/or people who can't disagree without getting angry.
Re: (Score:1, Insightful)
Re: (Score:2)
I have to agree there, as a user of tinydns/dnscache, this bug doesn't affect me because I don't let other people serve their records from my install of DJBDNS. If I did, I'd likely ask them for a 'data' file, look it over manually and manually install it. yeah it's more of a PITA than AXFR, but for my needs it is fine.
Even the other bug with the 200 outstanding requests for a record would be problematic to exploit on my network, since I only allow trusted computers on my network and you have to be on my
Re: (Score:2)
Well, yes, the bug is a very big deal for certain implementations. Though counting per installation they may be rare, the extent of their effect is quite great.
I expect it would be fairly trivial for these sites to update (though this is highly dependent). Or was trivial, as I imagine they've already done it.
Considering the extent, your find is of great value. Thanks. Considering the uniqueness of your find and the renown of the software, this is historic. Congratulations.
And I hear you were responsibl
Re: (Score:2)
This is very interesting. The idea of patching when harmless though not necessary has some appeal to me, as a ward against future problems as you say, but something doesn't seem quite right about it.
It's unlikely that I'll forget "The djbdns Bug", but more relevantly I don't anticipate accidentally implementing service of delegated subdomains.
Re: (Score:2)
You make it sound like this is the rarest thing in the world. It a solid and substantial vulnerability.
Maybe you don't have any third party controlled sub-domains but I assure you it is actually quite common.
Re: (Score:2)
You make it sound like this is the rarest thing in the world. It a solid and substantial vulnerability.
I don't mean to make it sound like the "rarest thing in the world". But I wouldn't expect maybe a single Slashdotter to be in this position. Otherwise, please note my comment here [slashdot.org].
Re: (Score:2)
'But I wouldn't expect maybe a single Slashdotter to be in this position.'
Sub-domain hosting is actually a fairly common thing. If I used tinydns I'd be at risk for this vulnerability now.
Confessions of a long-term djb/tiny dns user (Score:2)
First of all, I really like djbdns! Up until two weeks ago I ran it for our my employer (700~ tlds) and it had been running flawless for the last 4 years.
The reason, in the end, for the switch is due to the administrative workload of using djbdns.
Pushing updates to other servers usually involves pushing the .cdb data file to the dns/root directory of each of the resolves. Ok one chore, fine. The problem is in managing the database.
Managing 50-100 records command line is feasible, but if you have a lot of do
We did that too. (Score:2)
I had to check to make sure you weren't my old boss! A place I worked about a year ago did that. Our systems automatically registered hosted domain names and dropped the list of subdomains into our database. A cron job pulled records from there, generated the data file, compiled it and told tinydns to reload it.
I really appreciated djbdns's data format after having dealt with BIND at my last job. I remember it being disturbingly finicky about its input--there are plenty of ways to kill your DNS server if, f