SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Systemd-resolved Subject to Cache Poisoning
Date    Thursday November 13 2014, @03:19AM
Author    n1
Topic   
from the one-daemon-to-rule-them-all dept.
https://soylentnews.org/article.pl?sid=14/11/12/2126227

DECbot writes:

Whether you're running systemd happily or begrudgingly, it's best if you disable systemd-resolved as your DNS resolver for the time being. Reported today at seclists is a new DNS cache poisoning bug in systemd-resolved.

At its simplest, an attacker triggers a query to a domain he controls via SMTP or SSH-login. Upon receipt of the question, he can just add any answer he wants to have cached to the legit answer he provides for the query, e.g. providing two answer RR's: One for the question asked and one for a question that has never been asked - even if the DNS server is not authoritative for this domain.

Systemd-resolved accepts both answers and caches them. There are no reports as to the affected versions or how widespread the problem may be. Comments over at Hacker News suggests that it might not be widespread, most users would still be running the backported 208-stable while the DNS resolver was committed in 213 and considered fairly complete in 216, but that is if they enabled systemd-resolved in /etc/nsswitch.config.

Links

  1. "DECbot" - https://soylentnews.org/~DECbot/
  2. "seclists" - http://seclists.org/oss-sec/2014/q4/592
  3. "Hacker News" - http://news.ycombinator.com/item?id=8595335

© Copyright 2024 - SoylentNews, All Rights Reserved

printed from SoylentNews, Systemd-resolved Subject to Cache Poisoning on 2024-04-25 18:58:14