Results 1 to 3 of 3
  1. #1

    Are patched DNS servers behind N.A.T. still vunlerable to DNS cache poisoning?

    Greetings:

    Upon reading http://www.theregister.co.uk/2008/08...sky_black_hat/ it appears those who use network address translation may be vulnerable to DNS cache poisoning even after patching their DNS servers.

    "another 15 per cent are still vulnerable to some extent because they use network address translation gear that prevents the patch from working."

    Thoughts?

    Thank you.
    ---
    Peter M. Abraham
    LinkedIn Profile

  2. #2
    Join Date
    Apr 2007
    Location
    Bath, UK
    Posts
    132
    I think it depends on the box doing the NAT. When translating the ports they probably wont be as randomised as the what the DNS patch requires so it effectively removes the patch's changes. I don't know how you get around this apart from look for a NAT solution that has good random port mapping.

  3. #3
    Join Date
    Apr 2007
    Location
    Bath, UK
    Posts
    132
    Just found this which sheds some more light on the situation. Sorry for double post but I can't edit.

    http://www.circleid.com/posts/87143_...guessing_game/

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •