On Mon, 4 Aug 2008 14:47:58 -0700, Edward Jaffe 
<[EMAIL PROTECTED]> wrote:

>Edward Jaffe wrote:
>
>According to CERT, IBM mainframes are still listed as "unknown":
>...

For what it's worth, an MVS name server configured as a caching / 
forwarding name server can be protected from a direct attack by
having it listen on the loopback addr - 127.0.0.1.  Then it can 
process resolution requests only from the local RESOLVER.

>From what I've read over the last couple days it sounds like typical
cache poisoning attacks involve a flood of requests (and bogus
responses) from "the enemy".   If you limit the requests to the local
LPAR the enemy would have to also be on the local LPAR (and we 
all know that anything running on MVS is from an absolutely
trustworthy source).  

This, of course, does not keep a local caching name server from 
caching bogus data received from a corrupted name server.

I have no idea how much of this applies to other mainframe 
operating systems.

Pat O'Keefe  
  

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to