On Wed, Oct 8, 2008 at 10:33 PM, Sam Clippinger <[EMAIL PROTECTED]> wrote: > Well, not necessarily. At the moment, spamdyke is only vulnerable to a > very small part of the DNS spoofing attack. Most of the danger Dan > Kaminsky discovered comes from caching -- a vulnerable host could cache > incorrect DNS data sent by the attacker. spamdyke doesn't cache DNS > information, so that's a moot point. > > To be completely honest, there is a small danger that spamdyke could > receive spoofed responses from an attacker, if the attacker sends > packets with the correct ID numbers to the correct port before the > "real" nameserver could respond. The chances of success are very, very > low (but not zero) because each spamdyke process uses a different UDP > port for its DNS traffic, which only remains open while the process is > running. Also, the starting IDs for the queries are chosen randomly by > each process. It's not like a BIND server that uses the same port for > thousands of queries and increments its IDs in a predictable pattern. > > If someone did manage to spoof responses to a spamdyke process, the most > they could achieve would be an incorrect result for an RBL or rDNS > query. As a result, if a message were accepted improperly, the only > consequence is one piece of spam being delivered. Alternatively, if a > legitimate message were rejected improperly, the sender would receive a > bounce or the remote server would retry later (depending on the filter > and the attacker's data). There's no way to corrupt or intercept email > with this attack. > > So, I plan to look at randomizing the query ports. It's not a complex > change, so it'll probably be in the next feature-release or two. > Because the risk is so low, I may not implement it if the overhead is > too high. Either way, I plan to remain calmer than CERT/CC did. :) > > -- Sam Clippinger > > slamp slamp wrote: >> On Fri, Oct 3, 2008 at 5:52 PM, Eric Shubert <[EMAIL PROTECTED]> wrote: >> >>> Felix Buenemann wrote: >>> >>>> Hi, >>>> >>>> I agree with Arthur and Bgs in that SPF is a smarter thing to check, >>>> because it can be done without checking headers and currently has a much >>>> wider disribution base. >>>> >>>> IMHO the only way to properly reject DKIM failed mail is at the end of >>>> the DATA command, which is exactly how eg. simscan rejects virii or spam >>>> mail. So IMHO DKIM verification is something to do for a queue-handler >>>> not a frot end smtp handler, that is geared for high performance. (This >>>> is based on the assumtion, that spamdyke deals with 99% of the scam with >>>> very little cpu time, thus reducing server load and leaving more in >>>> depth checks to those mails that slip through spamdyke's already tight >>>> web.) >>>> >>>> -- Felix >>>> >>> Good thinking, Felix. Some things just don't belong in spamdyke as is. >>> >>> -- >>> -Eric 'shubes' >>> >>> >> >> >> I am not sure if this has been implemented, but this should be at the >> top, right? >> >> Fix the DNS spoofing "bug" by randomizing the outbound port with every >> query. >> Try not to panic about it like CERT/CC did. >> _______________________________________________ >> spamdyke-users mailing list >> spamdyke-users@spamdyke.org >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> > _______________________________________________ > spamdyke-users mailing list > spamdyke-users@spamdyke.org > http://www.spamdyke.org/mailman/listinfo/spamdyke-users >
Thanks for the explanation Sam! _______________________________________________ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users