【正文】
種攻擊還是有可取之處的,只不過Dan Kaminsky這個人太愛作秀以致招人嫌了。 小結DNS緩存污染是一種歷史悠久的攻擊方式,至今有14個年頭了。這個問題是DNS協(xié)議設計者最初沒有想到的,由于設計上的缺陷以及多年應用帶來的積重難返,在相當長的一段時間內這個問題都將始終存在并嚴重威脅著Internet。三. 參考資源[ 1] DOMAIN NAMES CONCEPTS AND FACILITIES RFC 882 RFC 1034 DOMAIN NAMES IMPLEMENTATION AND SPECIFICATION RFC 883 RFC 1035 [ 2] TCP/IP Illustrated Volume I: The Protocols W. Richard Stevens Internetworking With TCP/IP Vol I: Principles,Protocols,and Architecture Douglas E. Comer[ 3] [ 4] Defending your DNS in a postKaminsky world Paul Wouters paul@ [200902] [ 5] Various DNS service implementations generate multiple simultaneous queries for the same resource record [200211] Birthday Attack [ 6] Multiple DNS implementations vulnerable to cache poisoning [200807] [ 7] Patch your DNS NOW [20080724] [ 8] Black Ops 2008: It39。s The End Of The Cache As We Know It Dan Kaminsky [2008] [ 9] Dan Kaminsky vulnerability Details [10] DNS Cache Poisoning Joe Stewart, GCIH jstewart@ [11] PowerDNS Recursor DNS Cache Poisoning Amit Klein [200802] [12] Black Ops of DNS Chaos Communications Camp 2003 Dan Kaminsky 11 169。 2009 綠盟科技 密級: