BIND 9 denial of service being seen in the wild
Organizations across the Internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crashed after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions were reported being affected, including all currently supported release versions of ISC BIND 9. [...] An as-yet unidentified network event caused BIND 9 resolvers to cache an invalid record, subsequent queries for which could crash the resolvers with an assertion failure. ISC is working on determining the ultimate cause by which a record with this particular inconsistency is cached. At this time we are making available a patch which makes named recover gracefully from the inconsistency, preventing the abnormal exit." We should be seeing distributions releasing updated versions soon.
Posted Nov 17, 2011 16:23 UTC (Thu)
by paravoid (subscriber, #32869)
[Link] (2 responses)
Posted Nov 17, 2011 16:49 UTC (Thu)
by CodyRobertson (guest, #73942)
[Link] (1 responses)
Posted Nov 17, 2011 20:18 UTC (Thu)
by mbaldessari (guest, #36769)
[Link]
Posted Nov 17, 2011 17:12 UTC (Thu)
by jhardin (guest, #3297)
[Link] (1 responses)
Posted Nov 17, 2011 18:06 UTC (Thu)
by jeleinweber (subscriber, #8326)
[Link]
Iterative only (authoritative) servers should be immune, yes.
Posted Nov 17, 2011 17:53 UTC (Thu)
by bjartur (guest, #67801)
[Link] (1 responses)
Posted Nov 17, 2011 18:04 UTC (Thu)
by eigenstr (guest, #5205)
[Link]
Posted Nov 17, 2011 18:17 UTC (Thu)
by brad@vaxxine.com (guest, #6399)
[Link] (2 responses)
Posted Nov 17, 2011 19:47 UTC (Thu)
by khim (subscriber, #9252)
[Link]
Posted Nov 18, 2011 11:48 UTC (Fri)
by terryburton (subscriber, #26261)
[Link]
There may be many ways of coercing your local hosts to make lookups that you did not intend, such as including links in web content that the browser pre-caches as well as basic SMTP reception and mail content scanning. Enable query logging on your resolver to see the scope of this.
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
Are you sure it was something nefarous? Perhaps it was just a simple IP-over-DNS?
I think it was must simpler...
BIND 9 denial of service being seen in the wild