BIND 9 denial of service being seen in the wild
Organizations across the Internet reported crashes interrupting service on BIND 9 nameservers performing recursive queries. Affected servers crashed after logging an error in query.c with the following message: "INSIST(! dns_rdataset_isassociated(sigrdataset))" Multiple versions were reported being affected, including all currently supported release versions of ISC BIND 9. [...] An as-yet unidentified network event caused BIND 9 resolvers to cache an invalid record, subsequent queries for which could crash the resolvers with an assertion failure. ISC is working on determining the ultimate cause by which a record with this particular inconsistency is cached. At this time we are making available a patch which makes named recover gracefully from the inconsistency, preventing the abnormal exit." We should be seeing distributions releasing updated versions soon.
(Log in to post comments)
Posted Nov 17, 2011 16:23 UTC (Thu)
by paravoid (subscriber, #32869)
[Link] (2 responses)
Posted Nov 17, 2011 16:49 UTC (Thu)
by CodyRobertson (guest, #73942)
[Link] (1 responses)
Posted Nov 17, 2011 20:18 UTC (Thu)
by mbaldessari (guest, #36769)
[Link]
Posted Nov 17, 2011 17:12 UTC (Thu)
by jhardin (guest, #3297)
[Link] (1 responses)
Posted Nov 17, 2011 18:06 UTC (Thu)
by jeleinweber (subscriber, #8326)
[Link]
Iterative only (authoritative) servers should be immune, yes.
Posted Nov 17, 2011 17:53 UTC (Thu)
by bjartur (guest, #67801)
[Link] (1 responses)
Posted Nov 17, 2011 18:04 UTC (Thu)
by eigenstr (guest, #5205)
[Link]
Posted Nov 17, 2011 18:17 UTC (Thu)
by brad@vaxxine.com (guest, #6399)
[Link] (2 responses)
Posted Nov 17, 2011 19:47 UTC (Thu)
by khim (subscriber, #9252)
[Link]
Posted Nov 18, 2011 11:48 UTC (Fri)
by terryburton (subscriber, #26261)
[Link]
There may be many ways of coercing your local hosts to make lookups that you did not intend, such as including links in web content that the browser pre-caches as well as basic SMTP reception and mail content scanning. Enable query logging on your resolver to see the scope of this.
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
BIND 9 denial of service being seen in the wild
Are you sure it was something nefarous? Perhaps it was just a simple IP-over-DNS?
I think it was must simpler...
BIND 9 denial of service being seen in the wild
