Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 21 Mar 2024 20:38:14 -0400
From: Rich Felker <dalias@...c.org>
To: musl@...ts.openwall.com
Subject: Re: mDNS in musl

On Fri, Mar 22, 2024 at 01:29:43AM +0100, Tomas Volf wrote:
> On 2024-03-22 10:10:29 +1000, David Schinazi wrote:
> > > PS: which are the stakeholders contacted while the relevant standards
> > > brought in such hazardous default?
> >
> >
> > These RFCs went through the IETF Standards Track process, so the entire
> > IETF community was consulted when this was finalized around 2011-2012.
> >
> > I'd like to understand why you think this is hazardous though. mDNS only
> > applies to host names under .local - those names are not covered by DNSSEC,
> > and therefore any queries for them are always sent completely insecure.
> > Sending those queries over the wire to the configured DNS resolver has very
> > similar security properties to sending them over the wire as multicast.
> 
> Please ignore my comment from the peanut gallery if it is totally off, but is it
> not a difference between being able to do MitM (for regular non-DNSSEC DNS) and
> just being on the same network (multicast)?  So the former only router/gateway
> can do, the latter anyone able to respond to the multicast?  Assuming my
> understanding is correct, that does not seem "very similar security properties".

On lots of networks, root on any device attached to the local network
segment can hijack/mitm unauthenticated traffic (mac spoofing, arp
shenanigans, etc.), but indeed with intelligent switches that restrict
what addresses can be used by what physical ports, or with various
bridged interface configurations, etc. it's possible to have a setup
where untrusted devices attached to the network can't do that. So,
whether there's a difference depends on how hardened your network
layer is.

Rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.