|
Message-ID: <20170624122820.GB29096@openwall.com> Date: Sat, 24 Jun 2017 14:28:20 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: CVE for the TSIG issue in knot? On Sat, Jun 24, 2017 at 01:58:23PM +0200, Yves-Alexis Perez wrote: > I noticed the recent issue in knot with TSIG bypass > (https://lists.nic.cz/pipermail/knot-dns-users/2017-June/001144.html) Is is inappropriate to post only a link in here. In cases like this, please also quote at least the most essential portion of the content you're referring to, which is: "CZ.NIC has released Knot DNS 2.5.2 and Knot DNS 2.4.5. Beside several fixes and improvements, these versions fix a flaw within the TSIG protocol implementation that would allow an attacker with a valid key name and algorithm to bypass the TSIG authentication if no additional ACL restrictions is set. This vulnerability was discovered by security experts from Synacktiv. Special thanks to them!" Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.