DNS-OARC 24th Workshop, Buenos Aires, Presentations
Web-based DNS Randomness Test
US-CERT's Vulnerability Note VU#800113 describes deficiencies in the DNS protocol and implementations that can facilitate cache poisoning attacks. The answers from a poisoned nameserver cannot be trusted. You may be redirected to malicious web sites that will try to steal your identity or infect your computers with malware. Working exploits for this issue are already widely circulated! Upgrade your nameservers ASAP if you haven't done so already! Additional details about these poisoning attacks are available in Dan Kaminsky's post of August 7, 2008.
The essence of the problem is that DNS resolvers don't always use enough randomness in their transaction IDs and query source ports. Increasing the amount of randomness increases the difficulty of a successful poisoning attack.
This page exists to help you learn if your ISP's nameservers are vulnerable to this type of attack. If you click on the button below, we will test the randomness of your ISP DNS resolver.
The test takes a few seconds to complete. When its done you'll see a page where the transaction ID and source port randomness will be rated either GREAT, GOOD, or POOR. If you see a POOR rating, we recommend that contact your ISP and ask if they have plans to upgrade their nameserver software.
See porttest for another way to check your resolver from a Unix commandline.
Submitted by admin on Tue, 2014-07-29 21:15 categories [ ]
Public Interest Registry
Verizon Digital Media Svs
Integrated S and T
Tel Aviv University