Is Kaminsky's DNS flaw public?
Fellow Black Hat researcher apparently guesses the vulnerability causing Dan Kaminsky to urge everyone to patch their systems immediately.
Thirteen days after Dan Kaminsky asked his fellow security researchers not to speculate on the details of his DNS flaw, a fellow Black Hat researcher published his own speculation, and apparently got it right.
On July 8, IOActive researcher Kaminsky, but would not provide the details until all the affected vendors had released patches and all the systems worldwide could be patched. He figured it would take about 30 days for that to happen. The 30-day mark also just happened to coincide with his speaking engagement at Black Hat in Las Vegas on August 6.
Kaminsky has worked for about 6 months with major vendors, coordinating a. It was an effort at . However, in an , Kaminsky suggested, in retrospect, he should have been more candid with more of his peers.
Those he did confide in appeared to be won over.
Writing on Monday in his blog, Halvar Flake first attacks the very idea that a security flaw such as this could be kept a secret, then proceeds to lay out what he thinks the flaw is:
"Mallory wants to poison DNS lookups on server ns.polya.com for the domain www.gmx.net. The nameserver for gmx.net is ns.gmx.net. Mallory's IP is 244.244.244.244.
"Mallory begins to send bogus requests for www.ulam00001.com, www.ulam00002.com ... to ns.polya.com."
Flake's entire speculation can be found here.
In response, Dan Kaminsky wrote Monday afternoon on his blog "Patch. Today. Now. Yes, stay late," suggesting that Flake has either guessed correctly or is very close.