CVE-2016-1285, CVE-2016-1286 and CVE-2016-2088 vulnerabilities

Just a note that more vulnerabilities have been discovered that will require another round of patching. Infoblox have released a new version of NIOS to address these and other vendors are publishing patches as I write this. The CVE’s are summarised below: CVE–2016–2088: A response containing multiple DNS cookies causes servers with cookie support enabled […]

CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow

It’s been a torrid few months for BIND with various vulnerabilities and fixes published. This demonstrates the need to implement a robust patching schedule and it may make sense to reserve slots in your change control process to enable systems, like DNS servers, to be kept up to date with the latest security fixes. However […]

Calleva Networks announces the launch of D/R Application Switcher (DRAS)

Demonstrating an organizations ability to invoke a disaster recovery plan is a regulatory requirement for certain institutions and needs to be performed on a regular basis. Most organizations use the Domain Name System (DNS) to facilitate their Disaster Recovery plans.  DNS is used to route clients to “online” servers – it is already part of the […]

An update on recent DNS & DHCP vulnerabilities

There have been several DNS and DHCP vulnerabilities published recently. All the main DDI vendors have now released patches as far as we can tell. Two BIND vulnerabilities in particular are serious enough to justify patching your systems. For Infoblox customers, this means an upgrade to NIOS 7.2.5, this will address the following vulnerabilities: CVE-2015-8704: A […]

Configuring Google SafeSearch with Infoblox DNS Firewall

We recently did some work for a county council who wanted to enable Google SafeSearch for all the schools under their jurisdiction. Initially they were trying to use internal versions of google.com and google.co.uk with a CNAME record for www that redirected to forcesafesearch.google.com, but this is not an ideal solution for various reasons: Other “google.com” […]

CVE-2015-5477: Sorry, you will need to patch if you’re running BIND!

We don’t normally get too involved with discussing or publishing details about bugs and patches for BIND, however due to the severity of CVE-2015-5477, it has prompted a couple of customers to email me directly who I think just wanted a second opinion. Basically, yes, you do have to patch BIND! Unfortunately, the news from […]

Should a DNS Firewall be part of your defence-in-depth strategy?

There has been a slew of DNS Firewall related market activity recently that makes me wonder if DNS Firewall related products/solutions are finally gaining market acceptance. OpenDNS is probably one of the most well known DNS Firewall vendors, operating a global network of recursive servers that anyone can use for free, but with the option […]

Calleva Networks launches free DNS malware assessment

More and more malware is using DNS not only to contact command-and-control servers but as a data exfiltration mechanism that can see your valuable and precious data “leaking” out from the confines of your organisation. DNS is normally left relatively unsecured compared to other protocols because so many applications and servers depend upon it. Through […]

Is DANE DNSSEC’s killer app?

DANE has been around for a few years now but still seems to be a bit of an underground topic. It hardly ever crops up in conversations I have with prospects and the fact it is reliant on DNSSEC, which takes a serious commitment to implement, makes me wonder if this is just another good […]

Tolly report validates Infoblox Cloud Network Automation savings

Tolly Group, a leading independent IT testing firm, has found that automation of core network services—DNS, DHCP and IP addresses (DDI)—can reduce the deployment time for virtual machines in a VMware private cloud environment by 62 percent. Private clouds are rapidly emerging as the infrastructure platform of choice for many organisations because of the speed […]