There are perhaps three types of risks that you might be taking in accepting a client-
supplied domain name and installing it in that client’s
PTR record:
• The client might use this as an attack on the name server.
• The client might use the presence of the name in DNS as a way to bypass some
DNS-based security mechanism.
• The client might use the
PTR record to misrepresent its domain name while
doing something nefarious.
It is theoretically possible that if your DNS server has a bug, a DNS update of a
PTR
record with a client-supplied name might compromise the DNS server. Although this
is not a threat to be completely discounted, it is certainly a difficult attack to mount.
Attacks of this sort generally involve some sort of buffer overflow. But the client is
sending the DHCP server a domain name, and the DHCP server is going to validate
it. So an attacker has to construct a domain name that is malformed in such a way
that it will compromise the DNS server but will get past the DHCP server. This seems
unlikely; in reality, the DHCP server will probably be unable to process such a
domain name. It is more likely that an attack on the DHCP server itself would
succeed than that an attack through the DHCP server to the DNS server would
succeed.
The second possibility is that the client could insert a name into its
PTR record and
then use that
PTR record to bypass some sort of authentication mechanism. But this
is a very unlikely attack as well. The problem with this attack is that sites that use
domain-name–based security mechanisms don’t trust the
PTR record—they check the
A record as well. But if the client can update its A record, it is not lying about the
name it provided to the DHCP server, so there is no problem.
The third possibility is that the client might put some bogus name in its
PTR record
before doing something improper. If the improper behavior were detected, the blame
for it might be deflected on the rightful owner of the domain name. This is probably
the most likely of the three threats described here. It seems unlikely that it would
present a problem, however, because any sensible system administrator is going to
check the
A record as well as the PTR record when trying to figure out where an
attack originated. However, there’s no guarantee that this will happen—it is certainly
possible that people will jump to the wrong conclusions and bad things will happen
as a result.
Client-Supplied Hostnames
Microsoft Windows clients and Apple Macintosh clients always provide their own
hostnames. Microsoft clients are generally not willing to accept hostnames provided
by the DHCP server. So in practice, if you want users of DHCP clients configured by
CHAPTER 23 Updating DNS with DHCP396
027 3273 CH23 10/3/02 5:00 PM Page 396