Created attachment 195626 [details] patch to upgrade NSD versions 4.1.22 and before are vulnerable in comparing TSIG information and this can be used to discover a TSIG secret. NSD uses TSIG to protect zone transfers. The TSIG code uses a secret key to protect the data. The secret key is shared with both sides of the zone transfer connection. The comparison code in NSD was not time insensitive, causing the potential for an attacker to use timing information to discover data about the key contents. NSD versions from 2.2.0 to 4.1.22 are vulnerable. Upgrade to 4.1.23 or newer to get the fix. There is no known exploit. It was reported by Ondrej Sury (ISC).
A commit references this bug: Author: swills Date: Mon Jul 30 13:59:50 UTC 2018 New revision: 475892 URL: https://svnweb.freebsd.org/changeset/ports/475892 Log: dns/nsd upgrade to version 4.1.23 PR: 230182 Submitted by: jaap@NLnetLabs.nl (maintainer) Changes: head/dns/nsd/Makefile head/dns/nsd/distinfo
Committed, thanks!