Dynamic DNS Network Services LLC, of Worcester, Mass., said its servers have been flooded with "bad hits" from the Linksys WRT54G wireless router since its inception, and has decided to take action. The company will block all access to its site from the affected router, unless they apply the patch that Linksys made available in mid-November.
The Linksys bug has emerged as router manufacturers try to make their products an integral part of networks used by home and small businesses.
Some fixed URLs (like www.pcmagazine.com) are tied to static IP addresses, the collection of numbers that identifies the location of the server on the Internet. Other IPs are dynamically generated by the ISP, and the updates must be sent to other Domain Name Services (DNS) servers around the Internet to alert them to the new address. Although most servers typically use a small client application running on the server itself to handle the updates, some router manufacturers like Linksys have taken on this task as a means of adding value.
Most routers either dont implement a perfectly clean implementation of the update clients or use client implementations that dont meet DDNSNS specifications, resulting in occasional quirks and glitches, according to Tom Daily, chief infrastructure officer at DDNSNS, Worcester, Mass. For example, some clients used hard-coded DNS entries for DDNSNS own servers. When the company moved to a new IP address, the clients couldnt access them to process update requests.
Read the full story