[128083] in cryptography@c2.net mail archive
Re: Kaminsky finds DNS exploit
daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Mon Jul 14 13:30:25 2008
Date: Mon, 14 Jul 2008 10:52:42 -0400
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: Florian Weimer <fw@deneb.enyo.de>
Cc: John Levine <johnl@iecc.com>, cryptography@metzdowd.com
In-Reply-To: <87ej5wa6c1.fsf@mid.deneb.enyo.de>
On Mon, 14 Jul 2008 16:27:58 +0200
Florian Weimer <fw@deneb.enyo.de> wrote:
 
> On top of that, some operators decided not to offer TCP service at
> all.
Right.  There's a common misconception, on both security and network
operator mailing lists, that DNS servers use TCP only for zone
transfers, and that all such connection requests should be blocked.
See, for example, the NANOG thread starting at
http://mailman.nanog.org/pipermail/nanog/2008-June/001240.html
		--Steve Bellovin, http://www.cs.columbia.edu/~smb
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com