[105876] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Multiple DNS implementations vulnerable to cache poisoning

daemon@ATHENA.MIT.EDU (Jay R. Ashworth)
Tue Jul 8 19:20:25 2008

Date: Tue, 8 Jul 2008 19:20:05 -0400
From: "Jay R. Ashworth" <jra@baylink.com>
To: nanog@nanog.org
In-Reply-To: <D0D0330CBD07114D85B70B784E80C2F2022FC9E8@exch-mail2.win.slac.stanford.edu>
Errors-To: nanog-bounces@nanog.org

On Tue, Jul 08, 2008 at 01:48:57PM -0700, Buhrmaster, Gary wrote:
> Multiple DNS implementations vulnerable to cache poisoning:
> 
> http://www.kb.cert.org/vuls/id/800113
> 
> (A widely coordinated vendor announcement.  As always,
> check with your vendor(s) for patch status.)

Obligatory Slashdot link: http://it.slashdot.org/article.pl?sid=08/07/08/195225

(There's actually some useful data in the comments for a change, or I
wouldn't have bothered.)

Cheers,
-- jra
-- 
Jay R. Ashworth                   Baylink                      jra@baylink.com
Designer                     The Things I Think                       RFC 2100
Ashworth & Associates     http://baylink.pitas.com                     '87 e24
St Petersburg FL USA      http://photo.imageinc.us             +1 727 647 1274

	     Those who cast the vote decide nothing.
	     Those who count the vote decide everything.
	       -- (Joseph Stalin)


home help back first fref pref prev next nref lref last post