[105879] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Multiple DNS implementations vulnerable to cache poisoning

daemon@ATHENA.MIT.EDU (Owen DeLong)
Tue Jul 8 20:20:57 2008

From: Owen DeLong <owen@delong.com>
To: Lynda <shrdlu@deaddrop.org>
In-Reply-To: <48740254.8030404@deaddrop.org>
Date: Tue, 8 Jul 2008 17:20:30 -0700
Cc: Nanog <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

The tool, unfortunately, only goes after the server it thinks you are  
using to
recurse from the client where you're running your browser.

This makes it hard to test servers being used in production environments
without GUIs.  The tool is not Lynx compatible.

Owen

On Jul 8, 2008, at 5:12 PM, Lynda wrote:

> This is also being covered over on the Defcon Forums. Jeff Moss has  
> said that he'll post the link to the interview that Kaminsky is  
> doing right now, after it's over. Here's the link to the Forum  
> discussion:
>
> https://forum.defcon.org/showthread.php?t=9547
>
> The forum link also has a link to Dan's tool, where you can see if  
> your DNS server is vulnerable.
>
> -- 
> In April 1951, Galaxy published C.M. Kornbluth's "The Marching  
> Morons".
> The intervening years have proven Kornbluth right.
>                --Valdis Kletnieks



home help back first fref pref prev next nref lref last post