[105880] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Multiple DNS implementations vulnerable to cache poisoning

daemon@ATHENA.MIT.EDU (Christian Koch)
Tue Jul 8 20:39:22 2008

Date: Tue, 8 Jul 2008 20:38:56 -0400
From: "Christian Koch" <christian@broknrobot.com>
To: "Owen DeLong" <owen@delong.com>
In-Reply-To: <2165D146-C2EA-4716-B55C-71099D78C736@delong.com>
Cc: Nanog <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

surely the tool is not focused at a dns operator/admin audience..




On Tue, Jul 8, 2008 at 8:20 PM, Owen DeLong <owen@delong.com> wrote:

> The tool, unfortunately, only goes after the server it thinks you are using
> to
> recurse from the client where you're running your browser.
>
> This makes it hard to test servers being used in production environments
> without GUIs.  The tool is not Lynx compatible.
>
> Owen
>
>
> On Jul 8, 2008, at 5:12 PM, Lynda wrote:
>
>  This is also being covered over on the Defcon Forums. Jeff Moss has said
>> that he'll post the link to the interview that Kaminsky is doing right now,
>> after it's over. Here's the link to the Forum discussion:
>>
>> https://forum.defcon.org/showthread.php?t=9547
>>
>> The forum link also has a link to Dan's tool, where you can see if your
>> DNS server is vulnerable.
>>
>> --
>> In April 1951, Galaxy published C.M. Kornbluth's "The Marching Morons".
>> The intervening years have proven Kornbluth right.
>>               --Valdis Kletnieks
>>
>
>
>


-- 
^christian$

home help back first fref pref prev next nref lref last post