[105883] in North American Network Operators' Group
Re: Multiple DNS implementations vulnerable to cache poisoning
daemon@ATHENA.MIT.EDU (Jay R. Ashworth)
Tue Jul 8 21:43:51 2008
Date: Tue, 8 Jul 2008 21:43:36 -0400
From: "Jay R. Ashworth" <jra@baylink.com>
To: nanog@nanog.org
In-Reply-To: <48740254.8030404@deaddrop.org>
Errors-To: nanog-bounces@nanog.org
On Tue, Jul 08, 2008 at 05:12:04PM -0700, Lynda wrote:
> The forum link also has a link to Dan's tool, where you can see if your
> DNS server is vulnerable.
As a /.er noted, running that tool after *accessing it via DNS* may not
tell you anything, and I don't know that Kaminsky has himself
publically announced the IP address of his test machine.
Cheers,
-- jra
--
Jay R. Ashworth Baylink jra@baylink.com
Designer The Things I Think RFC 2100
Ashworth & Associates http://baylink.pitas.com '87 e24
St Petersburg FL USA http://photo.imageinc.us +1 727 647 1274
Those who cast the vote decide nothing.
Those who count the vote decide everything.
-- (Joseph Stalin)