[105883] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Multiple DNS implementations vulnerable to cache poisoning

daemon@ATHENA.MIT.EDU (Jay R. Ashworth)
Tue Jul 8 21:43:51 2008

Date: Tue, 8 Jul 2008 21:43:36 -0400
From: "Jay R. Ashworth" <jra@baylink.com>
To: nanog@nanog.org
In-Reply-To: <48740254.8030404@deaddrop.org>
Errors-To: nanog-bounces@nanog.org

On Tue, Jul 08, 2008 at 05:12:04PM -0700, Lynda wrote:
> The forum link also has a link to Dan's tool, where you can see if your 
> DNS server is vulnerable.

As a /.er noted, running that tool after *accessing it via DNS* may not
tell you anything, and I don't know that Kaminsky has himself
publically announced the IP address of his test machine.

Cheers,
-- jra
-- 
Jay R. Ashworth                   Baylink                      jra@baylink.com
Designer                     The Things I Think                       RFC 2100
Ashworth & Associates     http://baylink.pitas.com                     '87 e24
St Petersburg FL USA      http://photo.imageinc.us             +1 727 647 1274

	     Those who cast the vote decide nothing.
	     Those who count the vote decide everything.
	       -- (Joseph Stalin)


home help back first fref pref prev next nref lref last post