[105951] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Multiple DNS implementations vulnerable to cache poisoning

daemon@ATHENA.MIT.EDU (Michael Sinatra)
Thu Jul 10 14:14:23 2008

Date: Thu, 10 Jul 2008 11:12:56 -0700
From: Michael Sinatra <michael@rancid.berkeley.edu>
To: "Jay R. Ashworth" <jra@baylink.com>
In-Reply-To: <20080710180311.GL7665@cgi.jachomes.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

On 07/10/08 11:03, Jay R. Ashworth wrote:
> Another test, that apparently was publicized on some dnsops list:
> 
> dig +short porttest.dns-oarc.net TXT

The "some dnsops list" is the OARC public dns-operations list, and this 
posting explains the tool and briefly describes the results:

http://lists.oarci.net/pipermail/dns-operations/2008-July/002932.html

There's a healthy discussion of this vuln and DNSSEC going on over 
there, and that list is an appropriate forum for further discussion of 
this topic.

michael


home help back first fref pref prev next nref lref last post