[105951] in North American Network Operators' Group
Re: Multiple DNS implementations vulnerable to cache poisoning
daemon@ATHENA.MIT.EDU (Michael Sinatra)
Thu Jul 10 14:14:23 2008
Date: Thu, 10 Jul 2008 11:12:56 -0700
From: Michael Sinatra <michael@rancid.berkeley.edu>
To: "Jay R. Ashworth" <jra@baylink.com>
In-Reply-To: <20080710180311.GL7665@cgi.jachomes.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
On 07/10/08 11:03, Jay R. Ashworth wrote:
> Another test, that apparently was publicized on some dnsops list:
>
> dig +short porttest.dns-oarc.net TXT
The "some dnsops list" is the OARC public dns-operations list, and this
posting explains the tool and briefly describes the results:
http://lists.oarci.net/pipermail/dns-operations/2008-July/002932.html
There's a healthy discussion of this vuln and DNSSEC going on over
there, and that list is an appropriate forum for further discussion of
this topic.
michael