[106115] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

SANS: DNS Bug Now Public?

daemon@ATHENA.MIT.EDU (Jon Kibler)
Tue Jul 22 08:40:54 2008

Date: Tue, 22 Jul 2008 08:40:32 -0400
From: Jon Kibler <Jon.Kibler@aset.com>
To: nanog@nanog.org
Reply-To: Jon.Kibler@aset.com
Errors-To: nanog-bounces@nanog.org

This is a multi-part message in MIME format...

------------=_1216730440-16359-606
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SANS is reporting that Kaminsky's DNS bug may be now being exploited in
the wild. See:
	http://isc.sans.org/diary.html?n&storyid=4765

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
=eqbc
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.


------------=_1216730440-16359-606--


home help back first fref pref prev next nref lref last post