[106165] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Paul Ferguson)
Thu Jul 24 00:19:42 2008

From: "Paul Ferguson" <fergdawg@netzero.net>
Date: Thu, 24 Jul 2008 04:17:59 GMT
To: jared@puck.nether.net
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- Jared Mauch <jared@puck.nether.net> wrote:

>If your nameservers have not been upgraded or you did
>not enable the proper flags, eg: dnssec-enable and/or dnssec-validation=

>as applicable, I hope you will take another look.

Let's hope some very large service providers get their act together
real soon now.

http://www.hackerfactor.com/blog/index.php?/archives/204-Poor-DNS.html

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIiAJiq1pz9mNUZTMRAiSqAJwL9t4ldzKMjHyA4KITrLz2dHvTFQCgkfuR
G4SnZhKReOYYBjdSSJamVQw=3D
=3Dac5p
-----END PGP SIGNATURE-----



--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



home help back first fref pref prev next nref lref last post