[106172] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Paul Ferguson)
Thu Jul 24 01:57:45 2008

From: "Paul Ferguson" <fergdawg@netzero.net>
Date: Thu, 24 Jul 2008 05:55:51 GMT
To: sean@donelan.com
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- Sean Donelan <sean@donelan.com> wrote:

>>
>> Let's hope some very large service providers get their act together
>> real soon now.
>
>There is always a tension between discovery, changing, testing and =

finally deployment.
>

Sure, I can empathize, to a certain extent. But this issue has
been known for 2+ weeks now.

Not sure I can be very empathic now, given the seriousness, and the
proper warning ISPs have been given.

$.02,

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)

wj8DBQFIiBldq1pz9mNUZTMRAiLjAJ91jnOPW+nhuk0PA5qGjrwz0bH25ACgjOXS
IEJTnVU4BIZ8bMfU7dB4ZKY=3D
=3DsBS2
-----END PGP SIGNATURE-----


--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/



home help back first fref pref prev next nref lref last post