[106188] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Exploit for DNS Cache Poisoning - RELEASED

daemon@ATHENA.MIT.EDU (Jorge Amodio)
Thu Jul 24 10:10:47 2008

Date: Thu, 24 Jul 2008 09:10:13 -0500
From: "Jorge Amodio" <jmamodio@gmail.com>
To: "Paul Ferguson" <fergdawg@netzero.net>
In-Reply-To: <20080723.225551.2542.0@webmail01.vgs.untd.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

>
> Sure, I can empathize, to a certain extent. But this issue has
> been known for 2+ weeks now.
>

Well we knew about the DNS issues since long time ago (20+yrs perhaps?),
so the issue is not new, just the exploit is more easy to put together and
chances for it to succeed are much higher.

As I mentioned in another message, perhaps its time to get serious about
DNSSEC, where are we on this front ?

Cheers
Jorge

home help back first fref pref prev next nref lref last post