[106267] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked?

daemon@ATHENA.MIT.EDU (Nathan Ward)
Fri Jul 25 03:32:08 2008

From: Nathan Ward <nanog@daork.net>
To: nanog <nanog@merit.edu>
In-Reply-To: <01af01c8edbd$60571220$21053660$@berkman@reignmaker.net>
Date: Fri, 25 Jul 2008 19:31:30 +1200
Errors-To: nanog-bounces@nanog.org

On 25/07/2008, at 6:45 AM, Scott Berkman wrote:

> Is it just me or is the test page below down now?
>
> Or maybe some poisoned the NS record for dns-oarc.net and sent it to
> nowhere to stop testing! (J/K since I can get to the rest of the page
> fine).


Hmm, cute.

So uh, is this patch available for download over HTTPS with a key that  
was generated by the vendor and signed by well trusted root CAs on a  
boxes with OpenSSL versions not released by Debian?

PATCH NOW PATCH NOW seems like a fantastic way to get nefarious code  
deployed in really, really interesting places.

:-)

--
Nathan Ward





home help back first fref pref prev next nref lref last post