[106540] in North American Network Operators' Group
Re: Cache Poisoning Detection via ONZRA's CacheAudit
daemon@ATHENA.MIT.EDU (Matthew Black)
Mon Aug 4 16:23:52 2008
From: Matthew Black <black@csulb.edu>
To: Jose Avila <jose@onzra.com>,nanog@nanog.org
Date: Fri, 01 Aug 2008 15:25:46 -0700
In-Reply-To: <B01B41F7-9B3C-4E42-82D3-BDF9BCC95C0D@onzra.com>
Errors-To: nanog-bounces@nanog.org
On Fri, 1 Aug 2008 13:20:45 -0700
Jose Avila <jose@onzra.com> wrote:
> In light of new attack vectors DNS Cache Poisoning discovered by Dan
> Kaminsky, ONZRA has developed a free Open Source (BSD License) tool
> called CacheAudit. This tool allows recursive providers to detect cache
>poisoning events using cache dumps from their DNS servers. Along with
>releasing this tool, ONZRA has also released a white paper describing the
>validation process.
>
> Main Tool Page: http://www.onzra.com/cacheaudit.html
> White Paper: http://www.onzra.com/RecursiveDNSCacheAuditingWhitepaper.pdf
> Main Tool Page: http://www.onzra.com/cacheaudit.html
LOL. Now that's funny! I get a completely black screen
with Firefox and IE. I briefly glanced at the HTML src
code (CTRL-U) but don't want to burn brain cells figuring
out what you have to say.
matthew black
network services
california state university, long beach