[106540] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Cache Poisoning Detection via ONZRA's CacheAudit

daemon@ATHENA.MIT.EDU (Matthew Black)
Mon Aug 4 16:23:52 2008

From: Matthew Black <black@csulb.edu>
To: Jose Avila <jose@onzra.com>,nanog@nanog.org
Date: Fri, 01 Aug 2008 15:25:46 -0700
In-Reply-To: <B01B41F7-9B3C-4E42-82D3-BDF9BCC95C0D@onzra.com>
Errors-To: nanog-bounces@nanog.org

On Fri, 1 Aug 2008 13:20:45 -0700
  Jose Avila <jose@onzra.com> wrote:
> In light of new attack vectors DNS Cache Poisoning discovered by Dan 
> Kaminsky, ONZRA has developed a free Open Source (BSD License) tool 
> called CacheAudit. This tool allows recursive providers to detect  cache 
>poisoning events using cache dumps from their DNS servers. Along  with 
>releasing this tool, ONZRA has also released a white paper  describing the 
>validation process.
> 
> Main Tool Page: http://www.onzra.com/cacheaudit.html
> White Paper: http://www.onzra.com/RecursiveDNSCacheAuditingWhitepaper.pdf



> Main Tool Page: http://www.onzra.com/cacheaudit.html

LOL. Now that's funny! I get a completely black screen
with Firefox and IE. I briefly glanced at the HTML src
code (CTRL-U) but don't want to burn brain cells figuring
out what you have to say.

matthew black
network services
california state university, long beach


home help back first fref pref prev next nref lref last post