[106541] in North American Network Operators' Group
Re: Cache Poisoning Detection via ONZRA's CacheAudit
daemon@ATHENA.MIT.EDU (Jose Avila)
Mon Aug 4 16:24:02 2008
From: Jose Avila <jose@onzra.com>
To: Matthew Black <black@csulb.edu>
In-Reply-To: <web-19746672@remus.csulb.edu>
Date: Fri, 1 Aug 2008 15:34:18 -0700
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
Issue should be corrected.
Thanks,
Jose
On Aug 1, 2008, at 3:25 PM, Matthew Black wrote:
> On Fri, 1 Aug 2008 13:20:45 -0700
> Jose Avila <jose@onzra.com> wrote:
>> In light of new attack vectors DNS Cache Poisoning discovered by
>> Dan Kaminsky, ONZRA has developed a free Open Source (BSD License)
>> tool called CacheAudit. This tool allows recursive providers to
>> detect cache poisoning events using cache dumps from their DNS
>> servers. Along with releasing this tool, ONZRA has also released a
>> white paper describing the validation process.
>> Main Tool Page: http://www.onzra.com/cacheaudit.html
>> White Paper: http://www.onzra.com/RecursiveDNSCacheAuditingWhitepaper.pdf
>
>
>
>> Main Tool Page: http://www.onzra.com/cacheaudit.html
>
> LOL. Now that's funny! I get a completely black screen
> with Firefox and IE. I briefly glanced at the HTML src
> code (CTRL-U) but don't want to burn brain cells figuring
> out what you have to say.
>
> matthew black
> network services
> california state university, long beach
>