[106837] in North American Network Operators' Group
Re: [Fwd: Re: DNS attacks evolve]
daemon@ATHENA.MIT.EDU (bert hubert)
Thu Aug 14 15:11:14 2008
Resent-From: bert.hubert@netherlabs.nl
Resent-To: nanog@nanog.org
Date: Thu, 14 Aug 2008 21:06:08 +0200
From: bert hubert <bert.hubert@netherlabs.nl>
To: Mike Leber <mleber@he.net>
In-Reply-To: <48A46652.3050301@he.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org
On Thu, Aug 14, 2008 at 10:07:30AM -0700, Mike Leber wrote:
> FYI. There was some question here about whether PowerDNS was vulnerable
> or not and what it was doing, so I asked Bert Hubert about it. Here is
> his answer:
And my additional nuance:
By the way - just to nuance things, I'm sure PowerDNS can be spoofed too if
enough effort is thrown into it.
I'm working hard to implement the features that will allow me to state
PowerDNS won't be spoofed "in a million years of trying".
But I'm not there yet :-)
Cheers,
Bert
--
http://www.PowerDNS.com Open source, database driven DNS Software
http://netherlabs.nl Open and Closed source services