[106837] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: [Fwd: Re: DNS attacks evolve]

daemon@ATHENA.MIT.EDU (bert hubert)
Thu Aug 14 15:11:14 2008

Resent-From: bert.hubert@netherlabs.nl
Resent-To: nanog@nanog.org
Date: Thu, 14 Aug 2008 21:06:08 +0200
From: bert hubert <bert.hubert@netherlabs.nl>
To: Mike Leber <mleber@he.net>
In-Reply-To: <48A46652.3050301@he.net>
Cc: nanog@nanog.org
Errors-To: nanog-bounces@nanog.org

On Thu, Aug 14, 2008 at 10:07:30AM -0700, Mike Leber wrote:
> FYI.  There was some question here about whether PowerDNS was vulnerable 
> or not and what it was doing, so I asked Bert Hubert about it.  Here is 
> his answer:

And my additional nuance:

 By the way - just to nuance things, I'm sure PowerDNS can be spoofed too if
 enough effort is thrown into it.
 
 I'm working hard to implement the features that will allow me to state
 PowerDNS won't be spoofed "in a million years of trying".
 
 But I'm not there yet :-)

Cheers,

Bert

-- 
http://www.PowerDNS.com      Open source, database driven DNS Software 
http://netherlabs.nl              Open and Closed source services


home help back first fref pref prev next nref lref last post