[150332] in North American Network Operators' Group
Re: DNS Attacks
daemon@ATHENA.MIT.EDU (Henry Linneweh)
Tue Feb 21 21:18:15 2012
Date: Tue, 21 Feb 2012 18:17:22 -0800 (PST)
From: Henry Linneweh <hrlinneweh@sbcglobal.net>
To: "Valdis.Kletnieks@vt.edu" <Valdis.Kletnieks@vt.edu>,
Jimmy Hess <mysidia@gmail.com>
In-Reply-To: <23411.1329866104@turing-police.cc.vt.edu>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Reply-To: Henry Linneweh <hrlinneweh@sbcglobal.net>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
=0A=0AHere is a repeat=0Ahttp://www.theregister.co.uk/2012/02/16/ghost_doma=
ins_dns_vuln/=0A=0A-henry=0A________________________________=0AFrom: "Valdi=
s.Kletnieks@vt.edu" <Valdis.Kletnieks@vt.edu>=0ATo: Jimmy Hess <mysidia@gma=
il.com> =0ACc: nanog@nanog.org =0ASent: Tuesday, February 21, 2012 3:15 PM=
=0ASubject: Re: DNS Attacks=0A=0AOn Tue, 21 Feb 2012 16:29:04 CST, Jimmy He=
ss said:=0A> Once your user has shared "confidential" information unsolicit=
ed with=0A> an unknown third party, and the general public,=A0=A0=A0the inf=
ormation's=0A> confidentiality was spoiled by the act of posting, regardles=
s of the=0A> content of the information=0A=0AI see lawyers booking their va=
cations in Tahiti now.....