[169762] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: new DNS forwarder vulnerability

daemon@ATHENA.MIT.EDU (Nick Hilliard)
Fri Mar 14 09:59:06 2014

X-Envelope-To: nanog@nanog.org
Date: Fri, 14 Mar 2014 13:59:27 +0000
From: Nick Hilliard <nick@foobar.org>
To: mallman@icir.org, nanog@nanog.org
In-Reply-To: <20140314134516.BA770396DEA7@lawyers.icir.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 14/03/2014 13:45, Mark Allman wrote:
>   - We have found 7--9% of the open resolver population---or 2-3 million
>     boxes---to be vulnerable to this cache poisoning attack.  (The
>     variance is from different runs of our experiments.)

did you characterise what dns servers / embedded kit were vulnerable?  If
so, can you share the results?

Nick



home help back first fref pref prev next nref lref last post