[169765] in North American Network Operators' Group
Re: new DNS forwarder vulnerability
daemon@ATHENA.MIT.EDU (Nick Hilliard)
Fri Mar 14 12:21:28 2014
X-Envelope-To: nanog@nanog.org
Date: Fri, 14 Mar 2014 16:20:52 +0000
From: Nick Hilliard <nick@foobar.org>
To: Merike Kaeo <merike@doubleshotsecurity.com>,
Stephane Bortzmeyer <bortzmeyer@nic.fr>
In-Reply-To: <022DA097-3756-4B62-8EB1-1F4539F46EE4@doubleshotsecurity.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On 14/03/2014 16:05, Merike Kaeo wrote:
> Has someone / is someone doing this?
someone has, and many CPEs use dnsmasq. current uplink too slow to find
references.
Nick