[169765] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: new DNS forwarder vulnerability

daemon@ATHENA.MIT.EDU (Nick Hilliard)
Fri Mar 14 12:21:28 2014

X-Envelope-To: nanog@nanog.org
Date: Fri, 14 Mar 2014 16:20:52 +0000
From: Nick Hilliard <nick@foobar.org>
To: Merike Kaeo <merike@doubleshotsecurity.com>,
 Stephane Bortzmeyer <bortzmeyer@nic.fr>
In-Reply-To: <022DA097-3756-4B62-8EB1-1F4539F46EE4@doubleshotsecurity.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 14/03/2014 16:05, Merike Kaeo wrote:
> Has someone / is someone doing this?

someone has, and many CPEs use dnsmasq.  current uplink too slow to find
references.

Nick




home help back first fref pref prev next nref lref last post