[78530] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS Blackhole attack

daemon@ATHENA.MIT.EDU (Rachael Treu)
Mon Mar 7 14:51:36 2005

Date: Mon, 7 Mar 2005 13:40:56 -0600
From: Rachael Treu <rara@navigo.com>
To: Ketil Froyn <kfroyn@gnr.com>
Cc: "william(at)elan.net" <william@elan.net>, nanog@nanog.org
In-Reply-To: <1110195533.2836.60.camel@ketil>
Errors-To: owner-nanog@merit.edu


On Mon, Mar 07, 2005 at 11:38:53AM +0000, Ketil Froyn said something to the effect of:
> 
> On Sat, 2005-03-05 at 14:43 -0800, william(at)elan.net wrote:
> 
> > Global DNS cache poisoning attack?; Update...
> 
> It's a bit frustrating that problems this old and well-known can
> actually be used to cause damage.

Uh...see tcp ports 135 through 139, and give thought to smtp
as a protocol.  And I hear the water is lovely in nis, nfs, and
rpc this time of year... ;P

> 
> The easiest way to check if you are vulnerable to DNS poisoning is to
> try to poison yourself. Try my "poison yourself" page here:
> 
>   http://ketil.froyn.name/poison.html

Nice, handy resource.

What's up with the patching problems, btw?

whee,
--ra

--
k. rachael treu, CISSP	rara@navigo.com
..quis custodiet ipsos custodes?..


> 
> It tries to redirect www.example.com to a fake IP (the same one as I
> host my website on), where I have a virtualhost for www.example.com with
> a plain html page. It'll tell you if you were poisoned.
> 
> Cheers,
> Ketil Froyn
> 



home help back first fref pref prev next nref lref last post