[78989] in North American Network Operators' Group
Re: DNS cache poisoning attacks -- are they real?
daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sun Mar 27 23:50:02 2005
Date: Mon, 28 Mar 2005 10:19:33 +0530
From: Suresh Ramasubramanian <ops.lists@gmail.com>
Reply-To: Suresh Ramasubramanian <ops.lists@gmail.com>
To: Brad Knowles <brad@stop.mail-abuse.org>
Cc: Sean Donelan <sean@donelan.com>,
Florian Weimer <fw@deneb.enyo.de>, nanog@merit.edu
In-Reply-To: <p06200736be6c9bdda756@10.0.1.3>
Errors-To: owner-nanog@merit.edu
On Sun, 27 Mar 2005 18:22:15 +0100, Brad Knowles
<brad@stop.mail-abuse.org> wrote:
>
> Abusing someone else's poorly configured resolvers is not the way
> to solve this problem, and it's a bad habit to get into.
>
Er, I forgot to mention that it was my ISP whose resolver I used, and
I have a perfect right to use their resolver when necessary. I try
not to, when I am traveling, given the latency. But it is not like,
for example, using an open relay, or even using John Gilmore's open by
design relay at toad.com.
I dont know how, but dns requests to those resolvers worked, whereas
my local resolver got proxied through their dns .. if it was a
transparent proxy that'd not be the case.
-srs