[78989] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS cache poisoning attacks -- are they real?

daemon@ATHENA.MIT.EDU (Suresh Ramasubramanian)
Sun Mar 27 23:50:02 2005

Date: Mon, 28 Mar 2005 10:19:33 +0530
From: Suresh Ramasubramanian <ops.lists@gmail.com>
Reply-To: Suresh Ramasubramanian <ops.lists@gmail.com>
To: Brad Knowles <brad@stop.mail-abuse.org>
Cc: Sean Donelan <sean@donelan.com>,
	Florian Weimer <fw@deneb.enyo.de>, nanog@merit.edu
In-Reply-To: <p06200736be6c9bdda756@10.0.1.3>
Errors-To: owner-nanog@merit.edu


On Sun, 27 Mar 2005 18:22:15 +0100, Brad Knowles
<brad@stop.mail-abuse.org> wrote:
> 
>         Abusing someone else's poorly configured resolvers is not the way
> to solve this problem, and it's a bad habit to get into.
> 

Er, I forgot to mention that it was my ISP whose resolver I used, and
I have a perfect right to use their resolver when necessary.  I try
not to, when I am traveling, given the latency.  But it is not like,
for example, using an open relay, or even using John Gilmore's open by
design relay at toad.com.

I dont know how, but dns requests to those resolvers worked, whereas
my local resolver got proxied through their dns .. if it was a
transparent proxy that'd not be the case.
 
-srs

home help back first fref pref prev next nref lref last post