[11780] in bugtraq
Re: Dynamic DNS Vulnerability
daemon@ATHENA.MIT.EDU (Paul Leach (Exchange))
Thu Sep  9 11:48:02 1999
Mime-Version: 1.0
Content-Type: text/plain
Message-Id:  <19398D273324D3118A2B0008C7E9A56902FFFBA8@SIT.platinum.corp.microsoft.com>
Date:         Fri, 3 Sep 1999 12:46:17 -0700
Reply-To: "Paul Leach (Exchange)" <paulle@EXCHANGE.MICROSOFT.COM>
From: "Paul Leach (Exchange)" <paulle@EXCHANGE.MICROSOFT.COM>
X-To:         3xT <awacs@3XT.ORG>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
> -----Original Message-----
> From: 3xT [mailto:awacs@3XT.ORG]
> Sent: Monday, August 30, 1999 4:36 PM
>
> Currently most inplementations of Dynamic DNS or "DDNS" rely
> upon only client IP addresses in an access list for
> authentication.
Windows 2000 uses TSIG and Kerberos for update authentication.
Paul