[11780] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Dynamic DNS Vulnerability

daemon@ATHENA.MIT.EDU (Paul Leach (Exchange))
Thu Sep 9 11:48:02 1999

Mime-Version: 1.0
Content-Type: text/plain
Message-Id:  <19398D273324D3118A2B0008C7E9A56902FFFBA8@SIT.platinum.corp.microsoft.com>
Date:         Fri, 3 Sep 1999 12:46:17 -0700
Reply-To: "Paul Leach (Exchange)" <paulle@EXCHANGE.MICROSOFT.COM>
From: "Paul Leach (Exchange)" <paulle@EXCHANGE.MICROSOFT.COM>
X-To:         3xT <awacs@3XT.ORG>, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM

> -----Original Message-----
> From: 3xT [mailto:awacs@3XT.ORG]
> Sent: Monday, August 30, 1999 4:36 PM
>
> Currently most inplementations of Dynamic DNS or "DDNS" rely
> upon only client IP addresses in an access list for
> authentication.

Windows 2000 uses TSIG and Kerberos for update authentication.

Paul

home help back first fref pref prev next nref lref last post