[14796] in bugtraq

home help back first fref pref prev next nref lref last post

Re: glibc resolver weakness

daemon@ATHENA.MIT.EDU (Bennett Todd)
Sat May 6 14:57:19 2000

Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
              protocol="application/pgp-signature"; boundary="+mSjbC2tVdWE/Wop"
Message-Id:  <20000503153047.W635@rahul.net>
Date:         Wed, 3 May 2000 15:30:48 -0400
Reply-To: Bennett Todd <bet@RAHUL.NET>
From: Bennett Todd <bet@RAHUL.NET>
X-To:         antirez <antirez@LINUXCARE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000503034046.A9579@nagash.marmoc.net>; from
              antirez@LINUXCARE.COM on Wed, May 03, 2000 at 03:40:46AM +0200

--+mSjbC2tVdWE/Wop
Content-Type: text/plain; charset=us-ascii

For those sufficiently paranoid to worry about such things, one
solution (I believe, if I'm not misunderstanding the nature of the
threat) is to run a well-written, efficient, secure caching
nameserver on each and every local system, putting 127.0.0.1 in
/etc/resolv.conf.

One great caching nameserver is djb's dnscache, at
<URL:http://cr.yp.to/dnscache.html>.

-Bennett

--+mSjbC2tVdWE/Wop
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.0 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE5EH5nL6KAps40sTYRAWjLAJ4kH1tz18ivX6zTQXGFZtpFrn9e+gCffNCe
SMxQJ6ZCw/rJne/z89LxbKY=
=LFHH
-----END PGP SIGNATURE-----

--+mSjbC2tVdWE/Wop--

home help back first fref pref prev next nref lref last post