[17958] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Killing ircds via DNS

daemon@ATHENA.MIT.EDU (van der Kooij, Hugo)
Fri Dec 8 00:52:06 2000

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.LNX.4.30.0012062210081.21805-100000@bastion.hugo.vanderkooij.org>
Date:         Wed, 6 Dec 2000 22:12:09 +0100
Reply-To: Hugo.van.der.Kooij@CAIW.NL
From: "van der Kooij, Hugo" <Hugo.van.der.Kooij@CAIW.NL>
X-To:         David Luyer <david_luyer@PACIFIC.NET.AU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <200012060902.eB692xD09017@typhaon.pacific.net.au>

On Wed, 6 Dec 2000, David Luyer wrote:

> The bug is triggered by returning a 128-byte answer to an A-record query, eg,
> a 128-byte A-record response to a reverse DNS lookup on the client IP.  The
> fix should be self-evident.

I'm not that good in coding.

But isn't requesting an A record a normal DNS request? (Get an IP address
by the given name.) A reverse DNS query would be for a PTR record.
(Getting the name by an IP address.)

Hugo.

--
Hugo van der Kooij; Oranje Nassaustraat 16; 3155 VJ  Maasland
hvdkooij@caiw.nl	http://home.kabelfoon.nl/~hvdkooij/
--------------------------------------------------------------
This message has not been checked and may contain harmfull content.

home help back first fref pref prev next nref lref last post