nanog mailing list archives

Re: Multiple DNS implementations vulnerable to cache poisoning


From: "Christian Koch" <christian () broknrobot com>
Date: Tue, 8 Jul 2008 20:38:56 -0400

surely the tool is not focused at a dns operator/admin audience..




On Tue, Jul 8, 2008 at 8:20 PM, Owen DeLong <owen () delong com> wrote:

The tool, unfortunately, only goes after the server it thinks you are using
to
recurse from the client where you're running your browser.

This makes it hard to test servers being used in production environments
without GUIs.  The tool is not Lynx compatible.

Owen


On Jul 8, 2008, at 5:12 PM, Lynda wrote:

 This is also being covered over on the Defcon Forums. Jeff Moss has said
that he'll post the link to the interview that Kaminsky is doing right now,
after it's over. Here's the link to the Forum discussion:

https://forum.defcon.org/showthread.php?t=9547

The forum link also has a link to Dan's tool, where you can see if your
DNS server is vulnerable.

--
In April 1951, Galaxy published C.M. Kornbluth's "The Marching Morons".
The intervening years have proven Kornbluth right.
              --Valdis Kletnieks






-- 
^christian$


Current thread: