nanog mailing list archives

Re: SANS: DNS Bug Now Public?


From: "Christian Koch" <christian () broknrobot com>
Date: Tue, 22 Jul 2008 08:46:43 -0400

matasano blogged about it

cache of the original post here..

http://beezari.livejournal.com/

matasano apologizes here

http://www.matasano.com/log/1105/regarding-the-post-on-chargen-earlier-today/

dan posts (13 - 0) 13 days left to blackhat opposed to the 0 days since the
details were discussed

http://www.doxpara.com/?p=1176

halvar flake speculation

http://addxorrol.blogspot.com/2008/07/on-dans-request-for-no-speculation.html

post on daily dave

http://seclists.org/dailydave/2008/q3/0070.html



On Tue, Jul 22, 2008 at 8:40 AM, Jon Kibler <Jon.Kibler () aset com> wrote:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SANS is reporting that Kaminsky's DNS bug may be now being exploited in
the wild. See:
       http://isc.sans.org/diary.html?n&storyid=4765

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
=eqbc
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.




Current thread: