oss-sec mailing list archives
Re: DNS vulnerability: other relevant software
From: Robert Buchholz <rbu () gentoo org>
Date: Wed, 9 Jul 2008 19:21:03 +0200
On Wednesday 09 July 2008, Matthias Geerdsen wrote:
- pdnsd [4]: no info yet
Quoting from http://members.home.nl/p.a.rombouts/pdnsd/doc.html : query_port_start=number; ... In case a query start port is given pdnsd uses this port as the first port of a specified port range (see query_port_end) used for queries. pdnsd will try to randomly select a free port from this range as local port for the query. ... The sample configuration file that is shipped does not have this option set, the default value of this is "0". I can't currently test this on a kernel that does not randomize by default, so this domaind supports randomization, and *seems* to have it enabled by default. Robert
Attachment:
signature.asc
Description: This is a digitally signed message part.
Current thread:
- Re: DNS vulnerability: other relevant software, (continued)
- Re: DNS vulnerability: other relevant software Florian Weimer (Jul 09)
- Re: DNS vulnerability: other relevant software Eugene Teo (Jul 09)
- Re: DNS vulnerability: other relevant software Eugene Teo (Jul 09)
- Re: DNS vulnerability: other relevant software Eugene Teo (Jul 10)
- Re: DNS vulnerability: other relevant software Nathanael Hoyle (Jul 10)
- Re: DNS vulnerability: other relevant software Bernhard R. Link (Jul 11)
- Re: DNS vulnerability: other relevant software Nathanael Hoyle (Jul 11)
- Re: DNS vulnerability: other relevant software Florian Weimer (Jul 13)
- Re: DNS vulnerability: other relevant software Florian Weimer (Jul 12)
- Re: DNS vulnerability: other relevant software Eugene Teo (Jul 09)