Educause Security Discussion mailing list archives

Re: regarding the critical DNS protocol vulnerability


From: Russell Fulton <r.fulton () AUCKLAND AC NZ>
Date: Fri, 11 Jul 2008 15:39:59 +1200


On 11/07/2008, at 2:30 AM, Doug Pearson wrote:
Wednesday, 2008-07-09:

Regarding ability to use the Doxpara tool in an automated fashion:

Someone on NANOG came up with a perl wrapper that can be directed
at a specified DNS server.

http://mailman.nanog.org/pipermail/nanog/2008-July/001966.html

I have hacked this script so it reads output from nmap -oG (see the
comment at the start of the script).   Nmap found nearly 100 addresses
responding on tcp 53 but only a small fraction of these appear to be
running name servers.  Most timed out when the script tried to make
queries to them.  This slows things down enormously as the timeout is
a couple of minutes so the script took an hour or so to run.

The good news is that nearly all of our name servers are now fixed and
there are a few more that will be rebooted over the weekend.

Russell


Attachment: noclicky-1.00.pl
Description:





Current thread: