Full Disclosure mailing list archives

RE: Possible DNS compromise/poisoning?


From: <nicholasnam () hush com>
Date: Thu, 6 Jan 2005 06:02:34 -0800

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yes, that's exactly it.  Thanks.

On Wed, 05 Jan 2005 18:33:39 -0800 "ALD, Aditya, Aditya Lalit
Deshmukh" <aditya.deshmukh () online gateway expertworks net> wrote:
- --SNIP--
;; QUESTION SECTION:
;www.microsoft.com.             IN      A

;; ANSWER SECTION:
www.microsoft.com.      2415    IN      CNAME
www.microsoft.com.nsatc.net.
- --SNIP--

Notice that www.microsoft.com is a cname for
www.microsoft.com.nsatc.net.  It's not limited to
www.microsoft.com
and to the best of my knowledge the correct web content is
displayed.


Ms and all other big players have a round robin dns setup to
prevent
slowdown of their sites. It this what you are seeing ?

-aditya


___________________________________________________________________
_____
Delivered using the Free Personal Edition of Mailtraq
(www.mailtraq.com)
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkHdRUAACgkQQOst28rex95QLACffkWvXLliSMaBQVG0k+YlmpX9SEQA
niTzZQHhP4aALP3wxYpXJ8YagPP3
=KRWa
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: