SANS: DNS Bug Now Public?

Christian Koch christian at broknrobot.com
Tue Jul 22 07:46:43 CDT 2008


matasano blogged about it

cache of the original post here..

http://beezari.livejournal.com/

matasano apologizes here

http://www.matasano.com/log/1105/regarding-the-post-on-chargen-earlier-today/

dan posts (13 - 0) 13 days left to blackhat opposed to the 0 days since the
details were discussed

http://www.doxpara.com/?p=1176

halvar flake speculation

http://addxorrol.blogspot.com/2008/07/on-dans-request-for-no-speculation.html

post on daily dave

http://seclists.org/dailydave/2008/q3/0070.html



On Tue, Jul 22, 2008 at 8:40 AM, Jon Kibler <Jon.Kibler at aset.com> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> SANS is reporting that Kaminsky's DNS bug may be now being exploited in
> the wild. See:
>        http://isc.sans.org/diary.html?n&storyid=4765
>
> Jon Kibler
> - --
> Jon R. Kibler
> Chief Technical Officer
> Advanced Systems Engineering Technology, Inc.
> Charleston, SC  USA
> o: 843-849-8214
> c: 843-224-2494
> s: 843-564-4224
>
> My PGP Fingerprint is:
> BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.8 (Darwin)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
> evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
> =eqbc
> -----END PGP SIGNATURE-----
>
>
>
>
> ==================================================
> Filtered by: TRUSTEM.COM's Email Filtering Service
> http://www.trustem.com/
> No Spam. No Viruses. Just Good Clean Email.
>
>



More information about the NANOG mailing list