SANS: DNS Bug Now Public?
Christian Koch
christian at broknrobot.com
Tue Jul 22 12:46:43 UTC 2008
matasano blogged about it
cache of the original post here..
http://beezari.livejournal.com/
matasano apologizes here
http://www.matasano.com/log/1105/regarding-the-post-on-chargen-earlier-today/
dan posts (13 - 0) 13 days left to blackhat opposed to the 0 days since the
details were discussed
http://www.doxpara.com/?p=1176
halvar flake speculation
http://addxorrol.blogspot.com/2008/07/on-dans-request-for-no-speculation.html
post on daily dave
http://seclists.org/dailydave/2008/q3/0070.html
On Tue, Jul 22, 2008 at 8:40 AM, Jon Kibler <Jon.Kibler at aset.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> SANS is reporting that Kaminsky's DNS bug may be now being exploited in
> the wild. See:
> http://isc.sans.org/diary.html?n&storyid=4765
>
> Jon Kibler
> - --
> Jon R. Kibler
> Chief Technical Officer
> Advanced Systems Engineering Technology, Inc.
> Charleston, SC USA
> o: 843-849-8214
> c: 843-224-2494
> s: 843-564-4224
>
> My PGP Fingerprint is:
> BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253
>
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.8 (Darwin)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
>
> iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
> evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
> =eqbc
> -----END PGP SIGNATURE-----
>
>
>
>
> ==================================================
> Filtered by: TRUSTEM.COM's Email Filtering Service
> http://www.trustem.com/
> No Spam. No Viruses. Just Good Clean Email.
>
>
More information about the NANOG
mailing list