Multiple DNS implementations vulnerable to cache poisoning

Jean-François Mezei jfmezei at
Wed Jul 9 08:39:49 UTC 2008

Michael C. Toren wrote:

>         bash$ ./noclicky 
>         Looking up against
>         Fetching
>         Requests seen for
>  TXID=23113
>  TXID=31336
>  TXID=1613
>  TXID=22846
>  TXID=24013
>         Your nameserver appears to be safe

Thanks for the explanation. I used wireshark to capture the DNS traffic
from my server to the outside world while running the test.

My DNS server made the various DNS requests from the same port and is
thus vulnerable. (VMS TCPIP Services so no patches expected).

More information about the NANOG mailing list