Multiple DNS implementations vulnerable to cache poisoning

Andrews Carl 455 Carl.Andrews at crackerbarrel.com
Thu Jul 10 19:02:42 UTC 2008


https://www.dns-oarc.net 

-----Original Message-----
From: Michael Sinatra [mailto:michael at rancid.berkeley.edu] 
Sent: Thursday, July 10, 2008 1:13 PM
To: Jay R. Ashworth
Cc: nanog at nanog.org
Subject: Re: Multiple DNS implementations vulnerable to cache poisoning

On 07/10/08 11:03, Jay R. Ashworth wrote:
> Another test, that apparently was publicized on some dnsops list:
> 
> dig +short porttest.dns-oarc.net TXT

The "some dnsops list" is the OARC public dns-operations list, and this
posting explains the tool and briefly describes the results:

http://lists.oarci.net/pipermail/dns-operations/2008-July/002932.html

There's a healthy discussion of this vuln and DNSSEC going on over
there, and that list is an appropriate forum for further discussion of
this topic.

michael





More information about the NANOG mailing list