SANS: DNS Bug Now Public?

Jon Kibler Jon.Kibler at aset.com
Tue Jul 22 12:40:32 UTC 2008


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SANS is reporting that Kaminsky's DNS bug may be now being exploited in
the wild. See:
	http://isc.sans.org/diary.html?n&storyid=4765

Jon Kibler
- --
Jon R. Kibler
Chief Technical Officer
Advanced Systems Engineering Technology, Inc.
Charleston, SC  USA
o: 843-849-8214
c: 843-224-2494
s: 843-564-4224

My PGP Fingerprint is:
BAA2 1F2C 5543 5D25 4636 A392 515C 5045 CF39 4253

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.8 (Darwin)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iEYEARECAAYFAkiF1T8ACgkQUVxQRc85QlMN1ACfTR8oJRy2V27+c5PjERcUjgIU
evAAn1sDR9xMc1bEmTeygXl7QkF9er2T
=eqbc
-----END PGP SIGNATURE-----




==================================================
Filtered by: TRUSTEM.COM's Email Filtering Service
http://www.trustem.com/
No Spam. No Viruses. Just Good Clean Email.



More information about the NANOG mailing list