[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Exploit for DNS Cache Poisoning - RELEASED
- Subject: Exploit for DNS Cache Poisoning - RELEASED
- From: fergdawg at netzero.net (Paul Ferguson)
- Date: Thu, 24 Jul 2008 04:17:59 GMT
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -- Jared Mauch <jared at puck.nether.net> wrote:
>If your nameservers have not been upgraded or you did
>not enable the proper flags, eg: dnssec-enable and/or dnssec-validation
>as applicable, I hope you will take another look.
Let's hope some very large service providers get their act together
real soon now.
http://www.hackerfactor.com/blog/index.php?/archives/204-Poor-DNS.html
- - ferg
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)
wj8DBQFIiAJiq1pz9mNUZTMRAiSqAJwL9t4ldzKMjHyA4KITrLz2dHvTFQCgkfuR
G4SnZhKReOYYBjdSSJamVQw=
=ac5p
-----END PGP SIGNATURE-----
--
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
fergdawg(at)netzero.net
ferg's tech blog: http://fergdawg.blogspot.com/