[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Exploit for DNS Cache Poisoning - RELEASED
- Subject: Exploit for DNS Cache Poisoning - RELEASED
- From: fergdawg at netzero.net (Paul Ferguson)
- Date: Thu, 24 Jul 2008 05:55:51 GMT
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- -- Sean Donelan <sean at donelan.com> wrote:
>>
>> Let's hope some very large service providers get their act together
>> real soon now.
>
>There is always a tension between discovery, changing, testing and
finally deployment.
>
Sure, I can empathize, to a certain extent. But this issue has
been known for 2+ weeks now.
Not sure I can be very empathic now, given the seriousness, and the
proper warning ISPs have been given.
$.02,
- - ferg
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.3 (Build 3017)
wj8DBQFIiBldq1pz9mNUZTMRAiLjAJ91jnOPW+nhuk0PA5qGjrwz0bH25ACgjOXS
IEJTnVU4BIZ8bMfU7dB4ZKY=
=sBS2
-----END PGP SIGNATURE-----
--
"Fergie", a.k.a. Paul Ferguson
Engineering Architecture for the Internet
fergdawg(at)netzero.net
ferg's tech blog: http://fergdawg.blogspot.com/