DNS spoofing vulnerability
marty at goodoldmarty.com
Wed Jul 16 09:09:39 PDT 2008
> You're right, none of the BIND server stuff relates to you - I think
> AT&T should be able to upgrade their servers in time, if they haven't
> already. We're only discussing it because you brought it up.
Actually it was you who brought it up with that "Chicken
> If you want to check on AT&T's progress, execute this command
> [assuming you have dig installed]:
> dig +short porttest.dns-oarc.net TXT
That just shows the level of source port randomness for a
given resolver. Poor randomness in itself does not
constitute a vulnerability but it is a prerequisite for
Kaminsky's sploit, and others to work.
People have been attacking DNS successfully since it was
introduced. DNS attacks don't target single individuals but
instead attack the trusted DNS infrastructure to misdirect
the end users. This means only the big players are the
logical targets anyway, not HLFS users.
Electile Dysfunction : the inability to become aroused over
any of the
choices for President put forth by either party in the 2008
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 189 bytes
Desc: OpenPGP digital signature
More information about the hlfs-dev