North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: DNS cache poisoning attacks -- are they real?

  • From: Suresh Ramasubramanian
  • Date: Mon Mar 28 09:58:51 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:references; b=D87xvqYAEnuQrtW8BhYBBQgjgzGFBIqogHEujP4AXbEKVwxXGjVpPvXoh1u+1XjggUdgvdX3FSP9kx9KrTcpQy7y5KCE8iGaQw/T8CRdwY0dHwzu0AngmQeNJuyV3xSuljiANVCnE5a7Nleg1k/s3TdImM7BfzyS+4qso8vcUlI=

On Mon, 28 Mar 2005 16:40:22 +0100, Brad Knowles
<[email protected]> wrote:
>         If you want to use your own resolver remotely like this, I can't
> really say too much about that.  However, in that case I would
> encourage you to ensure that the server is closed to queries from
> outside sources unless those sources are cryptographically
> authenticated.

Not even mine as a matter of fact.  My DSL ISP's. :)