North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Multiple DNS implementations vulnerable to cache poisoning

  • From: Owen DeLong
  • Date: Tue Jul 08 20:20:56 2008

The tool, unfortunately, only goes after the server it thinks you are using to
recurse from the client where you're running your browser.


This makes it hard to test servers being used in production environments
without GUIs.  The tool is not Lynx compatible.

Owen

On Jul 8, 2008, at 5:12 PM, Lynda wrote:

This is also being covered over on the Defcon Forums. Jeff Moss has said that he'll post the link to the interview that Kaminsky is doing right now, after it's over. Here's the link to the Forum discussion:

https://forum.defcon.org/showthread.php?t=9547

The forum link also has a link to Dan's tool, where you can see if your DNS server is vulnerable.

--
In April 1951, Galaxy published C.M. Kornbluth's "The Marching Morons".
The intervening years have proven Kornbluth right.
--Valdis Kletnieks