Ok I will give more details, I am using Debian etch 64 Bits, the spamdyke
version is:
spamdyke 4.0.0+CONFIGTEST+DEBUG (C)2008 Sam Clippinger, samc (at) silence
(dot) org
I will put the option off full log dir.
Thanks for all,
Thiago Cesar
Diretor TI
MSN: [EMAIL PROTECTED]
Skype: thiago_ceor
On Wed, Oct 8, 2008 at 10:33 PM, Sam Clippinger [EMAIL PROTECTED] wrote:
Well, not necessarily. At the moment, spamdyke is only vulnerable to a
very small part of the DNS spoofing attack. Most of the danger Dan
Kaminsky discovered comes from caching -- a vulnerable host could cache
incorrect