Stephen Vaughan wrote:
Hi,

Does anyone know if TinyDNS is vulnerable to the dns cache poisoning exploit? I run tinydns servers, I ran the test below and it came back as POOR.

mh1:~# dig +short @ns1.example.com <http://ns1.example.com> porttest.dns-oarc.net <http://porttest.dns-oarc.net> TXT z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net <http://z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net>. "1.2.3.4 <http://1.2.3.4> is POOR: 26 queries in 4.4 seconds from 1 ports with std dev 0.00"

This is all very odd. It looks like you are resolving ns1.example.com to 1.2.3.4 which is a POOR DNS server.
--
Best Regards,
Stephen


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to