> I assume most of you have heard about the recent BIND/MS DNS updates  
> to somewhat address a new DNS spoofing attack vector discovered by Dan  
> Kaminsky.

This is NOT a new vulnerability. Kaminsky just got wise recently.
Bernstein made it public many years ago. Others have written about it too.
Djbns and PowerDNS were never affected because those authors knew about this
from the start. Why the big noise now?

Do you run public resolvers?
I think concerns about the resolver libs are misplaced, especially on HLFS.
Show how an attacker will exploit this before you let theory overcome logic.

Marty B.
-- 
Electile Dysfunction : the inability to become aroused over any of the
choices for President put forth by either party in the 2008 election.

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
http://linuxfromscratch.org/mailman/listinfo/hlfs-dev
FAQ: http://www.linuxfromscratch.org/faq/
Unsubscribe: See the above information page

Reply via email to