Forwarded... Men and Mice: 75.6 Percent of DNSs Poorly Configured The majority of DNSs are poorly configured with the result that almost a third are open to spoofing attacks, according to a survey conducted by Men & Mice. The survey looked at the most common errors in domain name configuration. It found that 75.6 percent of DNSs had configuration errors. DNS spoofing refers to the placement of phony data in a network's name server. It can result in users being directed to the wrong Web sites and unauthorizedparties gaining access to outgoing e-mail messages. The survey found that 32.1 percent of DNSs are vulnerable to spoofing. An attack could have disastrous implications for a company, its customers and correspondents, according to DNS consultant Cricket Liu. In addition, 30 percent of set-ups included lame delegations, which slow down DNS traffic and lookups, and in some cases return failed lookups. 24.7 percent of set-ups had incorrect delegations, which has the effect of increasing resolution time and making domain information inaccessible. 17.5 percent of domains returned look-up failures. 21.2 percent were configured so as to have various problems with mail delivery. The findings are based on a random survey sample of 5000 .com zones, taken from 2 million InterNIC registered zones. It was conducted in November 1998. <http://www.menandmice.com/> /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/ Boundary, n. In political geography, an imaginary line between two nations, separating the imaginary rights of one from the imaginary rights of another. -- Ambrose Bierce, The Devil's Dictionary __________________________________________________ To receive the digest version instead, send a blank email to [EMAIL PROTECTED] To SUBSCRIBE forward this message to: [EMAIL PROTECTED] To UNSUBSCRIBE, forward this message to: [EMAIL PROTECTED] Problems/suggestions regarding this list? Email [EMAIL PROTECTED] ___END____________________________________________
