Udhay Shankar N <[EMAIL PROTECTED]> writes:
> Kaminsky Breaks DNS
[...]
> Unlike other researchers who give up the gory details, Kaminsky took a
> wiser path by smiling and nodding. He’ll give up the goods at Black
> Hat in August. That should give folks enough time to patch their
> systems.
The
Niels Provos has a web page up with some javascript that automatically
checks if your DNS caching server has been properly patched or not.
http://www.provos.org/index.php?/pages/dnstest.html
It is worth telling people to try.
--
Perry E. Metzger[EMAIL PROTECTED]
--
On Mon, Jul 21, 2008 at 8:33 AM, Matt Ball <[EMAIL PROTECTED]> wrote:
>
>"If someone uses the __random32 function as defined in the 2.6.26
> Linux kernel, and leaks to you the result of taking successive outputs
> modulo 28233 (= 9 * 3137), can you determine the probable 96-bit
> internal state
Matt Ball writes:
>Another attacking avenue is the 32-bit initial seed. If the
>implementation re-seeds frequently, or leaks to you the first outputs
>after initialization, then you only have to brute-force the 32-bit
>seed space, times the number of samples since reseeding.
Well, that's good and