[nsp-sec] ACK: List of vulnerable DNS resolvers
Kevin Oberman
oberman at es.net
Wed Jul 23 12:45:36 EDT 2008
ACK AS291
--
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: oberman at es.net Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4 EADA 927D EBB3 987B 3751
> Date: Tue, 22 Jul 2008 16:11:49 -0700
> From: "Niels Provos" <niels at google.com>
> Sender: nsp-security-bounces at puck.nether.net
>
> ----------- nsp-security Confidential --------
>
> Hi,
>
> as you know, the DNS flaw was leaked yesterday. At the moment, ~70%
> of all resolvers on the Internet use static or trivially predictable
> source ports. These resolvers/NAT devices need to be patched as soon
> as possible. The CERT reference for this flaw can be found at:
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 224 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20080723/76feabbe/attachment-0001.sig>
More information about the nsp-security
mailing list