[nsp-sec] ACK AS852 - RE: List of vulnerable DNS resolvers

Chris Calvert Chris.Calvert at telus.com
Wed Jul 23 16:07:31 EDT 2008


Thanks Niels... ACK for AS852.

I'm pushing for a targetted information campaign for end-user contacts
(residential, soho, managed service, etc).

We're patched up as far as our Internet-facing recursive resolvers go (or so
I'm told!), the ones within my team's control were done some time ago.  If
anyone has a particularly effective way of getting reticent admins of
"internal" recursive resolvers to patch, please share.

chris

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> Niels Provos
> Sent: Tuesday, July 22, 2008 5:12 PM
> To: nsp-security at puck.nether.net
> Subject: [nsp-sec] List of vulnerable DNS resolvers
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 4858 bytes
Desc: not available
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20080723/f2c17b1b/attachment-0001.bin>


More information about the nsp-security mailing list