dns exploit

dhottinger at harrisonburg.k12.va.us dhottinger at harrisonburg.k12.va.us
Sat Jul 26 11:32:59 UTC 2008


Quoting Chris Buxton <cbuxton at menandmice.com>:

> That sure seems like a lot of work when you could just:
>
> dig porttest.dns-oarc.net txt +short @server-ip
>
> For example:
>
> $ dig porttest.dns-oarc.net txt +short @217.151.171.7
> z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net.
> "217.151.171.7 is GOOD: 26 queries in 3.9 seconds from 26 ports with
> std dev 19886.66"
>
> Notice the word "GOOD" in the output. Also notice the standard
> deviation shown at the end - you want 5 digits before the decimal point.
>
> Chris Buxton
> Professional Services
> Men & Mice
>
> On Jul 25, 2008, at 10:24 PM, Brian Keefer wrote:
>
>> On Jul 25, 2008, at 5:48 PM, Gregory Hicks wrote:
>>
>>>> Date: Fri, 25 Jul 2008 20:36:50 -0400
>>>> From: dhottinger at harrisonburg.k12.va.us
>>>> To: "comp-protocols-dns-bind at isc.org"
>>> <comp-protocols-dns-bind at isc.org>
>>>> Subject: dns exploit
>>>>
>>>> Silly question, how do I tell If Im vulnerable to the dns exploit?
>>>

All is well.  Thanks for the info.


-- 
Dwayne Hottinger
Network Administrator
Harrisonburg City Public Schools

"Everything should be made as simple as possible, but not simpler."
-- Albert Einstein



More information about the bind-users mailing list