On Wed, February 14, 2024 4:44 am, Peter J. Philipp wrote:
> ...
>
> * I'm not a cryptographer, mathematician nor do I program DNS on the
> recursive end. I program on the authoritative server end, where you can't
> do anything about something like a MITM anyhow. Donald Knuth and other
> books
Otto Moerbeek wrote:
> On Wed, Feb 14, 2024 at 04:55:20AM +0100, b...@fea.st wrote:
>
> > “A single packet can exhaust the processing
> > capacity of a vulnerable DNS server, effectively
> > disabling the machine, by exploiting a
> > 20-plus-year-old design flaw in the DNSSEC
> >
On Tue, Feb 13, 2024, at 9:55 PM, b...@fea.st wrote:
> “A single packet can exhaust the processing
> capacity of a vulnerable DNS server, effectively
> disabling the machine, by exploiting a
> 20-plus-year-old design flaw in the DNSSEC
> specification.
>
>
On Wed, Feb 14, 2024 at 04:55:20AM +0100, b...@fea.st wrote:
> “A single packet can exhaust the processing
> capacity of a vulnerable DNS server, effectively
> disabling the machine, by exploiting a
> 20-plus-year-old design flaw in the DNSSEC
> specification.
>
>
On 2/14/24 04:55, b...@fea.st wrote:
“A single packet can exhaust the processing
capacity of a vulnerable DNS server, effectively
disabling the machine, by exploiting a
20-plus-year-old design flaw in the DNSSEC
specification.
“A single packet can exhaust the processing
capacity of a vulnerable DNS server, effectively
disabling the machine, by exploiting a
20-plus-year-old design flaw in the DNSSEC
specification.
https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
6 matches
Mail list logo