(http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html)

Also serves as a good guide to how DNS works.

=====
Steve Friedl's Unixwiz.net Tech Tips
An Illustrated Guide to the Kaminsky DNS Vulnerability

The big security news of Summer 2008 has been Dan Kaminsky's discovery
of a serious vulnerability in DNS. This vulnerability could allow an
attacker to redirect network clients to alternate servers of his own
choosing, presumably for ill ends.

This all led to a mad dash to patch DNS servers worldwide, and though
there have been many writeups of just how the vulnerability manifests
itself, we felt the need for one in far more detail. Hence, one of our
Illustrated Guides.

This paper covers how DNS works: first at a high level, then by
picking apart an individual packet exchange field by field. Next,
we'll use this knowledge to see how weaknesses in common
implementations can lead to cache poisoning.

By fully understanding the issues at play, the reader may be better
equipped to mitigate the risks in his or her own environment.

We hope everybody who runs a DNS server patches soon.

[...]
=====

-- 
Soh Kam Yung
my Google Reader Shared links:
(http://www.google.com/reader/shared/16851815156817689753)
my Google Reader Shared SFAS links:
(http://www.google.com/reader/shared/user/16851815156817689753/label/sfas)

_______________________________________________
Slugnet mailing list
[email protected]
http://wiki.lugs.org.sg/LugsMailingListFaq
http://www.lugs.org.sg/mailman/listinfo/slugnet

Reply via email to