[
Date Prev
][
Date Next
] [
Thread Prev
][
Thread Next
] [
Date Index
] [
Thread Index
]
Tinydns - cache poisoning?
To
:
debian-security@lists.debian.org
Subject
: Tinydns - cache poisoning?
From
: "Stephen Vaughan" <
stephenvaughan@gmail.com
>
Date
: Wed, 30 Jul 2008 14:47:57 +1000
Message-id
: <
389c58c40807292147h27ab8f4ge3c349e9dd310c08@mail.gmail.com
>
Hi,
Does anyone know if TinyDNS is vulnerable to the dns cache poisoning exploit? I run tinydns servers, I ran the test below and it came back as POOR.
mh1:~# dig +short @
ns1.example.com
porttest.dns-oarc.net
TXT
z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net
.
"
1.2.3.4
is POOR: 26 queries in 4.4 seconds from 1 ports with std dev 0.00"
--
Best Regards,
Stephen
Reply to:
debian-security@lists.debian.org
Stephen Vaughan (on-list)
Stephen Vaughan (off-list)
Follow-Ups
:
Re: Tinydns - cache poisoning?
From:
Florian Weimer <fw@deneb.enyo.de>
Re: Tinydns - cache poisoning?
From:
Rick Moen <rick@linuxmafia.com>
Re: Tinydns - cache poisoning?
From:
John Allen <john.allen@dublinux.net>
Prev by Date:
Re: [SECURITY] [DSA 1620-1] New python2.5 packages fix several vulnerabilities
Next by Date:
Re: Tinydns - cache poisoning?
Previous by thread:
Re: [SECURITY] [DSA 1620-1] New python2.5 packages fix several vulnerabilities
Next by thread:
Re: Tinydns - cache poisoning?
Index(es):
Date
Thread