Merit Network
Can't find what you're looking for? Search the Mail Archives.
  About Merit   Services   Network   Resources & Support   Network Research   News   Events   Home

Discussion Communities: Merit Network Email List Archives

North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: DNS cache poisoning attacks -- are they real?

  • From: Suresh Ramasubramanian
  • Date: Mon Mar 28 09:58:51 2005
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:reply-to:to:subject:cc:in-reply-to:mime-version:content-type:content-transfer-encoding:references; b=D87xvqYAEnuQrtW8BhYBBQgjgzGFBIqogHEujP4AXbEKVwxXGjVpPvXoh1u+1XjggUdgvdX3FSP9kx9KrTcpQy7y5KCE8iGaQw/T8CRdwY0dHwzu0AngmQeNJuyV3xSuljiANVCnE5a7Nleg1k/s3TdImM7BfzyS+4qso8vcUlI=

On Mon, 28 Mar 2005 16:40:22 +0100, Brad Knowles
<brad@stop.mail-abuse.org> wrote:
>         If you want to use your own resolver remotely like this, I can't
> really say too much about that.  However, in that case I would
> encourage you to ensure that the server is closed to queries from
> outside sources unless those sources are cryptographically
> authenticated.

Not even mine as a matter of fact.  My DSL ISP's. :)




Discussion Communities


About Merit | Services | Network | Resources & Support | Network Research
News | Events | Contact | Site Map | Merit Network Home


Merit Network, Inc.