This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/dns-wg@ripe.net/
[dns-wg] What about the last mile, was: getting DNSSEC deployed
- Previous message (by thread): [dns-wg] What about the last mile, was: getting DNSSEC deployed
- Next message (by thread): [dns-wg] What about the last mile, was: getting DNSSEC deployed
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Jaap Akkerhuis
jaap at NLnetLabs.nl
Fri Feb 16 13:46:38 CET 2007
NEW ATTACK TECHNIQUE THREATENS BROADBAND USERS
Millions of high-speed Internet users across the globe are threatened
by a new attack technique called drive-by pharming, Symantec and
Indiana University researchers warned Thursday.
http://go.techtarget.com/r/1004039/1401570
This method is variation on the team to users equipment as a
coprocessor. In this case, a java applet tries to guess the passwd
of the users adsl router and then reconfigures the dns server in the
box. Most users have not chnged the original passwd (if an) or use an
easy tp gues one. More details got dicussed on nanog.
On the practical note, I need to say something definite to my
students what DNS experts think?
Tell then to switch of java etc. :-).
As noted, dnssec can protect against spoofed dns info.
jaap
- Previous message (by thread): [dns-wg] What about the last mile, was: getting DNSSEC deployed
- Next message (by thread): [dns-wg] What about the last mile, was: getting DNSSEC deployed
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ dns-wg Archives ]