This archive is retained to ensure existing URLs remain functional. It will not contain any emails sent to this mailing list after July 1, 2024. For all messages, including those sent before and after this date, please visit the new location of the archive at https://mailman.ripe.net/archives/list/dns-wg@ripe.net/
[dns-wg] New on RIPE Labs: NXNSAttack: Upgrade Resolvers to Stop New Kind of Random Subdomain Attack
- Previous message (by thread): [dns-wg] New on RIPE Labs: NXNSAttack: Upgrade Resolvers to Stop New Kind of Random Subdomain Attack
- Next message (by thread): [dns-wg] DNSSEC Validation Failures for RIPE NCC Zones
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Ralf Weber
dns at fl1ger.de
Thu May 21 10:15:22 CEST 2020
Moin! On 20 May 2020, at 16:43, Mirjam Kuehne wrote: > This article by Petr Špaček of CZ.NIC describes a newly discovered DNS > protocol vulnerability that affects all recursive DNS resolvers. That is not exactly true and while I normally would not have bothered to correct that, but I had to answer quite a few customer questions yesterday, so here we are. Akamai/Nominum Cacheserve and Akamai/Xerocole AnswerX are not affected by this. We had limits in the software for this in the Cacheserve case from day one. Would appreciate if you could correct that in the article. So long -Ralf —-- Ralf Weber
- Previous message (by thread): [dns-wg] New on RIPE Labs: NXNSAttack: Upgrade Resolvers to Stop New Kind of Random Subdomain Attack
- Next message (by thread): [dns-wg] DNSSEC Validation Failures for RIPE NCC Zones
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
[ dns-wg Archives ]