From owner-freebsd-security Sat Jun 14 12:13:00 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.5/8.8.5) id MAA04463 for security-outgoing; Sat, 14 Jun 1997 12:13:00 -0700 (PDT) Received: from ns2.harborcom.net (root@ns2.harborcom.net [206.158.4.4]) by hub.freebsd.org (8.8.5/8.8.5) with ESMTP id MAA04453 for ; Sat, 14 Jun 1997 12:12:48 -0700 (PDT) Received: from localhost (bradley@localhost) by ns2.harborcom.net (8.8.5/8.8.5) with SMTP id PAA14755; Sat, 14 Jun 1997 15:11:52 -0400 (EDT) Date: Sat, 14 Jun 1997 15:11:52 -0400 (EDT) From: Bradley Dunn X-Sender: bradley@ns2.harborcom.net Reply-To: Bradley Dunn To: Karl Denninger cc: freebsd-security@FreeBSD.ORG Subject: Re: DNS abuse (fwd) In-Reply-To: <19970612131353.63083@Jupiter.Mcs.Net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Thu, 12 Jun 1997, Karl Denninger wrote: > > > Test this URL to see if your DNS is abusable. > > > > > > http://apostols.org/toolz/dnshack.cgi > > > > > > ======================================= > > Build BIND 8.1? :-) This CGI script is able to insert the "Ohhh.shit.My.DNS.server.is.vulnerable" into a server running BIND 8.1-REL. The following is from a dump: $ORIGIN shit.My.DNS.server.is.vulnerable. Ohhh 291 IN NS ns.Ohhh.shit.My.DNS.server.is.vulnerable. ;Cr=addtnl [194.179.44.34] 291 IN A 194.179.44.35 ;Cr=answer [194.179.44.34] $ORIGIN Ohhh.shit.My.DNS.server.is.vulnerable. ns 291 IN A 194.179.44.35 ;Cr=addtnl [194.179.44.34] pbd -- You can make it illegal, but you can't make it unpopular.