Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 14 Jun 1997 15:11:52 -0400 (EDT)
From:      Bradley Dunn <bradley@dunn.org>
To:        Karl Denninger <karl@Mcs.Net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: DNS abuse (fwd)
Message-ID:  <Pine.BSF.3.96.970614144813.11319A-100000@ns2.harborcom.net>
In-Reply-To: <19970612131353.63083@Jupiter.Mcs.Net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 12 Jun 1997, Karl Denninger wrote:

> > > Test this URL to see if your DNS is abusable.
> > > 
> > >         http://apostols.org/toolz/dnshack.cgi
> > > 
> > > =======================================
> 
> Build BIND 8.1? :-)

This CGI script is able to insert the
"Ohhh.shit.My.DNS.server.is.vulnerable"
into a server running BIND 8.1-REL. The following is from a dump:

$ORIGIN shit.My.DNS.server.is.vulnerable.
Ohhh	291	IN	NS	ns.Ohhh.shit.My.DNS.server.is.vulnerable.	;Cr=addtnl [194.179.44.34]
	291	IN	A	194.179.44.35	;Cr=answer [194.179.44.34]
$ORIGIN Ohhh.shit.My.DNS.server.is.vulnerable.
ns	291	IN	A	194.179.44.35	;Cr=addtnl [194.179.44.34]


pbd
--
You can make it illegal, but you can't make it unpopular.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.970614144813.11319A-100000>