Date: Sat, 14 Jun 1997 15:11:52 -0400 (EDT) From: Bradley Dunn <bradley@dunn.org> To: Karl Denninger <karl@Mcs.Net> Cc: freebsd-security@FreeBSD.ORG Subject: Re: DNS abuse (fwd) Message-ID: <Pine.BSF.3.96.970614144813.11319A-100000@ns2.harborcom.net> In-Reply-To: <19970612131353.63083@Jupiter.Mcs.Net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 12 Jun 1997, Karl Denninger wrote: > > > Test this URL to see if your DNS is abusable. > > > > > > http://apostols.org/toolz/dnshack.cgi > > > > > > ======================================= > > Build BIND 8.1? :-) This CGI script is able to insert the "Ohhh.shit.My.DNS.server.is.vulnerable" into a server running BIND 8.1-REL. The following is from a dump: $ORIGIN shit.My.DNS.server.is.vulnerable. Ohhh 291 IN NS ns.Ohhh.shit.My.DNS.server.is.vulnerable. ;Cr=addtnl [194.179.44.34] 291 IN A 194.179.44.35 ;Cr=answer [194.179.44.34] $ORIGIN Ohhh.shit.My.DNS.server.is.vulnerable. ns 291 IN A 194.179.44.35 ;Cr=addtnl [194.179.44.34] pbd -- You can make it illegal, but you can't make it unpopular.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.970614144813.11319A-100000>