Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT
ADVERTISEMENT

Links 1 through 10 of 46 by Justin Mason tagged dns

DHS/ICE domain seizures suffer a serious false positive problem, resulting in the seizure and shutting down of 84,000 subdomains of a free DNS provider, replacing them with a banner accusing the site of trafficking in child porn. whoops!

Share It With Others!

according to this, the US Dept of Homeland Security is "seizing" domains through a back-channel to Verisign, since they directly control the .com TLD's nameservers. Expect to see dodgy sites start using non-US TLDs, names in multiple TLDs a la Pirate Bay, and eventually IPs instead of DNS records

Share It With Others!

DNSWL will charge for subscriptions to "heavy" users and anti-spam vendors

Share It With Others!

Ugh, very bad idea indeed. A backchannel for spammers/phishers/attackers from the mail reader is something we definitely do not want to provide. This is why we chose to cut URLs at the registrar boundary for URIBL lookups in SpamAssassin

Share It With Others!

good on them, spilling the beans at last! '“We haven’t seen any further attempts at cache poisoning since last week,” the spokesman added.'

Share It With Others!

a better quote than the IT article. "This issue has been caused by an unusual and irregular volume of internet traffic being directed onto our network, and this impacted the systems and servers that provide access to the Internet for our customers." Hmm. an irregular volume caused by a DNS cache poisoning attack, maybe? (via Chris)

Share It With Others!

the _only_ press coverage so far of Eircom's DNS subversion. 'The company blamed the problems on “an unusual and irregular volume of internet traffic” directed at its website, which affected the systems and servers that provide access to the internet for its customers.' uh, how does that wind up redirecting popular sites to porn ads exactly?

Share It With Others!

'Rik Ferguson, solutions architect at antivirus vendor Trend Micro, also reported about the issues. "So far there are very few details on the nature of the problem over at Eircom, but it is certainly clear that many Eircom subscribers are being redirected to bogus websites and rumours abound that Eircom’s DNS has been compromised," the researcher wrote on his blog. He suggests that affected users switch to using OpenDNS.'

Share It With Others!

they simply intercepted DNS requests for their zones, returning 127.0.0.1. using OpenDNS evades that

Share It With Others!

great guide to Dan's most recent discovery. it really is quite nasty (via Jeremy)

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT