Debian: New PowerDNS packages reduce DNS spoofing risk


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Debian: New PowerDNS packages reduce DNS spoofing risk
# 1  
Old 08-11-2008
Debian: New PowerDNS packages reduce DNS spoofing risk

LinuxSecurity.com: Brian Dowling discovered that the PowerDNS authoritative name server does not respond to DNS queries which contain certain characters, increasing the risk of successful DNS spoofing (CVE-2008-3337). This update changes PowerDNS to respond with SERVFAIL responses instead.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

1 More Discussions You Might Find Interesting

1. Cybersecurity

Help Make a spoofing DNS using pcap library

Hello all, i need your quick help. I have assignment project class to make a program using pcap library to spoofing DNS in linux environment. Can anyone help me, because i'm newbie in network security and in C?:confused: Regards, ptrfw (1 Reply)
Discussion started by: riska_bali
1 Replies
Login or Register to Ask a Question
TESTMXLOOKUP(1) 					      Double Precision, Inc.						   TESTMXLOOKUP(1)

NAME
testmxlookup - Look up mail relays for a domain SYNOPSIS
testmxlookup [@ip-address] [--dnssec] [--udpsize n] {domain} DESCRIPTION
testmxlookup lists the names and IP addresses of mail relays that receive mail for the domain. This is useful in diagnosing mail delivery problems. testmxlookup sends a DNS MX query for the specified domain, followed by A/AAAA queries, if needed. testmxlookup lists the hostname and the IP address of every mail relay, and its MX priority. DIAGNOSTICS The error message "Hard error" indicates that the domain does not exist, or does not have any mail relays. The error message "Soft error" indicates a temporary error condition (usually a network failure of some sorts, or the local DNS server is down). OPTIONS @ip-address Specify the DNS server's IP address, where to send the DNS query to, overriding the default DNS server addresses read from /etc/resolv.conf. "ip-address" must be a literal, numeric, IP address. --dnssec Enable the DNSSEC extension. If the DNS server has DNSSEC enabled, and the specified domain's DNS records are signed, the list of IP addresses is suffixed by "(DNSSEC)", indicating a signed response. This is a diagnostic option. Older DNS servers may respond with an error, to a DNSSEC query. --udpsize n Specify that n is the largest UDP packet size that the DNS server may send. This option is only valid together with "--dnssec". If "--dnssec" always returns an error, try "--udpsize 512" (the default setting is 1280 bytes, which is adequate for Ethernet, but other kinds of networks may impose lower limits). SEE ALSO
courier(8)[1], RFC 1035[2]. AUTHOR
Sam Varshavchik Author NOTES
1. courier(8) [set $man.base.url.for.relative.links]/courier.html 2. RFC 1035 http://www.rfc-editor.org/rfc/rfc1035.txt Courier Mail Server 11/18/2011 TESTMXLOOKUP(1)