[dns-operations] Clueless Major Backbone Provider
Barry Raveendran Greene
bgreene at senki.org
Tue Jul 22 19:39:33 UTC 2008
You can also give them my number is they are a Juniper customer. I can be
just as "expressive." I can also point out how this is a threat to their
operations, infrastructure, and business.
Barry Raveendran Greene
Director, Juniper Security Incident Response Team (SIRT)
Tel (Office): +1 408 936-6887
Tel (Cell): +1 408 218-4669
E-mail: bgreene at juniper.net
!
Chat Locations:
AIM: Barry R Greene
MSN: BarryRGreene
Yahoo: BarryRGreene
Skype: barrygreene
Jabber: barryrgreene at jabber.tisf.net
MSN: BarryRGreene at hotmail.com
PGP: 0x16BF45F3
> -----Original Message-----
> From: dns-operations-bounces at lists.oarci.net
> [mailto:dns-operations-bounces at lists.oarci.net] On Behalf Of
> Paul Vixie
> Sent: Tuesday, July 22, 2008 12:18 PM
> To: Jon.Kibler at aset.com
> Cc: dns-operations at lists.oarci.net
> Subject: Re: [dns-operations] Clueless Major Backbone Provider
>
> > Questions:
> > 1) How would you address the claims that this
> vulnerability is the
> > same as the one from a year ago? (2nd paragraph)
>
> give them my phone number and tell them i need to talk to them ASAP.
>
> Name: Vixie, Paul
> Handle: PV15-ARIN
> Company: Internet Systems Consortium, Inc.
> Address: 950 Charter Street
> City: Redwood City
> StateProv: CA
> PostalCode: 94063
> Country: US
> Comment:
> RegDate:
> Updated: 2004-01-06
> Phone: +1-650-423-1300 (Office)
> Phone: +1-650-423-1305 (Fax)
> Email: vixie at isc.org
>
> > 2) Does the use of load balancers decrease the risk as claimed?
> > (paragraph 4)
>
> it would reduce the risk if this was the same attack as
> before, as they are claiming. it might also do so if it's
> not the same attack as before, but until august 6, noone who
> knows that answer can speak it in public.
>
> > Comment:
> > Note in paragraph 3 the vendor says it does not disclose
> which name
> > servers that it uses, but in paragraph 2 gives a link that
> references
> > BIND name servers.
>
> i trust that everyone by now knows that this is a DNS problem
> not a BIND problem per se, and that BIND was only one of
> several affected vendors.
>
> --
> This message has been scanned for viruses and dangerous
> content by MailScanner, and is believed to be clean.
>
> _______________________________________________
> dns-operations mailing list
> dns-operations at lists.oarci.net
> http://lists.oarci.net/mailman/listinfo/dns-operations
>
More information about the dns-operations
mailing list