<div dir="ltr">Hard to hear that. You will be missed, my friend. <div><br clear="all"><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div><font color="#888888">Data Engineer by day at <a href="https://intercorp.com.pe/en/" target="_blank">Grupo Intercorp</a></font></div><div><font color="#888888">Editor and founder at The <a href="https://thepandaway.co" target="_blank">Panda Way</a> by night </font></div><div><font color="#888888"><a href="https://www.indie.vc/" target="_blank">Indie.vc</a> Scout</font></div><div><font color="#888888">Personal blog: <a href="https://a-data-driven-guy.com" target="_blank">https://a-data-driven-guy.com</a></font></div><div>T: <a href="https://twitter.com/marcosluis2186" target="_blank">@marcosluis2186</a></div><div>L: <a href="https://www.linkedin.com/in/mlortiz" target="_blank">/in/mlortiz</a></div><div>Q: <a href="https://quora.com/profile/Marcos-Ortiz-1" target="_blank">https://quora.com/profile/Marcos-Ortiz-1</a></div><div><br></div><span style="font-family:verdana,sans-serif"><font color="#888888"></font></span></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div><br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">El dom, 25 abr 2021 a las 21:03, Dave Lawrence (<<a href="mailto:tale@dd.org">tale@dd.org</a>>) escribió:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Our friend and colleague Dan Kaminsky has passed away of complications<br>
from diabetes. He was the discoverer/inventor of the DNS<br>
vulnerability that came to bear his name, the ability to take over<br>
whole swaths of domains much more easily than had previously been<br>
thought possible. <br>
<br>
Announcement from his niece:<br>
<a href="https://twitter.com/sarahbrie/status/1386384261133922310" rel="noreferrer" target="_blank">https://twitter.com/sarahbrie/status/1386384261133922310</a><br>
<br>
There are many pages that describe the vulnerability to varying<br>
degrees of depth. The key to it is first poisoning caches for the<br>
authority records of a zone. This lets an attacker then redirect many<br>
records within the zone at their leisure. Here's one write-up about it:<br>
<a href="http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" rel="noreferrer" target="_blank">http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html</a><br>
<br>
An entertaining, short video of the early stages of his experience<br>
with the vulnerability:<br>
<a href="https://www.youtube.com/watch?v=B-v_wJIJUI4" rel="noreferrer" target="_blank">https://www.youtube.com/watch?v=B-v_wJIJUI4</a><br>
<br>
For those who had not met him, he had a generous heart and a quick<br>
wit. I will miss him.<br>
_______________________________________________<br>
dns-operations mailing list<br>
<a href="mailto:dns-operations@lists.dns-oarc.net" target="_blank">dns-operations@lists.dns-oarc.net</a><br>
<a href="https://lists.dns-oarc.net/mailman/listinfo/dns-operations" rel="noreferrer" target="_blank">https://lists.dns-oarc.net/mailman/listinfo/dns-operations</a><br>
</blockquote></div>