<div dir="ltr">Sorry to hear that. Best wishes.<br></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, Apr 26, 2021 at 10:07 AM Dave Lawrence <<a href="mailto:tale@dd.org">tale@dd.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Our friend and colleague Dan Kaminsky has passed away of complications<br>
from diabetes. He was the discoverer/inventor of the DNS<br>
vulnerability that came to bear his name, the ability to take over<br>
whole swaths of domains much more easily than had previously been<br>
thought possible. <br>
<br>
Announcement from his niece:<br>
<a href="https://twitter.com/sarahbrie/status/1386384261133922310" rel="noreferrer" target="_blank">https://twitter.com/sarahbrie/status/1386384261133922310</a><br>
<br>
There are many pages that describe the vulnerability to varying<br>
degrees of depth. The key to it is first poisoning caches for the<br>
authority records of a zone. This lets an attacker then redirect many<br>
records within the zone at their leisure. Here's one write-up about it:<br>
<a href="http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html" rel="noreferrer" target="_blank">http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html</a><br>
<br>
An entertaining, short video of the early stages of his experience<br>
with the vulnerability:<br>
<a href="https://www.youtube.com/watch?v=B-v_wJIJUI4" rel="noreferrer" target="_blank">https://www.youtube.com/watch?v=B-v_wJIJUI4</a><br>
<br>
For those who had not met him, he had a generous heart and a quick<br>
wit. I will miss him.<br>
_______________________________________________<br>
dns-operations mailing list<br>
<a href="mailto:dns-operations@lists.dns-oarc.net" target="_blank">dns-operations@lists.dns-oarc.net</a><br>
<a href="https://lists.dns-oarc.net/mailman/listinfo/dns-operations" rel="noreferrer" target="_blank">https://lists.dns-oarc.net/mailman/listinfo/dns-operations</a><br>
</blockquote></div>