[rescue] The Verisign Exploit

Kevin kevin at mpcf.com
Wed Sep 17 16:16:20 CDT 2003


How does this patch work?

Anyone know how many root dns servers are "infected"
at this time?

/KRM

On Wed, 17 Sep 2003 16:58:06 -0400
"Sheldon T. Hall" <shel at cmhcsys.com> wrote:

> I suppose you all know that Verisign has,
> essentially, hijacked the DNS protocol, and now any
> otherwise-unassigned .com or .net domain name
> resolves to 64.94.110.11.  Unless you have today's
> patch for BIND, it seems all mistyped browser
> addresses end up on a Verisign page.
> 
> -Shel



More information about the rescue mailing list