lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: mmadison at fnni.com (Madison, Marc) Subject: Possible DNS compromise/poisoning? This is the correct information for MS. Perform a search on the address obtained in your dns query to confirm. -----Original Message----- From: full-disclosure-bounces@...ts.netsys.com [mailto:full-disclosure-bounces@...ts.netsys.com] On Behalf Of nicholasnam@...h.com Sent: Wednesday, January 05, 2005 8:45 AM To: full-disclosure@...ts.netsys.com Subject: [Full-Disclosure] Possible DNS compromise/poisoning? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Is anyone else seeing this: - --SNIP-- ;; QUESTION SECTION: ;www.microsoft.com. IN A ;; ANSWER SECTION: www.microsoft.com. 2415 IN CNAME www.microsoft.com.nsatc.net. - --SNIP-- Notice that www.microsoft.com is a cname for www.microsoft.com.nsatc.net. It's not limited to www.microsoft.com and to the best of my knowledge the correct web content is displayed. -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkHb/bwACgkQQOst28rex96r7wCgsFrpGByDC4YOskegpoIOetZsfMQA oIqgBD6fqzV1t57I/Yh+ayae4Z/Z =xvDv -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists