lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: nicholasnam at hush.com (nicholasnam@...h.com) Subject: Possible DNS compromise/poisoning? -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Yes, that's exactly it. Thanks. On Wed, 05 Jan 2005 18:33:39 -0800 "ALD, Aditya, Aditya Lalit Deshmukh" <aditya.deshmukh@...ine.gateway.expertworks.net> wrote: >>- --SNIP-- >>;; QUESTION SECTION: >>;www.microsoft.com. IN A >> >>;; ANSWER SECTION: >>www.microsoft.com. 2415 IN CNAME >>www.microsoft.com.nsatc.net. >>- --SNIP-- >> >>Notice that www.microsoft.com is a cname for >>www.microsoft.com.nsatc.net. It's not limited to >www.microsoft.com >>and to the best of my knowledge the correct web content is >>displayed. > > >Ms and all other big players have a round robin dns setup to >prevent >slowdown of their sites. It this what you are seeing ? > >-aditya > > >___________________________________________________________________ >_____ >Delivered using the Free Personal Edition of Mailtraq >(www.mailtraq.com) -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Version: Hush 2.4 wkYEARECAAYFAkHdRUAACgkQQOst28rex95QLACffkWvXLliSMaBQVG0k+YlmpX9SEQA niTzZQHhP4aALP3wxYpXJ8YagPP3 =KRWa -----END PGP SIGNATURE-----
Powered by blists - more mailing lists