lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040618171603.8584.qmail@www.securityfocus.com> Date: 18 Jun 2004 17:16:03 -0000 From: Peter Jelver <pj@...c.dk> To: bugtraq@...urityfocus.com Subject: Re: Symantec Enterprise Firewall DNSD cache poisoning Vulnerability In-Reply-To: <1087321536.7690.85.camel@...der.telecom.com.ar> This has yet to be investigated and commented by the vendor, but the SEF firewall dnsd has the option to configure "forwarders" - dnsd will defer all requests to these. A mitigating strategy until the vendor has an answer could be to configure forwarders pointing at ISP nameservers. Peter Jelver http://www.esec.dk