lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20070724174035.9273.qmail@securityfocus.com> Date: 24 Jul 2007 17:40:35 -0000 From: securityfocus@...workontap.com To: bugtraq@...urityfocus.com Subject: Re: "BIND 9 DNS Cache Poisoning" by Amit Klein (Trusteer) I don't exactly see how this is new "News" since Zalewski's paper on TCP sequence number analysis (which included analysis of versions of BIND): http://lcamtuf.coredump.cx/newtcp/ -ntn