lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <41DC2FAE.8070609@digitalmunition.com> From: kf_lists at digitalmunition.com (KF (lists)) Subject: Possible DNS compromise/poisoning? http://www.talkaboutsoftware.com/group/microsoft.public.windowsme.general/messages/241011.html -KF nicholasnam@...h.com wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >Is anyone else seeing this: > >- --SNIP-- >;; QUESTION SECTION: >;www.microsoft.com. IN A > >;; ANSWER SECTION: >www.microsoft.com. 2415 IN CNAME >www.microsoft.com.nsatc.net. >- --SNIP-- > >Notice that www.microsoft.com is a cname for >www.microsoft.com.nsatc.net. It's not limited to www.microsoft.com >and to the best of my knowledge the correct web content is >displayed. >-----BEGIN PGP SIGNATURE----- >Note: This signature can be verified at https://www.hushtools.com/verify >Version: Hush 2.4 > >wkYEARECAAYFAkHb/bwACgkQQOst28rex96r7wCgsFrpGByDC4YOskegpoIOetZsfMQA >oIqgBD6fqzV1t57I/Yh+ayae4Z/Z >=xvDv >-----END PGP SIGNATURE----- > >_______________________________________________ >Full-Disclosure - We believe in it. >Charter: http://lists.netsys.com/full-disclosure-charter.html > > > > >