lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200501061402.j06E2exe057202@mailserver3.hushmail.com>
From: nicholasnam at hush.com (nicholasnam@...h.com)
Subject: Possible DNS compromise/poisoning?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yes, that's exactly it.  Thanks.

On Wed, 05 Jan 2005 18:33:39 -0800 "ALD, Aditya, Aditya Lalit
Deshmukh" <aditya.deshmukh@...ine.gateway.expertworks.net> wrote:
>>- --SNIP--
>>;; QUESTION SECTION:
>>;www.microsoft.com.             IN      A
>>
>>;; ANSWER SECTION:
>>www.microsoft.com.      2415    IN      CNAME
>>www.microsoft.com.nsatc.net.
>>- --SNIP--
>>
>>Notice that www.microsoft.com is a cname for
>>www.microsoft.com.nsatc.net.  It's not limited to
>www.microsoft.com
>>and to the best of my knowledge the correct web content is
>>displayed.
>
>
>Ms and all other big players have a round robin dns setup to
>prevent
>slowdown of their sites. It this what you are seeing ?
>
>-aditya
>
>
>___________________________________________________________________
>_____
>Delivered using the Free Personal Edition of Mailtraq
>(www.mailtraq.com)
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.4

wkYEARECAAYFAkHdRUAACgkQQOst28rex95QLACffkWvXLliSMaBQVG0k+YlmpX9SEQA
niTzZQHhP4aALP3wxYpXJ8YagPP3
=KRWa
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ