lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 25 Mar 2007 15:58:27 -0400
From: Kradorex Xeron <kxeron@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: I'm not the only one who can't resolve
	phishtank.com, but some can..

I get a valid answer as well:

Tracing to phishtank.com[a] via 127.0.0.1, maximum of 3 retries
127.0.0.1 (127.0.0.1)
 |\___ auth3.opendns.com [phishtank.com] (208.69.39.2) Got authoritative 
answer
 |\___ auth2.opendns.com [phishtank.com] (208.67.219.54) Got authoritative 
answer
  \___ auth1.opendns.com [phishtank.com] (38.99.14.20) Got authoritative 
answer

auth1.opendns.com (38.99.14.20)         phishtank.com -> 66.135.40.79
auth2.opendns.com (208.67.219.54)       phishtank.com -> 66.135.40.79
auth3.opendns.com (208.69.39.2)         phishtank.com -> 66.135.40.79


What'd I'd do is throw it in your hosts file temporarily until DNS behaves

On Sunday 25 March 2007 15:53, Tim wrote:
> Looks fine for me:
>
> ------------
>
> ; <<>> DiG 9.3.4 <<>> phishtank.com
> ;; global options:  printcmd
> ;; Got answer:
> ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 26391
> ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
>
> ;; QUESTION SECTION:
> ;phishtank.com.			IN	A
>
> ;; ANSWER SECTION:
> phishtank.com.		42	IN	A	66.135.40.79
>
> ;; Query time: 4 msec
> ;; SERVER: 10.0.1.1#53(10.0.1.1)
> ;; WHEN: Sun Mar 25 15:49:29 2007
> ;; MSG SIZE  rcvd: 47
>
> -------------
>
> Do some of you happen to have a poisoned MS or Symantec DNS cache
> upstream of you?  (See [1] fmi.)
>
> tim
>
>
> 1.  http://www.incidents.org/presentations/dnspoisoning.html
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ