lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <497A2C51.7040509@findhost.org> Date: Fri, 23 Jan 2009 21:45:05 +0100 From: Kevin Fernandez <kevin@...dhost.org> To: full-disclosure@...ts.grok.org.uk Subject: DoS attacks -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Some days ago ISC published an article about some reports of spoofed DNS requests being sent to DNS servers to DDoS some targets: http://isc.sans.org/diary.html?storyid=5713 it is what happened to isprime: http://www.gossamer-threads.com/lists/nanog/users/111512 Today the networksolutions DNS servers are very slow, it can be linked to those attacks: http://blog.networksolutions.com/2009/potential-latency-on-network-solutions-dns/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkl6LFEACgkQwt4vS/saKML9EwCeI2g942xzwiMXFs4H6hNZJ8QM 7owAn1aXF2SOzyZFKEoeyXiSVwtfrDfP =HHTu -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/