On 7/9/2008 at 5:58 AM Steve Tornio wrote:

|On Jul 9, 2008, at 4:53 AM, Rod Whitworth wrote:
|>
|>
|> # tcpdump -nettti rl0 dst port 53
|> tcpdump: listening on rl0, link-type EN10MB
|> Jul 09 19:48:27.786683 00:01:80:0f:2b:94 00:00:24:c6:18:85 0800 70:
|> 192.168.80.4.16284 > 192.168.80.1.53: 57120+ A? pps.com.au. (28)
|> Jul 09 19:48:43.690332 00:01:80:0f:2b:94 00:00:24:c6:18:85 0800 67:
|> 192.168.80.4.1356 > 192.168.80.1.53: 32536+ A? ibm.com. (25)
|> Jul 09 19:49:11.013223 00:01:80:0f:2b:94 00:00:24:c6:18:85 0800 69:
|> 192.168.80.4.14540 > 192.168.80.1.53: 29420+ A? intel.com. (27)
|> ....
|>
|> # uname -a
|> OpenBSD master.witworx.com 4.3 GENERIC#698 i386
|>
|> Guess again.
|>
|> Was that so hard to try?
|
|I get a different result using the external interface of my caching
|name server, and mine looks vulnerable.
[snip]
|frank# uname -a
|OpenBSD frank.placeholder.com 4.3 GENERIC#698 i386

 =============

fwiw, I used the test on the website (http://www.doxpara.com/) and my OpenBSD
4.3 named server was flagged as vulnerable.

Reply via email to