Re: [dns-operations] DNS-OARC Spring Workshop Final Information

2014-05-09 Thread Keith Mitchell
Couple of quick updates: On 05/09/2014 10:34 AM, Keith Mitchell wrote: > jabber remote participation at: > > xmpp:dns-operati...@conference.jabber.dns-oarc.net Note this should be: xmpp:dns-operati...@conference..dns-oarc.net apologies for my typo. > For remote attendance, we p

Re: [dns-operations] Looking for wildcard record served by a stable signed TLD nameserver

2014-05-09 Thread Mark Andrews
In message , Paul Wouters writes: > > Hi, > > fedorahosted.org and fedorapeople.org use wildcards which fail often > when people are chained to an older bind version with the "NOQNAME > NSEC/NSEC3 proof extraction bug". > > (See https://bugzilla.redhat.com/show_bug.cgi?id=824219) > > For tool

[dns-operations] Looking for wildcard record served by a stable signed TLD nameserver

2014-05-09 Thread Paul Wouters
Hi, fedorahosted.org and fedorapeople.org use wildcards which fail often when people are chained to an older bind version with the "NOQNAME NSEC/NSEC3 proof extraction bug". (See https://bugzilla.redhat.com/show_bug.cgi?id=824219) For tools (like dnssec trigger) to detect this, we need a "stab

Re: [dns-operations] A funny DNS vulnerability

2014-05-09 Thread Mark Andrews
The IETF creates a multiple methods to update DNS securely and they choose to use something else. It's not like it was new technology when they were setting up the service. Domain Name:MYFOSCAM.ORG Domain ID: D165859065-LROR Creation Date: 2012-06-19T05:33:11Z Updated Date: 2012-08-19T03:52:48Z

[dns-operations] DNS-OARC Spring Workshop Final Information

2014-05-09 Thread Keith Mitchell
Here's final information for OARC's Spring workshop and EGM this weekend in Warsaw. Saturday morning will be an OARC Extraordinary General Meeting starting at 10:00AM, with formal business and content for OARC Members only. Note that this session will *not* be webcast. The full workshop timetable

[dns-operations] A funny DNS vulnerability

2014-05-09 Thread Stephane Bortzmeyer
--- Begin Message --- CVE-2014-1849 Foscam Dynamic DNS predictable credentials vulnerability Date Published: 05-08-2014 Class: Design error Remotely Exploitable: yes Vulnerability Description: Foscam IP camera vendor provides a Dynamic DNS (DynDNS) service. Every Foscam camera has a preassigne