Couple of quick updates:
On 05/09/2014 10:34 AM, Keith Mitchell wrote:
> jabber remote participation at:
>
> xmpp:dns-operati...@conference.jabber.dns-oarc.net
Note this should be:
xmpp:dns-operati...@conference..dns-oarc.net
apologies for my typo.
> For remote attendance, we p
In message , Paul Wouters
writes:
>
> Hi,
>
> fedorahosted.org and fedorapeople.org use wildcards which fail often
> when people are chained to an older bind version with the "NOQNAME
> NSEC/NSEC3 proof extraction bug".
>
> (See https://bugzilla.redhat.com/show_bug.cgi?id=824219)
>
> For tool
Hi,
fedorahosted.org and fedorapeople.org use wildcards which fail often
when people are chained to an older bind version with the "NOQNAME
NSEC/NSEC3 proof extraction bug".
(See https://bugzilla.redhat.com/show_bug.cgi?id=824219)
For tools (like dnssec trigger) to detect this, we need a "stab
The IETF creates a multiple methods to update DNS securely and they
choose to use something else. It's not like it was new technology
when they were setting up the service.
Domain Name:MYFOSCAM.ORG
Domain ID: D165859065-LROR
Creation Date: 2012-06-19T05:33:11Z
Updated Date: 2012-08-19T03:52:48Z
Here's final information for OARC's Spring workshop and EGM this
weekend in Warsaw.
Saturday morning will be an OARC Extraordinary General Meeting starting
at 10:00AM, with formal business and content for OARC Members only. Note
that this session will *not* be webcast.
The full workshop timetable
--- Begin Message ---
CVE-2014-1849 Foscam Dynamic DNS predictable credentials vulnerability
Date Published: 05-08-2014
Class: Design error
Remotely Exploitable: yes
Vulnerability Description:
Foscam IP camera vendor provides a Dynamic DNS (DynDNS) service. Every
Foscam camera has a preassigne