On 03/15/13 19:15, Reindl Harald wrote:
> Am 15.03.2013 10:57, schrieb Ed Greshko:
>> On 03/15/13 17:46, Ed Greshko wrote:
>>> Is the destination IP address a single IP address or are there others.
>>>
>>> Is your system running a DNS server?  If you are running one, is it 
>>> supposed to be servicing requests from the Internet?  If it is supposed to 
>>> be taking requests from the Internet, have you made sure to configure such 
>>> that recursion is disabled.
>> Never mind....
>>
>> In re-reading the original message I see the "source port" is 35442.  I'm 
>> pretty sure recursion from a DNS server would show 53 as the source port.
> pretty sure only if your DNS is very outdated
> http://unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html
>
> http://en.wikipedia.org/wiki/DNS_spoofing
> As stated above, source port randomization for DNS requests, combined with 
> the use of cryptographically-secure
> random numbers for selecting both the source port and the 16-bit 
> cryptographic nonce, can greatly reduce the
> probability of successful DNS race attacks.

Good to know.  It has been a long time since I've done DNS stuff at the network 
layer.

It sounded like a DNSSEC and DNS amplification attack with the Bank's network 
as the target.  But, the OP seems not to have a DNS server configured.

-- 
From now on, at least during winter time, Im going to blame all spelling an 
grammar erros on the cat sitting on my chest every time I sit down at the 
computer....

Attachment: signature.asc
Description: OpenPGP digital signature

-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to