[rescue] The Verisign Exploit
kevin at mpcf.com
Wed Sep 17 16:16:20 CDT 2003
How does this patch work?
Anyone know how many root dns servers are "infected"
at this time?
On Wed, 17 Sep 2003 16:58:06 -0400
"Sheldon T. Hall" <shel at cmhcsys.com> wrote:
> I suppose you all know that Verisign has,
> essentially, hijacked the DNS protocol, and now any
> otherwise-unassigned .com or .net domain name
> resolves to 184.108.40.206. Unless you have today's
> patch for BIND, it seems all mistyped browser
> addresses end up on a Verisign page.
More information about the rescue