Home > Security > Just a quick note

Just a quick note

1) Yes, I’m doing a webcast with Black Hat on the 24th
2) No, I’m not releasing the exploit early.

Now, let me be clear.  Oh wow, I wish I could drop the technical details on the 24th.  Did I really just sign up for a month of this?  But, no.  The webcast will be good.  The webcast will have interesting information.  You should indeed attend the webcast.  But I’m not screwing up everyone’s schedules with a huge “WHUPS JUST KIDDING”.  Details are being held until either August 6th at 11:15AM Pacific (thanks, Travis!), when I talk at the Black Hat Briefings.

Just a l’il while longer, guys.

Categories: Security
  1. Keith
    July 18, 2008 at 1:53 pm

    Thank you.

    Thank you more than you know, especially for dealing with it — and not “spilling the beans”.

    You exhibit a professional self-control that most of us envy. You have talent we envy too! :p

    This issue blew me away. The more I dig into your site, the more I’m amazed.

  2. July 18, 2008 at 2:35 pm

    This is a great tool for checking DNS servers for the cache poisoning vulnerability. Is there any way you can make the form take an IP address as input, so I can use it to check the DNS servers I manage? I just applied the Red Hat patch.


  3. July 18, 2008 at 11:41 pm

    Nice Tools,

    Thank you

  4. July 20, 2008 at 12:58 pm

    Thank you friend, for this tools.

  5. Keith
    July 20, 2008 at 8:01 pm


    How do we test servers behind closed networks? Yes, the redirection impact is minimal (in a closed network), but if this threat is for real, the disruption potential is HUGE.

    Is there a tool/method that we can deploy before or on Aug 7 we can give a list of NS IPs to test for random IDs/ports? Sure, we can demand people “patch” — but there is nothing like a tool/test to walk through our NS server IPs so we can KNOW what is out there on our networks.

    Is there anything availble, or do we need come up with our own solution?


  6. Jeff
    July 21, 2008 at 11:46 am

    Eddie –
    If you look at the code, and figure out what it’s doing, you’ll see that what you’re asking isn’t possible.

    Basically, it forces the client to query a random name in toorrr.com. The DNS server for that domain then records queries it receives. You’re browser is then shown a page which displays the records for the name it just queried. As such, the whole thing is client side – the server’s only involvement is in requesting the name on behalf of it’s client. There’s no way to check a given server, other than to make that server query a random name at toorrr.com.

    If you really wanted to check a server, you could generate your own name, query it on that server via NSLookup or dig, and then grab the resulting page from toorrr.com. However, toorrr.com only displays results for queries within the first few seconds after it sees the queries, so you’d likely need to script this the do it within the alloted time – or write your own checker using Dan’s code as an example.

  7. Daniel
    July 21, 2008 at 12:43 pm


    Can you comment on this vulnerability and how it relates to NeuStar’s UltraDNS platform? Since they are not running a BIND based resolver code would they still be affected by this flaw?

    Please let us know.


  8. July 21, 2008 at 2:39 pm

    Also note that the dns-oarc test is great for that situation.
    Run a command line the following, where the is your DNS server.
    dig @ +short porttest.dns-oarc.net TXT

    The results will show if your ports look random, including a simple test of the standard deviation for (very roughly) estimating how random the values are.

    More info here:

  9. Brian
    July 22, 2008 at 10:58 am


    see you there

  1. July 22, 2008 at 7:11 am
  2. July 24, 2008 at 12:34 pm

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: