Monday, November 08, 2010

Checking for source-port randomization to prevent Kaminsky cache poisoning vulnerability

Do digs like this ...

dig @example.com +short porttest.dns-oarc.net TXT

"127.0.0.1 is GREAT: 26 queries in 2.6 seconds from 26 ports with std dev 19493"

No comments:

Post a Comment