YNOT
  • Home
  • Industry News
    • Adult Business News
    • Adult Novelty News
    • YNOT Magazine
    • EU News
    • Opinions
    • Picture Galleries
  • PR Wire
    • Adult Company News
    • Adult Retail News
    • Adult Talent News
    • Adult Videos News
  • Podcasts
  • Industry Guides
    • Adult Affiliate Guide
    • Affiliate Marketing for Beginners
    • Top Adult Traffic Networks
    • Top Adult PR Agents
    • Funding an Adult Business
  • Business Directory
    • View Categories
    • View Listings
    • Submit Listing
  • Newsletters
  • Industry Events
    • Events Calendar
    • YNOT Cam Awards | Hollywood
    • YNOT Awards | Prague
    • YNOT Cammunity
    • YNOT Summit
    • YNOT Reunion
  • Login with YNOT ID

ICANN Releases “Cache-Poisoning” Defense Tool

Posted On 08 Aug 2008
By : admin

MARINA DEL REY, CA — A fatal flaw in the internet’s addressing system was patched in early July, but the International Corporation for Domain Names and Numbers remains sufficiently concerned about the potential for hackers and phishers to launch attacks through un-patched portals that it has released a tool to help domain administrators protect themselves and their users.The so-called “DNS cache poisoning” vulnerability could have allowed hackers to take control of all traffic on the Web, rerouting surfers to any designation the hackers chose regardless what address was typed into a browser. Although many admins responded to a mass call to update their server software in early July, ICANN officials said Wednesday they believe hundreds of thousands of machines worldwide may remain un-patched, creating a monumental opportunity for phishers and distributors of malware.

“Due to the distributed nature of the [domain name system], no one organization can implement a fix for this vulnerability,” ICANN warned Wednesday. “It requires the cooperation of all name server operators and DNS software vendors.”

Consequently, ICANN has released a FAQ about the issue and a tool that allows domain operators to test their domains for susceptibility to the flaw. The FAQ is located at the Internet Assigned Numbers Authority’s website, IANA.org/reports/2008/cross-pollination-faq.html. The tool is available free at Recursive.IANA.org.

Security researcher Dan Kaminsky discovered the design flaw in the internet’s addressing system about seven months ago. While it is not possible to fully fix the cache-poisoning flaw, there are ways to improve resistance to it. The vulnerability affects what are called “recursive” name servers, typically installed at ISPs and corporate network gateways to assist DNS lookups and cache results for faster lookups. The other major type of name servers, called “authoritative” servers — typically employed by domain registries to serve as the final authority about address resolutions — are not susceptible to the flaw.

However, name servers can be configured to perform both recursive and authoritative functions, and in those cases the authoritative functions are compromised by the recursive functions. The IANA tool scans domains and reports whether the subject domain’s name server includes a recursive function.

“Domain operators should look to ensuring that all of the authoritative name servers for their domain are separated from any recursive name servers to avoid being impacted by cache-poisoning attacks,” the ICANN alert issued Wednesday warned.

Surfers, too, can be affected by the vulnerability. ICANN warned surfers to ensure the DNS servers their ISPs use to look up domains have been patched to enable “source port randomization.” The DNS Operations, Analysis and Research Center has posted an online tool making it easy for surfers to evaluate their systems at its website, DNS-OARC.net/oarc/services/dnsentropy. If the test returns “great,” surfers can rest assured they are protected. If any other result is returned, surfers are advised to contact their network administrator and ask that the organization’s recursive name servers be updated.

Kaminsky also has posted to his site, Doxpara.com, a tool that will help surfers determine whether their systems are vulnerable to the flaw.

  • google-share
Previous Story

“Porno” Movie Gets R Rating

Next Story

Iraqi Prisoner Claims British Abuse by Pornography

Leave a Reply Cancel reply

You must be logged in to post a comment.

Sponsor

YNOT Shoot Me

YNOTShootMe.com has exclusive pics from adult industry business events. Check it out!

YNOT Directory

  • TrafficStars
    Marketing & Traffic Services
  • X Nations
    News & Resources
  • EMC Payments
    Merchant Account Services
  • Premiere Listing

    Dao of Leads

    More Details

RECENT

POPULAR

COMMENTS

Cubbi Thompson Inspires Perspiration in Reality Kings Scene

Posted On 22 Aug 2025

Will Notorious or Fresh Be Victorious at Evolved Fights?

Posted On 22 Aug 2025

Kyaa Chimera Craves the Big One in Latest from She Loves Black

Posted On 22 Aug 2025

Vanessa, Meet Vivid

Posted On 29 Sep 2014
Laila Mickelwaite and Exodus Cry

Laila Mickelwaite, Exodus Cry and their Crusade Against Porn

Posted On 03 May 2021

Someone puts Gal Gadot in one of your vids? Take it down!

Posted On 13 Dec 2017

Hoping viewers can also enjoy a spooky...

Posted On 24 Oct 2023

now a days these type of games will get...

Posted On 17 Jul 2023

good move from adent. these type of...

Posted On 06 Jul 2023

Sponsor

Sitemap
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.OkPrivacy Policy