<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNS CACHE POISONING in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927181#M409308</link>
    <description>Answer was sufficient.</description>
    <pubDate>Wed, 21 Sep 2005 08:16:13 GMT</pubDate>
    <dc:creator>Art Taylor</dc:creator>
    <dc:date>2005-09-21T08:16:13Z</dc:date>
    <item>
      <title>DNS CACHE POISONING</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927178#M409305</link>
      <description>How can I determine if I am at risk due to dns cache poisoning?&lt;BR /&gt;&lt;BR /&gt;This question is a result of an automated email from the WatchGuard folks in an article warning of this.&lt;BR /&gt;&lt;BR /&gt;Their article warned of "DNS Pharming: Someone's poisoned the water hole!"&lt;BR /&gt;&lt;BR /&gt;Thanks.&lt;BR /&gt;Art Taylor</description>
      <pubDate>Mon, 19 Sep 2005 15:53:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927178#M409305</guid>
      <dc:creator>Art Taylor</dc:creator>
      <dc:date>2005-09-19T15:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: DNS CACHE POISONING</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927179#M409306</link>
      <description>Basically, it is method for an attacker to change the IP address that a hostname resolves to.  For instance the hostname &lt;A href="http://www.nasa.gov" target="_blank"&gt;www.nasa.gov&lt;/A&gt; points to the IP address 208.185.54.47.  A DNS cache poisoning attack allows an attacker to change the IP address for a host/domain and point it to a different IP address.&lt;BR /&gt;&lt;BR /&gt;The various UNIX-based DNS servers are not vulnerable to this attack.  However, it may be possible to make them insecure through poor&lt;BR /&gt;configuration choices.&lt;BR /&gt;&lt;BR /&gt;If your company disable the DNS cache service, you are not at risk any more. &lt;BR /&gt;&lt;BR /&gt;Client workstations that use DNS should never cache DNS information locally. Once the workstation has stored DNS data locally, any process with the ability to access or change that information can trivially redirect services that depend on DNS to other hostnames.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Sep 2005 16:16:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927179#M409306</guid>
      <dc:creator>Hakan Aribas</dc:creator>
      <dc:date>2005-09-19T16:16:25Z</dc:date>
    </item>
    <item>
      <title>Re: DNS CACHE POISONING</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927180#M409307</link>
      <description>Hakan,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;"...However, it may be possible to make them insecure through poor configuration choices...."&lt;BR /&gt;What do I need to look for to determine if I have poor configuration choices?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;"...If your company disable the DNS cache service, you are not at risk any more..."&lt;BR /&gt;How is this done?  Is caching automatic when implementing DNS on HP?&lt;BR /&gt;&lt;BR /&gt;"...Client workstations that use DNS should never cache DNS information locally..."&lt;BR /&gt;What would I tell the Windows group to disable?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you in advance.&lt;BR /&gt;Art Taylor&lt;BR /&gt;</description>
      <pubDate>Mon, 19 Sep 2005 16:34:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927180#M409307</guid>
      <dc:creator>Art Taylor</dc:creator>
      <dc:date>2005-09-19T16:34:49Z</dc:date>
    </item>
    <item>
      <title>Re: DNS CACHE POISONING</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927181#M409308</link>
      <description>Answer was sufficient.</description>
      <pubDate>Wed, 21 Sep 2005 08:16:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/dns-cache-poisoning/m-p/4927181#M409308</guid>
      <dc:creator>Art Taylor</dc:creator>
      <dc:date>2005-09-21T08:16:13Z</dc:date>
    </item>
  </channel>
</rss>

