The security community is cynical. So much so, that most of the chatter that's taken place over the past 24-36 hours has suggested that Kaminsky's DNS vulnerability was little more than a publicity stunt and that his BlackHat presentation would be an over-hyped rehash of prior art. Granted, one has to suspend disbelief to even consider that something monumental would be discovered in DNS -- that's the protocol itself -- but hell, it's always nice to give a guy the benefit of the doubt.

Faced with nearly a month of criticism and questioning, and understanding the persuasive power of a technical peer review, Dan decided to expand the inner circle, so to speak. Rich Mogull arranged a phone call with Tom Ptacek and Dino Dai Zovi so that Dan could spill the beans and let them decide for themselves whether it was spin or substance. Turns out there was substance.

Now we sit around and wait until August 6th to cram into a ballroom with a thousand sweaty conference-goers to hear the juicy details. And Dan's presentations are usually packed to the brim even when he's not announcing anything.

In the meantime... how about patching those servers?

Veracode Security Solutions
Veracode Security Threat Guides

About Chris Eng

Chris Eng, vice president of research, is responsible for integrating security expertise into Veracode’s technology. In addition to helping define and prioritize the security feature set of the Veracode service, he consults frequently with customers to discuss and advance their application security initiatives. With over 15 years of experience in application security, Chris brings a wealth of practical expertise to Veracode.

Comments (2)

Thomas Ptacek | July 9, 2008 8:39 pm

Suckers. Next time, be wrong early like me!

Mathew Gregson | July 9, 2008 11:47 pm

Hype is rarely warranted. It just makes the wrong people panic and carry on like headless chooks.

In any case, I've patched my own server today as I was too tired when I learnt about this last night. Though I wonder how useful my effort was, as my ISP enforces an http proxy and they haven't yet patched their own DNS (and knowing them, they probably won't know about the issue until Christmas and will not do anything about it in any case - if you're interested).

I've only jumped to it immediately, because I have had idiots try to exploit my bind installation from time to time.

Please Post Your Comments & Reviews

Your email address will not be published. Required fields are marked *

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.