I realize this wired, but did they really have to dramatize it so much?. I mean, come on, talking about the possibility of routing the entire .com domain through his laptop? It sounded like something that Robert Ludlum would write.
They also portray Kaminsky as a pathetic nobody working out of his lonely apartment, when in reality he was already well respected before the DNS flaw discovery.
Lower on the drama? People get killed in that story, with the reporter present! I remember that story very well. Made an impression on me. more exciting than DNS flaws...
I think this is a terrible article. Paul Vixie has done nothing to fix this situation. He certainly does not deserve the fame of the article.
Other DNS servers like DJB-DNS and PowerDNS have implemented proper port randomization as part of their design a LONG time ago. As a result of that those servers are completely unaffected by this DNS exploit.
Vixie and his Bind crew ignored the whole thing for a long time until it blew up in their face. Now it it just an excuse to roll out the monster that is called DNSSEC of course. Great marketing.
[+] [-] dangrover|17 years ago|reply
"In a WORLD where ONE MAN holds the KEY to the entire INTERNET!"
[+] [-] joe_adk|17 years ago|reply
http://en.wikipedia.org/wiki/Don_LaFontaine
[+] [-] chris11|17 years ago|reply
[+] [-] tlrobinson|17 years ago|reply
[+] [-] tsally|17 years ago|reply
Or John Markoff?
[+] [-] technoguyrob|17 years ago|reply
[+] [-] nickb|17 years ago|reply
Ridiculous. I doubt Vixie said that.
[+] [-] jbyers|17 years ago|reply
http://www.wired.com/science/discoveries/magazine/16-03/ff_s...
[+] [-] thenextweb|17 years ago|reply
[+] [-] st3fan|17 years ago|reply
Other DNS servers like DJB-DNS and PowerDNS have implemented proper port randomization as part of their design a LONG time ago. As a result of that those servers are completely unaffected by this DNS exploit.
Vixie and his Bind crew ignored the whole thing for a long time until it blew up in their face. Now it it just an excuse to roll out the monster that is called DNSSEC of course. Great marketing.
[+] [-] tlrobinson|17 years ago|reply
[+] [-] bprater|17 years ago|reply
[+] [-] epe|17 years ago|reply
[+] [-] tlrobinson|17 years ago|reply
(Thomas Ptacek in the article == tptacek on Hacker News)
[+] [-] unknown|17 years ago|reply
[deleted]
[+] [-] sireat|17 years ago|reply
[+] [-] andr|17 years ago|reply
[+] [-] tlrobinson|17 years ago|reply
Not exactly a "summary", but... http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.htm...