Kashpureff stuff online

CBC has put together a short (7 mins or so) news piece on the Kashpureff/Alternic situation - it's available via RealVideo (which seems to run reasonably over my 28.8 modem at home) at <http://www.tv.cbc.ca/undercurrents/tv/week09/fugitive.ram>. They've also made an image of his US arrest warrant and the criminal complaint filed in the US district court (ED NY, 97-1343M) available at <http://www.tv.cbc.ca/undercurrents/stories/internic/warrant.html>. -- Greg Broiles | US crypto export control policy in a nutshell: gbroiles@netbox.com | Export jobs, not crypto. http://www.io.com/~gbroiles | http://www.parrhesia.com

Greg Broiles <gbroiles@netbox.com> writes:
CBC has put together a short (7 mins or so) news piece on the Kashpureff/Alternic situation - it's available via RealVideo (which seems to run reasonably over my 28.8 modem at home) at <http://www.tv.cbc.ca/undercurrents/tv/week09/fugitive.ram>.
So what did Kashpureff do? Who is Kashpureff? Is he the guy at Alternic who did some advanced DNS hacking to get Internic DNS root to point to him? Or something else? Adam -- Now officially an EAR violation... Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`

So what did Kashpureff do? Who is Kashpureff? Is he the guy at Alternic who did some advanced DNS hacking to get Internic DNS root to point to him? Or something else?
Yup, that's him. IIRC, he exploited Bind's failure to check input in certain cases: He set his DNS server to be the delegating authority for .com, say; then sent a recursive query to his victim's DNS server to get the victim to query _his_ server; his server mixed the bogus info into its response to the query, thus poisoning the victim's DNS. Cypherpunks write code. Crackerpunks read code. Ng Pheng Siong <ngpsstoi@pacific.net.sg>
participants (3)
-
Adam Back
-
Greg Broiles
-
Ng Pheng Siong