Z úvodu: We demonstrate a vulnerability affecting
the large majority of popular DNS implementations which
allows a malicious domain name to stay resolvable long af-
ter it has been removed from the upper level servers. Our
experiments with 19,045 open DNS servers show that even
one week after a domain name has been revoked and its TTL
expired, more than 70% of the servers will still resolve it.
Finally, we discuss several strategies to prevent this attack.
Komentá? ke studii je v ?lánku
DNS flaw reanimates slain evil sites as ghost domains. Nedávno použitá protiopat?ení jsou podle autor? studie neposta?ující.