Quoting Chris Buxton :

> That sure seems like a lot of work when you could just:
>
> dig porttest.dns-oarc.net txt +short @server-ip
>
> For example:
>
> $ dig porttest.dns-oarc.net txt +short @217.151.171.7
> z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b. a.pt.dns-oarc.net.
> "217.151.171.7 is GOOD: 26 queries in 3.9 seconds from 26 ports with
> std dev 19886.66"
>
> Notice the word "GOOD" in the output. Also notice the standard
> deviation shown at the end - you want 5 digits before the decimal point.
>
> Chris Buxton
> Professional Services
> Men & Mice
>
> On Jul 25, 2008, at 10:24 PM, Brian Keefer wrote:
>
>> On Jul 25, 2008, at 5:48 PM, Gregory Hicks wrote:
>>
>>>> Date: Fri, 25 Jul 2008 20:36:50 -0400
>>>> From: dhottinger@harrisonburg.k12.va.us
>>>> To: "comp-protocols-dns-bind@isc.org"
>>>
>>>> Subject: dns exploit
>>>>
>>>> Silly question, how do I tell If Im vulnerable to the dns exploit?
>>>


All is well. Thanks for the info.


--
Dwayne Hottinger
Network Administrator
Harrisonburg City Public Schools

"Everything should be made as simple as possible, but not simpler."
-- Albert Einstein