Test DNS terhadap bug dns-cache-poisoning

Untuk mengetest apakah Bind yang kita gunakan sebagai DNS server masih mengandung bug dns-cache-poisoning
dengan menggunakan perintah :

$ dig +short @{name-server-ip} porttest.dns-oarc.net txt

contoh :
$ dig +short @208.67.222.222 porttest.dns-oarc.net txt

Output:
z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net.
“208.67.222.222 is GOOD: 26 queries in 0.1 seconds from 26 ports with std dev 17746.18″

contoh diatas dns 208.67.222.222 tidak mengandung bug dns-cache-poisoning

contoh lain,
$ dig +short @125.22.47.125 porttest.dns-oarc.net txt

Output:

z.y.x.w.v.u.t.s.r.q.p.o.n.m.l.k.j.i.h.g.f.e.d.c.b.a.pt.dns-oarc.net.
“125.22.47.139 is POOR: 42 queries in 8.4 seconds from 1 ports with std dev 0.00″
dns 125.22.47.139 masih mengandung bug dns-cache-poisoning
untuk mengatasi update BIND ke versi terbaru.

Leave a Reply

Your email address will not be published. Required fields are marked *


*

Skip to toolbar