Pokemon trading cards Twitter's Twitter Blue TCL soundbar deal Pipeline hack update Mass Effect: Legendary Edition Stimulus checks still coming

Is Kaminsky's DNS flaw public?

Fellow Black Hat researcher apparently guesses the vulnerability causing Dan Kaminsky to urge everyone to patch their systems immediately.

Thirteen days after Dan Kaminsky asked his fellow security researchers not to speculate on the details of his DNS flaw, a fellow Black Hat researcher published his own speculation, and apparently got it right.

On July 8, IOActive researcher Kaminsky disclosed a flaw in the Domain Name System (DNS), but would not provide the details until all the affected vendors had released patches and all the systems worldwide could be patched. He figured it would take about 30 days for that to happen. The 30-day mark also just happened to coincide with his speaking engagement at Black Hat in Las Vegas on August 6.

Kaminsky has worked for about 6 months with major vendors, coordinating a massive synchronized release of patches. It was an effort at responsible disclosure. However, in an interview with CNET News, Kaminsky suggested, in retrospect, he should have been more candid with more of his peers.

Those he did confide in appeared to be won over.

Writing on Monday in his blog, Halvar Flake first attacks the very idea that a security flaw such as this could be kept a secret, then proceeds to lay out what he thinks the flaw is:

"Mallory wants to poison DNS lookups on server ns.polya.com for the domain www.gmx.net. The nameserver for gmx.net is ns.gmx.net. Mallory's IP is

"Mallory begins to send bogus requests for www.ulam00001.com, www.ulam00002.com ... to ns.polya.com."

Flake's entire speculation can be found here.

In response, Dan Kaminsky wrote Monday afternoon on his blog "Patch. Today. Now. Yes, stay late," suggesting that Flake has either guessed correctly or is very close.