Top 4th of July Sales Best 4K Projectors 7 Early Prime Day Deals Wi-Fi Range Extenders My Favorite Summer Gadgets Cheap Car Insurance Target's 4th of July Sale Best Running Earbuds, Headphones

Is Kaminsky's DNS flaw public?

Fellow Black Hat researcher apparently guesses the vulnerability causing Dan Kaminsky to urge everyone to patch their systems immediately.

Thirteen days after Dan Kaminsky asked his fellow security researchers not to speculate on the details of his DNS flaw, a fellow Black Hat researcher published his own speculation, and apparently got it right.

On July 8, IOActive researcher Kaminsky disclosed a flaw in the Domain Name System (DNS), but would not provide the details until all the affected vendors had released patches and all the systems worldwide could be patched. He figured it would take about 30 days for that to happen. The 30-day mark also just happened to coincide with his speaking engagement at Black Hat in Las Vegas on August 6.

Kaminsky has worked for about 6 months with major vendors, coordinating a massive synchronized release of patches. It was an effort at responsible disclosure. However, in an interview with CNET News, Kaminsky suggested, in retrospect, he should have been more candid with more of his peers.

Those he did confide in appeared to be won over.

Writing on Monday in his blog, Halvar Flake first attacks the very idea that a security flaw such as this could be kept a secret, then proceeds to lay out what he thinks the flaw is:

"Mallory wants to poison DNS lookups on server for the domain The nameserver for is Mallory's IP is

"Mallory begins to send bogus requests for, ... to"

Flake's entire speculation can be found here.

In response, Dan Kaminsky wrote Monday afternoon on his blog "Patch. Today. Now. Yes, stay late," suggesting that Flake has either guessed correctly or is very close.