www.dns-oarc.net Open in urlscan Pro
2620:ff:c000::66  Public Scan

URL: https://www.dns-oarc.net/oarc/services/dnsentropy
Submission: On July 04 via api from LU — Scanned from DE

Form analysis 1 forms found in the DOM

GET /index.php/search/node

<form action="/index.php/search/node" method="get" id="search-block-form" accept-charset="UTF-8" class="search-form search-block-form">
  <div class="js-form-item form-item js-form-type-search form-type-search js-form-item-keys form-item-keys form-no-label">
    <label for="edit-keys--2" class="visually-hidden">Search</label>
    <input title="Enter the terms you wish to search for." data-drupal-selector="edit-keys" type="search" id="edit-keys--2" name="keys" value="" size="15" maxlength="128" class="form-search">
  </div>
  <div data-drupal-selector="edit-actions" class="form-actions js-form-wrapper form-wrapper" id="edit-actions"><input class="search-form__submit button js-form-submit form-submit" data-drupal-selector="edit-submit" type="submit" id="edit-submit--3"
      value="Search">
  </div>
</form>

Text Content

Skip to main content


PRIMARY LINKS


Show — Primary Links Hide — Primary Links
 * Check My DNS
 * Member Portal
 * Mitigating DNS Denial of Service Attacks

2023-06-01: This service has been deprecated in favor of Check My DNS.

US-CERT's Vulnerability Note VU#800113 describes deficiencies in the DNS
protocol and implementations that can facilitate cache poisoning attacks. The
answers from a poisoned nameserver cannot be trusted. You may be redirected to
malicious web sites that will try to steal your identity or infect your
computers with malware. Working exploits for this issue are already widely
circulated! Upgrade your nameservers ASAP if you haven't done so already!
Additional details about these poisoning attacks are available in Dan Kaminsky's
post of August 7, 2008.

The essence of the problem is that DNS resolvers don't always use enough
randomness in their transaction IDs and query source ports. Increasing the
amount of randomness increases the difficulty of a successful poisoning attack.

This page exists to help you learn if your ISP's nameservers are vulnerable to
this type of attack. If you click on the button below, we will test the
randomness of your ISP DNS resolver.

The test takes a few seconds to complete. When its done you'll see a page where
the transaction ID and source port randomness will be rated either GREAT, GOOD,
or POOR. If you see a POOR rating, we recommend that contact your ISP and ask if
they have plans to upgrade their nameserver software.

See porttest for another way to check your resolver from a Unix commandline.


QUICK LINKS

Joining and Participating in DNS-OARC

OARC 44, Hybrid, Atlanta

OARC 43, Hybrid, Prague

DNS Community Day, Colombia

OARC Past Events

DNS-OARC Workshop Presentation Videos

OARC on LinkedIn, GitHub, Mastodns.net, Facebook, Instagram

Latest OARC Blog Posts

Mitigating DNS Denial of Service Attacks

DNS-OARC Conduct Policy



Contacting OARC


CONTENT NAVIGATION


Show — Content Navigation Hide — Content Navigation
 * Services
   * Check My DNS
   * DNSVIZ
   * OARC Mailing Lists
   * OARC Mattermost Chat Server
   * Resolver Sharing Project
   * TLDmon
   * DNS Privacy
   * dlvtest
   * Dont Probe
   * AS112
 * Upcoming Events
 * Past Events
   * DNS Community Day, Thailand
   * OARC 42, Hybrid (Charlotte)
   * OARC 41, Hybrid (Da Nang)
 * Software Development & Funding
 * DNS Tools Catalog
 * Data Catalog
   * DSC
   * RSSAC 002
   * DITL
   * Zone File Repository
   * Contributing
   * Root Zone Archive
 * About OARC
   * Corporation - Board - Team
   * OARC FAQ
   * Mission
   * Careers
   * Programme Committee
   * Privacy Committee
   * Contacting OARC
   * Presentations
   * Grants and Donors
   * Policies


SEARCH

Search



TOOLS


Show — Tools Hide — Tools
 * Recent content


OARC'S DIAMOND MEMBERS

ICANN
Verisign



OARC'S PLATINUM MEMBERS

Comcast
Google
Infoblox
salesforce.com, Inc.



OARC'S GOLD MEMBERS

Akamai
Cloudflare
DNSFilter
GoDaddy
ISC
Nominet
Oracle
RIPE NCC



OARC'S SILVER MEMBERS

AFNIC
APNIC
CIRA
Cisco
DENIC
EURid
IBM
ISOC
Meta
Microsoft
NIC.br
PIR
SIDN
SWITCH
UltraDNS (Vercara)



OARC'S BRONZE MEMBERS

AdGuard
Afilias
Alibaba Cloud
Amazon
Arnes
auDA
CentralNic
CNNIC
Craigslist
CZ.NIC
Deutsche Telekom AG
DigiCert
DigitalOcean
DNS Belgium
DomainTools
Fastly
Gransy
.IE
InternetNZ
JPRS
KISA/KRNIC
LACNIC
MSK-IX
Nameshield
Netscout
NIC.AT
NIC Chile
NIC Mexico
No-IP
Norid
PowerDNS
Punktum dk
Spamhaus EU Limited
SURF bv
Telus
The Swedish Internet Foundation
Traficom
Whalebone



OARC'S BLUE MEMBERS

BYU
CAIDA
CORE Association (Council of Registrars)
DigitalMedusa
ENS Labs Ltd.
Honest Consulting
Hostmaster Ltd.
Internet History Initiative
ISOC-IL
ISZT Nonprofit Kft.
M3AAWG
NASA
NIC.CR
NLnet Labs
NSRC at University of Oregon
PANDI
PCH
PNGUoT
Quad9
RNIDS
Supermethod
.th
University of Maryland
USC/ISI
UTwente



OARC'S SUPPORTERS

AFRINIC
BFH
CENTR
Columbia University
deSEC
DISA
Double Shot Security
Eesti Internet
Hazel Smith
LACTLD
Mythic Beasts
Netnod
Sinodun
SOX
TChung
Tel Aviv University
University Grenoble Alpes
US ARMY
WIDE