This is really not such a big thing to celebrate, since all routers should easily survive this test. But if, on the other hand, you previously had a router with firmware that was not surviving, and now it does, and you're using this test to verify that everything is now okay, then celebration is indeed in order.
Either way, since you are reading this, your router successfully survived the receipt of a surprisingly challenging DNS resolution reply which we inadvertently discovered while developing the DNS spoofability profiling test. This reply is, distressingly, known to immediately crash a variety of apparently unrelated makes and models of consumer routers.
Of course, this test can't prove that your router might not still (somehow) be vulnerable to some other remote exploit. But it does demonstrate that it is at least not susceptible to remote exploitation through DNS reply crashing.
https://www.grc.com/dns/crashtest.htm
While you are in GRC Neighborhood Check out.
DNS Nameserver Spoofability Test
Near the middle of 2008, the world was informed of the existence of a recently discovered, previously unknown and very serious vulnerability that was present within the majority of the Internet's domain name system (DNS) servers. The vulnerability was considered critical because, if exploited, it could be used to redirect unsuspecting Internet users to malicious web sites without detection.
https://www.grc.com/dns/dns.htm
And For once ATT Is doing something right
On the page above, several nameserver “spoofability” characteristics are ranked as shown to the left. These are intended to be rough but useful “rule of thumb” appraisals based upon our evolving experience with the Internet's nameservers as well as upon what's possible, reasonable and expected. Today, about 75% of the Internet's DNS nameservers rank “Excellent.” So if one or more of your DNS nameservers do not, understanding and exploring the reason for their sub-standard security may be worthwhile.
Comments