------------------ Pos6 Poison Module ------------------ To use this module, you will need to have a ready, compiled, Pos6 source tree. First, set the POS6ROOT variable of the supplied Makefile to the root directory of your source tree. Then, type "make" and hope the module will be built for you. Then, either copy the resulting library files (the ".la" file and the various ".so" files in the hidden ".libs" subdirectory) to your Pos6 library directory (usually /usr/lib/pos6), or add the build directory to your module lookup path by using the "libdir" configuration option. This module specifies the "poison" zone type. This zone type will try to poison bad caches with information for other zones. Modern Unix caches do not have this problem, but on Windows, at least I _thought_ protection against this is not by default enabled on at least Simple DNS Plus (otherwise a very good program). Here's what it does: ; Answer ID: 0 QR: 0 OPCODE: QUERY AA: 0 TC: 0 RD: 1 ; RA: 1 RCODE: NOERROR qc 1 an 1 au 0 ad 1 ; Questions: ;poison.acdam.net. A ; Answers: poison.acdam.net. 3600 CNAME acdam.net. ; Authority: ;(none) ; Additional: acdam.net. 3600 A 192.168.1.1 ; Query took: 1 msec ; Server queried: 127.0.0.1#3000[udp] Obviously, the address for acdam.net should be discarded as the server is authoritive for the "poison.acdam.net" zone, not for "acdam.net". This module takes the following arguments: * victim - Domain name to attack (the root by default) * ip - Ip number to send back (127.0.0.1 by default) Here's how I configured the module: libdir "/home/meilof/pos6poison" loadmodule poison zone poison poison.acdam.net victim acdam.net ip 192.168.1.1