Dan Kaminsky has revealed more details about the DNS flaw, and has said that he would do it all over again, despite receiving some harsh words from his peers in the security community.

Kaminsky's full-time job over the past few months has been working with software vendors and Internet companies to fix a widespread flaw in the DNS (domain name system), used by computers to find each other on the Internet. Kaminsky first disclosed the problem on 8 July, warning corporate users and Internet service providers to patch their software as quickly as possible.

On Wednesday, at a crowded session at the Black Hat conference, he disclosed more details of the issue, describing a dizzying array of attacks that could exploit DNS. Kaminsky also talked about some of the work he'd done to fix critical Internet services that could also be hit with this attack.

By exploiting a series of bugs in the way the DNS protocol works, Kaminsky had figured out a way to very quickly fill DNS servers with inaccurate information. Criminals could use this technique to redirect victims to fake websites, but in Kaminsky's talk, he described many more possible types of attacks.

He described how the flaw could be used to compromise email messages, software updating systems or even password recovery systems on popular websites.

And though many had thought that SSL (Secure Socket Layer) connections were impervious to this attack, Kaminsky also showed how even the SSL certificates used to confirm the validity of websites could be circumvented with a DNS attack. The problem, he said, is that the companies that issue SSL certificates use Internet services like email and the web to validate their certificates. "Guess how secure that is in the face of a DNS attack," Kaminsky said. "Not very."

"SSL's not the panacea we would like it to be," he said.

Another major problem has been what Kaminsky says is the "forgot my password" attack. This affects many companies that have web-based password recovery systems. Criminals could claim to have forgotten a user's password to the website and then use DNS hacking techniques to trick the site into sending the password to their own computer.

In addition to the DNS vendors, Kaminsky said he'd worked with companies such as Google, Facebook, Yahoo and eBay to fix the various problems related to the flaw. "I do not want to see my cell phone bill this month," he said.

Although some conference attendees said Wednesday that Kaminsky's talk was overhyped, OpenDNS CEO David Ulevitch said that the IOActive researcher has performed a valuable service to the Internet community. "The entire scope of the attack is even yet to be fully realised," he said. "This affects every single person on the Internet."

There have been some hiccups, however. Two weeks after Kaminsky first discussed the problem, technical details of the bug were accidentally leaked to the Internet by security company Matasano Security. Also, some high-traffic DNS servers stopped working properly after the initial patch was applied, and several firewall products that do Internet Protocol address translation have inadvertently undone some of the DNS changes made to address this problem.

In an interview after his Black Hat presentation, Kaminsky said that despite all the hassles, he'd still do the same thing again. "Hundreds of millions of people are safer," he said. "Things didn't go perfectly, but it went so much better than I had any right to expect."