Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 3 Nov 2006 07:47:22 +0000 (UTC)
From:      Doug Barton <dougb@FreeBSD.org>
To:        ports-committers@FreeBSD.org, cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org
Subject:   cvs commit: ports/dns/bind9 Makefile distinfo
Message-ID:  <200611030747.kA37lMZ0018601@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
dougb       2006-11-03 07:47:22 UTC

  FreeBSD ports repository

  Modified files:
    dns/bind9            Makefile distinfo 
  Log:
  Update to version 9.3.2-P2, which addresses the vulnerability
  announced by ISC dated 31 October (delivered via e-mail to the
  bind-announce@isc.org list today):
  
  Description:
          Because of OpenSSL's recently announced vulnerabilities
          (CAN-2006-4339, CVE-2006-2937 and CVE-2006-2940) which affect named,
          we are announcing this workaround and releasing patches.  A proof of
          concept attack on OpenSSL has been demonstrated for CAN-2006-4339.
  
          OpenSSL is required to use DNSSEC with BIND.
  
  Fix for version 9.3.2-P1 and lower:
          Upgrade to BIND 9.2.3-P2, then generate new RSASHA1 and
          RSAMD5 keys for all old keys using the old default exponent
          and perform a key rollover to these new keys.
  
          These versions also change the default RSA exponent to be
          65537 which is not vulnerable to the attacks described in
          CAN-2006-4339.
  
  Revision  Changes    Path
  1.72      +2 -2      ports/dns/bind9/Makefile
  1.39      +6 -6      ports/dns/bind9/distinfo



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200611030747.kA37lMZ0018601>