Date: Wed, 23 Jul 2008 10:07:46 +0200 From: Peter Olsson <pol@leissner.se> To: Paul Schmehl <pschmehl_lists_nada@tx.rr.com> Cc: Doug Barton <dougb@freebsd.org>, freebsd-stable@freebsd.org Subject: Re: FreeBSD 7.1 and BIND exploit Message-ID: <20080723080746.GK6675@pol.leissner.se> In-Reply-To: <9C1F9AB0E0CD3034CA691A30@utd65257.utdallas.edu> References: <20080722200720.0540245048@ptavv.es.net> <9C1F9AB0E0CD3034CA691A30@utd65257.utdallas.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
About scripts for automating DNSSEC maintenance, check this out: http://www.hznet.de/dns/zkt/ There are also some DNSSEC howtos on that site. We use ZKT for our DNSSEC zones, and everything except KSK rollover is fully automated. Has been working fine for about half a year now. Automatic KSK rollover will be in next release of ZKT, I don't know the details of how that is going to work. -- Peter Olsson pol@leissner.se
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080723080746.GK6675>