Date: Fri, 9 Jan 2009 00:36:15 -0800 (PST) From: Doug Barton <dougb@FreeBSD.org> To: matt donovan <kitchetech@gmail.com> Cc: Albert Thiel <athiel@yourdatacenter.com>, freebsd-ports@freebsd.org Subject: Re: BIND poisoning?? Message-ID: <alpine.BSF.2.00.0901090034320.1173@ync.qbhto.arg> In-Reply-To: <28283d910901081519g93fc3bdi3abfa5abe4c944b6@mail.gmail.com> References: <e9a459b729fa4adeb45f0001bdcdc6a9.athiel@yourdatacenter.com> <28283d910901081519g93fc3bdi3abfa5abe4c944b6@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 8 Jan 2009, matt donovan wrote: > On Thu, Jan 8, 2009 at 3:42 PM, Albert Thiel <athiel@yourdatacenter.com>wrote: > >> Whoever manages BIND.. >> >> SANS has a new warning/listing on BIND (Jan 7th) that may effect >> FreeBSD's implementation, but I am not sure... I'm just the mailman >> here :) >> >> http://isc.sans.org/diary.html?storyid=5641&rss As I've said several times now, you need to look at https://www.isc.org/node/373 to get the full picture. This issue is only relevant for you if you are using DNSSEC to verify signatures. > well the security team already knows I sent them some research I did and yes > the maintainer for the bind port knows as well I m just waiting back for a > reply from him. to see if he'll update the port or not. I both updated the ports and responded to you yesterday. Doug -- This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.0901090034320.1173>