Date: Wed, 14 Jan 2009 22:35:41 -0800 From: Doug Barton <dougb@FreeBSD.org> To: Carl Friend <Carl.Friend@mathworks.com> Cc: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-09:04.bind Message-ID: <496ED93D.1010200@FreeBSD.org> In-Reply-To: <0528A1CB48AB5B4FA0D8FD7E0D94D81D5A75B7441B@EXCHANGE-AH.ad.mathworks.com> References: <200901132233.n0DMXv4a055314@freefall.freebsd.org> <0528A1CB48AB5B4FA0D8FD7E0D94D81D5A75B7441B@EXCHANGE-AH.ad.mathworks.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Carl Friend wrote: > Hi Leonid, > > I got the message, so it looks like at least something is working. > > From the advisory: > >> NOTE WELL: If named(8) is not explicitly set to use DNSSEC the setup >> is not vulnerable to the issue as described in this Security Advisory. > > We are not using DNSSEC on either the internal or external BIND > instances. We *are* using authentication keys for some of the internal > infrastructure (for dynamic updates) but not for the external, and > this facility uses shared-secrets anyway rather than PKI. When you say "authentication keys" I assume you mean TSIG. If so, that is not affected by this advisory. > I think we're OK unless we're going to light up DNSSEC in the near > future. You are only vulnerable to a potential man-in-the-middle attack IF you are validating DNSSEC signatures AND IF the signatures on that record involve DSA. Doug -- This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?496ED93D.1010200>