Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Jan 2009 22:35:41 -0800
From:      Doug Barton <dougb@FreeBSD.org>
To:        Carl Friend <Carl.Friend@mathworks.com>
Cc:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-09:04.bind
Message-ID:  <496ED93D.1010200@FreeBSD.org>
In-Reply-To: <0528A1CB48AB5B4FA0D8FD7E0D94D81D5A75B7441B@EXCHANGE-AH.ad.mathworks.com>
References:  <200901132233.n0DMXv4a055314@freefall.freebsd.org> <0528A1CB48AB5B4FA0D8FD7E0D94D81D5A75B7441B@EXCHANGE-AH.ad.mathworks.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Carl Friend wrote:
>    Hi Leonid,
> 
>    I got the message, so it looks like at least something is working.
> 
>    From the advisory:
> 
>> NOTE WELL: If named(8) is not explicitly set to use DNSSEC the setup
>> is not vulnerable to the issue as described in this Security Advisory.
> 
>    We are not using DNSSEC on either the internal or external BIND
> instances.  We *are* using authentication keys for some of the internal
> infrastructure (for dynamic updates) but not for the external, and
> this facility uses shared-secrets anyway rather than PKI.

When you say "authentication keys" I assume you mean TSIG. If so, that
is not affected by this advisory.

>    I think we're OK unless we're going to light up DNSSEC in the near
> future.

You are only vulnerable to a potential man-in-the-middle attack IF you
are validating DNSSEC signatures AND IF the signatures on that record
involve DSA.

Doug

-- 

    This .signature sanitized for your protection



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?496ED93D.1010200>