Date: Thu, 8 Jan 2009 18:19:19 -0500 From: "matt donovan" <kitchetech@gmail.com> To: "Albert Thiel" <athiel@yourdatacenter.com> Cc: freebsd-ports@freebsd.org Subject: Re: BIND poisoning?? Message-ID: <28283d910901081519g93fc3bdi3abfa5abe4c944b6@mail.gmail.com> In-Reply-To: <e9a459b729fa4adeb45f0001bdcdc6a9.athiel@yourdatacenter.com> References: <e9a459b729fa4adeb45f0001bdcdc6a9.athiel@yourdatacenter.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jan 8, 2009 at 3:42 PM, Albert Thiel <athiel@yourdatacenter.com>wrote: > Whoever manages BIND.. > > SANS has a new warning/listing on BIND (Jan 7th) that may effect FreeBSD's > implementation, but I am > not sure... I'm just the mailman here :) > > http://isc.sans.org/diary.html?storyid=5641&rss > > I checked versions 6.2 through 7.0 and see that they _could_ be vulnerable > as they report a "do" flag > so are using DNSSEC. > > Hope this info helps.. -Al > > > Albert Thiel > athiel@yourdatacenter.com > > Your Data Center & HostLongIsland.com > Powerful FREE ISP Tools, Mail & Website Hosting > http://www.YourDataCenter.com > Hewlett, New York > (877)302-8642 > > > > > _______________________________________________ > freebsd-ports@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-ports > To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org" well the security team already knows I sent them some research I did and yes the maintainer for the bind port knows as well I m just waiting back for a reply from him. to see if he'll update the port or not.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?28283d910901081519g93fc3bdi3abfa5abe4c944b6>