Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Jan 2009 18:19:19 -0500
From:      "matt donovan" <kitchetech@gmail.com>
To:        "Albert Thiel" <athiel@yourdatacenter.com>
Cc:        freebsd-ports@freebsd.org
Subject:   Re: BIND poisoning??
Message-ID:  <28283d910901081519g93fc3bdi3abfa5abe4c944b6@mail.gmail.com>
In-Reply-To: <e9a459b729fa4adeb45f0001bdcdc6a9.athiel@yourdatacenter.com>
References:  <e9a459b729fa4adeb45f0001bdcdc6a9.athiel@yourdatacenter.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jan 8, 2009 at 3:42 PM, Albert Thiel <athiel@yourdatacenter.com>wrote:

> Whoever manages BIND..
>
> SANS has a new  warning/listing on BIND (Jan 7th) that may effect FreeBSD's
> implementation, but I am
> not sure... I'm just the mailman here :)
>
> http://isc.sans.org/diary.html?storyid=5641&rss
>
> I checked versions 6.2 through 7.0 and see that they _could_ be vulnerable
> as they report a "do" flag
> so are using DNSSEC.
>
> Hope this info helps.. -Al
>
>
> Albert Thiel
> athiel@yourdatacenter.com
>
> Your Data Center & HostLongIsland.com
> Powerful FREE ISP Tools, Mail & Website Hosting
> http://www.YourDataCenter.com
> Hewlett, New York
> (877)302-8642
>
>
>
>
> _______________________________________________
> freebsd-ports@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-ports
> To unsubscribe, send any mail to "freebsd-ports-unsubscribe@freebsd.org"


well the security team already knows I sent them some research I did and yes
the maintainer for the bind port knows as well I m just waiting back for a
reply from him. to see if he'll update the port or not.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?28283d910901081519g93fc3bdi3abfa5abe4c944b6>