Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 9 Jan 2009 00:36:15 -0800 (PST)
From:      Doug Barton <dougb@FreeBSD.org>
To:        matt donovan <kitchetech@gmail.com>
Cc:        Albert Thiel <athiel@yourdatacenter.com>, freebsd-ports@freebsd.org
Subject:   Re: BIND poisoning??
Message-ID:  <alpine.BSF.2.00.0901090034320.1173@ync.qbhto.arg>
In-Reply-To: <28283d910901081519g93fc3bdi3abfa5abe4c944b6@mail.gmail.com>
References:  <e9a459b729fa4adeb45f0001bdcdc6a9.athiel@yourdatacenter.com> <28283d910901081519g93fc3bdi3abfa5abe4c944b6@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 8 Jan 2009, matt donovan wrote:

> On Thu, Jan 8, 2009 at 3:42 PM, Albert Thiel <athiel@yourdatacenter.com>wrote:
>
>> Whoever manages BIND..
>>
>> SANS has a new warning/listing on BIND (Jan 7th) that may effect 
>> FreeBSD's implementation, but I am not sure... I'm just the mailman 
>> here :)
>>
>> http://isc.sans.org/diary.html?storyid=5641&rss

As I've said several times now, you need to look at 
https://www.isc.org/node/373 to get the full picture. This issue is only 
relevant for you if you are using DNSSEC to verify signatures.

> well the security team already knows I sent them some research I did and yes
> the maintainer for the bind port knows as well I m just waiting back for a
> reply from him. to see if he'll update the port or not.

I both updated the ports and responded to you yesterday.

Doug

-- 

     This .signature sanitized for your protection




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.0901090034320.1173>