From owner-freebsd-security@FreeBSD.ORG Mon Jul 29 10:09:04 2013 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 3F3E3D2 for ; Mon, 29 Jul 2013 10:09:04 +0000 (UTC) (envelope-from lars@e-new.0x20.net) Received: from mail.0x20.net (mail.0x20.net [IPv6:2001:aa8:fffb:1::3]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id F0F152B2B for ; Mon, 29 Jul 2013 10:09:03 +0000 (UTC) Received: from e-new.0x20.net (mail.0x20.net [IPv6:2001:aa8:fffb:1::3]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.0x20.net (Postfix) with ESMTPS id 946366A6000; Mon, 29 Jul 2013 12:09:02 +0200 (CEST) Received: from e-new.0x20.net (localhost [127.0.0.1]) by e-new.0x20.net (8.14.7/8.14.7) with ESMTP id r6TA92C9018092; Mon, 29 Jul 2013 12:09:02 +0200 (CEST) (envelope-from lars@e-new.0x20.net) Received: (from lars@localhost) by e-new.0x20.net (8.14.7/8.14.7/Submit) id r6TA92UL016931; Mon, 29 Jul 2013 12:09:02 +0200 (CEST) (envelope-from lars) Date: Mon, 29 Jul 2013 12:09:02 +0200 From: Lars Engels To: Kimmo Paasiala Subject: Re: bind9 and CVE-2013-4854 Message-ID: <20130729100902.GM59101@e-new.0x20.net> References: <20130726230549.GB64252@lonrach.local> <20130727085458.GB68862@lonrach.local> <46029EF7-D574-4953-AE8D-4BA79F5295BB@plosh.net> <20130727210809.GA70513@lonrach.local> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="oJoa/b7Rsqp4yzB0" Content-Disposition: inline In-Reply-To: X-Editor: VIM - Vi IMproved 7.3 X-Operation-System: FreeBSD 8.4-RELEASE User-Agent: Mutt/1.5.21 (2010-09-15) X-Mailman-Approved-At: Mon, 29 Jul 2013 11:37:35 +0000 Cc: freebsd-security X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 29 Jul 2013 10:09:04 -0000 --oJoa/b7Rsqp4yzB0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sun, Jul 28, 2013 at 12:03:43PM +0300, Kimmo Paasiala wrote: > A question related to this: >=20 > What is it that prevents BIND from being removed from the base when > there are very well working ports of BIND already that are far easier > to update when vulnerabilities are found. Is it the dig(1), host(1) > and nslookup(1) utilities? Yes. --oJoa/b7Rsqp4yzB0 Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.20 (FreeBSD) iEYEARECAAYFAlH2Pz4ACgkQKc512sD3afgNUgCgmGUvFJuJbYdWiG1On3KIoZDS tEEAn1Kqi1aOWxwvQBLZ2OOhhVHnjqZd =D/1Y -----END PGP SIGNATURE----- --oJoa/b7Rsqp4yzB0--