Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 3 May 2020 04:18:49 +0700
From:      Eugene Grosbein <eugen@grosbein.net>
To:        Per olof Ljungmark <peo@nethead.se>, The Doctor <doctor@doctor.nl2k.ab.ca>
Cc:        freebsd-ports@freebsd.org
Subject:   Re: Bind 9.16 port error still lingers
Message-ID:  <e82ea952-6226-07aa-471b-63ff51aa4e6c@grosbein.net>
In-Reply-To: <83462c13-c953-34e8-fc7c-ab180ea9804f@nethead.se>
References:  <20200502140501.GA16385@doctor.nl2k.ab.ca> <20200502143210.GA4453@elch.exwg.net> <20200502151636.GA22397@doctor.nl2k.ab.ca> <20200502165318.GB4453@elch.exwg.net> <20200502172907.GA59662@doctor.nl2k.ab.ca> <83462c13-c953-34e8-fc7c-ab180ea9804f@nethead.se>

next in thread | previous in thread | raw e-mail | index | archive | help
03.05.2020 1:13, Per olof Ljungmark wrote:

> On 2020-05-02 19:29, The Doctor via freebsd-ports wrote:
>> On Sat, May 02, 2020 at 06:53:18PM +0200, Christoph Moench-Tegeder wrote:
>>> ## The Doctor via freebsd-ports (freebsd-ports@freebsd.org):
> [snip]
> 
>> //Use with the following in named.conf, adjusting the allow list as needed:
>> key "rndc-key" {
>>        algorithm hmac-md5;
>>         secret "7ZbGK94NdSa2WACxx72W1w==";
> 
> I suggest you change this ^^^^^ rather quickly, especially if it is a public name server.

This is a key for local (over 127.0.0.1) connections for rndc,
it can be abused by local users only, or if there is remotely expoitable vulnerability
for running shell code. Still, should not be published so easily but no direct harm
when system has no untrusted local users.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?e82ea952-6226-07aa-471b-63ff51aa4e6c>