Matthew van Eerde wrote:
> Damian wrote:
>> So, if you didn't do it, and none of the other team-members did it,
>> then who did?  This raises an interesting issue: if an attacker
>> figures out how to poison the DNS server, nobody would get updates.
> 
> Worse, an attacker could point the records to a server under their
> own control, with malicious virus definitions.  I'll let everyone
> imagine the worst-case consequences of that.  

Or are the virus definition update packages signed?  If so, and freshclam were 
to check the signature of the package before accepting the update, that would 
mitigate this concern.

-- 
Matthew.van.Eerde (at) hbinc.com                 805.964.4554 x902
Hispanic Business Inc./HireDiversity.com         Software Engineer
perl -e"map{y/a-z/l-za-k/;print}shift" "Jjhi pcdiwtg Ptga wprztg,"
_______________________________________________
http://lurker.clamav.net/list/clamav-users.html

Reply via email to