Matthew van Eerde wrote: > Damian wrote: >> So, if you didn't do it, and none of the other team-members did it, >> then who did? This raises an interesting issue: if an attacker >> figures out how to poison the DNS server, nobody would get updates. > > Worse, an attacker could point the records to a server under their > own control, with malicious virus definitions. I'll let everyone > imagine the worst-case consequences of that.
Or are the virus definition update packages signed? If so, and freshclam were to check the signature of the package before accepting the update, that would mitigate this concern. -- Matthew.van.Eerde (at) hbinc.com 805.964.4554 x902 Hispanic Business Inc./HireDiversity.com Software Engineer perl -e"map{y/a-z/l-za-k/;print}shift" "Jjhi pcdiwtg Ptga wprztg," _______________________________________________ http://lurker.clamav.net/list/clamav-users.html