I'm running Wheezy on several i386 boxes. Over the weekend I installed bind9 and dhcp3-server on one of them. While starting to set up dynDNS, I noticed a comment in /etc/bind/named.conf.options (this is a file that had just been installed by the bind9 package):
// ports to talk. See http://www.kb.cert.org/vuls/id/800113 I look at the page at the URL. It concerns poisoning of the DNS cache. Debian is listed as being vulnerable and my D-Link DI-604 as unknown vulnerability. The document dates from 2008, and my D-Link router was purchased in 2004. It seems serious to this somewhat clueless geezer so I decide to investigate further. But I can't find any information more recent than 2008 by googling. Surely there have been some more recent developments. What has happened? Surely something has happened, but I find nothing. -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20110404131357.gc14...@big.lan.gnu