On Wed, Jul 8, 2015, at 12:27, Dan Lukes wrote:
> On 07/08/15 18:29, Mark Felder:
> >> IV.  Workaround
> >>
> >> No workaround is available, but hosts not running named(8) are not
> >> vulnerable.
> 
> > Why is no workaround available? Can't you just disable DNSSEC
> > validation?
> >
> > dnssec-enable no;
> > dnssec-validation no;
> 
> 
> Well, it depend ...
> 
> If someone is running DNSSEC validation, then turning it off is no
> solution.
> 
> You may claim either "turn off named" or "power off the computer" to be 
> available workaround ...
> 

DNSSEC is not a requirement to run a DNS resolver. We have pointed out
when you're not affected in other entries:

https://www.freebsd.org/security/advisories/FreeBSD-SA-14:06.openssl.asc

> IV.  Workaround
> 
> No workaround is available, but systems that do not use OpenSSL to implement
> the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1)
> protocols implementation and do not use the ECDSA implementation from OpenSSL
> are not vulnerable.

or look at this ipv6 entry:

https://www.freebsd.org/security/advisories/FreeBSD-SA-15:09.ipv6.asc

> IV.  Workaround
> 
> Only systems that are manually configured to use "accept_rtadv"
> ifconfig(8) flag on an interface are affected.

"No workaround is available, but only systems that are manually
configured to enable DNSSEC validation are affected." would be a
reasonable statement.
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to