ch for your support,
--
Larissa Shapiro
Internet Systems Consortium Product Manager
Technology Leadership for the Common Good
+1 650 423 1335
www.isc.org
___
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe
from this list
text of this document that omits
the distribution URL in the following section is an uncontrolled copy.
Uncontrolled copies may lack important information, be out of date, or
contain factual errors.
--
===
Larissa Shapiro
BIND and DHCP Product Manager, Internet
h our users.
If you cannot help out but someone within your group/team is interested,
please let me know as soon as possible! We're finalizing participants
Wednesday, May 9th.
Thank you for your consideration.
Larissa
Larissa Shapiro
BIND and DHCP Product Manager
Internet Systems Consortium
BIND 9 Resolver crashes after logging an error in query.c
Summary: Organizations across the Internet reported crashes interrupting
service on BIND 9 nameservers performing recursive queries. Affected
servers crashed after logging an error in query.c with the following
message: "INSIST(! dns_rdatas
ons on ISC's Support services or other offerings should be sent to
sa...@isc.org. More information on ISC's support and other offerings are
available at: http://www.isc.org/community/blog/201102/BIND-support
--
Larissa Shapiro
Internet Systems Consortium Product Manager
Technolog
to:security-offi...@isc.org>. Questions on ISC's Support services
or other offerings should be
sent to i...@isc.org <mailto:dhcp-b...@isc.org> More information on
ISC's support and other offerings are available
at:http://www.isc.org/community/blog/201102/BIND-support
- --
La
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
BIND 9.8.0-P1 is now available for download.
This release fixes one security related issue. The full up to date
advisory regarding this issue is available at:
https://www.isc.org/CVE-2011-1907. A text version of the advisory will
be provided for ease
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Note: https://www.isc.org/CVE-2011-1907 is the authoritative source
for this Security Advisory. Please check the source for any updates.
Summary: When a name server is configured with a response policy zone
(RPZ), queries for type RRSIG can trigger a
Hi Dennis,
Thank you for getting 9.7.3 out on Solaris, that is a huge help in
getting this important update out there.
I do not know the answer to your question about the NIST CVE listings,
but I will inquire. Our CVE numbers actually come to us from
Carnegie-Mellon CERT, not NIST, but NIST does
Internet Systems Consortium Security
Advisory
Title: Server Lockup Upon IXFR or DDNS Update Combined with High Query Rate
(http://www.isc.org/software/bind/advisories/cve-2011-0414)
CVE-2011-0414
VU#559980
CVSS: 7.1 (AV:N/AC:M/Au:N/C:N/I:N/A:C)
for more inf
. The full advisory is located at:
https://www.isc.org/announcement/bind-9-dnssec-validation-fails-new-ds-record
Please do not hesitate to contact us directly with any questions
regarding this matter.
Larissa
Larissa Shapiro
ISC Product Manager
laris...@isc.org
+1 650 423-1335
-BEGIN PGP
if you are running an
affected version.
Best Regards,
Larissa
Larissa Shapiro
ISC Product Manager
- --
Updated CVE:
BIND: cache incorrectly allows a ncache entry and a rrsig for the same type
Summary: Failure to clear
you for your time, and for your support of ISC and BIND.
The survey is at:
http://www.isc.org/announcement/give-your-input-future-bind
Best,
Larissa
Larissa Shapiro
BIND and DHCP Product Manager
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.14 (Darwin)
Comment: Using GnuPG with Mozilla
developments early next week, as soon as they are available.
Larissa Shapiro
ISC Product Manager
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
Probably. I'd like to get Michael's feedback... I have not heard of
this from anyone else have either of you?
On Aug 26, 2010, at 3:22 PM, Rob Foehl wrote:
I've been experimenting with loading a large number of master zones
(on the order of 250,000) in a single BIND instance, and have
BIND 9.7.1-P2 is a SECURITY PATCH for BIND 9.7.1.
BIND 9.7.1-P2 reverses a change that was introduced in BIND 9.7.1.
Security Advisory Regarding: RRSIG query handling bug in BIND 9.7.1
CVE# TBA
VU# 211905
Posting date: July 14, 2010
Program Impacted: BIND
Versions affected: 9.7.1, 9.7
BIND 9.7.1-P1 is now available.
BIND 9.7.1-P1 is a maintenance release for BIND 9.7.
BIND 9.7.1-P1 addresses two backwards compatibility issues introduced in
BIND 9.7.0:
1) BIND 9.7.x expected negative responses to be in a certain format,
one that matches what BI
further questions.
Best Regards,
Larissa
===
Larissa Shapiro
ISC Product Manager
laris...@isc.org
http://www.isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
concerns.
Best Regards,
Larissa
Larissa Shapiro
ISC Product Manager
+1 650 423 1335
laris...@isc.org
http://www.isc.org
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
BIND 9.7.1 is now available.
BIND 9.7.1 is a maintenance release for BIND 9.7.
BIND 9.7.1 can be downloaded from
ftp://ftp.isc.org/isc/bind9/9.7.1/bind-9.7.1.tar.gz
The PGP signature of the distribution is at
ftp://ftp.isc.org/isc/bind9/9.7.1/bind-9.7
Dear BIND Users Community,
This is a message about the BIND 10 Mascot contest - and who better to
reach out to than our current users? We hope you'll bear with us
for a moment...
Linux has Tux, the penguin, BSD has its Daemon, ISC's user community
deserves its own little creature to learn to love
21 matches
Mail list logo