On Fri, Nov 18, 2011 at 8:48 PM, Doug Barton wrote:
> I cannot emphasize this point highly enough:
Point is very very taken :-)
--
chs,
___
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe,
On 11/18/2011 06:05, Luchesar V. ILIEV wrote:
> On 18/11/2011 15:48, Christer Solskogen wrote:
>> On Thu, Nov 17, 2011 at 10:20 PM, Doug Barton wrote:
>>> The ports, 10-current, stable/8 and stable/7 were all updated yesterday
>>> shortly after ISC publicly released the code.
>>
>> But not releng/
On 18/11/2011 15:48, Christer Solskogen wrote:
> On Thu, Nov 17, 2011 at 10:20 PM, Doug Barton wrote:
>> The ports, 10-current, stable/8 and stable/7 were all updated yesterday
>> shortly after ISC publicly released the code.
>
> But not releng/*?
http://lists.freebsd.org/pipermail/freebsd-secur
On Thu, Nov 17, 2011 at 10:20 PM, Doug Barton wrote:
> The ports, 10-current, stable/8 and stable/7 were all updated yesterday
> shortly after ISC publicly released the code.
But not releng/*?
--
chs,
___
freebsd-ports@freebsd.org mailing list
http://
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 11/17/2011 08:31, Albert Thiel wrote:
> I have been hearing that since last night DNS 0-day exploitation is
> taking place all over the net.
I dislike the term "0-day" because it means different things to
different people. What is true is that a
I have been hearing that since last night DNS 0-day exploitation is taking
place all over the net.
ISC mentions recursion. Is this vulnerability only on DNS that allows
recursive queries? (if so mine
is safe thankfully). Is there a patch to the BSD flavor of BIND expected to
address this?
T