Re: BIND 9 question

2011-11-19 Thread Christer Solskogen
On Fri, Nov 18, 2011 at 8:48 PM, Doug Barton wrote: > I cannot emphasize this point highly enough: Point is very very taken :-) -- chs, ___ freebsd-ports@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-ports To unsubscribe,

Re: BIND 9 question

2011-11-18 Thread Doug Barton
On 11/18/2011 06:05, Luchesar V. ILIEV wrote: > On 18/11/2011 15:48, Christer Solskogen wrote: >> On Thu, Nov 17, 2011 at 10:20 PM, Doug Barton wrote: >>> The ports, 10-current, stable/8 and stable/7 were all updated yesterday >>> shortly after ISC publicly released the code. >> >> But not releng/

Re: BIND 9 question

2011-11-18 Thread Luchesar V. ILIEV
On 18/11/2011 15:48, Christer Solskogen wrote: > On Thu, Nov 17, 2011 at 10:20 PM, Doug Barton wrote: >> The ports, 10-current, stable/8 and stable/7 were all updated yesterday >> shortly after ISC publicly released the code. > > But not releng/*? http://lists.freebsd.org/pipermail/freebsd-secur

Re: BIND 9 question

2011-11-18 Thread Christer Solskogen
On Thu, Nov 17, 2011 at 10:20 PM, Doug Barton wrote: > The ports, 10-current, stable/8 and stable/7 were all updated yesterday > shortly after ISC publicly released the code. But not releng/*? -- chs, ___ freebsd-ports@freebsd.org mailing list http://

Re: BIND 9 question

2011-11-17 Thread Doug Barton
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 On 11/17/2011 08:31, Albert Thiel wrote: > I have been hearing that since last night DNS 0-day exploitation is > taking place all over the net. I dislike the term "0-day" because it means different things to different people. What is true is that a

BIND 9 question

2011-11-17 Thread Albert Thiel
I have been hearing that since last night DNS 0-day exploitation is taking place all over the net. ISC mentions recursion. Is this vulnerability only on DNS that allows recursive queries? (if so mine is safe thankfully). Is there a patch to the BSD flavor of BIND expected to address this? T