> Date: Thu, 07 Jan 2010 15:16:43 -0800
> From: Doug Barton
> Sender: owner-freebsd-sta...@freebsd.org
>
> Thomas Rasmussen wrote:
> > Hello,
> >
> > While this is all true, this vulnerability is for caching servers,
> > not authorative ones. It is pretty easy to setup DLV validation on a
> > re
Thomas Rasmussen wrote:
> Hello,
>
> While this is all true, this vulnerability is for caching servers,
> not authorative ones. It is pretty easy to setup DLV validation on a
> recursive bind server. However, it is not enabled by default on FreeBSD,
> so Stephen should be safe.
FWIW, I agree with
Kevin Oberman wrote:
Date: Wed, 06 Jan 2010 17:15:12 -0600
From: Stephen Montgomery-Smith
Sender: owner-freebsd-sta...@freebsd.org
FreeBSD Security Advisories wrote:
I. Background
BIND 9 is an implementation of the Domain Name System (DNS) protocols.
The named(8) daemon is an Internet
> Date: Wed, 06 Jan 2010 17:15:12 -0600
> From: Stephen Montgomery-Smith
> Sender: owner-freebsd-sta...@freebsd.org
>
> FreeBSD Security Advisories wrote:
>
> > I. Background
> >
> > BIND 9 is an implementation of the Domain Name System (DNS) protocols.
> > The named(8) daemon is an Internet
FreeBSD Security Advisories wrote:
I. Background
BIND 9 is an implementation of the Domain Name System (DNS) protocols.
The named(8) daemon is an Internet Domain Name Server.
DNS Security Extensions (DNSSEC) provides data integrity, origin
authentication and authenticated denial of existence