DNS exploit code is in the wild

Nelson Serafica ntserafica at yahoo.com
Fri Jul 25 02:05:07 UTC 2008


Thanks for the clarification. Just add some --prefix. 
Didn't notice that. I now pass those testdns regarding randomness port.

BTW, its nice joining in this lists. Members are active they respond immediately to any important inquiries

Regards,


Nelson






----- Original Message ----
From: Alan Clegg <Alan_Clegg at isc.org>
To: Nelson Serafica <ntserafica at yahoo.com>
Cc: bind-users at isc.org
Sent: Friday, July 25, 2008 9:32:11 AM
Subject: Re: DNS exploit code is in the wild

Nelson Serafica wrote:
> Thanks Jeremy,
> I have downloaded the file  bind-9.5.0-P1.tar.gz and do configure && make && make install.
> 
> Installation was successful. However, when I query the version of bind, it shows:
> 
> [root at ns1-rproxy bind-9.5.0-P1]# /usr/local/named/sbin/named -v
> BIND 9.2.3
> 
> I restart named (/etc/init.d/named restart) but still not yet updated. I have do also rndc reload as well but still the old version.
> 
> Is there a way I can verify that the new bind is already running?
By default, BIND installs into /usr/local/{bin,sbin}.  If you want it to
go into /usr/local/named/* you will have to configure it to do so.

  ./configure --help

for a full list of configuration options.  Make sure to set your options
as they were set when the original version was installed (location of
configuration, etc).

AlanC


      New Email names for you! 
Get the Email name you've always wanted on the new @ymail and @rocketmail. 
Hurry before someone else does!
http://mail.promotions.yahoo.com/newdomains/ph/


More information about the bind-users mailing list