DNS exploit code is in the wild
Nelson Serafica
ntserafica at yahoo.com
Fri Jul 25 02:05:07 UTC 2008
Thanks for the clarification. Just add some --prefix.
Didn't notice that. I now pass those testdns regarding randomness port.
BTW, its nice joining in this lists. Members are active they respond immediately to any important inquiries
Regards,
Nelson
----- Original Message ----
From: Alan Clegg <Alan_Clegg at isc.org>
To: Nelson Serafica <ntserafica at yahoo.com>
Cc: bind-users at isc.org
Sent: Friday, July 25, 2008 9:32:11 AM
Subject: Re: DNS exploit code is in the wild
Nelson Serafica wrote:
> Thanks Jeremy,
> I have downloaded the file bind-9.5.0-P1.tar.gz and do configure && make && make install.
>
> Installation was successful. However, when I query the version of bind, it shows:
>
> [root at ns1-rproxy bind-9.5.0-P1]# /usr/local/named/sbin/named -v
> BIND 9.2.3
>
> I restart named (/etc/init.d/named restart) but still not yet updated. I have do also rndc reload as well but still the old version.
>
> Is there a way I can verify that the new bind is already running?
By default, BIND installs into /usr/local/{bin,sbin}. If you want it to
go into /usr/local/named/* you will have to configure it to do so.
./configure --help
for a full list of configuration options. Make sure to set your options
as they were set when the original version was installed (location of
configuration, etc).
AlanC
New Email names for you!
Get the Email name you've always wanted on the new @ymail and @rocketmail.
Hurry before someone else does!
http://mail.promotions.yahoo.com/newdomains/ph/
More information about the bind-users
mailing list