KAMINSKY vulnerability !!

Kevin Darcy kcd at chrysler.com
Mon May 10 16:24:49 UTC 2010

A) Why do you assume an exploit at all? Hopefully you understand that 
the vast majority of software crashes in the world are triggered by 
benign transactions.

B) From the www.isc.org website:

"BIND 9.4-ESV-R1 is now available. BIND 9.4-ESV-R1 is revision 1 of the 
extended release version for BIND 9.4. It is recommended that all BIND 
9.4.x users upgrade to BIND 9.4-ESV-R1."

If you have to upgrade anyway, but you're going to stick with 9.4.x, why 
would you try to "get away with" running something older and 
less-recommended in that generation of BIND 9 than 9.4-ESV-R1?

                                             - Kevin

On 5/10/2010 10:58 AM, P.A wrote:
> Stephane, do you think I can get away with running 9.4.3-P5 that doesn't
> seem to have any known issues. Also what exploit do you think caused my
> original issue?
> As far as running an old version its been stable for a long time and to be
> honest I forgot I was running that version.
> -----Original Message-----
> From: Stephane Bortzmeyer [mailto:bortzmeyer at nic.fr]
> Sent: Monday, May 10, 2010 10:24 AM
> To: P.A
> Cc: bind-users at lists.isc.org
> Subject: Re: KAMINSKY vulnerability !!
> On Mon, May 10, 2010 at 10:05:47AM -0400,
>   P.A<razor at meganet.net>  wrote
>   a message of 242 lines which said:
>> My question is did I just get rid by the kaminsky vulnerability?
> Not at all. The Kaminsky attack poisons the server, it does not crash
> it.
>> Primary server: BIND 9.4.3b2
> Why do you run a beta version (and an old one)?
> This issue is known
> <http://www.mail-archive.com/bind-users@isc.org/msg00323.html>  and has
> been fixed in production versions a long time ago.
> _______________________________________________
> bind-users mailing list
> bind-users at lists.isc.org
> https://lists.isc.org/mailman/listinfo/bind-users

More information about the bind-users mailing list