KAMINSKY vulnerability !!
kcd at chrysler.com
Mon May 10 16:24:49 UTC 2010
A) Why do you assume an exploit at all? Hopefully you understand that
the vast majority of software crashes in the world are triggered by
B) From the www.isc.org website:
"BIND 9.4-ESV-R1 is now available. BIND 9.4-ESV-R1 is revision 1 of the
extended release version for BIND 9.4. It is recommended that all BIND
9.4.x users upgrade to BIND 9.4-ESV-R1."
If you have to upgrade anyway, but you're going to stick with 9.4.x, why
would you try to "get away with" running something older and
less-recommended in that generation of BIND 9 than 9.4-ESV-R1?
On 5/10/2010 10:58 AM, P.A wrote:
> Stephane, do you think I can get away with running 9.4.3-P5 that doesn't
> seem to have any known issues. Also what exploit do you think caused my
> original issue?
> As far as running an old version its been stable for a long time and to be
> honest I forgot I was running that version.
> -----Original Message-----
> From: Stephane Bortzmeyer [mailto:bortzmeyer at nic.fr]
> Sent: Monday, May 10, 2010 10:24 AM
> To: P.A
> Cc: bind-users at lists.isc.org
> Subject: Re: KAMINSKY vulnerability !!
> On Mon, May 10, 2010 at 10:05:47AM -0400,
> P.A<razor at meganet.net> wrote
> a message of 242 lines which said:
>> My question is did I just get rid by the kaminsky vulnerability?
> Not at all. The Kaminsky attack poisons the server, it does not crash
>> Primary server: BIND 9.4.3b2
> Why do you run a beta version (and an old one)?
> This issue is known
> <http://firstname.lastname@example.org/msg00323.html> and has
> been fixed in production versions a long time ago.
> bind-users mailing list
> bind-users at lists.isc.org
More information about the bind-users