<<<
Chronological Index
>>> <<<
Thread Index
>>>
Re: [ga] Bindv9/DNS updated security Vulnerabilities - Sans/FBI's Top 20
- To: Jeff Williams <jwkckid1@xxxxxxxxxxxxx>
- Subject: Re: [ga] Bindv9/DNS updated security Vulnerabilities - Sans/FBI's Top 20
- From: Stephane Bortzmeyer <bortzmeyer@xxxxxx>
- Date: Fri, 10 Oct 2003 09:38:16 +0200
- Cc: ga@xxxxxxxxxxxxxx
- In-reply-to: <3F86508A.F226D5A4@ix.netcom.com>
- Organization: NIC France
- References: <3F86508A.F226D5A4@ix.netcom.com>
- Sender: owner-ga@xxxxxxxxxxxxxx
- User-agent: Mutt/1.5.4i
On Thu, Oct 09, 2003 at 11:24:10PM -0700,
Jeff Williams <jwkckid1@xxxxxxxxxxxxx> wrote
a message of 21 lines which said:
> In light of the site finder mess, one also may want
> to consider the below listed more serious problem...
>
> See: http://www.sans.org/top20/oct02.php#U9 - Read completely
Excellent reading for every name server administrator. I would add
something: do not put all your eggs in the same basket (before BIND,
sendmail had a quasi-monopoly on one critical function and many
problems came from that before Postfix took a part of the
market). Excellent free software like nsd
<URL:http://www.nlnetlabs.nl/nsd/index.html> or PowerDNS
<URL:http://www.powerdns.com/> can replace BIND for some of its
functions.
<<<
Chronological Index
>>> <<<
Thread Index
>>>
|