Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 21 May 2008 11:48:46 -0800
From: Jonathan Smith <smithj@...ethemallocs.com>
To: oss-security@...ts.openwall.com
Subject: Re: Root name server changes -> bind

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Marcus Meissner wrote:
| 	The security consequences of obscure DNS root server usage are
obvious, IMHO.
| 	You might want to consider security updates to the bind package with
an updated
| 	root.hint file. (Since the story is on Slashdot, it is as public as
it can get;
| 	thus I use the regular channel for this request.)

Why did ICANN allow the old IP address to be taken by an untrusted
party? It would seem that IPs formerly used by root DNS servers should
be permanently retired to prevent just this sort of thing.

	smithj

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (GNU/Linux)

iEYEARECAAYFAkg0fJ4ACgkQCG91qXPaRenl1QCfWEVV3nZ7s2J1AKVO23F7CQ2l
uxcAoKp9TR5X4e/hcc5sz1o+bpNVoAla
=ZYQf
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.