[182899] in North American Network Operators' Group
Re: Exploits start against flaw that could hamstring huge swaths of
daemon@ATHENA.MIT.EDU (Jim Popovitch)
Tue Aug 4 11:15:56 2015
X-Original-To: nanog@nanog.org
In-Reply-To: <59E8C16E83D82B439E20698AAC790B5F01384CE23E@ma45>
Date: Tue, 4 Aug 2015 11:15:54 -0400
From: Jim Popovitch <jimpop@gmail.com>
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
On Tue, Aug 4, 2015 at 11:06 AM, Leonardo Oliveira Ortiz
<leonardo.ortiz@marisolsa.com> wrote:
> So, you guys recommend replace Bind for another option ?
The humorous thing is that the security researcher who showed the
recent bind9 error (note: it isn't a vulnerability or a hack, it's
just a way to remotely crash named), well, he criticized bind9 for
doing more than simple basic name services. So, it's very easy to
find bind9 alternatives if you are only looking for basic minimal DNS
functionality. But once you start looking for features... well there
aren't many options.
-Jim P.