[12566] in bugtraq
Re: CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND
daemon@ATHENA.MIT.EDU (Solar Designer)
Sat Nov 13 21:49:03 1999
Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Message-Id: <199911122043.XAA10283@false.com>
Date: Fri, 12 Nov 1999 23:43:08 +0300
Reply-To: Solar Designer <solar@FALSE.COM>
From: Solar Designer <solar@FALSE.COM>
X-To: David_Conrad@ISC.ORG
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <382B1A1C.10F9E41B@isc.org> from "David R. Conrad" at "Nov 11,
99 11:33:48 am"
Hello,
> course, recommend upgrading. In addition, we recommend running your
> nameserver as non-root and chrooted (I know setting this up is non-trivial --
> it'll be much, much easier in BINDv9).
While we're on the topic, there's a patch for running BIND 4.9.7 as
non-root and chrooted, as well as instructions on setting up the
jail, at:
http://www.openwall.com/bind/
Signed,
Solar Designer