[12566] in bugtraq

home help back first fref pref prev next nref lref last post

Re: CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND

daemon@ATHENA.MIT.EDU (Solar Designer)
Sat Nov 13 21:49:03 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Message-Id:  <199911122043.XAA10283@false.com>
Date:         Fri, 12 Nov 1999 23:43:08 +0300
Reply-To: Solar Designer <solar@FALSE.COM>
From: Solar Designer <solar@FALSE.COM>
X-To:         David_Conrad@ISC.ORG
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <382B1A1C.10F9E41B@isc.org> from "David R. Conrad" at "Nov 11,
              99 11:33:48 am"

Hello,

> course, recommend upgrading.  In addition, we recommend running your
> nameserver as non-root and chrooted (I know setting this up is non-trivial --
> it'll be much, much easier in BINDv9).

While we're on the topic, there's a patch for running BIND 4.9.7 as
non-root and chrooted, as well as instructions on setting up the
jail, at:

	http://www.openwall.com/bind/

Signed,
Solar Designer

home help back first fref pref prev next nref lref last post