[12582] in bugtraq

home help back first fref pref prev next nref lref last post

Re: BIND bugs of the month

daemon@ATHENA.MIT.EDU (David R. Conrad)
Sun Nov 14 16:43:43 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
Message-Id:  <382EFBBA.9F897FEE@isc.org>
Date:         Sun, 14 Nov 1999 10:13:14 -0800
Reply-To: "David R. Conrad" <David_Conrad@ISC.ORG>
From: "David R. Conrad" <David_Conrad@ISC.ORG>
X-To:         "D. J. Bernstein" <djb@CR.YP.TO>
To: BUGTRAQ@SECURITYFOCUS.COM

Dan,

> This NXT buffer overflow isn't part of some old code that Paul Vixie
> inherited from careless graduate students. It's new code.

Actually, most of the code is derived from a prototype DNSSEC implementation
done by John Gilmore and TIS quite a while back.  TIS (sorry, Network
Associates) contributed the revised implementation for the 8.2 release.

> Obviously ISC's auditing is inadequate.

For BINDv8, yes, it obviously was.

> Is ISC going to
> rewrite the client and server in a way that gives us confidence in
> their security?

BIND version 9 is a complete rewrite with an attempt to focus on
compartmentalization and auditability of the code.

Regards,
-drc

home help back first fref pref prev next nref lref last post