Dan,

> This NXT buffer overflow isn't part of some old code that Paul Vixie
> inherited from careless graduate students. It's new code.

Actually, most of the code is derived from a prototype DNSSEC implementation
done by John Gilmore and TIS quite a while back.  TIS (sorry, Network
Associates) contributed the revised implementation for the 8.2 release.

> Obviously ISC's auditing is inadequate.

For BINDv8, yes, it obviously was.

> Is ISC going to
> rewrite the client and server in a way that gives us confidence in
> their security?

BIND version 9 is a complete rewrite with an attempt to focus on
compartmentalization and auditability of the code.

Regards,
-drc

Reply via email to