Hello Everyone,
Bind9 is a good product and benchmark.
It has good documentation especially about vulnerabilities.
I wonder one thing, nowadays,
For brute force, reflection, ampliciation and etc. attacks, there is
prevention which is name response rate limit (RRL).
Question:
What is the default v
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
https://www.five-ten-sg.com/mapper/bind contains links to the source
rpms, and build instructions.
-BEGIN PGP SIGNATURE-
iHMEAREKADMWIQSuFMepaSkjWnTxQ5QvqPuaKVMWwQUCX8APLhUcY2FybEBmaXZl
LXRlbi1zZy5jb20ACgkQL6j7milTFsEA5gCfSJPL0ftRp+JlrMN4p
On 26.11.20 13:01, Mark Andrews wrote:
The message that generated this thread had the following:
To: upendra.gan...@gmail.com
Cc: bind-users , BIND Users
I have mentioned this 3 days ago, this info apparently got missed.
https://lists.isc.org/pipermail/bind-users/2020-November/103912.html
N
3 matches
Mail list logo