RE: KAMINSKY vulnerability !!

2010-05-10 Thread Paul Amaral
...@nic.fr] Sent: Monday, May 10, 2010 10:25 AM To: P.A Cc: bind-users@lists.isc.org Subject: Re: KAMINSKY vulnerability !! On Mon, May 10, 2010 at 10:19:33AM -0400, P.A wrote a message of 314 lines which said: > I think I see what the issue is, No. Completely unrelated. >

Re: KAMINSKY vulnerability !!

2010-05-10 Thread JINMEI Tatuya / 神明達哉
At Mon, 10 May 2010 10:05:47 -0400, "P.A" wrote: > Today I came in and both my name server stopped answering queries. I > restarted the servers a couple of times and they are now up. I have posted > the primary/slave look below. My question is did I just get rid by the >

RE: KAMINSKY vulnerability !!

2010-05-10 Thread P.A
...@nic.fr] > Sent: Monday, May 10, 2010 10:24 AM > To: P.A > Cc: bind-users@lists.isc.org > Subject: Re: KAMINSKY vulnerability !! > > On Mon, May 10, 2010 at 10:05:47AM -0400, > P.A wrote > a message of 242 lines which said: > > >> My question is did I jus

Re: KAMINSKY vulnerability !!

2010-05-10 Thread Kevin Darcy
sers@lists.isc.org Subject: Re: KAMINSKY vulnerability !! On Mon, May 10, 2010 at 10:05:47AM -0400, P.A wrote a message of 242 lines which said: My question is did I just get rid by the kaminsky vulnerability? Not at all. The Kaminsky attack poisons the server, it does not crash

RE: KAMINSKY vulnerability !!

2010-05-10 Thread P.A
ginal Message- From: Stephane Bortzmeyer [mailto:bortzme...@nic.fr] Sent: Monday, May 10, 2010 10:24 AM To: P.A Cc: bind-users@lists.isc.org Subject: Re: KAMINSKY vulnerability !! On Mon, May 10, 2010 at 10:05:47AM -0400, P.A wrote a message of 242 lines which said: > My question is di

Re: KAMINSKY vulnerability !!

2010-05-10 Thread Alan Clegg
On 5/10/2010 10:19 AM, P.A wrote: > Primary server: BIND 9.4.3b2 Continue your upgrade process to a version of BIND that is supported. :) http://www.isc.org/software/bind/versions AlanC signature.asc Description: OpenPGP digital signature ___ bind-

Re: KAMINSKY vulnerability !!

2010-05-10 Thread Stephane Bortzmeyer
On Mon, May 10, 2010 at 10:05:47AM -0400, P.A wrote a message of 242 lines which said: > My question is did I just get rid by the kaminsky vulnerability? Not at all. The Kaminsky attack poisons the server, it does not crash it. > Primary server: BIND 9.4.3b2 Why do you run a beta v

Re: KAMINSKY vulnerability !!

2010-05-10 Thread Stephane Bortzmeyer
On Mon, May 10, 2010 at 10:19:33AM -0400, P.A wrote a message of 314 lines which said: > I think I see what the issue is, No. Completely unrelated. > http://www.kb.cert.org/vuls/id/725188 In that case, the error was: Jul 29 09:10:57 lilith named[2428]: db.c:619: \ REQUIRE(type

RE: KAMINSKY vulnerability !!

2010-05-10 Thread P.A
, May 10, 2010 10:06 AM To: 'bind-users@lists.isc.org' Subject: KAMINSKY vulnerability !! Hi, list. Today I came in and both my name server stopped answering queries. I restarted the servers a couple of times and they are now up. I have posted the primary/slave look below. My qu

KAMINSKY vulnerability !!

2010-05-10 Thread P.A
Hi, list. Today I came in and both my name server stopped answering queries. I restarted the servers a couple of times and they are now up. I have posted the primary/slave look below. My question is did I just get rid by the kaminsky vulnerability? if so how can I determined what host caused