Very interesting!

The way I have -my- STN set up - (as much as I possibly can) - I have it 
look like a single networked machine connected to my cable modem.  (Or, 
at least this is what I expected!)

I am surprised that the STN DNS is visable to the outside world - as it 
has no reason to be - since it is simply handling DNS resolution on the 
inside of the firewall.

This would be different if the domain consisted of a number of 
real-world-viewable addresses that needed to be resolved externally - 
but (IMHO) the "typical" STN scenerio is not unlike my own:  A small 
internal network, on a non-routable IP space. (I use 172.31.x.x)

In that case, why should the STN DNS server be visable to the outside 
world?

The main reason I did -not- go with the STN provided DNS, is because I 
have a mix of both Wintel and Unix boxes on my network - and by putting 
the DNS on a Windows NT Server box, I can get both DNS and WINS (browser 
& network neibourhood) to talk to each other.

Very interesting......

Jim


[EMAIL PROTECTED] wrote:
> It is visible to the outside world. Port 53 from memory.
> 
> Steve.
> 
> -----Original Message-----
> From: Jim Harris [mailto:[EMAIL PROTECTED]]
> Sent: Sunday, 24 June 2001 13:42
> To: [EMAIL PROTECTED]
> Subject: RE: [STN] Security problem with BIND
> 
> 
> Interesting,
> 
> Which security check did YOU run?
> 
> I have never seen this - but then again, I do not use the DNS provided
> by STN, as I have my own "internal" DNS server that services my internal
> network - and referrs any external DNS questions out to my provider's
> DNS or wherever....
> 
> This implies that the STN DNS server is visable to the outside world?
> Odd, damned odd.  I would not have thought so - as it has no need to be
> visable outside....
> 
> Jim
> 
> Pythonista wrote:
> > I ran a security check on ShareTheNet 2.1.3 and it reported:
> >
> > The remote bind version is : 4.9.7-REL
> > The remote BIND server, according to its
> > version number, is vulnerable to various buffer
> > overflows that may allow an attacker to
> > gain a shell on this host.
> >
> > Solution : upgrade to bind 8.2.3 or 4.9.8
> > Risk factor : High
> >
> > Anyone fixed this?  Any Clues?
> 
> ============================================================
> Get greater power over your finances with NextCard Visa!
> Transfer Balances to rates as low as 2.99% Intro or
> 9.99% Ongoing APR. Don�t wait. Apply Now!
> http://click.topica.com/caaabQDbz8Rp2bAfyIgf/NextCard
> ============================================================
> 
> --
> Visit http://www.ShareTheNet.com for info about ShareTheNet
> Visit http://www.topica.com/lists/sharethenet for info about this list
> To Unsubscribe send email to: [EMAIL PROTECTED]
> 
> 
> 
> 
> 

============================================================
TopOffers. The Smart Shoppers Savings Secret!
Cool savings. Hot deals. Free Stuff.
All right in your in-box.
http://click.topica.com/caaab6fbz8Rp2bAfyICf/TopOffers
============================================================

--
Visit http://www.ShareTheNet.com for info about ShareTheNet
Visit http://www.topica.com/lists/sharethenet for info about this list
To Unsubscribe send email to: [EMAIL PROTECTED]

==^================================================================
EASY UNSUBSCRIBE click here: http://topica.com/u/?bz8Rp2.bAfyIC
Or send an email To: [EMAIL PROTECTED]
This email was sent to: [email protected]

T O P I C A -- Register now to manage your mail!
http://www.topica.com/partner/tag02/register
==^================================================================

Reply via email to