%-> A recent popular method of gaining root access to some
%-> networked machines
%-> involved exploitation of the NXT record buffer overflow in
%-> BIND; it became
%-> so popular in later March that CERT put out a new advisory on
%-> the problem
%-> which had been the subject of an advisory last year. This issue is why
%-> RedHat 6.2 now uses a non-privileged user to run BIND. I
%-> watched several
%-> DNS servers for different domains get hit on the same day, and each time
%-> the intruder started installing one of the DDoS systems.
%->
%-> - rick warner -
I'm seeing a fair few "version.bind" probes on my box... in the process of
shifting to DJB's dnscache and tinydns servers (http://cr.yp.to) which I
hope will be more secure.
-- Juha
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.