Print

Print


Right now, throughout sites on the Internet, there are references to
security issues dealing with the Domain Name System (DNS) daemons
running on a multitude of operating systems.

Via CERT:
	http://www.us-cert.gov/cas/techalerts/TA08-190B.html

Person who (claims) found it:
	http://www.doxpara.com/ (blog)
	http://www.doxpara.com/?p=1162 (specific post where it begins)

The DNS resolvers at ipHouse have been updated to the current
revision(s) of BIND where applicable.  Other systems are being tested
to verify that this vulnerability is not present in the servers at
ipHouse.

I'd like to encourage anyone running their own server(s) to please
look at updating them, regardless of when it was installed or last
updated.  Yes, it is a little more work to double check, and in many
cases, patch or update, but it is good work.

Note: ipHouse does not officially sanction the site of Dan Kaminsky by
any means, just that I believe there is good information in his blog,
as well as some tongue-in-cheek comments.

Support can be reached Monday thru Friday from 8:00am until 8:00pm,
Saturdays from 11:00am until 4:00pm via phone at 612-337-6340, or via
email at [log in to unmask]

-- 
Mike Horwath                                    [log in to unmask]
                         ipHouse - Welcome home!