bind chrooted, logging and SELinux = suffering
Fred Viles
fv+abuse at nospam.usen.epitools.com
Thu Jun 2 16:32:36 UTC 2005
Jason Vas Dias <jvdias at redhat.com> wrote in
news:d7n7d1$16ol$1 at sf1.isc.org:
>> >On Wed, 2005-06-01 at 12:17, Pete Ehlke wrote:
>> >> On Wed Jun 01, 2005 at 11:46:16 -0400, Jason Vas Dias wrote:
>> >> >
>> >> >By default, Red Hat ships BIND with maximum security
>> >> >protection enabled, to counter known security
>> >> >vulnerabilities as mandated by our security response team.
>> >> >
>> >> You know, the 'known security vulnerabilities' chestnut just
>> >> keeps popping up. Please tell me- what 'known security
>> >> vulnerabilities' have you identified in current versions of
>> >> BIND?
>>...
> No problem - you did ask for the reasons for our BIND SELinux
> policy.
No, he didn't. Reread. He asked you to list the "known security
vulnerabilities" in BIND that you referred to.
| I tried to explain them to you.
But you didn't attempt to answer his question. You'd make a good
politician.
- Fred
More information about the bind-users
mailing list