Blogs

  • Codenomicon Testing for BIND

    Our users value stability and security above anything else, when it comes to BIND.  Every time we have to issue a security advisory we are inconveniencing thousands of network administrators.  We also know they would rather be informed if there is some way to compromise or crash BIND.  So, when we read that Codenomicon discovered the Heartbleed bug in OpenSSL, we decided to

    Read more
    0
  • Recent ISC Network Update

    We apologize for our recent network problems. Beginning at 2 AM Pacific time yesterday, most if not all, of the links serving ISC were saturated with DDoS attack traffic targeted at one of our Hosted@ and SNS-Public Benefit customers. We’re largely back on-line, as of late last evening yesterday. We have communicated to our Hosted@ customers via the “noc-notice”, and in response

    Read more
    0
  • DNSSEC Key Security Webinar Scheduled for July 8th, 10 AM PST

    We held the webinar, and the recording is posted here. This webinar is a joint presentation with ISC and Thales e-Security, who will discuss using their nShield HSM in conjunction with BIND. Because DNS was never designed with security in mind, inherent DNS vulnerabilities pose a risk to all Internet services. To counter these risks, DNSSEC is being deployed across

    Read more
    0
  • Kea DHCP Server mailing lists added

    We are actively working on Kea, our new DHCP server.  Following the conclusion of the BIND 10 project, we are removing the Kea application from the BIND 10 framework, which we are no longer maintaining.  Kea will be ready for production deployment in 2015, and is intended to eventually replace our current ISC DHCP server implementation. The Kea project team

    Read more
    0
  • BIND 9.10 – DNSSEC, Crypto and Changes to Existing Behavior

    This is the last of three blog posts introducing the new features in BIND 9.10.  With BIND 9.10 we continue improving DNSSEC support. For the complete list of new features, see the 9.10 Release Note. DNSSEC Improvements PKCS#11 API for direct control of HSM.  A new compile-time option (“configure –enable-native-pkcs11″) allows the BIND 9 cryptography functions to use the PKCS#11

    Read more
    0