Blogs

  • 2015 ISC Open Source Accomplishments

    We are proud of another year of solid, responsible maintenance of our three core software products, BIND, ISC DHCP and Kea.   BIND 2015 Releases We issued four BIND9 maintenance releases and twelve security patch releases. In addition we made five releases of our -S edition for subscribers and two experimental releases. The last two types of releases incorporate both features and

    Read more
    0
  • Resolve to become more of a contributor, less of a free-loader, in 2016

    Do you work for an open-source Freeloader? This week is a great time to assess what open source your organization uses, and make sure you are doing ‘your share’ to support these community resources. All tech companies use open source, but not all of them support it.  Everyone loves leveraging open source, but not every organization shows that love in

    Read more
    0
  • ISC Contributions to Internet Organizations

    In addition to all the work we do, maintaining BIND and ISC DHCP, developing Kea and operating F-root and our subsidized SNS and hosting services, ISC employees make a number of contributions to other open source projects and Internet organizations.   Internet Organizations ISOC – David Farber, one of ISC’s Directors, is a current Trustee of the Internet Society. Jeff Osborn,

    Read more
    0
  • Kea to be released under Mozilla Public License 2.0

    In the past, ISC has released all of its open-source software under a simple license that we created. It’s called “The ISC License”; see https://en.wikipedia.org/wiki/ISC_license. The software world has changed in the years since we wrote the ISC license. Hundreds of lawyers have been involved in the writing and editing of open source licenses. There are many and varied licenses

    Read more
    0
  • H-Root will change its addresses on 1 December 2015. What does this mean for you?

      http://h.root-servers.org/renumber.html   The Internet DNS root nameservers are the servers which are authoritative for “.”, the apex of the DNS namespace. They are the starting point for resolving all public names. If you’re running a recursive server, you’re either relying on a built-in set of ‘root hints’, or you will have configured them manually. So isn’t renumbering one of these vital servers a

    Read more
    0
  • CVE-2015-5986: An incorrect boundary check can trigger a REQUIRE assertion failure in openpgpkey_61.c

    CVE: CVE-2015-5986 Document Version: 2.0 Posting date: 02 September 2015 Program Impacted: BIND Versions affected: 9.9.7 -> 9.9.7-P2, 9.10.2 -> 9.10.2-P3. Severity: Critical Exploitable: Remotely Description: An incorrect boundary check in openpgpkey_61.c can cause named to terminate due to a REQUIRE assertion failure.  This defect can be deliberately exploited by an attacker who can provide a maliciously constructed response in answer to a query. Impact: A server which

    Read more
    0
  • CVE-2015-5722: Parsing malformed keys may cause BIND to exit due to a failed assertion in buffer.c

    CVE:  CVE-2015-5722 Document Version:        2.0 Posting date:  2 September 2015 Program Impacted:  BIND Versions affected: BIND 9.0.0 -> 9.8.8,  BIND 9.9.0 -> 9.9.7-P2, BIND 9.10.0 -> 9.10.2-P3 Severity:  Critical Exploitable:  Remotely Description: Parsing a malformed DNSSEC key can cause a validating resolver to exit due to a failed assertion in buffer.c.  It is possible for a remote attacker to deliberately trigger this condition, for example

    Read more
    0
  • What is a BIND Assertion Failure?

    With the recent spate of patch releases of BIND due to security issues, I thought that it was worth putting fingers to keyboard to shed some light on the sources of these problems and what ISC is doing about them. ISC has a formal process for handling reports of security bugs. If we think the reported issue is serious enough,

    Read more
    0
  • About CVE-2015-5477

    As the security incident manager for this particular vulnerability notification, I’d like to say a little extra, beyond our official vulnerability disclosure about this critical defect in BIND.

    Many of our bugs are limited in scope or affect only users having a particular set of configuration choices. CVE-2015-5477 does not fall into that category.

    Read more
    0
  • CVE-2015-5477: An error in handling TKEY queries can cause named to exit with a REQUIRE assertion failure

    A deliberately constructed packet can exploit an error in the handling of queries for TKEY records, permitting denial of service. CVE: CVE-2015-5477 Document Version:          2.0 Posting date:   28 July 2015 Program Impacted:  BIND Versions affected:  9.1.0 -> 9.8.x, 9.9.0->9.9.7-P1, 9.10.0->9.10.2-P2 Severity:  Critical Exploitable:  Remotely Description: An error in the handling of TKEY queries can be exploited

    Read more
    0
  • 2014 Annual Report

    Letter from the President   We are now a trimmer and more functional organization, with financial controls, stability and predictability. We determined that BIND revenues had been subsidizing our other efforts, so we put more back into BIND, adding three DNS engineers in early 2015. On the operations side, we are cutting back on subsidized programs that no longer make

    Read more
    0
  • Resolver DDOS Mitigation

    Early in 2014 a couple of our BIND support customers told us about some intermittent periods of very heavy query activity that swamped their resolvers and asked us for help. It emerged that these were just the first signs of a long series of similar DDOS (Distributed Denial of Service) attacks that began in early 2014 and are continuing today around the Internet.

    Read more
    0

Last modified: November 1, 2016 at 1:25 pm