Blogs

  • Completion of BIND 10 Initial Development Program delivers Basis of ISC Next Generation Nameserver Software

    Internet Systems Consortium (ISC) is pleased to announce the completion of a multi-year software development program funded by JPRS and other key sponsors.  The next generation nameserver software framework is available as the BIND 10 distribution, http://bind10.isc.org/wiki/ProductionRelease, which has been well received by sponsors and the open source community. “We are proud to have been able to work closely with

    Read more
    0
  • ISC wraps up Open Home Gateway Forum

    Following a successful public demonstration at the 88th Internet Engineering Task Force (IETF) meeting November 2013, ISC’s Open Home Gateway Forum team has submitted its code for package signing and validation to the OpenWrt project. ISC is now disbanding the Open Home Gateway Forum since this code has been completed. Comcast and ISC created the Open Home Gateway Forum (OHGF)

    Read more
    0
  • The Crypto Library Disaster

    At the first time someone writes (or contributes to, so this does not apply only to first systems) an application using low level cryptography, (s)he has the choices between two bad and two very bad solutions. This blog explains the reasons of this recurrent disaster and tries to give some idea to avoid it… The worst possible solution is of

    Read more
    0
    0
  • ISC DHCP 4.3.0a1 now available

    We have now released ISC DHCP 4.3.0a1. The theme for this release is “v6 uplift”. We are upgrading some of the features you’ve used for DHCPv4 to make them available for DHCPv6. In general we’ve tried to use the same commands or similar commands so that moving from a DHCPv4 feature to DHCPv6 is as painless as possible. Over time we plan to add several

    Read more
    0
    0
  • Happy Birthday to ISC’s DHCP4

    On November 29th ISC’s DHCP4 will turn 18. The first code for the DHCP project was committed to the source repository by Ted Lemon on 1995-11-29. Over the years, our contributors have committed over 9,500 changes, covering everything from small bug fixes to major enhancements. Today, our DHCP code supports clients, relays and servers for both DHCPv4 and DHCPv6. Looking forward, our next

    Read more
    0
    0
  • BIND 9’s Security Record

    Introduction BIND 9 has an image problem. In fact, BIND of any version has had an image problem since at least the mid-1990’s, when the Internet stopped being a military/educational playground and turned commercial. That’s when security became an issue in a lot of places where people didn’t have to worry about it in the past. That’s when BIND started

    Read more
    0
    0
  • What’s Your Version?

    Who knew? We sure didn’t, and that’s why we’re asking. ISC has been providing BIND and ISC DHCP software for over 15 years now.  Publicly-available sources put our market share at over 80%, meaning our users come from a wide variety of industries and skill levels, but all depend on BIND.  In order to gain a better understanding of how

    Read more
    0
    0
  • Internet Systems Consortium Renews Commitment to BIND as Open Source – Jeff Osborn named President

    Internet Systems Consortium’s (ISC) Board of Directors named Jeff Osborn as Executive Director with the explicit goal of ensuring production-­‐ quality, fully featured nameserver software is available as open source, with no financial barriers to its use. Osborn will also serve as President of DNSco, ISC’s commercial subsidiary. “I am both thrilled and humbled to be trusted with the task

    Read more
    1
  • Happy 30th Birthday, GNU!

    Happy 30th Birthday GNU Project!

    Read more
    0
    0
  • BIND 9.9.4 Released

    ISC is excited to announce the release of BIND 9.9.4, featuring Response Rate Limiting (RRL), security patches, and bug fixes for DNSSEC, RPZ and configuration modules. The latest dot release ensures the stability, robustness and security of your critical Internet infrastructure. Response Rate Limiting (RRL) A DNS DDoS attack works by forging queries that look like they came from the

    Read more
    0
    0
  • Cache poisoning gets a second wind from RRL? Probably not.

    You may have heard recently that Response Rate Limiting (RRL) has re-opened the door on cache poisoning attacks (see CVE-2013-5661). ISC acknowledges that RRL can increase the effectiveness of cache poisoning attacks and appreciates the detailed research that uncovered it.  This is, however, only one piece in the larger context of competing security concerns, and each operator will need to

    Read more
    0
    0
  • ISC adds DDoS defense module to BIND software

    Internet Systems Consortium (ISC) announces that the RRL module, currently the most effective defense against the use of DNS in Distributed Denial of Service attacks, is now part of the upcoming BIND release. A DNS DDoS attack works by forging queries that look like they came from the victim’s server, making it appear to be requesting a high volume of

    Read more
    2
    0

Last modified: September 26, 2016 at 6:34 pm