bind chrooted, logging and SELinux = suffering

Fred Viles fv+abuse at nospam.usen.epitools.com
Thu Jun 2 16:32:36 UTC 2005


Jason Vas Dias <jvdias at redhat.com> wrote in
news:d7n7d1$16ol$1 at sf1.isc.org: 

>> >On Wed, 2005-06-01 at 12:17, Pete Ehlke wrote:
>> >> On Wed Jun 01, 2005 at 11:46:16 -0400, Jason Vas Dias wrote:
>> >> >
>> >> >By default, Red Hat ships BIND with maximum security
>> >> >protection enabled, to counter known security
>> >> >vulnerabilities as mandated by our security response team.
>> >> >
>> >> You know, the 'known security vulnerabilities' chestnut just
>> >> keeps popping up. Please tell me- what 'known security
>> >> vulnerabilities' have you identified in current versions of
>> >> BIND? 
>>...
> No problem - you did ask for the reasons for our BIND SELinux
> policy.

No, he didn't.  Reread.  He asked you to list the "known security 
vulnerabilities" in BIND that you referred to.

| I tried to explain them to you.

But you didn't attempt to answer his question.  You'd make a good 
politician.

- Fred



More information about the bind-users mailing list