Sponsored Content
Special Forums Cybersecurity Dns cache poisoning upgrade to bind9.5.0p2 Post 302224668 by amsct on Wednesday 13th of August 2008 04:02:25 PM
Old 08-13-2008
Depending on your current Bind versions, you might need to specify some configuration items explicitly inside the options block in named.conf:

- allow-query and allow-transfer
- check-names
- minimal-responses
- transfer-format
See Upgrading DNS Bind to 9.5.0 p2 | Unixplaza Blog
 

4 More Discussions You Might Find Interesting

1. IP Networking

how can we spoof ethernet by ARP cache poisoning on unix through a program

how can we spoof ethernet by ARP cache poisoning on unix through a program... can anyone post the source code to achieve this... (1 Reply)
Discussion started by: ud4u
1 Replies

2. IP Networking

DNS upgrade issues, bind9.5.0_P1

so we had bind 9.3.0... we upgraded to 9.5.0 patch 1 we kept the exact same named.conf now we have a problem that some DMZ server cant do lookups from our DNS slave anymore. in the named.log we see things like this: 22-Jul-2008 16:05:04.694 security: info: client <our DMZ servers... (2 Replies)
Discussion started by: robsonde
2 Replies

3. Solaris

Bind9 DNS on Solaris 10 x4270 & CPU usage

I have configured a Bind9 DNS on a X4270 machine with Solaris10 I am excuting some repformance tests with DNSPERF tool and maximun CPU usage is 23%. I have seen with prstat -L -p PID that named process usses only 2 of the 8 available CPU at the same time although threads for all CPUs exist.... (2 Replies)
Discussion started by: parisph
2 Replies

4. Solaris

DNS Cache Problem-Urgent !!!!!!

I have DNS Server running in solaris 10 . There is website called exaple.com ,whcih was hosted in this dns server with IP 1.2.3.4 ,now we deleted the DNS entry of that website from our DNS Server (db.exmaple.com is deleted from named.conf ) and it is hosted with some other name server with IP... (1 Reply)
Discussion started by: sandeep.tk
1 Replies
unattended-upgrade(8)					      System Manager's Manual					     unattended-upgrade(8)

NAME
unattended-upgrade - automatic installation of security (and other) upgrades SYNOPSIS
unattended-upgrade [options] DESCRIPTION
This program can download and install security upgrades automatically and unattended, taking care to only install packages from the config- ured APT source, and checking for dpkg prompts about configuration file changes. All output is logged to /var/log/unattended-upgrades.log. This script is the backend for the APT::Periodic::Unattended-Upgrade option and designed to be run from cron (e.g. via /etc/cron.daily/apt). OPTIONS
unattended-upgrade accepts the following options: -h, --help help output -d, --debug extra debug output into /var/log/unattended-upgrades.log --dry-run Just simulate installing updates, do not actually do it CONFIGURATION
The configuration is done via the apt configuration mechanism. The default configuration file can be found at /etc/apt/apt.conf.d/50unat- tended-upgrades AUTHORS
unattended-upgrade is written by Michael Vogt <mvo@ubuntu.com> This manual page was originally written by Michael Vogt <mvo@ubuntu.com> COPYRIGHT
Copyright (C) 2005-2009 Canonical There is NO warranty. You may redistribute this software under the terms of the GNU General Public License. For more information about these matters, see the files named COPYING. May 4, 2009 unattended-upgrade(8)
All times are GMT -4. The time now is 09:06 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy