25
Before your DNS servers lock up it is time to patch BIND
Domain Name System (DNS) security problems have lately been causing important Distributed Denial of Service (DDoS) attacks. After in 2016, the biggest DDoS attack knocked on tens-of-thousands of sites off the internet. Thus, when the Internet Systems Consortium (ISC) releases patches for three important BIND DNS security issues, you should patch it……
BIND is the most famous web DNS server. Like all DNS servers, it interprets human-readable domain names, including www.zdnet.com, into IP addresses. It is additionally used in nearly all Linux and Unix-based servers. In a nutshell, in the event you are running DNS, particularly on Linux, you are running BIND.
In recursive manner, by querying upstream important DNS servers when it can not find an answer in its local cache, the BIND server attempts to work out the address. Important DNS servers are, relatively speaking, more resistant to attacks from these security holes.
By good fortune, most Linux distributions have released patches for this particular trio of problem. I strongly recommend that system administrators patch this “significant” BIND security issue when possible.
There are no comments.