Community discussions

MikroTik App
 
User avatar
kometchtech
Member Candidate
Member Candidate
Topic Author
Posts: 194
Joined: Sat Jun 15, 2013 4:25 am
Location: Japan
Contact:

[security] DNS vulnerability check

Sat Dec 19, 2015 4:24 pm

Hello, support

Thought on the Routerboard DNS BIND is used, the following CVE was issued.
Will the impact of this vulnerability is not in the DNS of the Routerboard?

https://kb.isc.org/article/AA-01317

My best regards.
 
User avatar
kometchtech
Member Candidate
Member Candidate
Topic Author
Posts: 194
Joined: Sat Jun 15, 2013 4:25 am
Location: Japan
Contact:

Re: [security] DNS vulnerability check

Tue Dec 22, 2015 9:55 am

Incident resolution.

Do not use BIND you to support it.
It is likely no effect.
 
Zorro
Long time Member
Long time Member
Posts: 675
Joined: Wed Apr 16, 2014 2:43 pm

Re: [security] DNS vulnerability check

Tue Dec 22, 2015 10:42 am

"do not use bind or dnsmasq" was Excellent advice in last ~12years atleast.
even before code become More and MORE bloated and buggy, even before Phyton-written abominations become cornerstone of UB-NG.
so DJBDNS, UNBOUND or NSD was eventually become your best friend aswell as some other closed-source things, sometimes.
for nearly 25yrs all ISC-affected/guided/made things/software become/remain quite insecure and same exploitations was used since DNS creation, thus with ample impact/damage.

Who is online

Users browsing this forum: Bing [Bot], pav5, shahzaddj1 and 186 guests