In fact, the ONLY reason that the name "bind9" was ever even coined
at all was because the changes from bind8 both in the syntax of the
config file and how the program operated they wanted to boot admins
in the behind to get them to change their config files. It should
have been put to bed as a name a long time ago, or named "bind
version 9" like every other software program does with their versions.
On 17 Jul 2020, at 11:56, Ted Mittelstaedt <tedm@ipinc.net> wrote:
In fact, the ONLY reason that the name "bind9" was ever even coined
at all was because the changes from bind8 both in the syntax of the
config file and how the program operated they wanted to boot admins
in the behind to get them to change their config files.
This. Exactly this.
And for what it's worth, not all systems moved away from "named" to
"bind9". I've been running FreeBSD for decades, and I can't remember
ever calling the service "bind9".
And for what it's worth, not all systems moved away from "named" toThe service is always named, the package is bind. I stopped adding the 9 many years ago unless I need to specify a specific version like "bind nine dot eleven".
"bind9". I've been running FreeBSD for decades, and I can't remember
ever calling the service "bind9".
When FreeBSD was used mostly for servers it wasn't a problem. But moreBind is a poor choice for desktop use. Packages like unbound are much better for that sort of use, and it is fr less critical if those packages have security issues.
and more people are using it for desktop use where they want to basically install it and forget about it, never run patches, never give
a fig about security.
On 7/17/2020 11:35 AM, John W. Blue wrote:
Speaking about things to be annoyed over ..
I am still ticked that FreeBSD dropped BIND from the distribution for
something called unwinding or whatever it is.
I'm not happy that happened either but the simple fact is that if BIND
would quit dropping support so fast for it's older versions that never
would have happened.-a The fundamental problem was that BIND dropped
support for it's older versions before the distros dropped support for
their distros.-a This is happening with a lot of other software packages.
When FreeBSD was used mostly for servers it wasn't a problem.-a But more
and more people are using it for desktop use where they want to
basically install it and forget about it, never run patches, never give
a fig about security.-a Simpler programs like Unbound have less code
and so less things to go wrong, need less patches, and are easier to
support for a longer period of time so they get supported for a longer
period of time.-a Also, Unbound's main purpose in life is as a caching
dns program.-a Nobody who runs a server on FreeBSD uses Unbound.
On 21 Jul 2020, at 18:23, @lbutlr <kremels@kreme.com> wrote:Anything that talks to the net is critical path from a security perspective.
On 20 Jul 2020, at 10:09, tale <d.lawrence@salesforce.com> wrote:
And for what it's worth, not all systems moved away from "named" to
"bind9". I've been running FreeBSD for decades, and I can't remember
ever calling the service "bind9".
The service is always named, the package is bind. I stopped adding the 9 many years ago unless I need to specify a specific version like "bind nine dot eleven".
On 20 Jul 2020, at 11:45, Ted Mittelstaedt <tedm@ipinc.net> wrote:
When FreeBSD was used mostly for servers it wasn't a problem. But more
and more people are using it for desktop use where they want to basically install it and forget about it, never run patches, never give
a fig about security.
Bind is a poor choice for desktop use. Packages like unbound are much better for that sort of use, and it is fr less critical if those packages have security issues.
I agree that anyone using a FreeBSD install as a server should be using bind, but I also agree it should not be the default install. You install bind when you figure out you need it, and not before.
--
Mickey and Mallory know the difference between right and wrong; the
just don't give a damn.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list
ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information.
bind-users mailing list--
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
On 21 Jul 2020, at 18:23, @lbutlr <kremels@kreme.com> wrote:There are different levels of critical, and unbound is a lot further down that list that bind.
Bind is a poor choice for desktop use. Packages like unbound are much better for that sort of use, and it is fr less critical if those packages have security issues.
Anything that talks to the net is critical path from a security perspective.
On 22 Jul 2020, at 08:23, @lbutlr <kremels@kreme.com> wrote:I would beg to differ. From an exposure perspective they are identical. They both ask questions onto the network and both have to parse and process those answers. They both produce similar CVSS scores, which are a much more objective way of analysis the need to pay attention to a security issues. BIND and UNBOUND both have had CVSS scores of 7.5
On 21 Jul 2020, at 06:37, Mark Andrews <marka@isc.org> wrote:
On 21 Jul 2020, at 18:23, @lbutlr <kremels@kreme.com> wrote:
Bind is a poor choice for desktop use. Packages like unbound are much better for that sort of use, and it is fr less critical if those packages have security issues.
Anything that talks to the net is critical path from a security perspective.
There are different levels of critical, and unbound is a lot further down that list that bind.
--
We are born naked, wet and hungry; then it's all downhill.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list
ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information.
bind-users mailing list--
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
Distributions also need to look at their own practices. They ask us
to supply long term support but do not actually integrate the
maintenance releases but instead cherry-pick just the security fixes. Maintenance is not just security fixes. That means that we keep
seeing bug reports that need to be diagnosed about bugs we have fixed
years ago. That really isnrCOt a good use of peoples time. Not ours,
not the distributions maintainers nor the users time. Is there
little wonder that we stop producing bug fixes releases for old
version when the distributions donrCOt use them?
Linux is 10 times worse because they aren't even including the cEvery distribution I've laid my hands on so far has GCC packages and
compiler or development tools
anymore.
But many "systemadmins" out there think they are Unix admins
yet are afraid to compile programs.-a They will go to the FreeBSD port or
the Linux precompiled apt-get stuff.-a The reason is more and more non-technical people are getting their hands on this stuff.
On 7/23/20 6:28 AM, Ted Mittelstaedt wrote:
Linux is 10 times worse because they aren't even including the cEvery distribution I've laid my hands on so far has GCC packages and
compiler or development tools
anymore.
most development packages affixed with either -dev or -devel (most of
the time).
But many "systemadmins" out there think they are Unix admins
yet are afraid to compile programs. They will go to the FreeBSD port or
the Linux precompiled apt-get stuff. The reason is more and more
non-technical people are getting their hands on this stuff.
I don't disagree with this but I also think there's more to it than
that. For me personally I avoid compiling from source when I can get
away with it - not because I can't run make - but simply because binary packages are convenient. Having a package manager take care of updates
in the whole system is convenient. Having distribution maintainers that
say "okay we are going to go stable, bleeding edge or whatever with the
whole project" is useful when they can spend the time looking at the
upstream projects, and choose the most fitting software versions and
such to suit that goal. And when there's billions of machines running
very similar architectures, there is an argument to be made that making
every single one of them compile everything from source is rather
pointless. Why should every machine in existence be tasked with
CPU-intensive compilation workloads when a handful of dedicated
compilation servers can do exactly that, and a million times better?
On 20 Jul 2020, at 11:45, Ted Mittelstaedt <tedm@ipinc.net> wrote:
When FreeBSD was used mostly for servers it wasn't a problem. But more
and more people are using it for desktop use where they want to basically install it and forget about it, never run patches, never give
a fig about security.
Bind is a poor choice for desktop use. Packages like unbound are much better for that sort of use, and it is fr less critical if those packages have security issues.
I agree that anyone using a FreeBSD install as a server should be using bind, but I also agree it should not be the default install. You install bind when you figure out you need it, and not before.
--
Mickey and Mallory know the difference between right and wrong; the
just don't give a damn.
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list
ISC funds the development of this software with paid support subscriptions. Contact us at https://www.isc.org/contact/ for more information.
bind-users mailing list--- Synchronet 3.21d-Linux NewsLink 1.2
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users
[...]
With my internal BIND servers now running on Alpine (because super lightweight), that blurs the lines a bit.
Perhaps slightly OT, but here's a company which has a whole business--
model based on one nonobvious (?) reason to compile from source: https://polyverse.com/
--
Fred Morris
Caveat: i'm far from an expert on compiling, linking, disassembling,
etc... (in fact i know *very* little about these domains), so it's
possible my comment/question below won't even really make sense.
Still, i'm not going to learn more without asking, so...
On 7/23/20 9:49 AM, Michael De Roover wrote:
The idea is pretty interesting, seems like they provide a repository
with packages compiled with their own compiler that changes various
memory-related elements. It is true that memory is usually the culprit
behind security flaws.
On 7/23/20 9:49 AM, Michael De Roover wrote:
[...][...]
For this to work at all though, they'd have to provide all packages
simply as source code (why not use the distribution's own source
repositories?) and compile it on the target.
While it would still *technically* be security by obscurity, it would
seem to me that there's some value to this approach because access to
the compiled binary wouldn't necessarily be easy to obtain (especially
if the sysadmin provisioning the system takes extra efforts to *not*
share it with anyone). Or am i missing something?
While it would still *technically* be security by obscurity, it would
seem to me that there's some value to this approach because access to
the compiled binary wouldn't necessarily be easy to obtain (especially
if the sysadmin provisioning the system takes extra efforts to *not*
share it with anyone). Or am i missing something?
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 65 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 03:56:40 |
| Calls: | 862 |
| Files: | 1,311 |
| D/L today: |
817 files (9,660M bytes) |
| Messages: | 264,528 |