> > ISC began work on the -P1 patches immediately upon being made aware of > > the Kaminsky vulnerability. Our immediate goal was to make patches > > publicly available as soon as possible. During the development cycle we > > became aware of a potential performance issue > > A very different way of presenting the same facts: > > http://www.zdnet.com.au/news/security/soa/DNS-patch-causes-BIND-blunder/0,130061744,339290928,00.htm
i think their way of describing these events will sell more newspapers than my way of describing these events, and they're not expecting me to blame them for that difference, and in fact, i'm too busy to much care. -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
