In message <[email protected]>, Stephane Bortzmeyer writes:
> On Wed, Jul 29, 2009 at 04:25:18PM +0000,
>  Evan Hunt <[email protected]> wrote 
>  a message of 16 lines which said:
> 
> > Due to a combination of circumstances, including extreme rush and
> > the usual signer of our releases being away at IETF, we accidentally
> > signed yesterday's BIND 9 patch releases (9.4.3-P3, 9.5.1-P3, and
> > 9.6.1-P1) with the expired 2006 ISC signing key
> 
> How many people checked them? Probably not a lot since I did not saw
> reports "BIND releases corrupted!". It tells a lot about Internet
> security. And makes me seriously worry for the future when DNSSEC will
> be deployed...

        It also depended apon whether you had refreshed the keys
        on your keyring recently or not as to whether it is reported
        as expired or not.

        Most users do indirect verification by having just a hash
        which the maintainer for the package creates.  The end user
        assumes the maintainer checks the validity before creating
        the hash.

        Mark

> _______________________________________________
> bind-users mailing list
> [email protected]
> https://lists.isc.org/mailman/listinfo/bind-users
-- 
Mark Andrews, ISC
1 Seymour St., Dundas Valley, NSW 2117, Australia
PHONE: +61 2 9871 4742                 INTERNET: [email protected]
_______________________________________________
bind-users mailing list
[email protected]
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to