On 7/28/11 9:43 AM, Stephane Bortzmeyer wrote:
Did you try to obtain an independent confirmation from a reliable
source? (I do not know this product, but I distrust private black
boxes.) I recommend:
NeXpose is a good vulnerability auditor, it is a product by Rapid7 the
owners of metasploit.
Hi Everybody,
My Linux is OpenSuSE 11.4 with Kernel 2.6.37.6-0.5 which is used for
DNS server. I have installed bind-9.7.3P3-0.2.1
Our external auditor used NeXpose for scanning my system. It showed
Insufficient DNS Source Port Randomization Vulnerability. Therefore
I have followed BIND 9
On 28.07.11 15:33, Pete Fong wrote:
My Linux is OpenSuSE 11.4 with Kernel 2.6.37.6-0.5 which is used for
DNS server. I have installed bind-9.7.3P3-0.2.1
Our external auditor used NeXpose for scanning my system. It showed
Insufficient DNS Source Port Randomization Vulnerability.
The
On Thu, Jul 28, 2011 at 03:33:11PM +0800,
Pete Fong petefong2...@gmail.com wrote
a message of 27 lines which said:
I have adjusted named.conf configuration file as below :
query-source address * port * ;
query-source-v6 address * port *;
BIND randomizes properly by default. I would
Hi, Matus UHLAR
No, The scanner PC and DNS server is connected by crossover cable in
my environment. Therefore I have not any idea.
Thanks a lot,
Pete Fong
2011/7/28 Matus UHLAR - fantomas uh...@fantomas.sk:
On 28.07.11 15:33, Pete Fong wrote:
My Linux is OpenSuSE 11.4 with Kernel
If I understand correctly, the connection between the scanner PC and
your DNS server is not really the issue here.
What can cause problems is a firewall between your DNS server and the
Internet.
Danilo
On 07/28/2011 10:08 AM, Pete Fong wrote:
Hi, Matus UHLAR
No, The scanner PC and
6 matches
Mail list logo