On Sat, 26 Jul 2008, J Duke wrote:
I realize that the whole fix to this DNS cache poisoning is to have
random ports and random query ids, and that generating good, strong,
random numbers costs cpu cycles and time. Has anyone else noticed the
performance hit? Anything that I can do?
On 7/26/08, J Duke [EMAIL PROTECTED] wrote:
I wonder is anyone is seeing performance issues with the patched DNS in the
late snapshots?
http://marc.info/?l=bind-usersm=121726908015389w=2
On 2008-07-26, J Duke [EMAIL PROTECTED] wrote:
I moved back to an earlier version of OpenBSD on the DNS server, and
the Ironport traffic went up to normal, and the DNS lookup failures stopped.
Cpu utilization went back down to around 9%. But I'm vulnerable.
Sending spam seems a good way to
On Sat, Jul 26, 2008 at 4:12 PM, J Duke [EMAIL PROTECTED] wrote:
I wonder is anyone is seeing performance issues with the patched DNS in the
late snapshots?
I installed the July 22 snapshot on our DNS servers, which handle a pretty
heavy load of lookups, mostly for anti-spam action.
It was
I wonder is anyone is seeing performance issues with the patched DNS in the
late snapshots?
I installed the July 22 snapshot on our DNS servers, which handle a pretty
heavy load of lookups, mostly for anti-spam action.
It was running at 45% or higher cpu utilization after the July 22 snapshot
was
:[EMAIL PROTECTED] On Behalf
Of J Duke
Sent: Sunday, July 27, 2008 12:13 AM
To: misc@openbsd.org
Subject: Performance issues with the DNS patch?
I wonder is anyone is seeing performance issues with the patched DNS in
the
late snapshots?
I installed the July 22 snapshot on our DNS servers
6 matches
Mail list logo