back to article Critical BIND bug scores PATCH YESTERDAY grading

Gird your loins internet: Attackers now have the ability to disrupt large swathes of the web through a remote denial of service vulnerability found in the most widely used software for DNS servers. The BIND bug (CVE-2015-5477) patched overnight affects all DNS servers running the software, and can be attacked with ease. In …

  1. Anonymous Coward
    Anonymous Coward

    Mix your DNS

    There are plenty of authoritative DNS servers out there - bind, powerdns, djbdns, knot, nsd etc

    Since you need to have at least two DNS servers for resilience, run them with different software. Then when a bug like this comes along you're much less likely to be knocked off the face of the Internet.

  2. Raedwald Bretwalda

    "Unix platforms that are not typically patched as often as other systems"

    [citation needed]

    1. Anonymous Coward
      Anonymous Coward

      Consider all those home routers that come with built-in dns servers. Most will never get a patch for this at all.

      1. Glen Turner 666

        Home routers...

        Those home router DNS servers are unlikely to have run BIND as their DNS forwarder.

  3. Nate Amsden

    good for me I guess

    My DNS provider patched 2 days ago, yesterday wasn't good enough for them!

    https://www.dynstatus.com/incidents/r5xcrytxpb0k

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like