Re : Bind 4.9.6 ~ Current | X86 Exploit

From: Rob Kouwenberg (robkat_private)
Date: Wed Jun 17 1998 - 11:37:38 PDT

  • Next message: Dagmar d'Surreal: "Port 0 oddities"

    Hi !
    
    I was a bit alarmed after this message.
    
    Then I started out bithacking a bit for the following solution (IMHO improvement):
    
    
    Solution : static named compilation & chrooted execution.
    
    Situation :
    OS : BSDi 2.1
    named config files : /var/named
    
    Necessary changes in bind-4.9.7-REL distribution :
    Makefile :
    71c71
    < CC = gcc -static $(CPPFLAGS)
    ---
    > CC = cc $(CPPFLAGS)
    
    
    cp named /var/named/named
    cd /var/named
    chmod 555 named
    mkdir etc
    ln -s ../named.boot etc/named.boot
    mkdir var
    ln -s .. var/named
    
    chroot /var/named /named
    
    $ nslookup www.apple.com
    Server:  triple.stack.nl
    Address:  131.155.141.167
    
    Name:    www.apple.com
    Address:  17.254.0.91
    
    
    Sleeping steady until the real issue is solved.
    
    Tadiho, regards, Rob Kouwenberg
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:58:38 PDT