Trusty bind9 RRL
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
bind9 (Ubuntu) |
Fix Released
|
High
|
Unassigned |
Bug Description
It would be nice if the bind9 package for trusty included the --enable-rrl option to mitigate DNS amplification attacks and other DOS style attacks. ISC has already included this in the upstream code and the --enable-rrl option needs to be added to the configure statement.
https:/
adding the following to /etc/bind/
rate-limit {
};
Mar 6 07:28:56 ubuntu named[23914]: loading configuration from '/etc/bind/
Mar 6 07:28:56 ubuntu named[23914]: /etc/bind/
Mar 6 07:28:56 ubuntu named[23914]: loading configuration: failure
Mar 6 07:28:56 ubuntu named[23914]: exiting (due to fatal error)
Checking named -v does not show the enable-rrl option
root@ubuntu:
BIND 9.9.5-2-Ubuntu (Extended Support Version) <id:f9b8a50e> built by make with '--prefix=/usr' '--mandir=
compiled by GCC 4.8.2
using OpenSSL version: OpenSSL 1.0.1f 6 Jan 2014
using libxml2 version: 2.9.1
The attachment "Patch to modify debian/rules to enable rrl" seems to be a patch. If it isn't, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are a member of the ~ubuntu-reviewers, unsubscribe the team.
[This is an automated message performed by a Launchpad user owned by ~brian-murray, for any issues please contact him.]