Re: Something new? bind dos? exploit?

From: Henrik Johansen (securityfocus_at_wyss.dk)
Date: 02/15/04

  • Next message: Jeffrey Monahan: "Re: Something new? bind dos? exploit?"
    Date: 15 Feb 2004 13:47:25 -0000
    To: incidents@securityfocus.com
    
    
    ('binary' encoding is not supported, stored as-is) In-Reply-To: <402CBDE3.3010308@avwashington.com>

    Hi

    [SNIP]
    >Feb 13 06:55:40 hostname named[12631]: socket.c:1100: unexpected error:
    >Feb 13 06:55:40 hostname named[12631]: internal_send:
    >244.254.254.254#53: Invalid argument
    [SNIP]

    You might have this problem when you use spamassassin the software contacts proxies.relays.monkies.com this address is in spam.lists.conf file.

    relays.monkeys.com. 86400 IN NS bogus-maximus.monkeys.com.

    ;; ADDITIONAL SECTION:
    bogus-maximus.monkeys.com. 86400 IN A 244.254.254.254

    Try look at this group
    http://marc.theaimsgroup.com/?l=bind9-users&m=107662479000881&w=2
    They explains about this problem

    ---------------------------------------------------------------------------
    Free trial: Astaro Security Linux -- firewall with Spam/Virus Protection

    Protect your network with the comprehensive security solution that
    integrates six applications for ease of use and lower TCO.

    Firewall - Virus protection - Spam protection - URL blocking - VPN
    - Wireless security.

    Download 30-day evaluation at:
    http://www.astaro.com/php/contact/securityfocus.php
    ----------------------------------------------------------------------------


  • Next message: Jeffrey Monahan: "Re: Something new? bind dos? exploit?"

    Relevant Pages