Hi all, there is a big excitement the last days about the very serious vulnerability found in the current implementations of bind. A article at lwn.net [1] with some valuable comments might be used as a starting point to read more about the issue. The two other CRUX ports with DNS related software, maradns and dnsmasq, are in principle affected as well. Fortunately both authors wrote a statement, read [2] and [3]. I'll update dnsmasq to 2.43rc3 after doing the usual tests, if you update to this version be aware of it's rc-status. In the meantime the only safe solution is to switch over to maradns. regards Juergen [1] http://lwn.net/Articles/289138/ [2] http://marc.info/?l=maradns-list&m=121560639013865&w=2 [3] http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2008q3/002148.html -- Juergen Daubert | mailto:jue@jue.li Korb, Germany | http://jue.li/crux