I too, put the local name in the host table.  About the only thing I put 
in the host table.
Why is it not in the one Windows DNS you also have?  I would have thought 
that would have worked.

We do have some IBM i serving DNS.  And, yes, we are getting dinged on our 
audits.  Why?  Because IBM i reports it as running a really old version of 
bind.  Yes, the team at IBM i has patched most of the errors discovered 
since this level of bind but it still reports this old level of bind.  The 
problem is convincing the auditors that:
- Simply looking at DNS bind level is not sufficient.
- You have to show documentation that CVE such and such was resolved by 
fix such and such
- You have to show that the customer has this fix on.
And that is really tough to do from port scanning software that the 
auditors use.
Even if the auditors are a wholly owned subsidiary of IBM.

Ideally, the auditors would note that bind level such and such was 
supposed to address CVE such and such which states 'this CVE says that an 
attack using ... is possible" and then the auditor would attempt that 
attack.  Of course, if that attack was "will cause on overload, death and 
destruction and a launch of every nuclear device on earth" you might play 
heck reading the result of the next audit.


Rob Berendt

As an Amazon Associate we earn from qualifying purchases.

This thread ...

Replies:

Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.