En este momento incidencia resuelta!
Aunque siguen utilizando una version vulnerable de Bind (y lo publican, que cucos)
(link roto)
Probablemente algun jilipollas les han hecho un DoS
--------------------------------------------------------------------------------
[repking@enzima ~]$ dig txt chaos version.bind. @212.89.0.31
; > DiG 9.3.3rc2 > txt chaos version.bind. @212.89.0.31
; (1 server found)
;; global options: printcmd
;; Got answer:
;; ->>HEADER ;; flags: qr aa rd; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;version.bind. CH TXT
;; ANSWER SECTION:
version.bind. 0 CH TXT "9.3.1"
;; AUTHORITY SECTION:
version.bind. 0 CH NS version.bind.
;; Query time: 13 msec
;; SERVER: 212.89.0.31#53(212.89.0.31)
;; WHEN: Sun Nov 5 22:39:03 2006
;; MSG SIZE rcvd: 62
[repking@enzima ~]$
--------------------------------------------------------------------------------
Que actualicen ya!!! (o mejor aun, que pasen de BIND)
Saludos.
Repking.