Dr_Stein wrote:Honestly, I've never had *any* trouble with BIND. I have never personally met anyone that's had trouble with BIND. Those that I encountered elsewhere on the net that had BIND problems, were running waaay outdated versions.
I actualy had, and also I'm getting the habit to chroot everything I can easily, so less trouble I *can* have later. And bind was one of the most often used backdoor, together with sendmail. Hadn't you have the experience that after reading an advisory and check your machine, the man is already in?

Last week my time was spent to clean up an infected machine, and it's still not fully functional. Yes, it was outdated (about 4 years

, but even your developement machines are outdated. Keep in mind that when you see the advisory, it's already late. Your system was vulnerable then since it's existence, and I'm sure there are people who did know it. Yes, I'm not paranoid, and why should these people hunting me? but it's a fact you should know about: your system is always vulnerable fully, at least you don't know about
So these 'small steps' could have reasonable profit later.
But about the topic: I run multiple DNS on one machine, BIND on loopback interface with internal domains, and PDNS on external interfaces for the other servers (not publicaly available). PDNS queries BIND for internal domain requests. It works pretty well.