Applies To:Show Versions
3-DNS Controller versions 1.x - 4.x
Installing the upgrade
The current PTF installs fixes from all PTFs released after version 3.0. (For details, see the following section, Software enhancements and fixes.) The following instructions explain how to install the 3-DNS Controller, version 3.0 PTF-02 onto existing systems running version 3.0.
Note: If you have installed prior PTFs, this installation does not overwrite any configuration changes that you made for the prior PTFs.
Apply the PTF to 3-DNS Controller, version 3.0 using the following process:
- Change to the /var/tmp/ directory:
- Connect to the F5 Networks FTP site at ftp.f5.com (contact your vendor to get a user ID and password for the F5 FTP site).
- Change to the following directory:
- Download the following upgrade file:
- Extract the kit file in the /var/tmp/ directory, by typing the following command:
tar -xvf 3dns3.0PTF-02.tar
- Run the upgrade_ptf script in the /var/tmp/
directory to install the PTF, by typing the following command:
The script installs the upgrade and reboots the controller.
Once you install the software upgrade, refer to the Required configuration changes section for important information about configuration changes you must make on the 3-DNS Controller.
Software enhancements and fixes
What's fixed in this PTF
CERT Advisory CA-2002-23, Multiple Vulnerabilities In OpenSSL
The security vulnerabilities that are outlined in CERT Advisory CA-2002-23, Multiple Vulnerabilities In OpenSSL, have been fixed.
Enhancements and fixes released in prior PTFs
The following issues were resolved in the previous releases.
Version 3.0 PTF-01
CERT Advisory CA-2002-03, Multiple Vulnerabilities in Many
Implementations of the Simple Network Management Protocol (SNMP)
The security vulnerabilities that are outlined in CERT Advisory CA-2002-03, Multiple Vulnerabilities in Many Implementations of the Simple Network Management Protocol (SNMP), have been fixed.
CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability
The security vulnerability that is outlined in CERT Advisory CA-2002-17, Apache Web Server Chunk Handling Vulnerability, has been fixed.
CERT Advisory CA-2002-18, OpenSSH Vulnerabilities in Challenge Response Handling
The OpenSSH software running on the 3-DNS Controller has been upgraded to version 3.4p1 to address the security vulnerability that is outlined in CERT Advisory CA-2002-18.
CERT Advisory CA-2002-19, Buffer Overflow in Multiple DNS Resolver Libraries
The buffer overflow vulnerability in DNS resolver libraries that is outlined in CERT Advisory CA-2002-19 has been fixed.
The following section provides information about both required and optional configuration changes.
Required configuration changes
The current release has no required configuration changes.