This is the mail system at host nonagon.crans.org.
I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.
For further assistance, please send mail to postmaster.
If you do so, please include this problem report. You can
delete your own text from the attached returned message.
The mail system
<monitoring(a)federez.net> (expanded from <root>): host
smtp.crans.org[138.231.136.39] said: 550 5.1.0 <root(a)nonagon.crans.org>:
Sender address rejected: User unknown in relay recipient table (in reply to
RCPT TO command)
apticron report [Wed, 11 Jan 2017 23:38:21 +0100]
========================================================================
apticron has detected that some packages need upgrading on:
quigon.federez.net
[ 160.228.155.65 ]
The following packages are currently pending an upgrade:
bind9 1:9.9.5.dfsg-9+deb8u9
bind9-host 1:9.9.5.dfsg-9+deb8u9
bind9utils 1:9.9.5.dfsg-9+deb8u9
dnsutils 1:9.9.5.dfsg-9+deb8u9
libbind9-90 1:9.9.5.dfsg-9+deb8u9
libdns100 1:9.9.5.dfsg-9+deb8u9
libdns-export100 1:9.9.5.dfsg-9+deb8u9
libirs-export91 1:9.9.5.dfsg-9+deb8u9
libisc95 1:9.9.5.dfsg-9+deb8u9
libisccc90 1:9.9.5.dfsg-9+deb8u9
libisccfg90 1:9.9.5.dfsg-9+deb8u9
libisccfg-export90 1:9.9.5.dfsg-9+deb8u9
libisc-export95 1:9.9.5.dfsg-9+deb8u9
liblwres90 1:9.9.5.dfsg-9+deb8u9
========================================================================
Package Details:
Lecture des fichiers de modifications (« changelog »)...
--- Modifications pour bind9 (bind9 bind9-host bind9utils dnsutils libbind9-90 libdns100 libdns-export100 libirs-export91 libisc95 libisccc90 libisccfg90 libisccfg-export90 libisc-export95 liblwres90) ---
bind9 (1:9.9.5.dfsg-9+deb8u9) jessie-security; urgency=medium
* Apply patches from ISC.
* CVE-2016-9131: Assertion failure related to caching of TKEY records
in upstream DNS responses.
* CVE-2016-9147: Processing of RRSIG records in upstream DNS response
without corresponding signed data could lead to an assertion failure.
* CVE-2016-9444: Missing RRSIG records in the authority section of
upstream responses could lead to an assertion failure.
* RT #43779: Fix handling of CNAME/DNAME responses. (Regression due
to the CVE-2016-8864 fix.)
-- Florian Weimer <fw(a)deneb.enyo.de> Wed, 11 Jan 2017 11:50:31 +0100
========================================================================
You can perform the upgrade by issuing the command:
apt-get dist-upgrade
as root on quigon.federez.net
--
apticron