Commit graph

46 commits

Author SHA1 Message Date
Erwin Lansing
5efd401380 Add an option for filter-aaaa
Submitted by:	Matej Gregr <matej.gregr@gmail.com>
2013-09-23 10:20:56 +00:00
Baptiste Daroussin
24a1652ff4 Add NO_STAGE all over the place in preparation for the staging support (cat: dns) 2013-09-20 16:31:57 +00:00
Erwin Lansing
0d68cdb33f Update to 9.9.4
Note that the Rate Limiting option has been renamed.

Security Fixes

   Previously an error in bounds checking on the private type
   'keydata' could be used to deny service through a deliberately
   triggerable REQUIRE failure (CVE-2013-4854).  [RT #34238]

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

New Features

   Added Response Rate Limiting (RRL) functionality to reduce the
   effectiveness of DNS as an amplifier for reflected denial-of-service
   attacks by rate-limiting substantially-identical responses. [RT
   #28130]

Feature Changes

   rndc status now also shows the build-id. [RT #20422]

   Improved OPT pseudo-record processing to make it easier to support
   new EDNS options. [RT #34414]

   "configure" now finishes by printing a summary of optional BIND
   features and whether they are active or inactive. ("configure
   --enable-full-report" increases the verbosity of the summary.)
   [RT #31777]

   Addressed compatibility issues with newer versions of Microsoft
   Visual Studio. [RT #33916]

   Improved the 'rndc' man page. [RT #33506]

   'named -g' now no longer works with an invalid logging configuration.
   [RT #33473]

   The default (and minimum) value for tcp-listen-queue is now 10
   instead of 3.  This is a subtle control setting (not applicable
   to all OS   environments).  When there is a high rate of inbound
   TCP connections, it   controls how many connections can be queued
   before they are accepted by named.  Once this limit is exceeded,
   new TCP connections will be rejected.  Note however that a value
   of 10 does not imply a strict limit of 10 queued TCP connections
   - the impact of changing this configuration setting will be
   OS-dependent.  Larger values for tcp-listen queue will permit
   more pending tcp connections, which may be needed where there
   is a high rate of TCP-based traffic (for example in a dynamic
   environment where there are frequent zone updates and transfers).
   For most production servers the new default value of 10 should
   be adequate.  [RT #33029]

   Added support for OpenSSL versions 0.9.8y, 1.0.0k, and 1.0.1e
   with PKCS#11. [RT #33463]

   Added logging messages on slave servers when they forward DDNS
   updates to a master. [RT #33240]

   Changed the logging category for RRL events from 'queries' to
   'query-errors'. [RT #33540]
2013-09-20 08:22:45 +00:00
Erwin Lansing
8576e9d9a0 Make GSSAPI support optional
PR:		182122
Submitted by:	Uwe Doering <gemini@geminix.org>
2013-09-17 11:31:49 +00:00
Boris Samorodov
54e44467d7 . introduce ICONV_CONFIGURE_BASE variable at Mk/Uses/iconv.mk. It's value is
"--with-libiconv=${LOCALBASE}" at systems pre OSVERSION 100043 and "" (null)
  otherwise;
. convert all ports which has CONFIGURE_ARGS=--with-libiconv=${LOCALBASE}.

Approved by:	portmgr (bapt, implicit)
2013-09-05 20:18:30 +00:00
Ollivier Robert
b3392148de Update the RPZ+RL patches for both versions.
Approved by:	erwin
2013-07-27 21:08:35 +00:00
Ollivier Robert
290764c8ba Put back the two patches for RPZ-RL that were removed during the previous
update.
2013-07-26 22:19:27 +00:00
Ollivier Robert
3726e2cae1 Security update to fix CVE-2013-4854 as reported at
https://kb.isc.org/article/AA-01015/0

9.9.3-p1 -> 9.9.3-P2
9.8.5-p1 -> 9.8.5-P2

9.6.x is not affected, neither is 10.x.

Security:	CVE-2013-4854 Remote DOS
2013-07-26 22:05:05 +00:00
Erwin Lansing
c971701b31 Update to 9.9.3-P1
Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
   [RT #30792 / #30996]

   Prevents an assertion failure in named when RPZ and DNS64 are
   used together. (CVE-2012-5689) [RT #32141]

See release notes for further features and bug fixes:
https://kb.isc.org/article/AA-00970/0/BIND-9.9.3-P1-Extended-Support-Version-Release-Notes.html

Security:	CVE-2013-3919
		CVE-2013-2266
		CVE-2012-5688
		CVE-2012-5689
2013-06-05 11:51:29 +00:00
Erwin Lansing
e69dae8873 Update to 9.9.3 2013-05-31 09:49:42 +00:00
Erwin Lansing
56bb308f3e Update RPZ and RRL patch set:
- address the issue raised by Bob Harold. RRL on recursive servers
     applies rate limits after waiting for recursion except on
     sub-domains of domains for which the server is authoritative.

  - fix the bug reported by Roy Arends in which "slipped" NXDOMAIN
     responses had rcode values of 0 (NoError) instead of 3 (NXDOMAIN).

  - move reports of RRL drop and slip actions from the "queries"
     log category to the "query-errors" category. Because they are not
     in the "queres" category, enabling or disabling query logging no
     longer affects them.
2013-05-31 08:10:56 +00:00
Erwin Lansing
9d2a6cf8c1 Fix typo in RPZRRL_PATCH
Submitted by:	Alexander Yerenkow <yerenkow@gmail.com>
2013-05-06 07:53:38 +00:00
Niclas Zeising
f0886cc3f3 Readd dns/bind-tools.
This is done in a similar manner as the old bind-tools, but uses bind99
instead of bind97 as master port.
Change bind99 to facilitate the bind-tools slave, in a simlar way as was
done for bind97.

Approved by:	erwin (maintainer)
2013-04-24 13:17:03 +00:00
Erwin Lansing
2a0e1389ad Make pkg-message and pkg-install a local file to the bind98 and bind99
ports and not include the one from the deprecated bind97 port, which is
to be removed.
2013-04-23 08:26:48 +00:00
Erwin Lansing
fb20fb9362 Update RPZ+RRL patchset to the latest version.
The change makes "slip 1;" send only truncated (TC=1) responses.
Without the change, "slip 1;" is the same as the default of "slip 2;".
That default, which alternates truncated with dropped responses
when the rate limit is exceeded, is better for authoritative DNS
servers, because it further reduces the amplification of an attack
from about 1X to about 0.5X.

DNS RRL is not recommended for recursive servers.

Feature safe:	yes
2013-04-17 07:57:54 +00:00
Erwin Lansing
baa44623f2 Update to 9.9.2-P2
Removed the check for regex.h in configure in order
to disable regex syntax checking, as it exposes
BIND to a critical flaw in libregex on some
platforms. [RT #32688]

Security:       CVE-2013-2266
2013-03-27 07:56:12 +00:00
Erwin Lansing
bdfe2cb8a0 Update the RPZ+RRL patch files which remove
working files that should not have been in the patches[1]
Also move to a versioned filename for the patches[2]

Submitted by:	Robert Sargent <robtsgt@gmail.com> [1],
		Vernon Schryver <vjs@rhyolite.com> [2]
2013-03-15 14:47:41 +00:00
Erwin Lansing
acbe6f2e70 Update RPZ+RRL patch to 028.23
A serious Multiple Zone Response Policy Zone (RPZ2)
Speed Improvement bug has been fixed.

`./configure --enable-rpz-nsip --enable-rpz-nsdname`
is now the default.

Responses affected by the all-per-second parameter
are always dropped. The slip value has no effect on them.

There are improved log messages for responses that are
dropped or "slipped," because they would require an
excessive identical referral.
2013-02-05 09:34:48 +00:00
Erwin Lansing
dc0e56bb80 Reduce lenght of the option description for RPZRRL_PATCH to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:   Terry Kennedy <terry@tmk.com>
2013-01-10 10:37:18 +00:00
Erwin Lansing
bad9ad12ae Update the response rate limiting patch to the latest
released version of January 5, 2013.

This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same
patch.

More information: http://ss.vix.su/~vjs/rrlrpz.html
2013-01-09 10:20:16 +00:00
Erwin Lansing
d2c1b13640 Add LICENSE. 2013-01-04 10:47:28 +00:00
Erwin Lansing
38649eeb03 Add experimental option for Response Rate Limiting patch. 2013-01-04 10:39:41 +00:00
Erwin Lansing
b0e7b6c04c - Use new OPTIONS_GROUP for DLZ options.[1]
- This also allows more than one DLZ option
  to be set.[2]

Submitted by:	bapt [1] (as RADIO)
Suggested by:	az [2] (thus GROUP instead)
2012-12-14 10:43:35 +00:00
Erwin Lansing
f7345394fe Update to the latest patch level from ISC:
BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
2012-12-05 07:46:03 +00:00
Erwin Lansing
534bdf4937 Improve the SSL option description
Submitted by:	Kazunori Fujiwara <fujiwara@jprs.co.jp>
Feature safe:	yes
2012-12-03 10:52:11 +00:00
Erwin Lansing
680f311898 Remove gpg signature checking that in itself does not
provide any additional security.

Feature safe:	yes
2012-12-03 10:48:18 +00:00
Erwin Lansing
e8882f0ecc - Update CONFLICTS
- Fix a typo in the OPTIONSNG conversion
- Add FIXED_RRSET option
- Add RPZ options (9.8 and 9.8 only)

PR:		172586
Submitted by:	Craig Leres <leres@ee.lbl.gov>
Feature safe:	yes
2012-11-27 10:05:32 +00:00
Erwin Lansing
fc2b7bdc9a Reduce lenght of the option description for DLZ_MYSQL to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:	Terry Kennedy <terry@tmk.com>
Feature safe:	yes
2012-10-26 08:37:10 +00:00
Erwin Lansing
311da8020a - Convert to OPTIONSNG
- Turn on IPv6 support by default

Feature safe:	yes
2012-10-25 10:53:57 +00:00
Erwin Lansing
a2855c60bc Force python off to disable build time detection of python.
Submitted by:	zeising
Feature safe:	yes
2012-10-19 13:20:02 +00:00
Erwin Lansing
9699084cf2 Update to 9.9.2
Feature safe:	yes
2012-10-19 10:17:27 +00:00
Erwin Lansing
b6095ca45c Upgrade to the latest BIND patch level:
A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Security:	  http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
2012-10-10 11:54:44 +00:00
Erwin Lansing
0a8fc4d0e4 Take maintainership of the BIND ports while I'm working on the latest
security releases.
2012-10-10 09:11:41 +00:00
Doug Barton
deda664425 Throw my ports back in the pool, and make my intentions clear for the
various ports that I've created.

I bid fond fare well
A chapter closes for me
What opens for you?
2012-10-08 10:38:47 +00:00
Doug Barton
ece74c7d62 Upgrade to the latest BIND patch level:
Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.

For more information: https://kb.isc.org/article/AA-00788
2012-09-19 03:46:35 +00:00
Doug Barton
e859d6a9bf Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
2012-07-24 19:23:23 +00:00
Doug Barton
543df633d3 Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
2012-06-04 21:51:34 +00:00
Doug Barton
7d79b1b01f Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Each version also contains other critical bug fixes.

All BIND users are encouraged to upgrade to these latest versions.
2012-05-23 04:41:19 +00:00
Doug Barton
b416df6141 Remove patch that is incorporated into version 9.9.1 2012-05-23 04:40:33 +00:00
Doug Barton
9ee0aabd58 Switch to using the PORTDOCS macro
Feature safe:	yes
2012-04-04 22:03:08 +00:00
Doug Barton
59d8a15c5f Add a patch from ISC slated for 9.9.1 which fixes an assertion failure
Feature safe: yes
2012-03-17 06:37:10 +00:00
Doug Barton
4281e345bf Release version of 9.9.0. Code is identical to rc4. 2012-02-29 18:41:12 +00:00
Doug Barton
42a96bb523 Upgrade to rc4, rndc and dlz fixes, including DNSSEC key maintenance timer 2012-02-24 07:26:21 +00:00
Doug Barton
aaca6c8912 Upgrade to 9.9.0rc3, various small bug fixes 2012-02-19 02:41:42 +00:00
Doug Barton
9e59fe46d7 Update to 9.9.0rc2, which addresses mostly in-line signing bugs 2012-02-01 02:12:20 +00:00
Doug Barton
37ba3cc3a7 By popular demand add a port for the newest BIND branch, 9.9.x. This will
stay as a -devel until it's formally released, which should be soon'ish.

BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases,
including:
	NXDOMAIN redirection
	Improved startup and reconfiguration time, especially with large
		numbers of authoritative zones
	New "inline-signing" option, allows named to sign zones completely
		transparently, including static zones
	Many other new features, especially for DNSSEC

See the CHANGES file for more information on features.

https://kb.isc.org/article/AA-00592
2012-01-28 05:28:10 +00:00