d4984bf979
significant updates, not the least of which is the new and improved DNSSEC code based on the latest standards (including DS). Various updates to the port, including: 1. Download the PGP signature 2. If running on ${OSVERSION} >= 503000, configure with threads 3. Update pkg-descr re IPv6 RRs 4. Update pkg-message to reflect a world with 6-current There is also a patch to correct a man page installation error. This problem should be fixed in the next release. Approved by: portmgr (marcus)
22 lines
1.1 KiB
Text
22 lines
1.1 KiB
Text
*************************************************************************
|
|
* _ _____ _____ _____ _ _ _____ ___ ___ _ _ *
|
|
* / \|_ _|_ _| ____| \ | |_ _|_ _/ _ \| \ | | *
|
|
* / _ \ | | | | | _| | \| | | | | | | | | \| | *
|
|
* / ___ \| | | | | |___| |\ | | | | | |_| | |\ | *
|
|
* /_/ \_\_| |_| |_____|_| \_| |_| |___\___/|_| \_| *
|
|
* *
|
|
* BIND 9 requires a good source of randomness to operate. *
|
|
* It also requires configuration of rndc, including a *
|
|
* "secret" key. If you are using FreeBSD 4.x, visit *
|
|
* http://people.freebsd.org/~dougb/randomness.html for *
|
|
* information on how to set up entropy gathering. Users *
|
|
* of FreeBSD 5.x or later do not need to do this step. If *
|
|
* you are running BIND 9 in a chroot environment, make *
|
|
* sure that there is a /dev/random device in the chroot. *
|
|
* *
|
|
* The easiest, and most secure way to configure rndc is *
|
|
* to run 'rndc-confgen -a' which will generate the proper *
|
|
* conf file, with a new random key, and appropriate file *
|
|
* permissions. *
|
|
* *
|
|
*************************************************************************
|