Commit graph

50 commits

Author SHA1 Message Date
obache
18e5807215 Use SSLBASE for openssl engines. 2014-12-12 07:44:08 +00:00
wiedi
a77507491d fix SMF Manifest installation by not overwriting INSTALLATION_DIRS 2014-06-14 10:14:06 +00:00
wiz
7eeb51b534 Bump for perl-5.20.0.
Do it for all packages that
* mention perl, or
* have a directory name starting with p5-*, or
* depend on a package starting with p5-
like last time, for 5.18, where this didn't lead to complaints.
Let me know if you have any this time.
2014-05-29 23:35:13 +00:00
jperkin
222f8dc36b Import initial SMF support for individual packages. 2014-03-11 14:34:36 +00:00
jperkin
45bc40abb4 Remove example rc.d scripts from PLISTs.
These are now handled dynamically if INIT_SYSTEM is set to "rc.d", or
ignored otherwise.
2014-03-11 14:04:57 +00:00
tron
73d05e2276 Recursive PKGREVISION bump for OpenSSL API version bump. 2014-02-12 23:17:32 +00:00
pettai
ea45070dea Update distfile to reflect the new rrl patch 2014-01-27 21:25:21 +00:00
pettai
5bd33132bb Fetch the correct rl-9.8.6.patch file 2014-01-27 16:44:27 +00:00
taca
73b24e9255 Update bind98 to 9.8.6pl2, (BIND 9.8.6-P2), security fix for CVE-2014-0591.
--- 9.8.6-P2 released ---

3693.	[security]	memcpy was incorrectly called with overlapping
			ranges resulting in malformed names being generated
			on some platforms.  This could cause INSIST failures
			when serving NSEC3 signed zones.  [RT #35120]

3658.	[port]		linux: Address platform specific compilation issue
			when libcap-devel is installed. [RT #34838]
2014-01-13 17:28:22 +00:00
taca
0d279042ad Update bind98 to 9.8.6pl1 (BIND 9.8.6-P1).
Security Fixes

   Treat an all zero netmask as invalid when generating the localnets
   acl. A Winsock library call on some Windows systems can return
   an incorrect value for an interface's netmask, potentially causing
   unexpected matches to BIND's built-in "localnets" Access Control
   List. (CVE-2013-6230) [RT #34687]
2013-11-07 04:22:22 +00:00
taca
598ec39872 Update bind98 to 9.8.6 (BIND 9.8.6).
(CVE-2013-4854 and CVE-2013-3919 were already fixed in pkgsrc.)

Security Fixes

   Previously an error in bounds checking on the private type
   'keydata' could be used to deny service through a deliberately
   triggerable REQUIRE failure (CVE-2013-4854).  [RT #34238]

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

Feature Changes

   rndc status now also shows the build-id. [RT #20422]

   Improved OPT pseudo-record processing to make it easier to support
   new EDNS options. [RT #34414]

   "configure" now finishes by printing a summary of optional BIND
   features and whether they are active or inactive. ("configure
   --enable-full-report" increases the verbosity of the summary.)
   [RT #31777]

   Addressed compatibility issues with newer versions of Microsoft
   Visual Studio. [RT #33916]

   Improved the 'rndc' man page. [RT #33506]

   'named -g' now no longer works with an invalid logging configuration.
   [RT #33473]

   The default (and minimum) value for tcp-listen-queue is now 10
   instead of 3.  This is a subtle control setting (not applicable
   to all OS environments).  When there is a high rate of inbound
   TCP connections, it controls how many connections can be queued
   before they are accepted by named.  Once this limit is exceeded,
   new TCP connections will be rejected.  Note however that a value
   of 10 does not imply a strict limit of 10 queued TCP connections
   - the impact of changing this configuration setting will be
   OS-dependent.  Larger values for tcp-listen queue will permit
   more pending tcp connections, which may be needed where there
   is a high rate of TCP-based traffic (for example in a dynamic
   environment where there are frequent zone updates and transfers).
   For most production servers the new default value of 10 should
   be adequate.  [RT #33029]

   Added support for OpenSSL versions 0.9.8y, 1.0.0k, and 1.0.1e
   with PKCS#11. [RT #33463]

   Added logging messages on slave servers when they forward DDNS
   updates to a master. [RT #33240]

Bug Fixes

   Fixed the "allow-query-on" option to correctly check the destination
   address. [RT #34590]

   Fix DNSSEC auto maintenance so signatures can be removed from a
   zone with only KSK keys for an algorithm. [RT #34439]

   Fix forwarding for forward only "zones" beneath automatic empty
   zones. [RT #34583]

   Fix DNSSEC auto maintenance so signatures from newly inactive
   keys are removed (when publishing a new key while deactivating
   another key at the same time). [RT #32178]

   Remove bogus warning log message about missing signatures when
   receiving a query for a SIG record. [RT #34600]

   Fix Response Policy Zones on slave servers so new RPZ changes
   take effect. [RT #34450]

   Improved resistance to a theoretical authentication attack based
   on differential timing.  [RT #33939]

   named was failing to answer queries during "rndc reload" [RT
   #34098]

   Fixed a broken 'Invalid keyfile' error message in dnssec-keygen.
   [RT #34045]

   The build of BIND now installs isc/stat.h so that it's available
   to /isc/file.h when building other applications that reference
   these header files - for example dnsperf (see Debian bug ticket
   #692467).  [RT #33056]

   Better handle failures building XML for stats channel responses.
   [RT #33706]

   Fixed a memory leak in GSS-API processing. [RT #33574]

   Fixed an acache-related race condition that could cause a crash.
   [RT #33602]

   rndc now properly fails when given an invalid '-c' argument. [RT
   #33571]

   Fixed an issue with the handling of zero TTL records that could
   cause improper SERVFAILs. [RT #33411]

   Fixed a crash-on-shutdown race condition with DNSSEC validation.
   [RT #33573]

   Corrected the way that "rndc addzone" and "rndc delzone" handle
   non-standard characters in zone names. [RT #33419]
2013-09-21 15:59:00 +00:00
taca
96d327f749 Update bind98 to 9.8.5pl2 (BIND 9.8.5-P2).
--- 9.8.5-P2 released ---

3621.	[security]	Incorrect bounds checking on private type 'keydata'
			can lead to a remotely triggerable REQUIRE failure
			(CVE-2013-4854). [RT #34238]
2013-07-27 03:20:53 +00:00
jperkin
b091c2f172 Bump PKGREVISION of all packages which create users, to pick up change of
sysutils/user_* packages.
2013-07-12 10:44:52 +00:00
taca
f1beedb3e9 Update bind98 to 9.8.5pl1 (BIND 9.8.5-P1).
Please refer CHANGES file for complete changes and here is quote from
release announce.


Introduction

   BIND 9.8.5-P1 is the latest production release of BIND 9.8.


Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   A deliberately constructed combination of records could cause
   named to hang while populating the additional section of a
   response. (CVE-2012-5166) [RT #31090]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
   [RT #30792 / #30996]

   Prevents an assertion failure in named when RPZ and DNS64 are
   used together. (CVE-2012-5689) [RT #32141]


New Features

   Adds a new configuration option, "check-spf"; valid values are
   "warn" (default) and "ignore".  When set to "warn", checks SPF
   and TXT records in spf format, warning if either resource record
   type occurs without a corresponding record of the other resource
   record type.  [RT #33355]

   Adds support for Uniform Resource Identifier (URI) resource
   records. [RT #23386]

   Adds support for the EUI48 and EUI64 RR types. [RT #33082]

   Adds support for the RFC 6742 ILNP record types (NID, LP, L32,
   and L64). [RT #31836]
2013-06-06 02:56:36 +00:00
wiz
d2ca14a3f1 Bump all packages for perl-5.18, that
a) refer 'perl' in their Makefile, or
b) have a directory name of p5-*, or
c) have any dependency on any p5-* package

Like last time, where this caused no complaints.
2013-05-31 12:39:57 +00:00
pettai
24c803d767 new rrl patch, new checksum 2013-04-08 15:53:36 +00:00
rodent
a0a1f2e57c Fixes:
COMMENT should not be longer than 70 characters.
 COMMENT should not begin with 'A'.
 COMMENT should not begin with 'An'.
 COMMENT should not begin with 'a'.
 COMMENT should not end with a period.
 COMMENT should start with a capital letter.

pkglint warnings. Some files also got minor formatting, spelling, and style
corrections.
2013-04-06 03:45:05 +00:00
pettai
b00d81afb2 Also update the corresponding RRL patch + distinfo file 2013-03-27 12:03:55 +00:00
taca
5801817bd2 Update bind98 to 9.8.4pl2 (BIND 9.8.4-P2).
--- 9.8.4-P2 released ---

3516.	[security]	Removed the check for regex.h in configure in order
			to disable regex syntax checking, as it exposes
			BIND to a critical flaw in libregex on some
			platforms. [RT #32688]
2013-03-26 22:12:56 +00:00
wiz
a8730d5aa1 Bump PKGREVISION for mysql default change to 55. 2013-03-02 20:33:21 +00:00
pettai
aeb5795660 Updated rrl patch version + source 2013-02-09 00:09:43 +00:00
jperkin
becd113253 PKGREVISION bumps for the security/openssl 1.0.1d update. 2013-02-06 23:20:50 +00:00
obache
64deda1dc9 recursive bump from cyrus-sasl libsasl2 shlib major bump. 2012-12-16 01:51:57 +00:00
taca
a45f518362 Update bind98 to 9.8.4p1 (BIND 9.8.4-P1) which solves CVE-2012-5688.
--- 9.8.4-P1 released ---

3407.	[security]	Named could die on specific queries with dns64 enabled.
			[Addressed in change #3388 for BIND 9.8.5 and 9.9.3.]
2012-12-05 00:54:16 +00:00
is
25f1860c44 PKG_OPTIONize kerberos as 'kerberos'. From: Matthias Kretschmer via PR#45823
with a minor edit.
N.B.: a minority of packages uses 'gssapi' as the option name. We should
decide on one option name and fix all packages to use the same, with
notification of the users and a transition mechanism. (Do we support, or
intend to support, any GSSAPI mechanisms other than Kerberos? In parallel?)
2012-12-02 11:51:44 +00:00
pettai
db1c2baa8f Remove the PATCH* lines from the Makefile 2012-11-11 00:22:11 +00:00
pettai
3865963e9a Added RRL (Response Rate Limiting) build option 2012-11-10 23:44:30 +00:00
asau
e059e7e469 Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days. 2012-10-23 17:18:07 +00:00
cheusov
141b842e87 Add CONFLICTS between net/bind and net/host.
net/bind9*: remove "bind<x.y.z" entries from CONFLICTS. It is useless
   because package's PKGBASE is "bind".
2012-10-21 15:49:06 +00:00
taca
1dd5322937 Update bind98 package to 9.8.4.
Here are change changes from release note.  Note security fixes except
CVE-2012-5166 should be already fixed in previous version of bind98 package.

Please refer https://kb.isc.org/article/AA-00797 for list of full bug fixes.


Security Fixes

* A deliberately constructed combination of records could cause named to hang
  while populating the additional section of a response. [CVE-2012-5166] [RT
  #31090]
* Prevents a named assert (crash) when queried for a record whose RDATA
  exceeds 65535 bytes [CVE-2012-4244] [RT #30416]
* Prevents a named assert (crash) when validating caused by using "Bad cache"
  data before it has been initialized. [CVE-2012-3817] [RT #30025]
* A condition has been corrected where improper handling of zero-length RDATA
  could cause undesirable behavior, including termination of the named
  process. [CVE-2012-1667] [RT #29644]


New Features

* Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are
  now supported per RFC 6605. [RT #21918]


Feature Changes

* Improves OpenSSL error logging [RT #29932]
* nslookup now returns a nonzero exit code when it is unable to get an answer.
  [RT #29492]
2012-10-10 03:06:37 +00:00
wiz
8b5d49eb78 Bump all packages that use perl, or depend on a p5-* package, or
are called p5-*.

I hope that's all of them.
2012-10-03 21:53:53 +00:00
taca
f806680aa4 Update bind98 to 9.8.3pl3 (BIND 9.8.3-P3).
--- 9.8.3-P3 released ---

3364.	[security]	Named could die on specially crafted record.
			[RT #30416]
2012-09-13 01:35:18 +00:00
wiz
b598935c28 Make it clearer which package contains exactly which bind version.
Patch from Bug Hunting.
2012-08-26 14:23:49 +00:00
spz
cc2170e785 patch update for CVE-2012-3817:
--- 9.8.3-P2 released ---

   3346.   [security]      Bad-cache data could be used before it was
                           initialized, causing an assert. [RT #30025]

   3342.   [bug]           Change #3314 broke saving of stub zones to disk
                           resulting in excessive cpu usage in some cases.
                           [RT #29952]
2012-07-24 20:16:21 +00:00
sbd
21792a9296 Recursive PKGREVISION bump for libxml2 buildlink addition. 2012-06-14 07:43:06 +00:00
taca
09d09d7de6 Update bind98 to 9.8.3pl1 (BIND 9.8.3-P1).
Security release for CVE-2012-1667.

	--- 9.8.3-P1 released ---

3331.	[security]	dns_rdataslab_fromrdataset could produce bad
			rdataslabs. [RT #29644]
2012-06-04 13:25:53 +00:00
taca
3849afc013 Update bind98 to 9.8.3.
pkgsrc change: add an comment to patches/patch-bin_tests_system_Makefile.in.

Changes from release announce:

Security Fixes

*  Windows binary packages distributed by ISC are now built and linked
   against OpenSSL 1.0.0i

New Features

*  None

Feature Changes

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fixes

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-threaded
   environment.  (Note that this may not provide a measurable
   improvement over previous versions of BIND, but it corrects the
   performance impact of change 3309 / RT #27995) [RT #29239]

*  Addresses a race condition that can cause named to to crash when
   the masters list for a zone is updated via rndc reload/reconfig
   [RT #26732]

*  named-checkconf now correctly validates dns64 clients acl
   definitions. [RT #27631]

*  Fixes a race condition in zone.c that can cause named to crash
   during the processing of rndc delzone [RT #29028]

*  Prevents a named segfault from resolver.c due to procedure
   fctx_finddone() not being thread-safe.  [RT #27995]

*  Improves DNS64 reverse zone performance. [RT #28563]

*  Adds wire format lookup method to sdb. [RT #28563]

*  Uses hmctx, not mctx when freeing rbtdb->heaps to avoid triggering
   an assertion when flushing cache data. [RT #28571]

*  Resolves inconsistencies in locating DNSSEC keys where zone names
   contain characters that require special mappings [RT #28600]

*  A new flag -R  has been added to queryperf for running tests
   using non-recursive queries.  It also now builds correctly on
   MacOS version 10.7 (darwin)  [RT #28565]

*  Named no longer crashes if gssapi is enabled in named.conf but
   was not compiled into the binary [RT #28338]

*  SDB now handles unexpected errors from back-end database drivers
   gracefully instead of exiting on an assert. [RT #28534]
2012-05-22 03:32:31 +00:00
marino
a47d6e7e7c net/bind98: Fix undefined reference to 'main'
Bind98 needs the same fix bind99 received on 23 Mar 2012 to fix the
linking of driver.so
2012-05-20 13:22:40 +00:00
marino
5c1f856ac6 PR#45780 net/bind98: Fix chroot operation
Implemented per PR.
2012-05-20 09:10:44 +00:00
taca
22160b7777 Add fix to a race condition in the resolver code that can cause a recursive
nameserver: <https://kb.isc.org/article/AA-00664>.

Bump PKGREVISION.
2012-05-01 02:47:52 +00:00
taca
2eaaf95009 Update bind98 pacakge to 9.8.2.
Security Fixes

  + BIND 9 nameservers performing recursive queries could cache an
    invalid record and subsequent queries for that record could
    crash the resolvers with an assertion failure. [RT #26590]
    [CVE-2011-4313]

Feature Changes

  + RPZ implementation now conforms to version 3 of the specification.
    [RT #27316]

  + It is now possible to explicitly disable DLV in named.conf by
    specifying "dnssec-lookaside no;". This is the default, but the
    ability to configure it makes it clearly visible to administrators.
    [RT #24858]

  + --enable-developer, a new composite argument to the configure
    script, enables a set of build options normally disabled but
    frequently selected in test or development builds, specifically:
    enable_fixed_rrset, with_atf, enable_filter_aaaa, enable_rpz_nsip,
    enable_rpz_nsdname, and with_dlz_filesystem (and on Linux and
    Darwin, also enable_exportlib) [RT #27103]
2012-04-05 00:39:34 +00:00
taca
c999cfae38 Don't install doc/arm HTML files twice. 2012-03-12 15:40:15 +00:00
taca
4fe0c3b273 Fix build problem on NetBSD current, maybe caused by newer gcc.
* Avoid to use true as variable name.
2011-11-17 00:48:09 +00:00
spz
29694f0bbf BIND 9.8.1-P1 is security patch for BIND 9.8.1.
* BIND 9 nameservers performing recursive queries could cache an invalid
  record and subsequent queries for that record could crash the resolvers
  with an assertion failure. [RT #26590]
2011-11-16 21:34:44 +00:00
shattered
26ce32cfbd PR/29576 -- Use @RCD_SCRIPTS_SHELL@ in rc.d scripts, not /bin/sh 2011-10-07 22:37:02 +00:00
taca
a6571bf16f Update bind98 package to 9.8.1.
pkgsrc change: add a patch to fix build problem with some PKG_OPTIONS,
such as "ldap".


New Features

9.8.1

     * Added a new include file with function typedefs for the DLZ
       "dlopen" driver. [RT #23629]
     * Added a tool able to generate malformed packets to allow testing of
       how named handles them. [RT #24096]
     * The root key is now provided in the file bind.keys allowing DNSSEC
       validation to be switched on at start up by adding
       "dnssec-validation auto;" to named.conf. If the root key provided
       has expired, named will log the expiration and validation will not
       work. More information and the most current copy of bind.keys can
       be found at http://www.isc.org/bind-keys. *Please note this feature
       was actually added in 9.8.0 but was not included in the 9.8.0
       release notes. [RT #21727]

Security Fixes

9.8.1

     * If named is configured with a response policy zone (RPZ) and a
       query of type RRSIG is received for a name configured for RRset
       replacement in that RPZ, it will trigger an INSIST and crash the
       server. RRSIG. [RT #24280]
     * named, set up to be a caching resolver, is vulnerable to a user
       querying a domain with very large resource record sets (RRSets)
       when trying to negatively cache the response. Due to an off-by-one
       error, caching the response could cause named to crash. [RT #24650]
       [CVE-2011-1910]
     * Using Response Policy Zone (RPZ) to query a wildcard CNAME label
       with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
       query type independant. [RT #24715]
     * Using Response Policy Zone (RPZ) with DNAME records and querying
       the subdomain of that label can cause named to crash. Now logs that
       DNAME is not supported. [RT #24766]
     * Change #2912 populated the message section in replies to UPDATE
       requests, which some Windows clients wanted. This exposed a latent
       bug that allowed the response message to crash named. With this
       fix, change 2912 has been reduced to copy only the zone section to
       the reply. A more complete fix for the latent bug will be released
       later. [RT #24777]

Feature Changes

9.8.1

     * Merged in the NetBSD ATF test framework (currently version 0.12)
       for development of future unit tests. Use configure --with-atf to
       build ATF internally or configure --with-atf=prefix to use an
       external copy. [RT #23209]
     * Added more verbose error reporting from DLZ LDAP. [RT #23402]
     * The DLZ "dlopen" driver is now built by default, no longer
       requiring a configure option. To disable it, use "configure
       --without-dlopen". (Note: driver not supported on win32.) [RT
       #23467]
     * Replaced compile time constant with STDTIME_ON_32BITS. [RT #23587]
     * Make --with-gssapi default for ./configure. [RT #23738]
     * Improved the startup time for an authoritative server with a large
       number of zones by making the zone task table of variable size
       rather than fixed size. This means that authoritative servers with
       lots of zones will be serving that zone data much sooner. [RT
       #24406]
     * Per RFC 6303, RFC 1918 reverse zones are now part of the built-in
       list of empty zones. [RT #24990]
2011-09-01 03:44:35 +00:00
taca
3cc2dab7d0 Update bind98 package to 9.8.0pl4 (9.8.0-P4), security release.
Introduction

   BIND 9.8.0-P4 is security patch for BIND 9.8.0.

   Please see the CHANGES file in the source code release for a complete
   list of all changes.


	--- 9.8.0-P4 released ---

3124.	[bug]		Use an rdataset attribute flag to indicate
			negative-cache records rather than using rrtype 0;
			this will prevent problems when that rrtype is
			used in actual DNS packets.  [RT #24777]

	--- 9.8.0-P3 released (withdrawn) ---

3126.	[security]	Using DNAME record to generate replacements caused
			RPZ to exit with a assertion failure. [RT #23766]

3125.	[security]	Using wildcard CNAME records as a replacement with
			RPZ caused named to exit with a assertion failure.
			[RT #24715]

3123.	[security]	Change #2912 exposed a latent flaw in
			dns_rdataset_totext() that could cause named to
			crash with an assertion failure. [RT #24777]

3115.	[bug]		Named could fail to return requested data when
			following a CNAME that points into the same zone.
			[RT #2445]
2011-07-05 13:35:29 +00:00
taca
518f9b6f02 Update bind98 package to 9.8.0pl2(9.8.0-P2)
--- 9.8.0-P2 released ---

3121.   [security]      An authoritative name server sending a negative
                        response containing a very large RRset could
                        trigger an off-by-one error in the ncache code
                        and crash named. [RT #24650]

3120.	[bug]		Named could fail to validate zones listed in a DLV
			that validated insecure without using DLV and had
			DS records in the parent zone. [RT #24631]
2011-05-27 06:45:30 +00:00
taca
99da4e6c38 Update bind98 pacakge to 9.8.0p1 (9.8.0-P1).
Fixes https://www.isc.org/CVE-2011-1907.

	--- 9.8.0-P1 released ---

3100.	[security]	Certain response policy zone configurations could
			trigger an INSIST when receiving a query of type
			RRSIG. [RT #24280]
2011-05-06 00:34:32 +00:00
taca
ff8a919f96 Importing BIND 9.8.0 as net/bind98.
Full release note:
	http://ftp.isc.org/isc/bind9/9.8.0/RELEASE-NOTES-BIND-9.8.html

New Features

9.8.0

     * The ADB hash table stores informations about which authoritative
       servers to query about particular domains. Previous versions of
       BIND had the hash table size as a fixed value. On a busy recursive
       server, this could lead to hash table collisions in the ADB cache,
       resulting in degraded response time to queries. Bind 9.8 now has a
       dynamically scalable ADB hash table, which helps a busy server to
       avoid hash table collisions and maintain a consistent query
       response time. [RT #21186]
     * BIND now supports a new zone type, static-stub. This allows the
       administrator of a recursive nameserver to force queries for a
       particular zone to go to IP addresses of the administrator's
       choosing, on a per zone basis, both globally or per view. I.e. if
       the administrator wishes to have their recursive server query
       192.0.2.1 and 192.0.2.2 for zone example.com rather than the
       servers listed by the .com gTLDs, they would configure example.com
       as a static-stub zone in their recursive server. [RT #21474]
     * BIND now supports Response Policy Zones, a way of expressing
       "reputation" in real time via specially constructed DNS zones. See
       the draft specification here:
       http://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt [RT #21726]
     * BIND 9.8.0 now has DNS64 support. named synthesizes AAAA records
       from specified A records if no AAAA record exists. IP6.ARPA CNAME
       records will be synthesized from corresponding IN-ADDR.ARPA. [RT
       #21991/22769]
     * Dynamically Loadable Zones (DLZ) now support dynamic updates.
       Contributed by Andrew Tridgell of the Samba Project. [RT #22629]
     * Added a "dlopen" DLZ driver, allowing the creation of external DLZ
       drivers that can be loaded as shared objects at runtime rather than
       having to be linked with named at compile time. Currently this is
       switched on via a compile-time option, "configure
       --with-dlz-dlopen". Note: the syntax for configuring DLZ zones is
       likely to be refined in future releases. Contributed by Andrew
       Tridgell of the Samba Project. [RT #22629]
     * named now retains GSS-TSIG keys across restarts. This is for
       compatibility with Microsoft DHCP servers doing dynamic DNS updates
       for clients, which don't know to renegotiate the GSS-TSIG session
       key when named restarts. [RT #22639]
     * There is a new update-policy match type "external". This allows
       named to decide whether to allow a dynamic update by checking with
       an external daemon. Contributed by Andrew Tridgell of the Samba
       Project. [RT #22758]
     * There have been a number of bug fixes and ease of use enhancements
       for configuring BIND to support GSS-TSIG [RT #22629/22795]. These
       include:
          + Added a "tkey-gssapi-keytab" option. If set, dynamic updates
            will be allowed for any key matching a Kerberos principal in
            the specified keytab file. "tkey-gssapi-credential" is no
            longer required and is expected to be deprecated. Contributed
            by Andrew Tridgell of the Samba Project. [RT #22629]
          + It is no longer necessary to have a valid /etc/krb5.conf file.
            Using the syntax DNS/hostname@REALM in nsupdate is sufficient
            for to correctly set the default realm. [RT #22795]
          + Documentation updated new gssapi configuration options (new
            option tkey-gssapi-keytab and changes in
            tkey-gssapi-credential and tkey-domain behavior). [RT 22795]
          + DLZ correctly deals with NULL zone in a query. [RT 22795]
          + TSIG correctly deals with a NULL tkey->creator. [RT 22795]
     * A new test has been added to check the apex NSEC3 records after
       DNSKEY records have been added via dynamic update. [RT #23229]
     * RTT banding (randomized server selection on queries) was introduced
       in BIND releases in 2008, due to the Kaminsky cache poisoning bug.
       Instead of always picking the authoritative server with the lowest
       RTT to the caching resolver, all the authoritative servers within
       an RTT range were randomly used by the recursive server.
       While this did add an extra bit of randomness that an attacker had
       to overcome to poison a recursive server's cache, it also impacts
       the resolver's speed in answering end customer queries, since it's
       no longer the fastest auth server that gets asked. This means that
       performance optimizations, such using topologically close
       authoritative servers, are rendered ineffective.
       ISC has evaluated the amount of security added versus the
       performance hit to end users and has decided that RTT banding is
       causing more harm than good. Therefore, with this release, BIND is
       going back to the server selection used prior to adding RTT
       banding. [RT #23310]

Feature Changes

9.8.0

     * There is a new option in dig, +onesoa, that allows the final SOA
       record in an AXFR response to be suppressed. [RT #20929
     * There is additional information displayed in the recursing log
       (qtype, qclass, qid and whether we are following the original
       name). [RT #22043]
     * Added option 'resolver-query-timeout' in named.conf (max query
       timeout in seconds) to set a different value than the default (30
       seconds). A value of 0 means 'use the compiled in default';
       anything longer than 30 will be silently set to 30. [RT #22852]
     * For Mac OS X, you can now have the test interfaces used during
       "make test" stay beyond reboot. See bin/tests/system/README for
       details.
2011-03-04 03:52:14 +00:00