Commit graph

73 commits

Author SHA1 Message Date
taca
0cf654747e net/bind916: update to 9.16.43
--- 9.16.43 released ---

6212.   [bug]           Don't process detach and close netmgr events when
                        the netmgr has been paused. [GL #4200]
2023-08-29 14:46:00 +00:00
wiz
0046911d31 *: recursive bump for Python 3.11 as new default 2023-08-14 05:23:45 +00:00
wiz
47b83b9746 bind916: restrict buildlink3.mk dependency to < 9.18 to avoid pulling in bind918 2023-07-03 12:48:51 +00:00
taca
a78b10e0e1 net/bind916: update to 9.16.42
pkgsrc change: reduce pkglint warnings.

9.16.42 (2023-06-21)

Security release:

- CVE-2023-2828
- CVE-2023-2911

6192.	[security]	A query that prioritizes stale data over lookup
			triggers a fetch to refresh the stale data in cache.
			If the fetch is aborted for exceeding the recursion
			quota, it was possible for 'named' to enter an infinite
			callback loop and crash due to stack overflow. This has
			been fixed. (CVE-2023-2911) [GL #4089]

6190.	[security]	Improve the overmem cleaning process to prevent the
			cache going over the configured limit. (CVE-2023-2828)
			[GL #4055]

6183.	[bug]		Fix a serve-stale bug where a delegation from cache
			could be returned to the client. [GL #3950]

6173.	[bug]		Properly process extra "nameserver" lines in
			resolv.conf otherwise the next line is not properly
			processed. [GL #4066]

6169.	[bug]		named could crash when deleting inline-signing zones
			with "rndc delzone". [GL #4054]
2023-06-21 14:40:43 +00:00
taca
e0a23a66d3 net/bind916: update to 9.16.41
--- 9.16.41 released ---

6157.	[bug]		When removing delegations in an OPTOUT range
			empty-non-terminal NSEC3 records generated by
			those delegations were not removed. [GL #4027]
2023-05-17 13:41:58 +00:00
taca
c502837fd3 net/bind916: update to 9.16.40
--- 9.16.40 released ---

6142.	[bug]		Reduce the number of dns_dnssec_verify calls made
			determining if revoked keys needs to be removed from
			the trust anchors. [GL #3981]

6138.	[doc]		Fix the DF-flag documentation on the outgoing
			UDP packets. [GL #3710]

6132.	[doc]		Remove a dead link in the DNSSEC guide. [GL #3967]

6129.	[cleanup]	Value stored to 'source' during its initialization is
			never read. [GL #3965]

6124.	[bug]		When changing from a NSEC3 capable DNSSEC algorithm to
			an NSEC3 incapable DNSSEC algorithm using KASP the zone
			could sometimes be incompletely signed. [GL #3937]

5741.	[bug]		Log files with "timestamp" suffixes could be left in
			place after rolling, even if the number of preserved
			log files exceeded the configured "versions" limit.
			[GL #828] [GL #3959]
2023-04-24 13:45:10 +00:00
adam
b8410cfcaf revbump after textproc/icu update 2023-04-19 08:08:03 +00:00
taca
bb4f9f7a3d net/bind916: update to 9.16.39
--- 9.16.39 released ---

6119.	[bug]		Make sure to revert the reconfigured zones to the
			previous version of the view, when the new view
			reconfiguration fails during the configuration of
			one of the configured zones. [GL #3911]

6116.	[bug]		Fix error path cleanup issue in the dns_catz_new_zones()
			function. [GL #3900]

6115.	[bug]		Unregister db update notify callback before detaching
			from the previous db inside the catz update notify
			callback. [GL #3777]

6105.	[bug]		Detach 'rpzs' and 'catzs' from the previous view in
			configure_rpz() and configure_catz(), respectively,
			just after attaching it to the new view. [GL #3880]

6098.	[test]		Don't test HMAC-MD5 when not supported by libcrypto.
			[GL #3871]

6095.	[test]		Test various 'islands of trust' configurations when
			using managed keys. [GL #3662]

6094.	[bug]		Building against (or running with) libuv versions
			1.35.0 and 1.36.0 is now a fatal error.  The rules for
			mixing and matching compile-time and run-time libuv
			versions have been tightened for libuv versions between
			1.35.0 and 1.40.0. [GL #3840]
2023-03-17 13:54:19 +00:00
taca
acb08c086d net/bind916: update to 9.16.38
--- 9.16.38 released ---

6083.	[bug]		Fix DNSRPS-enabled builds as they were inadvertently
			broken by change 6042. [GL #3827]

6081.	[bug]		Handle primary server address lookup failures in
			nsupdate more gracefully. [GL #3830]

6080.	[bug]		'named -V' leaked memory. [GL #3829]

6079.	[bug]		Force set the DS state after a 'rdnc dnssec -checkds'
			command. [GL #3822]

6075.	[bug]		Add missing node lock when setting node->wild in
			add_wildcard_magic. [GL #3799]

6072.	[bug]		Avoid the OpenSSL lock contention when initializing
			Message Digest Contexts by using explicit algorithm
			fetching, initializing static contexts for every
			supported algorithms, and initializing the new context
			by copying the static copy. [GL #3795]

6069.	[bug]		Detach from the view in zone_shutdown() to
			release the memory held by the dead view
			early. [GL #3801]
2023-02-16 13:36:01 +00:00
taca
22a06431b6 net/bind916: update to 9.16.37
--- 9.16.37 released ---

6067.	[security]	Fix serve-stale crash when recursive clients soft quota
			is reached. (CVE-2022-3924) [GL #3619]

6066.	[security]	Handle RRSIG lookups when serve-stale is active.
			(CVE-2022-3736) [GL #3622]

6064.	[security]	An UPDATE message flood could cause named to exhaust all
			available memory. This flaw was addressed by adding a
			new "update-quota" statement that controls the number of
			simultaneous UPDATE messages that can be processed or
			forwarded. The default is 100. A stats counter has been
			added to record events when the update quota is
			exceeded, and the XML and JSON statistics version
			numbers have been updated. (CVE-2022-3094) [GL #3523]

6062.	[func]		The DSCP implementation, which has only been
			partly operational since 9.16.0, is now marked as
			deprecated. Configuring DSCP values in named.conf
			will cause a warning will be logged. [GL #3773]

6060.	[bug]		Fix a use-after-free bug in dns_zonemgr_releasezone()
			by detaching from the zone manager outside of the write
			lock. [GL #3768]

6059.	[bug]		In some serve stale scenarios, like when following an
			expired CNAME record, named could return SERVFAIL if the
			previous request wasn't successful. Consider non-stale
			data when in serve-stale mode. [GL #3678]

6058.	[bug]		Prevent named from crashing when "rndc delzone"
			attempts to delete a zone added by a catalog zone.
			[GL #3745]

6050.	[bug]		Changes to the RPZ response-policy min-update-interval
			and add-soa options now take effect as expected when
			named is reconfigured. [GL #3740]

6048.	[bug]		Fix a log message error in dns_catz_update_from_db(),
			where serials with values of 2^31 or larger were logged
			incorrectly as negative numbers. [GL #3742]

6045.	[cleanup]	The list of supported DNSSEC algorithms changed log
			level from "warning" to "notice" to match named's other
			startup messages. [GL !7217]

6044.	[bug]		There was an "RSASHA236" typo in a log message.
			[GL !7206]
2023-01-26 13:32:47 +00:00
taca
dbfe9253df net/bind916: update to 9.16.36
9.16.36 (2022-12-21)

Feature Changes

* The auto-dnssec option has been deprecated and will be removed in a future
  BIND 9.19.x release. Please migrate to dnssec-policy.  [GL #3667]

Bug Fixes

* When a catalog zone was removed from the configuration, in some cases a
  dangling pointer could cause the named process to crash.  This has been
  fixed. [GL #3683]

* When a zone was deleted from a server, a key management object related to
  that zone was inadvertently kept in memory and only released upon
  shutdown.  This could lead to constantly increasing memory use on servers
  with a high rate of changes affecting the set of zones being served.  This
  has been fixed.  [GL #3727]

* In certain cases, named waited for the resolution of outstanding recursive
  queries to finish before shutting down.  This was unintended and has been
  fixed.  [GL #3183]

* The zone <name>/<class>: final reference detached log message was moved
  from the INFO log level to the DEBUG(1) log level to prevent the
  named-checkzone tool from superfluously logging this message in non-debug
  mode.  [GL #3707]
2023-01-09 06:48:53 +00:00
adam
cc34ee3bc6 massive revision bump after textproc/icu update 2022-11-23 16:18:32 +00:00
taca
4432a3d032 net/bind916: update to 9.16.35
9.6.35 (2022-11-16)

Bug Fixes

* A crash was fixed that happened when a dnssec-policy zone that used NSEC3
  was reconfigured to enable inline-signing.  [GL #3591]

* In certain resolution scenarios, quotas could be erroneously reached for
  servers, including any configured forwarders, resulting in SERVFAIL
  answers being sent to clients.  This has been fixed.  [GL #3598]

* rpz-ip rules in response-policy zones could be ineffective in some cases
  if a query had the CD (Checking Disabled) bit set to 1.  This has been
  fixed.  [GL #3247]

* Previously, if Internet connectivity issues were experienced during the
  initial startup of named, a BIND resolver with dnssec-validation set to
  auto could enter into a state where it would not recover without stopping
  named, manually deleting the managed-keys.bind and managed-keys.bind.jnl
  files, and starting named again.  This has been fixed.  [GL #2895]

* The statistics counter representing the current number of clients awaiting
  recursive resolution results (RecursClients) could overflow in certain
  resolution scenarios.  This has been fixed.  [GL #3584]

* Previously, BIND failed to start on Solaris-based systems with hundreds of
  CPUs.  This has been fixed.  [GL #3563]

* When a DNS resource record's TTL value was equal to the resolver's
  configured prefetch "eligibility" value, the record was erroneously not
  treated as eligible for prefetching.  This has been fixed.  [GL #3603]
2022-11-16 13:47:38 +00:00
taca
a051dbe49d net/bind916: update to 9.16.34
9.16.34

Known Issues

* Upgrading from BIND 9.16.32 or any older version may require a manual
  configuration change.  The following configurations are affected:

	- type primary zones configured with dnssec-policy but without
          either allow-update or update-policy,

	- type secondary zones configured with dnssec-policy.

* In these cases please add inline-signing yes; to the individual zone
  configuration(s).  Without applying this change, named will fail to start.
  For more details, see
  https://kb.isc.org/docs/dnssec-policy-requires-dynamic-dns-or-inline-signing

New Features

* Support for parsing and validating the dohpath service parameter in SVCB
  records was added.  [GL #3544]

* named now logs the supported cryptographic algorithms during startup and
  in the output of named -V.  [GL #3541]

Bug Fixes

* Changing just the TSIG key names for primaries in catalog zones' member
  zones was not effective.  This has been fixed.  [GL #3557]
2022-10-19 11:04:49 +00:00
he
7e95e48835 Upgrade net/bind916 to version 9.16.33.
OKed by wiz@

Pkgsrc changes:
 * Just checksum updates.

Upstream changes:
        --- 9.16.33 released ---

5962.   [security]      Fix memory leak in EdDSA verify processing.
                        (CVE-2022-38178) [GL #3487]

5961.   [security]      Fix memory leak in ECDSA verify processing.
                        (CVE-2022-38177) [GL #3487]

5960.   [security]      Fix serve-stale crash that could happen when
                        stale-answer-client-timeout was set to 0 and there was
                        a stale CNAME in the cache for an incoming query.
                        (CVE-2022-3080) [GL #3517]

5957.   [security]      Prevent excessive resource use while processing large
                        delegations. (CVE-2022-2795) [GL #3394]

5956.   [func]          Make RRL code treat all QNAMEs that are subject to
                        wildcard processing within a given zone as the same
                        name. [GL #3459]

5955.   [port]          The libxml2 library has deprecated the usage of
                        xmlInitThreads() and xmlCleanupThreads() functions. Use
                        xmlInitParser() and xmlCleanupParser() instead.
                        [GL #3518]

5954.   [func]          Fallback to IDNA2003 processing in dig when IDNA2008
                        conversion fails. [GL #3485]

5953.   [bug]           Fix a crash on shutdown in delete_trace_entry(). Add
                        mctx attach/detach pair to make sure that the memory
                        context used by a memory pool is not destroyed before
                        the memory pool itself. [GL #3515]

5952.   [bug]           Use quotes around address strings in YAML output.
                        [GL #3511]

5951.   [bug]           In some cases, the dnstap query_message field was
                        erroneously set when logging response messages.
                        [GL #3501]

5948.   [bug]           Fix nsec3.c:dns_nsec3_activex() function, add a missing
                        dns_db_detachnode() call. [GL #3500]

5945.   [bug]           If parsing /etc/bind.key failed, delv could assert
                        when trying to parse the built in trust anchors as
                        the parser hadn't been reset. [GL !6468]

5942.   [bug]           Fix tkey.c:buildquery() function's error handling by
                        adding the missing cleanup code. [GL #3492]

5941.   [func]          Zones with dnssec-policy now require dynamic DNS or
                        inline-siging to be configured explicitly. [GL #3381]

5936.   [bug]           Don't enable serve-stale for lookups that error because
                        it is a duplicate query or a query that would be
                        dropped. [GL #2982]
2022-09-21 12:58:47 +00:00
taca
70fe86e0ab net/bind916: update to 9.16.32
9.16.32 (2022-08-17)

Notes for BIND 9.16.32

Feature Changes

* The DNSSEC algorithms RSASHA1 and NSEC3RSASHA1 are now automatically
  disabled on systems where they are disallowed by the security policy
  (e.g. Red Hat Enterprise Linux 9).  Primary zones using those algorithms
  need to be migrated to new algorithms prior to running on these systems,
  as graceful migration to different DNSSEC algorithms is not possible when
  RSASHA1 is disallowed by the operating system.  [GL #3469]

* Log messages related to fetch limiting have been improved to provide more
  complete information.  Specifically, the final counts of allowed and
  spilled fetches are now logged before the counter object is destroyed.
  [GL #3461]

Bug Fixes

* Non-dynamic zones that inherit dnssec-policy from the view or options
  blocks were not marked as inline-signed and therefore never scheduled to
  be re-signed.  This has been fixed.  [GL #3438]

* The old max-zone-ttl zone option was meant to be superseded by the
  max-zone-ttl option in dnssec-policy; however, the latter option was not
  fully effective.  This has been corrected: zones no longer load if they
  contain TTLs greater than the limit configured in dnssec-policy.  For
  zones with both the old max-zone-ttl option and dnssec-policy configured,
  the old option is ignored, and a warning is generated.  [GL #2918]

* rndc dumpdb -expired was fixed to include expired RRsets, even if
  stale-cache-enable is set to no and the cache-cleaning time window has
  passed.  [GL #3462]
2022-08-17 15:38:28 +00:00
taca
0cab809b63 net/bind916: update to 9.16.31
9.6.31 (2022-07-20)

5917.	[bug]		Update ifconfig.sh script as is miscomputed interface
			identifiers when destroying interfaces. [GL #3061]

5915.	[bug]		Detect missing closing brace (}) and computational
			overflows in $GENERATE directives. [GL #3429]

5913.	[bug]		Fix a race between resolver query timeout and
			validation in resolver.c:validated(). Remove
			resolver.c:maybe_destroy() as it is no loger needed.
			[GL #3398]

5909.	[bug]		The server-side destination port was missing from dnstap
			captures of client traffic. [GL #3309]

5905.	[bug]		When the TCP connection would be closed/reset between
			the connect/accept and the read, the uv_read_start()
			return value would be unexpected and cause an assertion
			failure. [GL #3400]

5903.	[bug]		When named checks that the OPCODE in a response matches
			that of the request, if there is a mismatch named logs
			an error.  Some of those error messages incorrectly
			used RCODE instead of OPCODE to lookup the nemonic.
			This has been corrected. [GL !6420]
2022-07-20 15:14:13 +00:00
jperkin
761a3b9852 bind916: Fix SMF method script. Bump PKGREVISION. 2022-07-19 11:56:00 +00:00
wiz
8292204475 *: recursive bump for perl 5.36 2022-06-28 11:30:51 +00:00
taca
2076a52f14 net/bind916: update to 9.16.30
--- 9.16.30 released ---

5899.	[func]		Don't try to process DNSSEC-related and ZONEMD records
			in catz. [GL #3380]

5890.	[bug]		When the fetches-per-server quota was adjusted
			because of an authoritative server timing out more
			or less frequently, it was incorrectly set to 1
			rather than the intended value.  This has been
			fixed. [GL #3327]

5888.	[bug]		Only write key files if the dnssec-policy keymgr has
			changed the metadata. [GL #3302]

5823.	[func]		Replace hazard pointers based lock-free list with
			locked-list based queue that's simpler and has no or
			little performance impact. [GL #3180]
2022-06-15 14:02:36 +00:00
taca
a0db95e716 net/bind916: update to 9.16.29
This release contains a fix for CVE-2022-1183.


	--- 9.16.29 released ---

5885.	[bug]		RPZ NSIP and NSDNAME rule processing didn't handle stub
			and static-stub zones at or above the query name.  This
			has now been addressed. [GL #3232]

5881.	[bug]		dig +nssearch could hang in rare cases when recv_done()
			callback was being called earlier than send_done().
			[GL #3278]

5880.	[func]		Add new named command-line option -C to print built-in
			defaults. [GL #1326]

5879.	[contrib]	dlz: Add FALLTHROUGH and UNREACHABLE macros. [GL #3306]

5874.	[bug]		keymgr didn't work with python 3.11. [GL !6157]

5866.	[bug]		Work around a jemalloc quirk which could trigger an
			out-of-memory condition in named over time. [GL #3287]

5863.	[bug]		If there was a pending negative cache DS entry,
			validations depending upon it could fail. [GL #3279]

5858.	[bug]		Don't remove CDS/CDNSKEY DELETE records on zone sign
			when using 'auto-dnssec maintain;'. [GL #2931]
2022-05-18 15:05:07 +00:00
taca
b69d3102b6 net/bind916: update to 9.16.28
--- 9.16.28 released ---

5856.	[bug]		The "starting maxtime timer" message related to outgoing
			zone transfers was incorrectly logged at the ERROR level
			instead of DEBUG(1). [GL #3208]

5852.	[func]		Add new "reuseport" option to enable/disable load
			balancing of sockets. [GL #3249]

5843.	[bug]		When an UPDATE targets a zone that is not configured,
			the requested zone name is now logged in the "not
			authoritative" error message, so that it is easier to
			track down problematic update clients. [GL #3209]

5836.	[bug]		Quote the dns64 prefix in error messages that complain
			about problems with it, to avoid confusion with the
			following dns64 ACLs. [GL #3210]

5834.	[cleanup]	C99 variable-length arrays are difficult to use safely,
			so avoid them except in test code. [GL #3201]

5828.	[bug]		Replace single TCP write timer with per-TCP write
			timers. [GL #3200]

5824.	[bug]		Invalid dnssec-policy definitions were being accepted
			where the defined keys did not cover both KSK and ZSK
			roles for a given algorithm.  This is now checked for
			and the dnssec-policy is rejected if both roles are
			not present for all algorithms in use. [GL #3142]
2022-04-21 14:14:46 +00:00
adam
f5e35d538b revbump for textproc/icu update 2022-04-18 19:09:40 +00:00
adam
e39295c91d revbump for devel/protobuf 2022-04-03 18:50:16 +00:00
jperkin
2e0efd0a61 bind916: Fix linker flags on SunOS. 2022-03-31 12:16:24 +00:00
taca
0b6f7a63c4 net/bind916: update to 9.16.27
--- 9.16.27 released ---

5818.	[security]	A synchronous call to closehandle_cb() caused
			isc__nm_process_sock_buffer() to be called recursively,
			which in turn left TCP connections hanging in the
			CLOSE_WAIT state blocking indefinitely when
			out-of-order processing was disabled. (CVE-2022-0396)
			[GL #3112]
2022-03-17 00:18:05 +00:00
taca
b007ea132b net/bind916: update to 9.16.26
--- 9.16.26 released ---

5801.	[bug]		Log "quota reached" message when hard quota
			is reached when accepting a connection. [GL #3125]

5800.	[func]		Add ECS support to the DLZ interface. [GL #3082]

5797.	[bug]		A failed view configuration during a named
			reconfiguration procedure could cause inconsistencies
			in BIND internal structures, causing a crash or other
			unexpected errors. [GL #3060]

5795.	[bug]		rndc could crash when interrupted by a signal
			before receiving a response. [GL #3080]

5793.	[bug]		Correctly detect and enable UDP recvmmsg support
			in all versions of libuv that support it. [GL #3095]
2022-02-20 12:57:56 +00:00
gutteridge
71c39cd216 bind916: fix builds on Solaris derivates
A patch fixing SunOS builds was lost during a recent update, restore
it. (And s/SmartOS/SunOS/ in comment, this doesn't just affect SmartOS,
reproduced and fixed on OmniOS. This package also fails to build on
Linux, but that's another issue entirely.) Addresses PR pkg/56716 from
Russell Hansen.
2022-02-17 15:37:26 +00:00
taca
58e3de27c0 net/bind916: update to 9.16.25
Notes for BIND 9.16.25

Feature Changes

* Overall memory use by named has been optimized and reduced, especially on
  systems with many CPU cores.  The default memory allocator has been
  switched from internal to external.  A new command-line option -M internal
  allows named to be started with the old internal memory allocator.  [GL
  #2398]

Bug Fixes

* On FreeBSD, TCP connections leaked a small amount of heap memory, leading
  to an eventual out-of-memory problem.  This has been fixed.  [GL #3051]

* If signatures created by the ZSK were expired and the ZSK private key was
  offline, the signatures were not replaced.  This behavior has been amended
  to replace the expired signatures with new signatures created using the
  KSK.  [GL #3049]

* Under certain circumstances, the signed version of an inline-signed zone
  could be dumped to disk without the serial number of the unsigned version
  of the zone.  This prevented resynchronization of the zone contents after
  named restarted, if the unsigned zone file was modified while named was
  not running.  This has been fixed.  [GL #3071]
2022-01-27 13:35:36 +00:00
he
44c7ca76f3 Eh, undo PKGREVISION. 2021-12-15 14:19:21 +00:00
he
4b8c1722e8 Upgrade net/bind916 to version 9.16.24.
Upstream changes:

        --- 9.16.24 released ---

5773.   [func]          Change the message when accepting TCP connection has
                        failed to say "Accepting TCP connection failed" and
                        change the log level for ISC_R_NOTCONNECTED, ISC_R_QUOTA
                        and ISC_R_SOFTQUOTA results codes from ERROR to INFO.
                        [GL #2700]

5768.   [bug]           dnssec-dsfromkey failed to omit revoked keys. [GL #853]

5764.   [bug]           dns_sdlz_putrr failed to process some valid resource
                        records. [GL #3021]

5762.   [bug]           Fix a "named" crash related to removing and restoring a
                        `catalog-zone` entry in the configuration file and
                        running `rndc reconfig`. [GL #1608]

5758.   [bug]           mdig now honors the operating system's preferred
                        ephemeral port range. [GL #2374]

5757.   [test]          Replace sed in nsupdate system test with awk to
                        construct the nsupdate command.  The sed expression
                        was not reliably changing the ttl. [GL #3003]
2021-12-15 14:18:32 +00:00
adam
b6d9bd86bc revbump for icu and libffi 2021-12-08 16:01:42 +00:00
taca
3320f8267a net/bind916: update to 9.16.23
--- 9.16.23 released ---

5752.	[bug]		Fix an assertion failure caused by missing member zones
			during a reload of a catalog zone. [GL #2308]

5750.	[bug]		Fix a bug when comparing two RSA keys. There was a typo
			which caused the "p" prime factors to not being
			compared. [GL #2972]

5737.	[bug]		Address Coverity warning in lib/dns/dnssec.c.
			[GL #2935]
2021-11-19 14:32:27 +00:00
kim
fcb31ffb58 *: Revbump for protobuf-3.19.0
Fix for: Shared object "libprotobuf.so.29" not found
2021-11-11 12:02:46 +00:00
taca
d008fe8afe net/bind916: update distinfo
Update distinfo with latest digest(1).
2021-10-29 07:54:34 +00:00
taca
fb75dcac53 net/bind916: update to 9.16.22
This release contains security fix.

--- 9.16.22 released ---

5736.	[security]	The "lame-ttl" option is now forcibly set to 0. This
			effectively disables the lame server cache, as it could
			previously be abused by an attacker to significantly
			degrade resolver performance. (CVE-2021-25219)
			[GL #2899]

5724.	[bug]		Address a potential deadlock when checking zone content
			consistency. [GL #2908]

5723.	[bug]		Change 5709 broke backward compatibility for the
			"check-names master ..." and "check-names slave ..."
			options. This has been fixed. [GL #2911]

5720.	[contrib]	Old-style DLZ drivers that had to be enabled at
			build-time have been marked as deprecated. [GL #2814]

5719.	[func]		The "map" zone file format has been marked as
			deprecated. [GL #2882]

5717.	[func]		The "cache-file" option, which was documented as "for
			testing purposes only" and not to be used, has been
			removed. [GL #2903]

5716.	[bug]		Multiple library names were mistakenly passed to the
			krb5-config utility when ./configure was invoked with
			the --with-gssapi=[/path/to/]krb5-config option. This
			has been fixed by invoking krb5-config separately for
			each required library. [GL #2866]

5715.	[func]		Add a check for ports specified in "*-source(-v6)"
			options clashing with a global listening port. Such a
			configuration was already unsupported, but it failed
			silently; it is now treated as an error. [GL #2888]

5714.	[bug]		Remove the "adjust interface" mechanism which was
			responsible for setting up listeners on interfaces when
			the "*-source(-v6)" address and port were the same as
			the "listen-on(-v6)" address and port. Such a
			configuration is no longer supported; under certain
			timing conditions, that mechanism could prevent named
			from listening on some TCP ports. This has been fixed.
			[GL #2852]

5712.	[doc]		Add deprecation notice about removing native PKCS#11
			support in the next major BIND 9 release. [GL #2691]
2021-10-29 06:01:19 +00:00
nia
ab845b2028 net: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Not committed (merge conflicts...):

net/radsecproxy/distinfo

The following distfiles could not be fetched (fetched conditionally?):

./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch
2021-10-26 11:05:20 +00:00
taca
6635d95bcb net/bind916: update pkgsrc changes from NetBSD
Catch up changes from NetBSD; update them for BIND 9.16.

Bump PKGREVISION.
2021-10-24 06:40:28 +00:00
kim
8f52ceaa4f *: Revbump for protobuf-3.18.0
Fix for: Shared object "libprotobuf.so.28" not found
2021-10-21 20:33:03 +00:00
nia
5c85662953 net: Remove SHA1 hashes for distfiles 2021-10-07 14:41:10 +00:00
taca
fd6a608f35 net/bind916: update to 9.16.21
--- 9.16.21 released ---

5711.	[bug]		"map" files exceeding 2GB in size failed to load due to
			a size comparison that incorrectly treated the file size
			as a signed integer. [GL #2878]

5710.	[port]		win32: incorrect parentheses resulted in the wrong
			sizeof() tests being used to pick the appropriate
			Windows atomic operations for the object's size.
			[GL #2891]

5709.	[cleanup]	Enum values throughout the code have been updated
			to use the terms "primary" and "secondary" instead of
			"master" and "slave", respectively. [GL #1944]

5708.	[bug]		The thread-local isc_tid_v variable was not properly
			initialized when running BIND 9 as a Windows Service,
			leading to a crash on startup. [GL #2837]

5705.	[bug]		Change #5686 altered the internal memory structure of
			zone databases, but neglected to update the MAPAPI value
			for zone files in "map" format. This caused named to
			attempt to load incompatible map files, triggering an
			assertion failure on startup. The MAPAPI value has now
			been updated, so named rejects outdated files when
			encountering them. [GL #2872]

5704.	[bug]		Change #5317 caused the EDNS TCP Keepalive option to be
			ignored inadvertently in client requests. It has now
			been fixed and this option is handled properly again.
			[GL #1927]

5701.	[bug]		named-checkconf failed to detect syntactically invalid
			values of the "key" and "tls" parameters used to define
			members of remote server lists. [GL #2461]

5700.	[bug]		When a member zone was removed from a catalog zone,
			journal files for the former were not deleted.
			[GL #2842]

5699.	[func]		Data structures holding DNSSEC signing statistics are
			now grown and shrunk as necessary upon key rollover
			events. [GL #1721]

5698.	[bug]		When a DNSSEC-signed zone which only has a single
			signing key available is migrated to use KASP, that key
			is now treated as a Combined Signing Key (CSK).
			[GL #2857]

5696.	[protocol]	Support for HTTPS and SVCB record types has been added.
			(This does not include ADDITIONAL section processing for
			these record types, only basic support for RR type
			parsing and printing.) [GL #1132]

5694.	[bug]		Stale data in the cache could cause named to send
			non-minimized queries despite QNAME minimization being
			enabled. [GL #2665]

5691.	[bug]		When a dynamic zone was made available in another view
			using the "in-view" statement, running "rndc freeze"
			always reported an "already frozen" error even though
			the zone was successfully frozen. [GL #2844]

5690.	[func]		dnssec-signzone now honors Predecessor and Successor
			metadata found in private key files: if a signature for
			an RRset generated by the inactive predecessor exists
			and does not need to be replaced, no additional
			signature is now created for that RRset using the
			successor key. This enables dnssec-signzone to gradually
			replace RRSIGs during a ZSK rollover. [GL #1551]
2021-09-19 16:26:51 +00:00
taca
06d08d1b59 net/bind916: add patch for map zone file problem
Add patch: <https://kb.isc.org/docs/map-zone-format-incompatibility-in-bind-9-16-20-and-9-17-17>.

Bump PKGREVISION.
2021-08-21 03:55:54 +00:00
taca
998eeeaf0e net/bind916: update to 9.16.20
This update contains security fix: CVE-2021-25218.


	--- 9.16.20 released ---

5689.	[security]	An assertion failure occurred when named attempted to
			send a UDP packet that exceeded the MTU size, if
			Response Rate Limiting (RRL) was enabled.
			(CVE-2021-25218) [GL #2856]

5688.	[bug]		Zones using KASP and inline-signed zones failed to apply
			changes from the unsigned zone to the signed zone under
			certain circumstances. This has been fixed. [GL #2735]

5687.	[bug]		"rndc reload <zonename>" could trigger a redundant
			reload for an inline-signed zone whose zone file was not
			modified since the last "rndc reload". This has been
			fixed. [GL #2855]

5686.	[func]		The number of internal data structures allocated for
			each zone was reduced. [GL #2829]

5685.	[bug]		named failed to check the opcode of responses when
			performing zone refreshes, stub zone updates, and UPDATE
			forwarding. This has been fixed. [GL #2762]

5682.	[bug]		Some changes to "zone-statistics" settings were not
			properly processed by "rndc reconfig". This has been
			fixed. [GL #2820]

5681.	[func]		Relax the checks in the dns_zone_cdscheck() function to
			allow CDS and CDNSKEY records in the zone that do not
			match an existing DNSKEY record, as long as the
			algorithm matches. This allows a clean rollover from one
			provider to another in a multi-signer DNSSEC
			configuration. [GL #2710]

5679.	[func]		Thread affinity is no longer set. [GL #2822]

5678.	[bug]		The "check DS" code failed to release all resources upon
			named shutdown when a refresh was in progress. This has
			been fixed. [GL #2811]

5672.	[bug]		Authentication of rndc messages could fail if a
			"controls" statement was configured with multiple key
			algorithms for the same listener. This has been fixed.
			[GL #2756]
2021-08-19 03:33:49 +00:00
jklos
dabc348783 Fixed COMMENT because package is at 9.16. 2021-08-02 18:45:35 +00:00
he
c1cfce5612 Upgrade net/bind916 to version 9.16.19.
Upstream changes:

        --- 9.16.19 released ---

5671.   [bug]           A race condition could occur where two threads were
                        competing for the same set of key file locks, leading to
                        a deadlock. This has been fixed. [GL #2786]

5670.   [bug]           create_keydata() created an invalid placeholder keydata
                        record upon a refresh failure, which prevented the
                        database of managed keys from subsequently being read
                        back. This has been fixed. [GL #2686]

5669.   [func]          KASP support was extended with the "check DS" feature.
                        Zones with "dnssec-policy" and "parental-agents"
                        configured now check for DS presence and can perform
                        automatic KSK rollovers. [GL #1126]

5668.   [bug]           Rescheduling a setnsec3param() task when a zone failed
                        to load on startup caused a hang on shutdown. This has
                        been fixed. [GL #2791]

5667.   [bug]           The configuration-checking code failed to account for
                        the inheritance rules of the "dnssec-policy" option.
                        This has been fixed. [GL #2780]

5666.   [doc]           The safe "edns-udp-size" value was tweaked to match the
                        probing value from BIND 9.16 for better compatibility.
                        [GL #2183]

5665.   [bug]           If nsupdate sends an SOA request and receives a REFUSED
                        response, it now fails over to the next available
                        server. [GL #2758]

5664.   [func]          For UDP messages larger than the path MTU, named now
                        sends an empty response with the TC (TrunCated) bit set.
                        In addition, setting the DF (Don't Fragment) flag on
                        outgoing UDP sockets was re-enabled. [GL #2790]

5662.   [bug]           Views with recursion disabled are now configured with a
                        default cache size of 2 MB unless "max-cache-size" is
                        explicitly set. This prevents cache RBT hash tables from
                        being needlessly preallocated for such views. [GL #2777]

5661.   [bug]           Change 5644 inadvertently introduced a deadlock: when
                        locking the key file mutex for each zone structure in a
                        different view, the "in-view" logic was not considered.
                        This has been fixed. [GL #2783]

5658.   [bug]           Increasing "max-cache-size" for a running named instance
                        (using "rndc reconfig") did not cause the hash tables
                        used by cache databases to be grown accordingly. This
                        has been fixed. [GL #2770]

5655.   [bug]           Signed, insecure delegation responses prepared by named
                        either lacked the necessary NSEC records or contained
                        duplicate NSEC records when both wildcard expansion and
                        CNAME chaining were required to prepare the response.
                        This has been fixed. [GL #2759]

5653.   [bug]           A bug that caused the NSEC3 salt to be changed on every
                        restart for zones using KASP has been fixed. [GL #2725]
2021-07-22 13:30:24 +00:00
rin
e349de9b55 net/bind916: Oops, fix reversed ``#if'' 2021-07-20 07:23:04 +00:00
rin
627bd1d1ca net/bind916 --disable-atomic is no longer supported 2021-07-20 06:41:46 +00:00
rin
ad2fd24b8d net/bind916 Use atomic 32-bit integers where appropriate, revision++
Mostly taken from NetBSD base:

- For counters, make sure to use 32-bit integers for !_LP64 platforms.
  In the previous revisions, this is partially done, i.e., incomplete.

- For flags fit within 32-bit width, use 32-bit integers for everyone.
  In the previous, this is incomplete, and restricted for __NetBSD__.
  Fix and generalize to everyone.

- Make comments in patches more helpful.

Fix build for ILP32 platforms as reported in PR pkg/56315.

Thanks jklos@ for testing.
2021-07-20 06:39:45 +00:00
nia
55394cf036 Revbump for MySQL default change 2021-06-23 20:33:06 +00:00
otis
7061e9618a net/bind916: Update to 9.6.18
This is a bugfix release.

- Fixed a bug that caused the NSEC salt to be changed for KASP zones on every
  startup.

- Signed, insecure delegation responses prepared by named either lacked the
  necessary NSEC records or contained duplicate NSEC records when both wildcard
  expansion and CNAME chaining were required to prepare the response. This has
  been fixed.

- Queries where the wildcard match contained the letter W failed to return the
  correct response as the W was mapped to \000.

- Checking of key-directory and dnssec-policy was broken. The checks failed to
  account for key-directory inheritance.

Full release notes:
https://bind9.readthedocs.io/en/v9_16/notes.html#notes-for-bind-9-16-18
2021-06-19 13:18:21 +00:00