Commit graph

26 commits

Author SHA1 Message Date
tonnerre
fc39e60fea Fix a Denial-of-Service vulnerability in maradns version 1.2.12.06
Crafted CNAME entries can be used to DoS MaraDNS without this patch
See CVE-2008-0061 for more details
Approved-by: wiz
2008-03-19 22:55:21 +00:00
joerg
aed560de83 Remove patches that were scheduled for removal with the last maradns
update.
2007-08-23 09:53:13 +00:00
joerg
9258a49e84 Update to maradns-1.2.12.06.
Most important changes:
- full Y2038 compliance
- full support for DNS over TCP
- some changes in the zone format.
2007-08-12 01:14:30 +00:00
joerg
161c920c15 Prepare for switching to NO_MTREE=yes. 2007-03-24 19:21:18 +00:00
obache
578d809b76 Update maradns to 1.0.39.
changelog:
       maradns-1.0.39:

           * Backport of memory leak fix to 1.0 branch of MaraDNS

           (2006.07.24)

       maradns-1.0.38:
           Backport of MaraDNS 1.2.09 Microsoft.com fix to legacy 1.0 branch

           (2006.06.16)

       maradns-1.0.37:
           This is an update for the 1.0 legacy branch of MaraDNS

           * Removed all example mararc files which allow any IP on the
             internet to perform recursive queries (these can be used for
             denial of service attacks)

           (2006.04.07)

       maradns-1.0.36:
           This is a bugfix release for the legacy 1.0 branch of MaraDNS.

           * A backport of the 2-line patch recently posted to the mailing
             list concerning incorrect dangling CNAME warnings

           (2005.12.31)

       maradns-1.0.35:

           * Backport of 1.1.x fix of csv1 example in documentation

           * Backport of 1.1.x fix of MINFO RR description

           * Backport of 1.1.x security fix.

           (2005.11.20)

       maradns-1.0.34:

           * Hotfix: recursion works again

           * Regression procedure added.

           (2005.10.26)

       maradns-1.0.33:

           * Fixed occassional crash that happens while reading zone files at
             MaraDNS startup.

           * Fixed occassional compression error which shows up in MaraDNS
             logs.

           * Update man page to point out some unimplemented features will be
             in 1.2

           (2005.10.24)

       maradns-1.0.32:
           Hotfix: RR rotation now works again.

           (2005.08.08)

       maradns-1.0.31:
           Two patches by Albert Lee that improve Maras stability.

           (2005.08.07)

       maradns-1.0.30:

           * Warn the user when they have dangling CNAME records

           * Fix bug with MX records with preferences > 255 in getzone tool

           (2005.06.30)

       maradns-1.0.29:
           This release improves how MaraDNS'recursive resolver parses
           packets so that Mara can interoperate better with some stub
           resolvers that dont bother looking past the header of a DNS
           packet.

           (2005.05.13)
2006-12-13 04:35:16 +00:00
ghen
b7b5b640e0 Use 3rd person for DESCR. 2006-04-27 19:50:15 +00:00
jlam
9c8b5ede43 Point MAINTAINER to pkgsrc-users@NetBSD.org in the case where no
developer is officially maintaining the package.

The rationale for changing this from "tech-pkg" to "pkgsrc-users" is
that it implies that any user can try to maintain the package (by
submitting patches to the mailing list).  Since the folks most likely
to care about the package are the folks that want to use it or are
already using it, this would leverage the energy of users who aren't
developers.
2006-03-04 21:28:51 +00:00
joerg
c20234c51d DragonFly also needs sys/time.h before sys/resource.h. 2006-01-25 17:48:54 +00:00
jlam
dc9594e09d Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mk
automatically detects whether we want the pkginstall machinery to be
used by the package Makefile.
2005-12-29 06:21:30 +00:00
salo
37a5e2dd19 Update to version 1.0.28
Too many changes to list, see CHANGELOG within the source tarball.
This update was prompted by an issue with random number generator,
see the following url for details:

 http://www.maradns.org/download/patches/maradns-1.0.26-rekey_rng
2005-05-13 13:25:55 +00:00
tv
f816d81489 Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used. 2005-04-11 21:44:48 +00:00
wiz
3f03ff5750 Remove broken rc.d script. Fixes PR 24587. Bump PKGREVISION. 2005-03-14 23:41:35 +00:00
agc
b12d62efb5 Add RMD160 digests. 2005-02-24 12:13:41 +00:00
reed
32d8f290c2 The default location of the pkgsrc-installed rc.d scripts is now
under share/examples/rc.d. The variable name already was named
RCD_SCRIPTS_EXAMPLEDIR.

This is from ideas from Greg Woods and others.

Also bumped PKGREVISION for all packages using RCD_SCRIPTS mechanism
(as requested by wiz).
2004-12-28 02:47:40 +00:00
jlam
00686c240d Set PTHREAD_AUTO_VARS to "yes" after pthread.buildlink3.mk was changed
not to automatically add pthread-related CFLAGS, LDFLAGS, and LIBS to
the configure and build processes.
2004-12-04 23:09:06 +00:00
wiz
54cea8dbf4 Fix build (missing PTHREAD_LDFLAGS). 2004-12-04 11:58:06 +00:00
wiz
8863d919d7 Reset maintainer on his request. 2004-11-27 18:04:20 +00:00
jlam
af591191d2 Remove redundant uses of PTHREAD_{CFLAGS,LDFLAGS} now that they're added
automatically by pthread.buildlink3.mk.  Also, factor out the pthread
library out of PTHREAD_LDFLAGS into a standalone variable PTHREAD_LIBS
and use it in packages where necessary (usually the ones that don't
have a GNU configure script).
2004-11-12 06:39:19 +00:00
snj
0a9411e5e7 Convert to buildlink3. 2004-04-25 08:24:03 +00:00
reed
9c790735db mk/bsd.pkg.install.mk now automatically registers
the RCD_SCRIPTS rc.d script(s) to the PLIST.

This GENERATE_PLIST idea is part of Greg A. Woods'
PR #22954.

This helps when the RC_SCRIPTS are installed to
a different ${RCD_SCRIPTS_EXAMPLEDIR}. (Later,
the default RCD_SCRIPTS_EXAMPLEDIR will be changed
to be more clear that they are the examples.)

These patches also remove the etc/rc.d/ scripts from PLISTs
(of packages that use RCD_SCRIPTS). (This also removes
now unused references from openssh* makefiles. Note that
qmail package has not been changed yet.)

I have been doing automatic PLIST registration for RC_SCRIPTS
for over a year. Not all of these packages have been tested,
but many have been tested and used.

Somethings maybe to do:
- a few packages still manually install the rc.d scripts to
  hard-coded etc/rc.d. These need to be fixed.
- maybe  remove from mk/${OPSYS}.pkg.dist mtree specifications too.
2004-04-23 22:07:52 +00:00
cube
4f73b397e7 o Better handling of pthreads dependency
o Fixes to make building and installing more easy
o Make MaraDNS actually look into ${PKG_SYSCONFDIR} for its configuration
  file, thus bumping PKGREVISION.
2003-11-14 21:19:03 +00:00
wiz
92c0808d82 Make build with pth. 2003-11-14 09:34:42 +00:00
xtraeme
24cdb08135 Add pthread's buildlink and fix typo (fixes bulk build by hubertf@) 2003-09-27 02:29:18 +00:00
jmmv
77158045c8 Reimplace removal of ${PREFIX}/doc after installation.
(Note that anyway, maradns' installation process is screwed up.  It uses
cp and mkdir to install things, it copies useless stuff like Makefiles,
installs duplicates of manpages, etc...)
2003-09-26 11:20:27 +00:00
xtraeme
d6697f91b0 Updated to 1.0.18
Changes:

	Cleaned up and fixed a bug in the MaraDNS startup
	script. Now, the only prorcesses that will be killed
	will be bona fide MaraDNS processes.

Closes PR pkg/22963.
2003-09-26 10:11:58 +00:00
xtraeme
133995d090 Initial import of maradns 1.0.17.
Package provided by pancake <pancake@phreaker.net> via pkgsrc-wip.

MaraDNS is a package that implements the Domain Name Service (DNS), an
essential internet service. MaraDNS is intended for environments where a DNS
server must be secure and where the server must use the absolute minimum
number of resources possible. MaraDNS was created in response to issues
people had with the DNS servers available in early 2001; and has the
following design goals:

Security-aware programming. A DNS server needs to be secure. I have a number
of security features in the code, including:

   1. The code uses a special string library which is resistant to buffer
      overflows.

   2. The code, if started as root, mandates running as an unpriviledged user
      in a chroot() jail.

Open-Source. The 1.0 release of the DNS server is public-domain code;
the 1.2 release will be released under a very liberal BSD-style license.

Simplicity. This DNS server has the minimum number of features needed to
correctly act as an authoritative and/or recursive name server.
2003-09-25 14:12:50 +00:00