Commit graph

40 commits

Author SHA1 Message Date
taca
3161c9fde9 net/bind911: update to 9.11.26
Update bind911 to 9.11.26 (BIND 9.11.26) which is maintenance release.

	--- 9.11.26 released ---

5544.	[func]		Restore the default value of "nocookie-udp-size" to 4096
			bytes. [GL #2250]

5541.	[func]		Adjust the "max-recursion-queries" default from 75 to
			100. [GL #2305]

5540.	[port]		Fix building with native PKCS#11 support for AEP Keyper.
			[GL #2315]

5539.	[bug]		Tighten handling of missing DNS COOKIE responses over
			UDP by falling back to TCP. [GL #2275]

5534.	[bug]		The CNAME synthesized from a DNAME was incorrectly
			followed when the QTYPE was CNAME or ANY. [GL #2280]
2020-12-19 14:44:15 +00:00
taca
0daf4f32db net/bind911: apply fix for man page problems
Apply fix for man page problems as bind-announce post.

Message-ID: <467ff8dc-00a0-674f-3b09-ae0ebf8dd293@isc.org>
Subject: A fix is available for man page problems affecting the BIND 9.11.25 release (was Re: New BIND releases are available: 9.11.25, 9.16.9, and 9.17.7)
Date: Mon, 30 Nov 2020 01:51:28 -0900
From: Michael McNally <mcnally@isc.org>
To: bind-announce@lists.isc.org

Bump PKGREVISION.
2020-12-02 14:54:55 +00:00
otis
851ed74f56 bind911: Actually remove unneeded patch 2020-11-26 11:29:10 +00:00
otis
81b34c25df bind911: Update to 9.11.25
Changes:

	--- 9.11.25 released ---

5527.	[bug]		A NULL pointer dereference occurred when creating an NTA
			recheck query failed. [GL #2244]

5523.	[bug]		The initial lookup in a zone transitioning to/from a
			signed state could fail if the DNSKEY RRset was not
			found. [GL #2236]

5518.	[bug]		Stub zones now work correctly with primary servers using
			"minimal-responses yes". [GL #1736]

	--- 9.11.24 released ---

5516.	[func]		The default EDNS buffer size has been changed from 4096
			to 1232 bytes. [GL #2183]

5513.	[doc]		The ARM section describing the "rrset-order" statement
			was rewritten to make it unambiguous and up-to-date with
			the source code. [GL #2139]

5510.	[bug]		Implement the attach/detach semantics for dns_message_t
			to fix a data race in accessing an already-destroyed
			fctx->rmessage. [GL #2124]

5506.	[bug]		Properly handle failed sysconf() calls, so we don't
			report invalid memory size. [GL #2166]
2020-11-26 11:24:13 +00:00
ryoon
2831546220 *: Recursive revbump from textproc/icu-68.1 2020-11-05 09:07:25 +00:00
taca
0b1c9c4deb net/bind911: update to 9.11.23
Update bind911 package to 9.11.23.


	--- 9.11.23 released ---

5497.	[bug]		'dig +bufsize=0' failed to disable EDNS. [GL #2054]

5496.	[bug]		Address a TSAN report by ensuring each rate limiter
			object holds a reference to its task. [GL #2081]

5492.	[bug]		Tighten LOC parsing to reject a period (".") and/or "m"
			as a value. Fix handling of negative altitudes which are
			not whole meters. [GL #2074]

5489.	[bug]		Named erroneously accepted certain invalid resource
			records that were incorrectly processed after
			subsequently being written to disk and loaded back, as
			the wire format differed. Such records include: CERT,
			IPSECKEY, NSEC3, NSEC3PARAM, NXT, SIG, TLSA, WKS, and
			X25. [GL !3953]

5488.	[bug]		NTA code needed to have a weak reference on its
			associated view to prevent the latter from being deleted
			while NTA tests were being performed. [GL #2067]
2020-09-19 13:07:00 +00:00
wiz
00da7815c0 *: bump PKGREVISION for perl-5.32. 2020-08-31 18:06:29 +00:00
taca
55dd6a8375 net/bind911: update to 9.11.22
Update bind911 to 9.11.22 (BIND 9.11.22).


	--- 9.11.22 released ---

5481.	[security]	"update-policy" rules of type "subdomain" were
			incorrectly treated as "zonesub" rules, which allowed
			keys used in "subdomain" rules to update names outside
			of the specified subdomains. The problem was fixed by
			making sure "subdomain" rules are again processed as
			described in the ARM. (CVE-2020-8624) [GL #2055]

5480.	[security]	When BIND 9 was compiled with native PKCS#11 support, it
			was possible to trigger an assertion failure in code
			determining the number of bits in the PKCS#11 RSA public
			key with a specially crafted packet. (CVE-2020-8623)
			[GL #2037]

5476.	[security]	It was possible to trigger an assertion failure when
			verifying the response to a TSIG-signed request.
			(CVE-2020-8622) [GL #2028]

5475.	[bug]		Wildcard RPZ passthru rules could incorrectly be
			overridden by other rules that were loaded from RPZ
			zones which appeared later in the "response-policy"
			statement. This has been fixed. [GL #1619]

5474.	[bug]		dns_rdata_hip_next() failed to return ISC_R_NOMORE
			when it should have. [GL !3880]

5465.	[func]		Added fallback to built-in trust-anchors, managed-keys,
			or trusted-keys if the bindkeys-file (bind.keys) cannot
			be parsed. [GL #1235]

5463.	[bug]		Address a potential NULL pointer dereference when out of
			memory in dnstap.c. [GL #2010]

5462.	[bug]		Move LMDB locking from LMDB itself to named. [GL #1976]
2020-08-21 16:09:44 +00:00
taca
79c9832a35 net/bind911: update to 9.11.20
Update bind911 to 9.11.20, fixing CVE-2020-8619.


	--- 9.11.20 released ---

5437.	[bug]		Fix a data race in lib/dns/resolver.c:log_formerr().
			[GL #1808]

5434.	[security]	It was possible to trigger an INSIST in
			lib/dns/rbtdb.c:new_reference() with a particular zone
			content and query patterns. (CVE-2020-8619) [GL #1111]
			[GL #1718]

5433.	[test]		Prevent the resolver system test for change #5395
			(max-recursion-queries) from failing on systems without
			IPv6 support. [GL #1873]

5428.	[bug]		Clean up GSSAPI resources in nsupdate only after taskmgr
			has been destroyed. Thanks to Petr Menšík. [GL !3316]

5427.	[bug]		Fix a regression in address/prefix length checking that
			should have been a warning instead of an error.
			[GL #1849]

5415.	[test]		Address race in dnssec system test that led to
			test failures. [GL #1852]

5413.	[test]		Address race in autosign system test that led to
			test failures. [GL #1852]

5412.	[bug]		'provide-ixfr no;' failed to return up-to-date responses
			when the serial was greater than or equal to the
			current serial. [GL #1714]

5409.	[performance]	When looking up NSEC3 data in a zone database, skip the
			check for empty non-terminal nodes; the NSEC3 tree does
			not have any. [GL #1834]

5408.	[protocol]	Print Extended DNS Errors if present in OPT record.
			[GL #1835]

5405.	[bug]		'named-checkconf -p' could include spurious text in
			server-addresses statements due to an uninitialized DSCP
			value. [GL #1812]
2020-06-18 14:06:21 +00:00
adam
6bd0c30da6 Revbump for icu 2020-06-02 08:22:31 +00:00
taca
ae25457eeb net/bind911: fix build problem if PKG_DEVELOPER is enabled
There was build problem after pkg-config was aded to USE_TOOLS if
PKG_DEVELOPER is enabled, causing WRKDIR reference.

Fix method is dirty (or quick) hack.
2020-05-30 14:20:36 +00:00
jperkin
709118af45 bind*: Require pkg-config. 2020-05-21 12:45:47 +00:00
taca
dc74b6c45b net/bind911: update to 9.11.19
Update bind911 to 9.11.19 (BIND 9.11.19).


	--- 9.11.19 released ---

5404.	[bug]		'named-checkconf -z' could incorrectly indicate
			success if errors were found in one view but not in a
			subsequent one. [GL #1807]

5398.	[bug]		Named could fail to restart if a zone with a double
			quote (") in its name was added with 'rndc addzone'.
			[GL #1695]

5395.	[security]	Further limit the number of queries that can be
			triggered from a request.  Root and TLD servers
			are no longer exempt from max-recursion-queries.
			Fetches for missing name server address records
			are limited to 4 for any domain. (CVE-2020-8616)
			[GL #1388]

5394.	[cleanup]	Named formerly attempted to change the effective UID and
			GID in named_os_openfile(), which could trigger a
			spurious log message if they were already set to the
			desired values. This has been fixed. [GL #1042]
			[GL #1090]

5390.	[security]	Replaying a TSIG BADTIME response as a request could
			trigger an assertion failure. (CVE-2020-8617)
			[GL #1703]

5387.	[func]		Warn about AXFR streams with inconsistent message IDs.
			[GL #1674]
2020-05-19 10:21:25 +00:00
taca
aed0f4d9d8 net/bind911: update to 9.11.18
Update bind911 to 9.11.18 (BIND 9.11.18).


	--- 9.11.18 released ---

5380.	[contrib]	Fix building MySQL DLZ modules against MySQL 8
			libraries. [GL #1678]

5379.	[doc]		Clean up serve-stale related options that leaked into
			the BIND 9.11 release. [GL !3265]

5378.	[bug]		Receiving invalid DNS data was triggering an assertion
			failure in nslookup. [GL #1652]

5377.	[feature]	Detect atomic operations support on ppc64le. Thanks to
			Petr Menšík. [GL !3295]

5376.	[bug]		Fix ineffective DNS rebinding protection when BIND is
			configured as a forwarding DNS server. Thanks to Tobias
			Klein. [GL #1574]

5368.	[bug]		Named failed to restart if 'rndc addzone' names
			contained special characters (e.g. '/'). [GL #1655]

	--- 9.11.17 released ---

5358.	[bug]		Inline master zones whose master files were touched
			but otherwise unchanged and were subsequently reloaded
			may have stopped re-signing. [GL !3135]

5357.	[bug]		Newly added RRSIG records with expiry times before
			the previous earliest expiry times might not be
			re-signed in time.  The was a side effect of 5315.
			[GL !3137]
2020-04-18 06:12:28 +00:00
taca
48192ed304 net/bind911: update to 9.11.16
Update bind911 to 9.11.16 (BIND 9.11.16).

	--- 9.11.16 released ---

5353.	[doc]		Document port and dscp parameters in forwarders
			configuration option. [GL #914]

5352.	[bug]		Correctly handle catalog zone entries containing
			characters that aren't legal in filenames. [GL #1592]

5351.	[bug]		CDS / CDNSKEY consistency checks failed to handle
			removal records. [GL #1554]

5350.	[bug]		When a view was configured with class CHAOS,
			dns_view_findzonecut() could incorrectly return
			success for non-existent records. [GL #1540]

5348.	[bug]		dnssec-settime -Psync was not being honoured.
			[GL !2925]
2020-02-20 16:38:16 +00:00
taca
87bef80627 net/bind911: update HOMEPAGE
Update HOMEPAGE to use https://.
2020-01-23 08:00:01 +00:00
taca
bd89931d48 net/bind911: update to 9.11.15
Update bind911 to 9.11.15 (BIND 9.11.15).

	--- 9.11.15 released ---

5339.	[bug]		With some libmaxminddb versions, named could erroneously
			match an IP address not belonging to any subnet defined
			in a given GeoIP2 database to one of the existing
			entries in that database. [GL #1552]

5338.	[bug]		Fix line spacing in `rndc secroots`.
			Thanks to Tony Finch. [GL !2478]

5337.	[func]		'named -V' now reports maxminddb and protobuf-c
			versions. [GL !2686]
2020-01-23 07:58:22 +00:00
jperkin
26c1bffc9f *: Recursive revision bump for openssl 1.1.1. 2020-01-18 21:48:19 +00:00
taca
c76e5c890e net/bind911: update to 9.11.14
Update bind911 to 9.11.14 (BIND 9.11.14).

	--- 9.11.14 released ---

5330.	[bug]		'configure --without-python' was ineffective if
			PYTHON was set in the environment. [GL #1434]

5329.	[bug]		Reconfiguring named caused memory to be leaked when any
			GeoIP2 database was in use. [GL #1445]

5328.	[bug]		rbtdb.c:rdataset_{get,set}ownercase failed to obtain
			a node lock. [GL #1417]

5327.	[func]		Added a statistics counter to track queries
			dropped because the recursive-clients quota was
			exceeded. [GL #1399]

5326.	[bug]		Add python dependancy on 'distutils.core' to configure.
			'distutils.core' is required for installation.
			[GL #1397]

5322.	[bug]		Conditional compilation of lock_callback was
			inconsistent with conditional use of the function
			when forcing BIND to build with older and unsupported
			versions of OpenSSL. [GL #1386]

5321.	[bug]		Obtain write lock before updating version->records
			and version->bytes. [GL #1341]
2020-01-04 10:08:41 +00:00
taca
443e9345e5 net/bind911: update to 9.11.13
Update bind911 to 9.11.3.  It includes fix for CVS-2019-6477.


	--- 9.11.13 released ---

5315.	[bug]		Apply the inital RRSIG expiration spread fixed
			to all dynamically created records in the zone
			including NSEC3. Also fix the signature clusters
			when the server has been offline for prolonged
			period of times. [GL #1256]

5314.	[func]		Added a new statistics variable "tcp-highwater"
			that reports the maximum number of simultaneous TCP
			clients BIND has handled while running. [GL #1206]

5313.	[bug]		The default GeoIP2 database location did not match
			the ARM.  'named -V' now reports the default
			location. [GL #1301]

5310.	[bug]		TCP failures were affecting EDNS statistics. [GL #1059]

5309.	[bug]		"geoip-use-ecs yes;" was not working for GeoIP2.
			[GL #1275]

5308.	[bug]		Don't log DNS_R_UNCHANGED from sync_secure_journal()
			at ERROR level in receive_secure_serial(). [GL #1288]

5307.	[bug]		Fix hang when named-compilezone output is sent to pipe.
			Thanks to Tony Finch. [GL !2481]

5306.	[security]	Set a limit on the number of concurrently served
			pipelined TCP queries. (CVE-2019-6477) [GL #1264]

5302.	[bug]		Fix checking that "dnstap-output" is defined when
			"dnstap" is specified in a view. [GL #1281]

5301.	[bug]		Detect partial prefixes / incomplete IPv4 address in
			acls. [GL #1143]
2019-11-21 05:38:21 +00:00
rillig
eb3c2b436e net: align variable assignments
pkglint -Wall -F --only aligned --only indent -r

No manual corrections.
2019-11-03 11:45:28 +00:00
taca
a83e0161f9 net/bind911: update to 9.11.12
Update bind911 to 9.11.12 (BIND 9.11.12).  This is not security release.

	--- 9.11.12 released ---

5296.	[bug]		Address various issues reported by cppcheck. [GL !2421]

5294.	[func]		Fallback to ACE name on output in locale, which does not
			support converting it to unicode.  [GL #846]

5293.	[bug]		On Windows, named crashed upon any attempt to fetch XML
			statistics from it. [GL #1245]

5292.	[bug]		Queue 'rndc nsec3param' requests while signing inline
			zone changes. [GL #1205]
2019-10-17 00:48:31 +00:00
taca
5bb6dd8bac net/bind911: update to 9.11.10
Update bind911 to 9.11.10 (BIND 9.11.10).

	--- 9.11.10 released ---

5275.	[bug]		Mark DS records included in referral messages
			with trust level "pending" so that they can be
			validated and cached immediately, with no need to
			re-query. [GL #964]

5273.	[bug]		Check that bits [64..71] of a dns64 prefix are zero.
			[GL #1159]

5269.	[port]		cygwin: can return ETIMEDOUT on connect() with a
			non-blocking socket. [GL #1133]

5268.	[bug]		named could crash during configuration if
			configured to use "geoip continent" ACLs with
			legacy GeoIP. [GL #1163]

5266.	[bug]		named-checkconf failed to report dnstap-output
			missing from named.conf when dnstap was specified.
			[GL #1136]

5265.	[bug]		DNS64 and RPZ nodata (CNAME *.) rules interacted badly
			[GL #1106]

5264.	[func]		New DNS Cookie algorithm - siphash24 - has been added to
			BIND 9. [GL #605]
2019-09-18 14:32:10 +00:00
wiz
84e123ddd2 Bump PKGREVISIONs for perl 5.30.0 2019-08-11 13:17:48 +00:00
taca
20d02c760e net/bind911: update to 9.11.9.
Update bind911 to 9.11.9.

	--- 9.11.9 released ---

5260.	[bug]		dnstap-read was producing malformed output for large
			packets. [GL #1093]

5258.	[func]		Added support for the GeoIP2 API from MaxMind,
			when BIND is compiled using "configure --with-geoip2".
			The legacy GeoIP API can be enabled by using
			"configure --with-geoip" instead. These options
			cannot be used together.

			Certain geoip ACL settings that were available with
			legacy GeoIP are not available when using GeoIP2.
			See the ARM for details. [GL #182]

5257.	[bug]		Some statistics data was not being displayed.
			Add shading to the zone tables. [GL #1030]

5256.	[bug]		Ensure that glue records are included in root
			priming responses if "minimal-responses" is not
			set to "yes". [GL #1092]

5255.	[bug]		Errors encountered while reloading inline-signing
			zones could be ignored, causing the zone content to
			be left in an incompletely updated state rather than
			reverted. [GL #1109]

5253.	[port]		Support platforms that don't define ULLONG_MAX.
			[GL #1098]

5249.	[bug]		Fix a possible underflow in recursion clients
			statistics when hitting recursive clients
			soft quota. [GL #1067]
2019-07-18 03:02:52 +00:00
jperkin
da6c4086ab bind*: Remove privileges from SMF method script.
This inadvertently opened up the named process to more privileges than
necessary and could be considered a security risk.  This may affect chroot
support, adding back in support for that will need to be done carefully.

Bump PKGREVISIONs.
2019-06-28 17:01:30 +00:00
jperkin
ebc81c735d bind*: Move MESSAGE to MESSAGE.rcd, they are rc.d specific. 2019-06-20 12:26:33 +00:00
taca
24df3a5811 net/bind911: update to 9.11.8
Update bind911 to 9.11.8 (BIND 9.11.8).

	--- 9.11.8 released ---

5244.	[security]	Fixed a race condition in dns_dispatch_getnext()
			that could cause an assertion failure if a
			significant number of incoming packets were
			rejected. (CVE-2019-6471) [GL #942]

5241.	[bug]		Fix Ed448 private and public key ASN.1 prefix blobs.
			[GL #225]

5237.	[bug]		Recurse to find the root server list with 'dig +trace'.
			[GL #1028]
2019-06-20 02:13:58 +00:00
jperkin
19304ee7b8 bind*: Fix a couple of issues in the SMF method.
Fix a typo in the configuration_file arguments, joyent/pkgsrc#189.
Ensure the /var/run/named directory has the correct permissions.
2019-06-19 10:58:48 +00:00
taca
70fa58b77e net/bind911: update to 9.11.7
Update bind911 to 9.11.7, this is maintenance releases.

--- 9.11.7 released ---

5233.	[bug]		Negative trust anchors did not work with "forward only;"
			to validating resolvers. [GL #997]
5232.	[bug]		Fix a high-load race/crash in isc_socket_cancel().
			[GL #834]
5231.	[protocol]	Add support for displaying CLIENT-TAG and SERVER-TAG.
			[GL #960]
5229.	[protocol]	Enforce known SSHFP fingerprint lengths. [GL #852]
5228.	[cleanup]	If trusted-keys and managed-keys are configured
			simultaneously for the same name, the key cannot
			be rolled automatically. This configuration now
			logs a warning. [GL #868]
5224.	[bug]		Only test provide-ixfr on TCP streams. [GL #991]
5222.	[bug]		'delv -t ANY' could leak memory. [GL #983]
5221.	[test]		Enable parallel execution of system tests on
			Windows. [GL !4101]
5218.	[bug]		Conditionally include <dlfcn.h>. [GL #995]
5214.	[bug]		win32: named now removes its lock file upon shutdown.
			[GL #979]
5213.	[bug]		win32: Eliminated a race which allowed named.exe running
			as a service to be killed prematurely during shutdown.
			[GL #978]
5210.	[bug]		When dnstap is enabled and recursion is not
			available, incoming queries are now logged
			as "auth". Previously, this depended on whether
			recursion was requested by the client, not on
			whether recursion was available. [GL #963]
5209.	[bug]		When update-check-ksk is true, add_sigs was not
			considering offline keys, leaving record sets signed
			with the incorrect type key. [GL #763]
5208.	[test]		Run valid rdata wire encodings through totext+fromtext
			and tofmttext+fromtext methods to check these methods.
			[GL #899]
5207.	[test]		Check delv and dig TTL values. [GL #965]
5205.	[bug]		Enforce that a DS hash exists. [GL #899]
5204.	[test]		Check that dns_rdata_fromtext() produces a record that
			will be accepted by dns_rdata_fromwire(). [GL #852]
5203.	[bug]		Enforce whether key rdata exists or not in KEY,
			DNSKEY, CDNSKEY and RKEY. [GL #899]
5197.	[bug]		dig could die in best effort mode on multiple SIG(0)
			records. Similarly on multiple OPT and multiple TSIG
			records. [GL #920]
5194.	[bug]		Enforce non empty ZOMEMD hash. [GL #899]
5193.	[bug]		EID and NIMLOC failed to do multi-line output
			correctly. [GL #899]
5192.	[bug]		configure --fips-mode failed. [GL #946]
5191.	[port]		Darwin: dlzexternal/driver.so was not building.
			[GL #948]
5189.	[cleanup]	Remove revoked root DNSKEY from bind.keys. [GL #945]
5187.	[test]		Set time zone before running any tests in dnstap_test.
			[GL #940]
5185.	[bug]		PKCS11 build could fail if ECDSA is not supported.
			[GL #935]
5184.	[bug]		Missing unlocks in sdlz.c. [GL #936]
5182.	[bug]		Fix a high-load race/crash in handling of
			isc_socket_close() in resolver. [GL #834]
5180.	[bug]		delv now honors the operating system's preferred
			ephemeral port range. [GL #925]
5179.	[cleanup]	Replace some vague type declarations with the more
			specific dns_secalg_t and dns_dsdigest_t.
			Thanks to Tony Finch. [GL !1498]
5178.	[bug]		Handle EDQUOT (disk quota) and ENOSPC (disk full)
			errors when writing files. [GL #902]
5176.	[tests]		Remove a dependency on libxml in statschannel system
			test. [GL #926]
5175.	[bug]		Fixed a problem with file input in dnssec-keymgr,
			dnssec-coverage and dnssec-checkds when using
			python3. [GL #882]
5174.	[doc]		Tidy dnssec-keygen manual. [GL !1557]
5172.	[bug]		nsupdate now honors the operating system's preferred
			ephemeral port range. [GL #905]
5170.	[test]		Added --with-dlz-filesystem to feature-test. [GL !1587]
5168.	[test]		Do not crash on shutdown when RPZ fails to load.  Also,
			keep previous version of the database if RPZ fails to
			load. [GL #813]
5167.	[bug]		nxdomain-redirect could sometimes lookup the wrong
			redirect name. [GL #892]
2019-05-20 16:03:55 +00:00
taca
3f12dc03ae net/bind911: update to 9.11.6pl1
Update bind911 to 9.11.5pl4 (BIND 9.11.5-P4).

Fix security problem CVE-2018-5743 and overhaul pkgsrc.  Now no need
to change namedb is permission under NetBSD.

* Update note about required directories.
* Drop pkg-config from USE_TOOLS.
* Drop none existing configure arguments and PKG_OPTIONS:
	- fetchlimit
	- sit

	--- 9.11.6-P1 released ---

5200.	[security]	tcp-clients settings could be exceeded in some cases,
			which could lead to exhaustion of file descriptors.
			(CVE-2018-5743) [GL #615]
2019-04-30 02:51:38 +00:00
jperkin
4a64ebb8cb bind*: Ensure named directory is created on SunOS. 2019-03-01 21:46:50 +00:00
taca
4c15df2cde net/bind911: update to 9.11.5pl4
Update bind911 to 9.11.5pl4 (BIND 9.11.5-P4).

	--- 9.11.5-P4 released ---

	--- 9.11.5-P3 released (withdrawn) ---

5141.	[security]	Zone transfer controls for writable DLZ zones were
			not effective as the allowzonexfr method was not being
			called for such zones. (CVE-2019-6465) [GL #790]

	--- 9.11.5-P2 released (withdrawn) ---

5118.	[security]	Named could crash if it is managing a key with
			`managed-keys` and the authoritative zone is rolling
			the key to an unsupported algorithm. (CVE-2018-5745)
			[GL #780]

5110.	[security]	Named leaked memory if there were multiple Key Tag
			EDNS options present. (CVE-2018-5744) [GL #772]
2019-02-22 01:22:38 +00:00
taca
4825d2b404 net/bind911: update to 9.11.5pl1
Update bind911 to 9.11.5pl1 (BIND 9.11.5-P1).

	--- 9.11.5-P1 released ---

5108.	[bug]		Named could fail to determine bottom of zone when
			removing out of date keys leading to invalid NSEC
			and NSEC3 records being added to the zone. [GL #771]
2018-12-15 16:39:07 +00:00
jperkin
be17b5228f bind911: Fix build on SunOS. 2018-10-24 11:27:28 +00:00
taca
7c48796a65 net/bind911: update to 9.11.5
--- 9.11.5 released ---

	--- 9.11.5rc1 released ---

5038.	[bug]		Chaosnet addresses were compared incorrectly.
			[GL #562]

5034.	[bug]		A race between threads could prevent zone maintenance
			scheduled immediately after zone load from being
			performed. [GL #542]

5033.	[bug]		When adding NTAs to multiple views using "rndc nta",
			the text returned via rndc was incorrectly terminated
			after the first line, making it look as if only one
			NTA had been added. Also, it was not possible to
			differentiate between views with the same name but
			different classes; this has been corrected with the
			addition of a "-class" option. [GL #105]

5032.	[func]		Add krb5-selfsub and ms-selfsub update policy rules.
			[GL #511]

5030.	[bug]		Align CMSG buffers to a 64-bit boundary, fixes crash
			on architectures with strict alignment. [GL #521]

5028.	[bug]		Spread the initial RRSIG expiration times over the
			entire working sig-validity-interval when signing a
			zone in named to even out re-signing and transfer
			loads. [GL #418]

5026.	[bug]		rndc reconfig should not touch already loaded zones.
			[GL #276]

5022.	[doc]		Update ms-self, ms-subdomain, krb5-self, and
			krb5-subdomain documentation. [GL !708]

5021.	[bug]		dig returned a non-zero exit code when it received a
			reply over TCP after a retry. [GL #487]

5019.	[cleanup]	A message is now logged when ixfr-from-differences is
			set at zone level for an inline-signed zone. [GL #470]

5018.	[bug]		Fix incorrect sizeof arguments in lib/isc/pk11.c.
			[GL !588]

5017.	[bug]		lib/isc/pk11.c failed to unlink the session before
			releasing the lock which is unsafe. [GL !589]

5016.	[bug]		Named could assert with overlapping filter-aaaa and
			dns64 acls. [GL #445]

5015.	[bug]		Reloading all zones caused zone maintenance to cease
			for inline-signed zones. [GL #435]

5014.	[bug]		Signatures loaded from the journal for the signed
			version of an inline-signed zone were not scheduled for
			refresh. [GL #482]

5012.	[bug]		Fix lock order reversal in pk11_initialize. [GL !590]

5009.	[bug]		Upon an OpenSSL failure, the first error in the OpenSSL
			error queue was not logged. [GL #476]

5008.	[bug]		"rndc signing -nsec3param ..." requests were silently
			ignored for zones which were not yet loaded or
			transferred. [GL #468]

5007.	[cleanup]	Replace custom ISC boolean and integer data types
			with C99 stdint.h and stdbool.h types. [GL #9]

5005.	[bug]		dnssec-verify, and dnssec-signzone at the verification
			step, failed on some validly signed zones. [GL #442]

5004.	[bug]		'rndc reconfig' could cause inline zones to stop
			re-signing. [GL #439]

5003.	[bug]		dns_acl_isinsecure did not handle geoip elements.
			[GL #406]

5002.	[bug]		mdig: Handle malformed +ednsopt option, support 100
			+ednsopt options per query rather than 100 total and
			address memory leaks if +ednsopt was specified.
			[GL #410]

5001.	[bug]		Fix refcount errors on error paths. [GL !563]

4996.	[bug]		dig: Handle malformed +ednsopt option. [GL #403]

4995.	[test]		Add tests for "tcp-self" update policy. [GL !282]

4994.	[bug]		Trust anchor telemetry queries were not being sent
			upstream for locally served zones. [GL #392]

4992.	[bug]		The wrong address was being logged for trust anchor
			telemetry queries. [GL #379]

4990.	[bug]		Prevent a possible NULL reference in pkcs11-keygen.
			[GL #401]
2018-10-21 15:51:14 +00:00
wiz
3ce3ed950b bind91?: fix whitespace 2018-09-27 04:24:18 +00:00
taca
35b6578d3a net/bind911: update to 9.11.4pl2
Update bind911 to 9.11.4pl2 (BIND 9.11.4-P2).

	--- 9.11.4-P2 released ---

5022.	[doc]		Update ms-self, ms-subdomain, krb5-self, and
			krb5-subdomain documentation. [GL !708]

5015.	[bug]		Reloading all zones caused zone maintenance to cease
			for inline-signed zones. [GL #435]

5014.	[bug]		Signatures loaded from the journal for the signed
			version of an inline-signed zone were not scheduled for
			refresh. [GL #482]
2018-09-20 10:01:36 +00:00
jklos
49b3a63fbe Disable atomic operations on VAX and m68k in addition to mipsel so BIND
compiles on these architectures.
2018-09-13 02:57:43 +00:00
taca
c84f75c1b5 net/bind911 Add BIND 9.11 package
Add bind9.11.4pl1 (BIND 9.11.4-P1) package.

Note: named(8) requires writable permission to current directory when
start up or the directory specified by "directory" in options statement.


BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture.  Some
of the important features of BIND-9 are:

	- DNS Security
	- IP version 6
	- DNS Protocol Enhancements
	- Views
	- Multiprocessor Support
	- Improved Portability Architecture
	- Full NSEC3 support
	- Automatic zone re-signing
	- New update-policy methods tcp-self and 6to4-self

This package contains the BIND 9.11 release.

	- Catalog Zones, a new method for provisioning servers
	- "dnstap", a fast and flexible method of capturing and logging
	  DNS traffic.
	- "dyndb", a new API for loading zone data from an external database
	- dnssec-keymgr, a new key mainenance utility
	- mdig, an alternate version of dig utility
	- And more...
2018-09-09 13:11:38 +00:00