Commit graph

44 commits

Author SHA1 Message Date
reed
0785b368b8 Updated to 9.4.3-P3 for security issue:
https://www.isc.org/node/474
2009-07-28 20:39:45 +00:00
hasso
9d2140de08 Make these compile on DragonFly master. 2009-04-07 17:38:10 +00:00
adrianp
38800b746e --- 9.4.3-P2 released ---
2579.	[bug]		DNSSEC lookaside validation failed to handle unknown
			algorithms. [RT #19479]
2009-03-22 15:31:44 +00:00
adrianp
a90526cf98 Fix build on OpenSolaris
http://src.opensolaris.org/source/xref/sfw/usr/src/cmd/bind/getaddrinfo.c.patch
2009-02-21 14:42:02 +00:00
adrianp
fe15735863 Changes since 9.4.3:
2522.	[security]	Handle -1 from DSA_do_verify().

2498.	[bug]		Removed a bogus function argument used with
			ISC_SOCKET_USE_POLLWATCH: it could cause compiler
			warning or crash named with the debug 1 level
			of logging. [RT #18917]
2009-01-08 09:02:19 +00:00
adrianp
ea37c51ff5 Update to 9.4.3
Resolver could try unreachable servers multiple times.
Adb's handling of lame addresses was different for IPv4 and IPv6.
Remove NULL pointer dereference in dns_journal_print().
libbind: Out of bounds reference in dns_ho.c:addrsort.
Set initial timeout to 800ms.
TSIG context leak

For all the details see:
 http://oldwww.isc.org/sw/bind/view/?release=9.4.3#RELEASE
2009-01-04 00:16:03 +00:00
adrianp
b32fceaac6 Changes since 9.4.2-P1:
--- 9.4.2-P2 released ---

2406.   [bug]           Some operating systems have FD_SETSIZE set to a
			low value by default, which can cause resource
			exhaustion when many simultaneous connections are
			open.  Linux in particular makes it difficult to
			increase this value.  To use more sockets with
			select(), set ISC_SOCKET_FDSETSIZE.  Example:
			STD_CDEFINES="-DISC_SOCKET_FDSETSIZE=4096" ./configure
			(This should not be necessary in most cases, and
			never for an authoritative-only server.) [RT #18328]

2404.	[port]		hpux: files unlimited support.

2403.	[bug]		TSIG context leak. [RT #18341]

2402.	[port]		Support Solaris 2.11 and over. [RT #18362]

2401.	[bug]		Expect to get E[MN]FILE errno internal_accept()
			(from accept() or fcntl() system calls). [RT #18358]

2399.	[bug]		Abort timeout queries to reduce the number of open
			UDP sockets. [RT #18367]

2398.	[bug]           Improve file descriptor management.  New,
			temporary, named.conf option reserved-sockets,
			default 512. [RT #18344]

2396.	[bug]		Don't set SO_REUSEADDR for randomized ports.
			[RT #18336]

2395.	[port]		Avoid warning and no effect from "files unlimited"
			on Linux when running as root. [RT #18335]

2394.	[bug]		Default configuration options set the limit for
			open files to 'unlimited' as described in the
			documentation. [RT #18331]

2392.	[bug]		remove 'grep -q' from acl test script, some platforms
			don't support it. [RT #18253]

2322.	[port]		MacOS: work around the limitation of setrlimit()
			for RLIMIT_NOFILE. [RT #17526]
2008-08-03 18:41:45 +00:00
adrianp
24256612d8 Update to 9.4.2-P1
Please see CHANGES for all the details but the driving factor of this update
is:
2375.   [security]      Fully randomize UDP query ports to improve
                        forgery resilience. [RT #17949]
2008-07-10 21:05:30 +00:00
adrianp
417ce0dd73 Fix two typos: inclue => include 2008-06-21 22:13:22 +00:00
tonnerre
7b9f66b40a Fix CVE-2008-0122 for libbind (as contained in bind). A misplaced boundary
check can be abused for implementation specific exploitation: depending on
the use of libbind, this can result in denial of service or even remote
code execution.
2008-05-11 00:00:57 +00:00
reed
2da7fd65d2 Fix two typos. I didn't test this. Bump PKGREVISION as on
"dragonfly" this may change the build.
2007-08-08 18:32:45 +00:00
adrianp
0f8acfef46 Update to 9.4.1-P1
2206.	[security]
"allow-query-cache" and "allow-recursion" now
cross inherit from each other.
If allow-query-cache is not set in named.conf then
allow-recursion is used if set, otherwise allow-query
is used if set, otherwise the default (localnets;
localhost;) is used.
If allow-recursion is not set in named.conf then
allow-query-cache is used if set, otherwise allow-query
is used if set, otherwise the default (localnets;
localhost;) is used.

2203.	[security]
Query id generation was cryptographically weak.

2202.	[security]
The default acls for allow-query-cache and
allow-recursion were not being applied.

2193.	[port]
win32: BINDInstall.exe is now linked statically.

2192.	[port]
win32: use vcredist_x86.exe to install Visual
Studio's redistributable dlls if building with
Visual Stdio 2005 or later.
2007-07-28 11:41:56 +00:00
cjs
753b5b5e37 Update BIND to 9.4.1:
CVE-2007-2241: A sequence of queries can cause a recursive nameserver
to exit. While it is unlikely these will occur in normal operation, an
attack can use them to cause the affected versions to exit. This attack
is a denial of service, and does not allow an attacker to gain control
of affected systems.
2007-05-02 08:12:37 +00:00
cjs
bfde5f2e6c Upgrade BIND to 9.4.0.
I won't attempt to summarize 221 lines of changes in README here.
2007-04-15 18:56:49 +00:00
adrianp
b4f9d6caab Update to 9.3.4
Lots of changes, see http://www.isc.org/sw/bind/view/?release=9.3.4#RELEASE
for all the details:

In brief:
2126.	[security]	Serialise validation of type ANY responses.

2124.	[security]	It was possible to dereference a freed fetch
context.

2089.	[security]	Raise the minimum safe OpenSSL versions to
OpenSSL 0.9.7l and OpenSSL 0.9.8d.  Versions
prior to these have known security flaws which
are (potentially) exploitable in named.

2088.	[security]	Change the default RSA exponent from 3 to 65537.

2066.   [security]      Handle SIG queries gracefully.

1941.   [bug]           ncache_adderesult() should set eresult even if no
rdataset is passed to it.
2007-01-28 01:31:52 +00:00
adrianp
d1991b97c2 Fixes for CVE-2006-4095 and CVE-2006-4096 from bind-9.3.2-P1
* Assertion failure in ISC BIND SIG query processing (CVE-2006-4095)

- Recursive servers
Queries for SIG records will trigger an assertion failure if more
than one RRset is returned. However exposure can be minimized by
restricting which sources can ask for recursion.

- Authoritative servers
If a nameserver is serving a RFC 2535 DNSSEC zone and is queried
for the SIG records where there are multiple RRsets, then the
named program will trigger an assertion failure when it tries
to construct the response.

* INSIST failure in ISC BIND recursive query handling code (CVE-2006-4096)

It is possible to trigger an INSIST failure by sending enough
recursive queries such that the response to the query arrives after
all the clients waiting for the response have left the recursion
queue. However exposure can be minimized by restricting which sources
can ask for recursion.
2006-09-05 20:45:32 +00:00
seb
a4632cd538 Bump PKGREVISION to 1.
Fix build on NetBSD/sparc64 3.x: sync CPP symbols usage between
struct addrinfo definition and its usage in getaddrinfo().

While here define struct addrinfo's pad members the same way as in
NetBSD's /usr/include/netbsd.h and sync code in
lib/bind/irs/getaddrinfo.c:getaddrinfo().

This had been reported to bind9-bugs at isc dot org.
2006-08-28 16:00:45 +00:00
taca
201bdcfe0f Update bind to 9.3.2.
Changes are huge, so please see http://www.isc.org/sw/bind/bind9.3.php.
2006-08-17 14:14:18 +00:00
joerg
f78e66add4 Add DragonFly support. 2006-03-22 16:40:08 +00:00
tron
e0542143c9 Don't set "DIST_SUBDIR". BIND 9.x archives include the version number. 2005-06-01 22:23:19 +00:00
tron
043f4868f3 Update "bind" package to version 9.3.1. Changes since version 9.3.0:
BIND 9.3.1 is a maintenance release, containing fixes for a number of
bugs in 9.3.0.
libbind: corresponds to that from BIND 8.4.6-REL.
2005-06-01 22:02:55 +00:00
tron
4fa2df93ca - Rename rc script "named" to "named9" to avoid conflicts with NetBSD's
builtin script.
- Don't set "pidfile" in "named9.sh" because it breaks change rooted
  configurations.
- Disable inlining in "lib/dns/rbt.c" on PowerPC systems because certain
  GCC version create broken code for that file.
Bump package revision because of the above changes.
2005-03-16 13:56:24 +00:00
tron
b84a76dea3 Add missing RCS Ids. 2005-03-15 15:50:04 +00:00
agc
b12d62efb5 Add RMD160 digests. 2005-02-24 12:13:41 +00:00
tron
adb876c663 Apply ISC patch to fix a potential DoS in BIND 9.3.0 reported in VU#938617.
Bump package version number to 9.3.0pl1 because of this.
2005-01-26 09:32:31 +00:00
tron
a4caaa600c Update "bind9" package to version 9.3.0. Changes since version 9.2.3:
- DNSSEC is now DS based (RFC 3658).
  See also RFC 3845, doc/draft/draft-ietf-dnsext-dnssec-*.
- DNSSEC lookaside validation.
- check-names is now implemented.
- rrset-order in more complete.
- IPv4/IPv6 transition support, dual-stack-servers.
- IXFR deltas can now be generated when loading master files,
  ixfr-from-differences.
- It is now possible to specify the size of a journal, max-journal-size.
- It is now possible to define a named set of master servers to be
  used in masters clause, masters.
- The advertised EDNS UDP size can now be set, edns-udp-size.
  allow-v6-synthesis has been obsoleted.
	NOTE:
	* Zones containing MD and MF will now be rejected.
	* dig, nslookup name. now report "Not Implemented" as
	  NOTIMP rather than NOTIMPL.  This will have impact on scripts
	  that are looking for NOTIMPL.
- libbind: corresponds to that from BIND 8.4.5.
2004-10-03 09:20:41 +00:00
tron
f7fbf20b22 Make this build under NetBSD 2.0E and newer. 2004-05-18 07:05:34 +00:00
manu
6da3b75a85 Fogotten changed file in last commits 2004-04-07 13:01:45 +00:00
manu
9d13f9a96d Build and install BIND9 resolver in ${prefix}/include/bind/ and
${prefix}/lib/libbind.a , just like the BIND8 package does.
2004-04-06 14:54:17 +00:00
tron
96ecbc8ae0 Include "sys/param.h" before "sys/sysctl.h" (as documented) on NetBSD to
fix build failure in (at least) NetBSD 2.0B.
2004-04-01 20:29:53 +00:00
cube
cddfa4e8dc Sync distinfo with reality. 2003-10-30 15:23:58 +00:00
itojun
5a6d0fa811 upgrade to 9.2.3.
If you have installed BIND 9.1.3-P1, BIND 9.1.3-P2, BIND 9.2.2-P1,
BIND 9.2.2-P2, BIND 9.2.3rc2 or BIND 9.2.3rc3 it is recommended that
you upgrade.  These versions generate false positives when applying
delegation-only tests.

        --- 9.2.3 released ---
1525.   [bug]           dns_cache_create() could trigger a REQUIRE
                        failure in isc_mem_put() during error cleanup.
1524.   [port]          AIX needs to be able to resolve all symbols when
                        creating shared libraries (--with-libtool).
1523.   [bug]           Fix race condition in rbtdb. [RT# 9189]
1522.   [bug]           dns_db_findnode() relax the requirements on 'name'.
                        [RT# 9286]
1518.   [bug]           dns_nxt_buildrdata(), and hence dns_nxt_build(),
                        contained a off-by-one error when working out the
                        number of octets in the bitmap.
1514.   [bug]           named: isc_hash_destroy() was being called too early.
                        [RT #9160]
1513.   [doc]           Add "US" to root-delegation-only exclude list.
        --- 9.2.3rc4 released ---
1512.   [bug]           Extend the delegation-only logging to return query
                        type, class and responding nameserver.
1511.   [bug]           delegation-only was generating false positives
                        on negative answers from subzones.
        --- 9.2.3rc3 released ---
1510.   [func]          New view option "root-delegation-only".  Apply
                        delegation-only check to all TLDs and root.
                        Note there are some TLDs that are NOT delegation
			only (e.g. DE, LV, US and MUSEUM) these can be excluded
                        from the checks by using exclude.
                        root-delegation-only exclude {
                                "DE"; "LV"; "US"; "MUSEUM";
                        };
1509.   [bug]           Hint zones should accept delegation-only.  Forward
                        zone should not accept delegation-only.
1508.   [bug]           Don't apply delegation-only checks to answers from
                        forwarders.
1507.   [bug]           Handle BIND 8 style returns to NS queries to parents
                        when making delegation-only checks.
1506.   [bug]           Wrong return type for dns_view_isdelegationonly().
        --- 9.2.3rc2 released ---
1505.   [bug]           Uninitialised rdataset in sdb. [RT #8750]
1504.   [func]          New zone type "delegation-only".
1503.   [port]          win32: install libeay32.dll outside of system32.
(9.2.2-P2 is somewhere around here)
2003-10-27 03:56:03 +00:00
taca
21b5f134df Update bind9 package to 9.2.2p3 (9.2.2-P3).
--- 9.2.2-P3 released ---

1512.	[bug]		Extend the delegation-only logging to return query
			type, class and responding nameserver.

1511.	[bug]		delegation-only was generating false positives
			on negative answers from subzones.
2003-09-22 13:22:16 +00:00
itojun
0ef35c2714 9.2.2-P2
--- 9.2.2-P2 released ---
1509.   [bug]           Hint zones should accept delegation-only.  Forward
                        zone should not accept delegation-only.
1508.   [bug]           Don't apply delegation-only checks to answers from
                        forwarders.
1507.   [bug]           Handle BIND 8 style returns to NS queries to parents
                        when making delegation-only checks.
1506.   [bug]           Wrong return type for dns_view_isdelegationonly().
2003-09-20 12:50:24 +00:00
itojun
9d9ce60e1b upgrade to 9.2.2p1.
---
BIND 9.2.2-P1 is now available.

In response to high demand from our users, ISC is releasing a patch for BIND
to support the declaration of "delegation-only" zones in caching/recursive
name servers.  Briefly, a zone which has been declared "delegation-only" will
be effectively limited to containing NS RRs for subdomains, but no actual
data outside its apex (for example, its SOA RR and apex NS RRset).  This can
be used to filter out "wildcard" or "synthesized" data from NAT boxes or from
authoritative name servers whose undelegated (in-zone) data is of no interest.
2003-09-17 14:28:51 +00:00
hubertf
ff07ab9def Recognize native threads.
Addresses PR 20641 by Kimmo Suominen <kim@tac.nyc.ny.us>
2003-03-10 02:47:37 +00:00
hubertf
33d122f27c Update bind9 to 9.2.2
Changes: many, at least 1 security related.
2003-03-05 05:40:43 +00:00
kleink
be7afc41b3 As seen in libc, prevent gcc's memory usage from exploding during
optimizing by moving each round into a separate function on sparc64.
2002-06-27 07:33:26 +00:00
taca
bcc935adc5 Update bind9 pacakge to 9.2.1 (with pkglint free).
--- 9.2.1 released ---

1271.	[port]		win32: a make file contained absolute version specific
			references.

1269.	[bug]		Missing masters clause was not handled gracefully.
			[RT #2703]

1244.	[bug]		Receiving a TCP message from a blackhole address would
			prevent further messages being received over that
			interface.

1178.	[bug]		Follow and cache (if appropriate) A6 and other
			data chains to completion in the additional section.

	--- 9.2.1rc2 released ---

1240.	[bug]		It was possible to leak zone references by
			specifying an incorrect zone to rndc.

1239.	[bug]		Under certain circumstances named could continue to
			use a name after it had been freed triggering
			INSIST() failures.  [RT #2614]

1238.	[bug]		It is possible to lockup the server when shutting down
			if notifies are being processed. [RT #2591]

1237.	[bug]		nslookup: "set q=type" failed.

1236.	[bug]		dns_rdata{class,type}_fromtext() didn't handle non
			NULL terminated text regions. [RT #2588]

1232.	[bug]		unix/errno2result() didn't handle EADDRNOTAVAIL.

1231.	[port]		HPUX 11.11 recvmsg() can return spurious EADDRNOTAVAIL.

1230.	[bug]		isccc_cc_isreply() and isccc_cc_isack() were broken.

1229.	[bug]		named would crash if it received a TSIG signed
			query as part of an AXFR response. [RT #2570]

1228.	[bug]		'make install' did not depend on 'make all'. [RT #2559]

1227.	[bug]		dns_lex_getmastertoken() now returns ISC_R_BADNUMBER
			if a number was expected and some other token was
			found. [RT#2532]

1222.	[bug]		Specifying 'port *' did not always result in a system
			selected (non-reserved) port being used. [RT #2537]

1221.	[bug]		Zone types 'master', 'slave' and 'stub' were not being
			compared case insensitively. [RT #2542]

1218.	[bug]		Named incorrectly returned SERVFAIL rather than
			NOTAUTH when there was a TSIG BADTIME error. [RT #2519]

1216.	[bug]		Multiple server clauses for the same server were not
			reported.  [RT #2514]

1215.	[port]		solaris: add support to ifconfig.sh for x86 2.5.1

1214.	[bug]		Win32: isc_file_renameunique() could leave zero length
			files behind.

1212.	[port]		libbind: 64k answer buffers were causing stack space
			to be exceeded for certian OS.  Use heap space instead.

1211.	[bug]		dns_name_fromtext() incorrectly handled certain
			valid octal bitlabels. [RT #2483]

1210.	[bug]		libbind: getnameinfo() failed to lookup IPv4 mapped /
			compatible addresses. [RT #2461]

1208.	[bug]		dns_master_load*() failed to log a error message if
			an error was detected when parsing the ownername of
			a record.  [RT #2448]

	--- 9.2.1rc1 released ---

1207.	[bug]		libbind: getaddrinfo() could call freeaddrinfo() with
			an invalid pointer.

1206.	[bug]		SERVFAIL and NOTIMP responses to an EDNS query should
			trigger a non-EDNS retry.

1205.	[bug]		OPT, TSIG and TKEY cannot be used to set the "class"
			of the message. [RT #2449]

1204.	[bug]		libbind: res_nupdate() failed to update the name
			server addresses before sending the update.

1201.	[bug]		Require that if 'callbacks' is passed to
			dns_rdata_fromtext(), callbacks->error and
			callbacks->warn are initialized.

1200.	[bug]		Log 'errno' that we are unable to convert to
			isc_result_t. [RT #2404]

1198.	[bug]		OPT printing style was not consistant with the way the
			header fields are printed.  The DO bit was not reported
			if set.  Report if any of the MBZ bits are set.

1197.	[bug]		Attempts to define the same acl multiple times were not
			detected.

1196.	[contrib]	update mdnkit to 2.2.3.

1195.	[bug]		Attempts to redefine builtin acls should be caught.
			[RT #2403]

1194.	[bug]		Not all duplicate zone definitions were being detected
			at the named.conf checking stage. [RT #2431]

1193.	[bug]		Best effort parsing didn't handle packet truncation.

1191.   [bug]           A dynamic update removing the last non-apex name in
			a secure zone would fail. [RT #2399]

1189.	[bug]		On some systems, malloc(0) returns NULL, which
			could cause the caller to report an out of memory
			error. [RT #2398]

1188.	[bug]		Dynamic updates of a signed zone would fail if
			some of the zone private keys were unavailable.

1186.   [bug]           isc_hex_tobuffer(,,length = 0) failed to unget the
                        EOL token when reading to end of line.

1185.	[bug]		libbind: don't assume statp->_u._ext.ext is valid
			unless RES_INIT is set when calling res_*init().

1184.	[bug]		libbind: call res_ndestroy() if RES_INIT is set
			when res_*init() is called.

1183.	[bug]		Handle ENOSR error when writing to the internal
			control pipe. [RT #2395]

1182.	[bug]		The server could throw an assertion failure when
			constructing a negative response packet.

1176.	[doc]		Document that allow-v6-synthesis is only performed
			for clients that are supplied recursive service.
			[RT #2260]

1175.	[bug]		named-checkzone failed to call dns_result_register()
			at startup which could result in runtime
			exceptions when printing "out of memory" errors.
			[RT #2335]

1174.	[bug]		Win32: add WSAECONNRESET to the expected errors
			from connect(). [RT #2308]

1173.	[bug]		Potential memory leaks in isc_log_create() and
			isc_log_settag(). [RT #2336]

1172.	[doc]		Add CERT, GPOS, KX, NAPTR, NSAP, PX and TXT to
			table of RR types in ARM.

1170.	[bug]		Don't attempt to print the token when a I/O error
			occurs when parsing named.conf. [RT #2275]

1168.	[bug]		Empty also-notify clauses were not handled. [RT #2309]

1167.	[contrib]	nslint-2.1a3 (from author).

1166.	[bug]		"Not Implemented" should be reported as NOTIMP,
			not NOTIMPL. [RT #2281]

1165.	[bug]		We were rejecting notify-source{-v6} in zone clauses.

1164.	[bug]		Empty masters clauses in slave / stub zones were not
			handled gracefully. [RT #2262]

1162.	[bug]		The allow-notify option was not accepted in slave
			zone statements.

1161.	[bug]		named-checkzone looped on unbalanced brackets.
			[RT #2248]

1160.	[bug]		Generating Diffie-Hellman keys longer than 1024
			bits could fail. [RT #2241]

1156.	[port]		The configure test for strsep() incorrectly
			succeeded on certain patched versions of
			AIX 4.3.3. [RT #2190]

1154.	[bug]		Don't attempt to obtain the netmask of a interface
			if there is no address configured. [RT #2176]

1152.	[bug]		libbind: read buffer overflows.

1144.	[bug]		rndc-confgen would crash if both the -a and -t
			options were specified. [RT #2159]

1142.	[bug]		dnssec-signzone would fail to delete temporary files
			in some failure cases. [RT #2144]

1141.	[bug]		When named rejected a control message, it would
			leak a file descriptor and memory.  It would also
			fail to respond, causing rndc to hang.
			[RT #2139, #2164]

1140.	[bug]		rndc-confgen did not accept IPv6 addresses as arguments
			to the -s option. [RT #2138]

1136.	[bug]		CNAME records synthesized from DNAMEs did not
			have a TTL of zero as required by RFC2672.
			[RT #2129]

1125.	[bug]		rndc: -k option was missing from usage message.
			[RT #2057]

1124.	[doc]		dig: +[no]dnssec, +[no]besteffort and +[no]fail
			are now documented. [RT #2052]

1123.	[bug]		dig +[no]fail did not match description. [RT #2052]

1109.	[bug]		nsupdate accepted illegal ttl values.

1108.	[bug]		On Win32, rndc was hanging when named was not running
			due to failure to select for exceptional conditions
			in select(). [RT #1870]

1081.	[bug]		Multicast queries were incorrectly identified
			based on the source address, not the destination
			address.

1072.	[bug]		The TCP client quota could be exceeded when
			recursion occurred. [RT #1937]

1071.	[bug]		Sockets listening for TCP DNS connections
			specified an excessive listen backlog. [RT #1937]

1070.	[bug]		Copy DNSSEC OK (DO) to response as specified by
			draft-ietf-dnsext-dnssec-okbit-03.txt.

1014.	[bug]		Some queries would cause statistics counters to
			increment more than once or not at all. [RT #1321]

1012.	[bug]		The -p option to named did not behave as documented.

 988.	[bug]		'additional-from-auth no;' did not work reliably
			in the case of queries answered from the cache.
			[RT #1436]

 995.	[bug]		dig, host, nslookup: using a raw IPv6 address as a
			target address should be fatal on a IPv4 only system.
2002-05-04 14:56:23 +00:00
itojun
130ca0283e upgrade to 9.2.0.
list of changes between 9.1.3 to 9.2.0 is available at:
http://www.isc.org/products/BIND/bind9.html
2001-11-27 03:38:40 +00:00
itojun
a11bc04864 upgrade to 9.1.3 from ISC. changes between 9.1.2 to 9.1.3:
--- 9.1.3 released ---

	--- 9.1.3rc3 released ---

 911.	[bug]		Fail gracefully with multiple hint zones. [RT #1433]

 910.	[port]		Some pre-RFC2133 IPv6 implementations do not define
			IN6ADDR_ANY_INIT. [RT #1416]

	--- 9.1.3rc2 released ---

 904.	[bug]		The server would leak memory if attempting to use
			an expired TSIG key. [RT #1406]

 903.	[bug]		dig should not crash when receiving a TCP packet
			of length 0.

 902.	[bug]		The -d option was ignored if both -t and -g were also
			specified.

 901.	[cleanup]	The man pages no longer have empty lines outside of
			literal blocks.

 898.	[bug]		"dig" failed to set a nonzero exit status
			on UDP query timeout. [RT #1323]

 894.	[bug]		When using the DNSSEC tools, a message intended to warn
			when the keyboard was being used because of the lack
			of a suitable random device was not being printed.

 892.	[bug]		The server could attempt to refresh a zone that
			was being loaded, causing an assertion failure.
			[RT #1335]

 891.	[bug]		Return an error when a SIG(0) signed response to
			an unsigned query is seen.  This should actually
			do the verification, but it's not currently
			possible. [RT #1391]

 888.	[bug]		Don't die when using TKEY to delete a nonexistent
			TSIG key. [RT #1392]

 860.	[interop]	Drop cross class glue in zone transfers.

 852.	[bug]		Handle responses from servers which do not
			now about IXFR.

 850.	[bug]		dns_rbt_findnode() would not find nodes that were
			split on a bitstring label somewhere other than in
			the last label of the node. [RT #1351]

 705.	[port]		Work out resource limit type for use where rlim_t is
			not available. [RT #695]

 704.	[port]		RLIMIT_NOFILE is not available on all platforms.

 703.	[port]		sys/select.h is needed on older platforms. [RT #695]

	--- 9.1.3rc1 released ---

 831.	[bug]		The configure script tried to determine
			endianness before making its final decision on
			which C compiler to use, causing Solaris/x86
			systems with gcc to be incorrectly identified
			as big-endian. [RT #1315]

 827.	[bug]		When an IXFR protocol error occurs, the slave
			should retry with AXFR.

 826.	[bug]		Some IXFR protocol errors were not detected.

 825.	[bug]		zone.c:ns_query() detached from the wrong zone
			reference. [RT #1264]

 824.	[bug]		Correct line numbers reported by dns_master_load().
			[RT #1263]

 822.	[bug]		Sending nxrrset prerequisites would crash nsupdate.
			[RT #1248]

 806.	[bug]		DNS_R_SEENINCLUDE was failing to propagate back up
			the calling stack to the zone maintence level, causing
			zones to not reload when an included file was touched
			but the top-level zone file was not.

 771.	[cleanup]	TSIG errors related to unsynchronized clocks
			are logged better. [RT #919]

 734.	[bug]		An attempt to re-lock the zone lock could occur if
			the server was shutdown during a zone tranfer.
			[RT #830]

 712.	[bug]		Sending a large signed update message caused an
			assertion failure. [RT #718]

 669.	[bug]		dnssec-keygen now makes the public key file
			non-world-readable for symmetric keys. [RT #403]
2001-07-04 00:21:34 +00:00
itojun
ab82f6986c upgrade to 9.1.2.
--- 9.1.2 released ---

	--- 9.1.2rc1 released ---

 820.	[bug]		Name server address lookups failed to follow
			A6 chains into the glue of local authoritative
			zones.

 819.	[bug]		In certain cases, the resolver's attempts to
			restart an address lookup at the root could cause
			the fetch to deadlock (with itself) instead of
			restarting. [RT #1225]

 818.	[bug]		Certain pathological responses to ANY queries could
			cause an assertion failure. [RT #1218]

 816.	[bug]		Report potential problems with log file accessibility
			at configuration time, since such problems can't
			reliably be reported at the time they actually occur.

 815.	[bug]		If a log file was specified with a path separator
			character (i.e. "/") in its name and the directory
			did not exist, the log file's name was treated as
			though it were the directory name. [RT #1189]

 814.	[bug]		Socket objects left over from accept() failures
			were incorrectly destroyed, causing corruption
			of socket manager data structures.

 813.	[bug]		File descriptors exceeding FD_SETSIZE were handled
			badly. [RT #1192]

 812.	[bug]		dig sometimes printed incomplete IXFR responses
			due to an uninitialized variable. [RT #1188]

 811.	[bug]		Parentheses were not quoted in zone dumps. [RT #1194]

 810.	[bug]		The signer name in SIG records was not properly
 			downcased when signing/verifying records. [RT #1186]

 807.	[bug]		When setting up TCP connections for incoming zone
			transfers, the transfer-source port was not
			ignored like it should be.

 804.	[bug]		Attempting to obtain entropy could fail in some
 			situations.  This would be most common on systems
			with user-space threads. [RT #1131]

 802.	[bug]		DNSSEC key tags were computed incorrectly in almost
 			all cases. [RT #1146]

 801.	[bug]		nsupdate should treat lines beginning with ';' as
 			comments. [RT #1139]

 800.	[bug]		dnssec-signzone produced incorrect statistics for
 			large zones. [RT #1133]

 799.	[bug]		The ADB didn't find AAAA glue in a zone unless A6
			glue was also present.
2001-05-06 00:19:06 +00:00
wiz
433b62957e Move to sha1 checksum, and/or add distfile sizes. 2001-04-21 11:23:08 +00:00
agc
2d6b6a009c + move the distfile digest/checksum value from files/md5 to distinfo
+ move the patch digest/checksum values from files/patch-sum to distinfo
2001-04-17 11:43:32 +00:00