pkgsrc/net/powerdns/distinfo
rodent 4dedf39251 Updated to latest release, 3.4.3. Updated and defuzzed patches. Added cryptopp
and zeromq options, which are disabled by default. ChangeLog:

PowerDNS Authoritative Server 3.4.3

Warning: Version 3.4.3 of the PowerDNS Authoritative Server is a major upgrade if you are coming from 2.9.x. Additionally, if you are coming from any 3.x version (including 3.3.1), there is a mandatory SQL schema upgrade. Please refer to the Upgrade documentation for important information on correct and stable operation, as well as notes on performance and memory use.

Released March 2nd, 2015


Bug fixes:

    commit ceb49ce: pdns_control: exit 1 on unknown command (Ruben Kerkhof)
    commit 1406891: evaluate KSK ZSK pairs per algorithm (Kees Monshouwer)
    commit 3ca050f: always set di.notified_serial in getAllDomains (Kees Monshouwer)
    commit d9d09e1: pdns_control: don't open socket in /tmp (Ruben Kerkhof)

New features:

    commit 2f67952: Limit who can send us AXFR notify queries (Ruben Kerkhof)

Improvements:

    commit d7bec64: respond REFUSED instead of NOERROR for "unknown zone" situations
    commit ebeb9d7: Check for Lua 5.3 (Ruben Kerkhof)
    commit d09931d: Check compiler for relro support instead of linker (Ruben Kerkhof)
    commit c4b0d0c: Replace PacketHandler with UeberBackend where possible (Christian Hofstaedtler)
    commit 5a85152: PacketHandler: Share UeberBackend with DNSSECKeeper (Christian Hofstaedtler)
    commit 97bd444: fix building with GCC 5

Experimental API changes (Christian Hofstaedtler):

    commit ca44706: API: move shared DomainInfo reader into it's own function
    commit 102602f: API: allow writing to domains.account field
    commit d82f632: API: read and expose domain account field
    commit 2b06977: API: be more strict when parsing record contents
    commit 2f72b7c: API: Reject unknown types (TYPE0)
    commit d82f632: API: read and expose domain account field

PowerDNS Authoritative Server 3.4.2

Warning: Version 3.4.2 of the PowerDNS Authoritative Server is a major upgrade if you are coming from 2.9.x. Additionally, if you are coming from any 3.x version (including 3.3.1), there is a mandatory SQL schema upgrade. Please refer to the Upgrade documentation for important information on correct and stable operation, as well as notes on performance and memory use.

Released February 3rd, 2015

Find the downloads on our download page.

This is a performance and bugfix update to 3.4.1 and any earlier version. For high traffic setups, including those using DNSSEC, upgrading to 3.4.2 may show tremendous performance increases.

A list of changes since 3.4.1 follows.

Improvements:

    commit 73004f1: implement CORS for the HTTP API
    commit 4d9c289: qtype is now case insensitive in API and database
    commit 13af5d8, commit 223373a, commit 1d5a68d, commit 705a73f, commit b418d52: Allow (optional) PIE hardening
    commit 2f86f20: json-api: remove priority from json
    commit cefcf9f: backport remotebackend fixes
    commit 920f987, commit dd8853c: Support Lua 5.3
    commit 003aae5: support single-type ZSK signing
    commit 1c57e1d: Potential fix for ticket #1907, we now try to trigger libgcc_s.so.1 to load before we chroot. I can't reproduce the bug on my local system, but this "should" help. Seriously.
    commit 031ab21: update polarssl to 1.3.9

Bug fixes:

    commit 60b2b7c, commit d962fbc: refuse overly long labels in names
    commit a64fd6a: auth: limit long version strings to 63 characters and catch exceptions in secpoll
    commit fa52e02: pdnssec: fix ttl check for RRSIG records
    commit 0678b25: fix up latency reporting for sub-millisecond latencies (would clip to 0)
    commit d45c1f1: make sure we don't throw an exception on "pdns_control show" of an unknown variable
    commit 63c8088: fix startup race condition with carbon thread already trying to broadcast uninitialized data
    commit 796321c: make qsize-q more robust
    commit 407867c: mind04 discovered we count corrupt packets and EAGAIN situations as validly received packets, skewing the udp questions/answers graphs on auth.
    commit f06d069: make latency & qsize reporting 'live'. Plus fix that we only reported the qsize of the first distributor.
    commit 2f3498e: fix up statbag for carbon protocol and function pointers
    commit 0f2f999: get priority from table in Lua axfrfilter; fixes ticket #1857
    commit 96963e2, commit bbcbbbe, commit d5c9c07: various backends: fix records pointing at root
    commit e94c2c4: remove additional layer of trailing . stripping, which broke MX records to the root in the BIND backend. Should close ticket #1243.
    commit 8f35ba2: api: use uncached results for getKeys()
    commit c574336: read ALLOW-AXFR-FROM from the backend with the metadata

Minor changes:

    commit 1e39b4c: move manpages to section 1
    commit b3992d9: secpoll: Replace ~ with _
    commit 9799ef5: only zones with an active ksk are secure
    commit d02744f: api: show keys for zones without active ksk

New features:

    commit 1b97ba0: add signatures metric to auth, so we can plot signatures/second
    commit 92cef2d: pdns_control: make it posible to notify all zones at once
    commit f648752: JSON API: provide flush-cache, notify, axfr-retrieve
    commit 02653a7: add 'bench-db' to do very simple database backend performance benchmark
    commit a83257a: enable callback based metrics to statbas, and add 5 such metrics: uptime, sys-msec, user-msec, key-cache-size, meta-cache-size, signature-cache-size

Performance improvements:

    commit a37fe8c: better key for packetcache
    commit e5217bb: don't do time(0) under signature cache lock
    commit d061045, commit 135db51, commit 7d0f392: shard the packet cache, closing ticket #1910.
    commit d71a712: with thanks to Jack Lloyd, this works around the default Botan allocator slowing down for us during production use.
2015-03-27 23:37:52 +00:00

25 lines
1.7 KiB
Text

$NetBSD: distinfo,v 1.18 2015/03/27 23:37:52 rodent Exp $
SHA1 (pdns-3.4.3.tar.bz2) = 578968d94fda8578473bdb357df77ce8e4cb7448
RMD160 (pdns-3.4.3.tar.bz2) = e8ab5774ceb12178853d6207c4777b60e6c82933
Size (pdns-3.4.3.tar.bz2) = 1332686 bytes
SHA1 (patch-aa) = 5d7a2f6d7b74139fbdcd7673181ccaeb91f1e565
SHA1 (patch-ab) = a816def3825c0260642dab85f518bebaf4ba904b
SHA1 (patch-modules_luabackend_luabackend.hh) = 23ae1a2c047f367a51b7bfa10a546aeb91cccea4
SHA1 (patch-modules_pipebackend_pipebackend.cc) = 975cf47dc92bf4402167b5a25f85eaf527398c06
SHA1 (patch-modules_pipebackend_pipebackend.hh) = 3ff9f666a1b348810be38ffe67fd740521390630
SHA1 (patch-pdns_botan18signers.cc) = 58df2d630ac46ea2fd1ce2699ce7a3bd927de177
SHA1 (patch-pdns_dns.hh) = 6f47292c573d1a01cdd2ba3312edf17e216c2dbc
SHA1 (patch-pdns_dnspacket.cc) = 822d8f1758069cbdc90f09b29e538257af5f5141
SHA1 (patch-pdns_dnsparser.cc) = 3b7f1929013261d09112394e525dede41e03afff
SHA1 (patch-pdns_dnsparser.hh) = 1ad7090312992915a0ad9bf8b006d229262936c3
SHA1 (patch-pdns_dnsscope.cc) = a42bbda2d5d9e2bc2a0004ffc77efcd5d5beeb28
SHA1 (patch-pdns_dynloader.cc) = 9a4119a17a5ed2144737d2b6161aceaa633f66c6
SHA1 (patch-pdns_htimer.cc) = 6064c73db33d2e7cc65979757e90ecdf8d7c16e6
SHA1 (patch-pdns_misc.cc) = 832cf6bd2f0b018d66a49e5b0f9f879a107c1a90
SHA1 (patch-pdns_nameserver.cc) = 13011d7cd1e6915c4b547f7817fa72e595ac2a3a
SHA1 (patch-pdns_pdns_recursor.cc) = 97f3688baef5a7520514764a4590d0b92fa51fda
SHA1 (patch-pdns_receiver.cc) = 11e096024b007d53528d61083a65fd5e941fe6eb
SHA1 (patch-pdns_recursor__cache.cc) = 36dc4c4691f6d88fb7b6cc452cda19dc07a1b53b
SHA1 (patch-pdns_resolver.cc) = 0f3de1aef64d1e24a5b0f87bfdd866c75ff3c1ff
SHA1 (patch-pdns_tcpreceiver.cc) = 0624ac68b2b1f609febb46be97e14c3d358f37b9