FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

I am looking for an LTO tape library. Do you have one to spare?
Commit found by message id
Wed, 9 Jul 2008
[ 19:02:01 dougb ] Original commit 
bind9 dns  Deleted Deprecated Expired files touched by this commit  An older version of this port was marked as vulnerable. Completely new version of the BIND DNS suite with updated DNSSEC
bind94 dns  Deleted Deprecated Expired files touched by this commit The BIND DNS suite with updated DNSSEC and threads
bind95 dns  Deleted Deprecated Expired files touched by this commit The BIND DNS suite with updated DNSSEC and threads
Upgrade to the -P1 versions of each port, which add stronger randomization
of the UDP query-source ports. The server will still use the same query
port for the life of the process, so users for whom the issue of cache
poisoning is highly significant may wish to periodically restart their
server using /etc/rc.d/named restart, or other suitable method.

In order to take advantage of this randomization users MUST have an
appropriate firewall configuration to allow UDP queries to be sent and
answers to be received on random ports; and users MUST NOT specify a
port number using the query-source[-v6] option.

The avoid-v[46]-udp-ports options exist for users who wish to eliminate
certain port numbers from being chosen by named for this purpose. See
the ARM Chatper 6 for more information.

Also please note, this issue applies only to UDP query ports. A random
ephemeral port is always chosen for TCP queries.

This issue applies primarily to name servers whose main purpose is to
resolve random queries (sometimes referred to as "caching" servers, or
more properly as "resolving" servers), although even an "authoritative"
name server will make some queries, primarily at startup time.

This update addresses issues raised in:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447
http://www.kb.cert.org/vuls/id/800113
http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience

Number of ports [& non-ports] in this commit: 3

Showing files for just one port: dns/bind9

show all files

hide all files


6 files found
ActionRevisionLinksFile
modify 1.82 View diff View revision /ports/head/dns/bind9/Makefile
modify 1.44 View diff View revision /ports/head/dns/bind9/distinfo
modify 1.85 View diff View revision /ports/head/dns/bind94/Makefile
modify 1.47 View diff View revision /ports/head/dns/bind94/distinfo
modify 1.87 View diff View revision /ports/head/dns/bind95/Makefile
modify 1.49 View diff View revision /ports/head/dns/bind95/distinfo
Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
dbusJul 03
mencoderJun 28
mplayerJun 28
lzo2Jun 26
phpmyadmin*Jun 24
gnupgJun 23
gnupg1Jun 23
samba36Jun 23
samba4Jun 23
samba41Jun 23
iodineJun 18
asteriskJun 17
asterisk11Jun 17
dbusJun 14
chromiumJun 10

7 vulnerabilities affecting 10 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds


Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 24444
Broken 194
Deprecated 620
Ignore 517
Forbidden 2
Restricted 264
No CDROM 102
Vulnerable 26
Expired 3
Set to expire 607
Interactive 15
new 24 hours 4
new 48 hours8
new 7 days33
new fortnight53
new month92


Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2014 Dan Langille. All rights reserved.