notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

non port: dns/bind98/Makefile

Number of commits found: 100

Tuesday, 23 Sep 2014
14:16 mat search for other commits by this committer
Update to 9.8.8.

Sponsored by:	Absolight
Original commitRevision:369063 
Sunday, 7 Sep 2014
10:24 mat search for other commits by this committer
configure no longer has problems detecting our arch like it had in bind95's
time, so remove ARCH modification, which leads to other problems, like [1]

PR:		193359 [1]
Submitted by:	dinoex [1]
Sponsored by:	Absolight
Original commitRevision:367505 
Thursday, 7 Aug 2014
08:40 mat search for other commits by this committer
Push back expiration to the end of the month.

Sponsored by:	Absolight
Original commitRevision:364250 
Tuesday, 29 Jul 2014
22:16 mat search for other commits by this committer
Enable RRL by default.

Requested by:	so many my head hurts
Sponsored by:	Absolight
Original commitRevision:363400 
Thursday, 24 Jul 2014
18:34 tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample

databases/libgdamm:
- Drop :keepla
- USES=tar:bzip2
- Use INSTALL_TARGET=install-strip

databases/libgdamm5:
- Add INSTALL_TARGET=install-strip
- Drop --enable-static (inherited from old repocopy)

devel/anjuta x11-toolkits/py-gnome-extras:
- Drop :keepla

dns/powerdns dns/powerdns-devel:
- Convert to USES=libtool
- Add INSTALL_TARGET=install-strip
- Disable static modules
- Stop creating library symlinks with .0 suffix, not needed for dynamically
  opened modules

mail/dovecot2:
- Add USES=libtool

mail/dovecot2-pigeonhole:
- Drop CONFIGURE_TARGET (incorrect for Dragonfly)
- Add USES=libtool and INSTALL_TARGET=install-strip

math/gnumeric:
- USES=libtool tar:xz

Approved by:	portmgr (implicit, bump unstaged ports)
Original commitRevision:362835 
Friday, 11 Jul 2014
16:03 mat search for other commits by this committer
Add the expiration date of BIND 9.8.

Sponsored by:	Absolight
Original commitRevision:361560 
15:38 mat search for other commits by this committer
And it's supposed to be lower case.

Sponsored by:	Absolight
Original commitRevision:361553 
15:28 mat search for other commits by this committer
Add CPE to BIND9.

Sponsored by:	Absolight
Original commitRevision:361548 
Tuesday, 17 Jun 2014
17:16 mat search for other commits by this committer
Remove test bits.

Pointy hat to:	mat
Sponsored by:	Absolight
Original commitRevision:358151 
15:01 mat search for other commits by this committer
Convert dns/bind9* to USES=gssapi.

Sponsored by:	Absolight
Original commitRevision:358127 
Friday, 13 Jun 2014
13:14 mat search for other commits by this committer
Correct local path for rpz* patchs.

Sponsored by:	Absolight
Original commitRevision:357679 
Thursday, 12 Jun 2014
12:30 mat search for other commits by this committer
Update to 9.8.7-P1

Changes:	https://lists.isc.org/pipermail/bind-announce/2014-June/000912.html
Sponsored by:	Absolight
Original commitRevision:357587 
Monday, 9 Jun 2014
14:17 mat search for other commits by this committer
Do install a rndc.conf.sample.

Sponsored by:	Absolight
Original commitRevision:357152 
10:24 mat search for other commits by this committer
Unbreak, it seems not everybody as switched to pkg yet...

Sponsored by:	Absolight
Original commitRevision:357127 
Friday, 6 Jun 2014
10:59 mat search for other commits by this committer
Don't install rndc.conf

It is generated by the rc script during the first startup.  And if
the file is present, it messes up the rndc.key generation.

Poked by:	Alain Audebert
Sponsored by:	Absolight
Original commitRevision:356762 
Saturday, 17 May 2014
21:30 mat search for other commits by this committer
Fix build with GOST (on 10, base OpenSSL doesn't have it)
Make sure OpenSSL from ports is used < 10.

Sponsored by:	Absolight
Original commitRevision:354375 
Friday, 16 May 2014
03:13 mat search for other commits by this committer
Ok, revert r354129, it was a bad idea.

Poked by:	many
Sponsored by:	Absolight
Original commitRevision:354193 
Thursday, 15 May 2014
14:12 mat search for other commits by this committer
Try and fix the plist for bind9* ports when <10.

Poked by:	swills
Sponsored by:	Absolight
Original commitRevision:354129 
Wednesday, 14 May 2014
23:59 mat search for other commits by this committer
Make GOST in BIND 9.* optional

Test Plan: Currently testing in poudriere

Differential Revision: https://phabric.freebsd.org/D12
Original commitRevision:354095 
Thursday, 17 Apr 2014
16:43 mat search for other commits by this committer
Fix the rc script reload command.

Noticed by:	David Samms
Sponsored by:	Absolight
Original commitRevision:351487 
Wednesday, 16 Apr 2014
18:28 zeising search for other commits by this committer
The FreeBSD x11@ and graphics team proudly presents
a zeising, kwm production, with help from dumbbell, bdrewery:

NEW XORG ON FREEBSD 9-STABLE AND 10-STABLE

This update switches over to use the new xorg stack by default on FreeBSD 9
and 10 stable, on osversions where vt(9) is available.
It is still possible to use the old stack by specifying WITHOUT_NEW_XORG in
/etc/make.conf .
FreeBSD 8-STABLE and released versions of FreeBSD still use
the old version.
A package repository with binary packages for new xorg will
be available soon.

This patch also contains updates of libxcb and related ports, pixman, as well
as some drivers and utilities.

Bump portrevisions for xf86-* ports, as well as virtualbox-ose-additions due
to xserver version change.

Apart from these updates, the way shared libraries are handled has been
changed for all xorg ports, as well as libxml2 and freetype, which means
ltverhack is gone and as a consequence shared libraries have been bumped.
The plan is that this change will make library bumps less likely in the
future.
All affected ports have had their portrevisions bumped as a consequence of
this.

Fix some issues where WITH_NEW_XORG weren't detected properly on CURRENT.

Update instructions, hardware support, and more notes can be found on
https://wiki.freebsd.org/Graphics

Thanks to:	all testers, bdrewery and the FreeBSD x11@ team
exp-run by:	bdrewery [1]
PR:		ports/187602 [1]
Approved by:	portmgr (bdrewery), core (jhb)
Original commitRevision:351411 
Thursday, 10 Apr 2014
20:43 mat search for other commits by this committer
Two changes to the RC script
- Add a dependency on ldconfig
- Allow people to change the pidfile

PR:		188439
Submitted by:	Oliver Lehmann
Sponsored by:	Absolight
Original commitRevision:350848 
Thursday, 27 Mar 2014
13:30 mat search for other commits by this committer
- Fix startup script
- Fix whitespace

PR:		188011
Submitted by:	takefu
Sponsored by:	Absolight
Original commitRevision:349338 
Tuesday, 25 Mar 2014
17:25 mat search for other commits by this committer
Finaly pet rclint.

With help from:	crees
Sponsored by:	Absolight
Original commitRevision:349162 
15:46 mat search for other commits by this committer
Remove GSSAPI from the default options.

Almost nobody needs it, and people keep having a hard time building BIND
because of this.

Sponsored by:	Absolight
Original commitRevision:349154 
Monday, 17 Mar 2014
18:46 mat search for other commits by this committer
- Use SUB_FILES for named.conf and the rc script
- Fix some package installation warnings

Sponsored by:	Absolight
Original commitRevision:348497 
Friday, 7 Mar 2014
19:15 mat search for other commits by this committer
Pet PORTSCOUT.

Sponsored by:	Absolight
Original commitRevision:347417 
Thursday, 6 Mar 2014
17:31 mat search for other commits by this committer
Always depend on libxml[1]
Add XML newstats support to bind99[2]

PR:		186890[1], 186791[2]
Submitted by:	Jason Mann[1], Matthew Seaman[2]
Sponsored by:	Absolight
Original commitRevision:347284 
17:12 mat search for other commits by this committer
Try and have BIND start earlier.

Sponsored by:	Absolight
Original commitRevision:347281 
Tuesday, 4 Mar 2014
17:32 mat search for other commits by this committer
Don't polute isc-config.sh with gssapi flags.

Submitted by:	hrs
Sponsored by:	Absolight
Original commitRevision:347046 
Thursday, 27 Feb 2014
18:10 mat search for other commits by this committer
Change the BIND ports to use PKGNAMESUFFIX.

Sponsored by:	Absolight
Original commitRevision:346383 
Friday, 7 Feb 2014
09:16 mat search for other commits by this committer
Use a permanent name for the patch. (same file, the other was a symlink.)

Sponsored by:	Absolight
Original commitRevision:343206 
09:10 mat search for other commits by this committer
Unbreak in the RPZRRL_PATCH case, patch has been released.

Many thanks to:	Vernon Schryver
Sponsored by:	Absolight
Original commitRevision:343204 
Friday, 31 Jan 2014
09:50 mat search for other commits by this committer
Note that the RPZRRL patch doesn't work yet with that release.

Sponsored by:	Absolight
Original commitRevision:341969 
09:06 mat search for other commits by this committer
Update to 9.8.7.

Changes:	https://lists.isc.org/pipermail/bind-announce/2014-January/000895.html
Sponsored by:	Absolight
Original commitRevision:341951 
Monday, 27 Jan 2014
15:43 garga search for other commits by this committer
Revert r341073, static libs are not supposed to be PIC
Original commitRevision:341417 
Saturday, 25 Jan 2014
18:28 garga search for other commits by this committer
Add -fPIC to CFLAGS for amd64, this fix static libraries

Approved by:	mat@ (maintainer)
Original commitRevision:341073 
Monday, 13 Jan 2014
17:38 mat search for other commits by this committer
Security update to fix CVE-2014-0591 as reported at
https://kb.isc.org/article/AA-01078/74/

9.9.4 -> 9.9.4-P2
9.8.6 -> 9.8.6-P2
9.6-ESV-R10 -> 9.6-ESV-R10-P2

Security:	CVE-2014-0591 Remote DOS
Original commitRevision:339612 
Wednesday, 8 Jan 2014
22:52 mat search for other commits by this committer
Fixup rndc.conf.sample installation

Spotted by:	antoine
Original commitRevision:339186 
Tuesday, 7 Jan 2014
09:55 erwin search for other commits by this committer
There's always a default value for named_conf now, so no need to
check for it, and espcially not for a wrong value.

Noticed by:	Stefan Bethke <stb@lassitu.de>
Approved by:	mat (maintainer)
Original commitRevision:338989 
Monday, 6 Jan 2014
23:15 mat search for other commits by this committer
Yet another round of fixes.

This time, it seems all of REPLACE_BASE, not REPLACE_BASE and post Bind removal
from base seem to work consistently.
Original commitRevision:338952 
21:39 mat search for other commits by this committer
Fix yet another bug, they're creeping like crazy...
Original commitRevision:338943 
13:34 mat search for other commits by this committer
Convert to staging and new options.
Original commitRevision:338877 
Saturday, 4 Jan 2014
19:25 mat search for other commits by this committer
Add the DOCS option to OPTIONS_DEFAULT.
Original commitRevision:338674 
Thursday, 2 Jan 2014
13:43 erwin search for other commits by this committer
Hand the BIND ports to a new volunteer.
Original commitRevision:338442 
Tuesday, 10 Dec 2013
10:01 erwin search for other commits by this committer
Fix build with GSSAPI option without Kerberos

PR:		184560
Submitted by:	Dewayne <dewayne@heuristicsystems.com.au>
Original commitRevision:336054 
Sunday, 8 Dec 2013
19:49 marino search for other commits by this committer
bind(96,98,99): Couple OSVERSION with OPSYS

OSVERSION is platform-specific and must be used with OPSYS.

Approved by:	maintainer (erwin)
Original commitRevision:335933 
Saturday, 7 Dec 2013
10:50 gjb search for other commits by this committer
To prevent fallout of lowering __FreeBSD_version in releng/10.0 branch,
adjust OSVERSION evaluation in ports that specifically use '100050N'.

Approved by:	affected maintainers (implicit)
Sponsored by:	The FreeBSD Foundation
Original commitRevision:335824 
Thursday, 5 Dec 2013
12:54 erwin search for other commits by this committer
Install named.conf as named.conf.sample and don't overwrite on upgrade

Bullet hole in foot:	joeld
Pointy hat:		erwin
Original commitRevision:335667 
Wednesday, 4 Dec 2013
12:15 erwin search for other commits by this committer
Fix build with GSSAPI

Submitted by:	sunpoet
Original commitRevision:335618 
Friday, 22 Nov 2013
13:41 erwin search for other commits by this committer
Fix startup script.

PR:		184159 [1]
Submitted by:	Pawel Biernacki <pawel.biernacki@gmail.com> [1],
		Trond Endrestoel <Trond.Endrestol@ximalas.info> (private email)
Original commitRevision:334593 
Tuesday, 12 Nov 2013
07:38 erwin search for other commits by this committer
Support FreeBSD 10.0.

On FreeBSD 10.0, all configuration is installed under
/usr/local/etc/namedb and installs its own rc script in
$PREFIX, which no longer support chroot installations.

LINKS and REPLACE_BASE options are not supported on 10.0
for obvious reasons.

Note for FreeBSD 9.x and earlier users, LINKS is no longer
the default option, though still supported.

An UPDATING entry will follow after bind96 and bind99 are fixed
as well.
Original commitRevision:333546 
Monday, 4 Nov 2013
11:23 erwin search for other commits by this committer
Drop support for REPLACE_BIND option after BIND was removed from base,
there's nothing to replace.
Original commitRevision:332693 
Friday, 1 Nov 2013
10:26 erwin search for other commits by this committer
Fix PATCH_SITES

Submitted by:	"Felix J. Ogris" <fjo@ogris.de>
Original commitRevision:332348 
Saturday, 28 Sep 2013
12:32 erwin search for other commits by this committer
Update to 9.8.6
Original commitRevision:328564 
Monday, 23 Sep 2013
10:20 erwin search for other commits by this committer
Add an option for filter-aaaa

Submitted by:	Matej Gregr <matej.gregr@gmail.com>
Original commitRevision:327967 
Friday, 20 Sep 2013
16:31 bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
dns)
Original commitRevision:327719 
Tuesday, 17 Sep 2013
11:31 erwin search for other commits by this committer
Make GSSAPI support optional

PR:		182122
Submitted by:	Uwe Doering <gemini@geminix.org>
Original commitRevision:327469 
Thursday, 5 Sep 2013
20:18 bsam search for other commits by this committer
. introduce ICONV_CONFIGURE_BASE variable at Mk/Uses/iconv.mk. It's value is
  "--with-libiconv=${LOCALBASE}" at systems pre OSVERSION 100043 and "" (null)
  otherwise;
. convert all ports which has CONFIGURE_ARGS=--with-libiconv=${LOCALBASE}.

Approved by:	portmgr (bapt, implicit)
Original commitRevision:326444 
Saturday, 27 Jul 2013
21:08 roberto search for other commits by this committer
Update the RPZ+RL patches for both versions.

Approved by:	erwin
Original commitRevision:323808 
Friday, 26 Jul 2013
22:05 roberto search for other commits by this committer
Security update to fix CVE-2013-4854 as reported at
https://kb.isc.org/article/AA-01015/0

9.9.3-p1 -> 9.9.3-P2
9.8.5-p1 -> 9.8.5-P2

9.6.x is not affected, neither is 10.x.

Security:	CVE-2013-4854 Remote DOS
Original commitRevision:323757 
Wednesday, 5 Jun 2013
11:49 erwin search for other commits by this committer
Update to 9.8.5-P1

Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   A deliberately constructed combination of records could cause
   named to hang while populating the additional section of a
   response. (CVE-2012-5166) [RT #31090]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
   [RT #30792 / #30996]

   Prevents an assertion failure in named when RPZ and DNS64 are
   used together. (CVE-2012-5689) [RT #32141]

See release notes for further features and bug fixes:
https://kb.isc.org/article/AA-00969/0/BIND-9.8.5-P1-Release-Notes.html

Security:	CVE-2013-3919
		CVE-2012-5166
		CVE-2013-2266
		CVE-2012-5688
		CVE-2012-5689
Original commitRevision:319983 
Friday, 31 May 2013
09:32 erwin search for other commits by this committer
Update to 9.8.5
Original commitRevision:319472 
08:10 erwin search for other commits by this committer
Update RPZ and RRL patch set:

  - address the issue raised by Bob Harold. RRL on recursive servers
     applies rate limits after waiting for recursion except on
     sub-domains of domains for which the server is authoritative.

  - fix the bug reported by Roy Arends in which "slipped" NXDOMAIN
     responses had rcode values of 0 (NoError) instead of 3 (NXDOMAIN).

  - move reports of RRL drop and slip actions from the "queries"
     log category to the "query-errors" category. Because they are not
     in the "queres" category, enabling or disabling query logging no
     longer affects them.
Original commitRevision:319468 
Tuesday, 23 Apr 2013
08:26 erwin search for other commits by this committer
Make pkg-message and pkg-install a local file to the bind98 and bind99
ports and not include the one from the deprecated bind97 port, which is
to be removed.
Original commitRevision:316321 
Wednesday, 17 Apr 2013
07:57 erwin search for other commits by this committer
Update RPZ+RRL patchset to the latest version.

The change makes "slip 1;" send only truncated (TC=1) responses.
Without the change, "slip 1;" is the same as the default of "slip 2;".
That default, which alternates truncated with dropped responses
when the rate limit is exceeded, is better for authoritative DNS
servers, because it further reduces the amplification of an attack
from about 1X to about 0.5X.

DNS RRL is not recommended for recursive servers.

Feature safe:	yes
Original commitRevision:315942 
Wednesday, 27 Mar 2013
07:55 erwin search for other commits by this committer
Update to 9.8.4-P2

Removed the check for regex.h in configure in order
to disable regex syntax checking, as it exposes
BIND to a critical flaw in libregex on some
platforms. [RT #32688]

Security:	CVE-2013-2266
Original commitRevision:315355 
Friday, 15 Mar 2013
10:56 erwin search for other commits by this committer
Update the RPZ+RRL patch files which remove
working files that should not have been in the patches[1]
Also move to a versioned filename for the patches[2]

Submitted by:	Robert Sargent <robtsgt@gmail.com> [1],
		Vernon Schryver <vjs@rhyolite.com> [2]
Original commitRevision:314294 
Thursday, 10 Jan 2013
10:37 erwin search for other commits by this committer
Reduce lenght of the option description for RPZRRL_PATCH to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:   Terry Kennedy <terry@tmk.com>
Original commitRevision:310175 
Wednesday, 9 Jan 2013
10:20 erwin search for other commits by this committer
Update the response rate limiting patch to the latest
released version of January 5, 2013.

This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same
patch.

More information: http://ss.vix.su/~vjs/rrlrpz.html
Original commitRevision:310131 
Friday, 4 Jan 2013
10:47 erwin search for other commits by this committer
Add LICENSE.
Original commitRevision:309925 
10:39 erwin search for other commits by this committer
Add experimental option for Response Rate Limiting patch.
Original commitRevision:309924 
Friday, 14 Dec 2012
10:43 erwin search for other commits by this committer
- Use new OPTIONS_GROUP for DLZ options.[1]
- This also allows more than one DLZ option
  to be set.[2]

Submitted by:	bapt [1] (as RADIO)
Suggested by:	az [2] (thus GROUP instead)
Original commitRevision:308897 
Wednesday, 5 Dec 2012
07:46 erwin search for other commits by this committer
Update to the latest patch level from ISC:

  BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
Original commitRevision:308317 
Monday, 3 Dec 2012
10:52 erwin search for other commits by this committer
Improve the SSL option description

Submitted by:	Kazunori Fujiwara <fujiwara@jprs.co.jp>
Feature safe:	yes
Original commitRevision:308136 
10:48 erwin search for other commits by this committer
Remove gpg signature checking that in itself does not
provide any additional security.

Feature safe:	yes
Original commitRevision:308135 
Tuesday, 27 Nov 2012
10:05 erwin search for other commits by this committer
- Update CONFLICTS
- Fix a typo in the OPTIONSNG conversion
- Add FIXED_RRSET option
- Add RPZ options (9.8 and 9.8 only)

PR:		172586
Submitted by:	Craig Leres <leres@ee.lbl.gov>
Feature safe:	yes
Original commitRevision:307830 
Friday, 26 Oct 2012
08:37 erwin search for other commits by this committer
Reduce lenght of the option description for DLZ_MYSQL to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:	Terry Kennedy <terry@tmk.com>
Feature safe:	yes
Original commitRevision:306427 
Thursday, 25 Oct 2012
10:53 erwin search for other commits by this committer
- Convert to OPTIONSNG
- Turn on IPv6 support by default

Feature safe:	yes
Original commitRevision:306379 
Friday, 19 Oct 2012
09:32 erwin search for other commits by this committer
Update to 9.8.4

Feature safe:	yes
Original commitRevision:306112 
Wednesday, 10 Oct 2012
11:54 erwin search for other commits by this committer
Upgrade to the latest BIND patch level:

A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Security:	 
http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
Original commitRevision:305645 
09:11 erwin search for other commits by this committer
Take maintainership of the BIND ports while I'm working on the latest
security releases.
Original commitRevision:305639 
Monday, 8 Oct 2012
10:38 dougb search for other commits by this committer
Throw my ports back in the pool, and make my intentions clear for the
various ports that I've created.

I bid fond fare well
A chapter closes for me
What opens for you?
Original commitRevision:305526 
Wednesday, 19 Sep 2012
03:46 dougb search for other commits by this committer
Upgrade to the latest BIND patch level:

Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.

For more information: https://kb.isc.org/article/AA-00788
Original commitRevision:304476 
Tuesday, 24 Jul 2012
19:23 dougb search for other commits by this committer
Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
Original commit
Monday, 4 Jun 2012
21:51 dougb search for other commits by this committer
Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
Original commit
Wednesday, 23 May 2012
04:41 dougb search for other commits by this committer
Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Each version also contains other critical bug fixes.

All BIND users are encouraged to upgrade to these latest versions.
Original commit
Wednesday, 4 Apr 2012
21:41 dougb search for other commits by this committer
Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.

For the port, switch to using the PORTDOCS macro.

Feature safe:   yes
Original commit
Wednesday, 16 Nov 2011
23:41 dougb search for other commits by this committer
Upgrade to the latest security patch releases to address the
following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-tbd
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

Feature safe:   yes
Original commit
Thursday, 1 Sep 2011
04:43 dougb search for other commits by this committer
Upgrade to version 9.8.1. Release notes at:

https://deepthought.isc.org/article/AA-00446/81/
or
/usr/local/share/doc/bind98/CHANGES

Remove the patch incorporated upstream, and add new include to plist.
Original commit
Sunday, 17 Jul 2011
04:08 dougb search for other commits by this committer
Fix the location of the default pid file in named.8

Problem pointed out in the PR

PR:             conf/155006
Submitted by:   Helmut Schneider <jumper99@gmx.de>
Original commit
Tuesday, 5 Jul 2011
21:19 dougb search for other commits by this committer
Update to versions 9.8.0-P4, 9.7.3-P3, and 9.6-ESV-R4-P3.

ALL BIND USERS ENCOURAGED TO UPGRADE IMMEDIATELY

This update addresses the following vulnerabilities:

CVE-2011-2464
=============
Severity:       High
Exploitable:    Remotely

Description:

A defect in the affected BIND 9 versions allows an attacker to remotely
cause the "named" process to exit using a specially crafted packet. This
defect affects both recursive and authoritative servers. The code location
of the defect makes it impossible to protect BIND using ACLs configured
within named.conf or by disabling any features at compile-time or run-time.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464
https://www.isc.org/software/bind/advisories/cve-2011-2464

CVE-2011-2465
=============
Severity:       High
Exploitable:    Remotely

Description:

A defect in the affected versions of BIND could cause the "named" process
to exit when queried, if the server has recursion enabled and was
configured with an RPZ zone containing certain types of records.
Specifically, these are any DNAME record and certain kinds of CNAME
records.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2465
https://www.isc.org/software/bind/advisories/cve-2011-2465

Additional changes in this version:

* If named is configured to be both authoritative and resursive and
  receives a recursive query for a CNAME in a zone that it is
  authoritative for, if that CNAME also points to a zone the server
  is authoritative for, the recursive part of name will not follow
  the CNAME change and the response will not be a complete CNAME
  chain. [RT #24455]

  Thus the patch for this bug has been removed from the port

* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
  with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
  query type independant. [RT #24715] [CVE-2011-1907]
Original commit
Friday, 27 May 2011
23:47 dougb search for other commits by this committer
Upgrade to 9.8.0-P2, which addresses the following issues:

1. Very large RRSIG RRsets included in a negative cache can trigger
an assertion failure that will crash named (BIND 9 DNS) due to an
off-by-one error in a buffer size check.

This bug affects all resolving name servers, whether DNSSEC validation
is enabled or not, on all BIND versions prior to today. There is a
possibility of malicious exploitation of this bug by remote users.

2. Named could fail to validate zones listed in a DLV that validated
insecure without using DLV and had DS records in the parent zone.

Add a patch provided by ru@ and confirmed by ISC to fix a crash at
shutdown time when a SIG(0) key is being used.

Add a patch from ISC that will be in 9.8.1 to handle intermittent
failure of recursive queries involving CNAMEs and previously cached
responses.
Original commit
Friday, 6 May 2011
21:13 dougb search for other commits by this committer
Upgrade to version 9.8.0-P1:

Certain response policy zone configurations could trigger an INSIST
when receiving a query of type RRSIG.

https://www.isc.org/CVE-2011-1907

This vulnerability is only possible if you have enable the new RPZ feature.
Original commit
Wednesday, 2 Mar 2011
00:27 dougb search for other commits by this committer
This is 9.8.0, the first release version in the 9.8 series.

New features versus previous release candidates include:

* There is a new option in dig, +onesoa, that allows the final SOA
  record in an AXFR response to be suppressed. [RT #20929
* There is additional information displayed in the recursing log
  (qtype, qclass, qid and whether we are following the original
  name). [RT #22043]
* Added option 'resolver-query-timeout' in named.conf (max query
  timeout in seconds) to set a different value than the default (30
  seconds). A value of 0 means 'use the compiled in default';
  anything longer than 30 will be silently set to 30. [RT #22852]
* For Mac OS X, you can now have the test interfaces used during
  "make test" stay beyond reboot. See bin/tests/system/README for
  details.

There are also numerous bug fixes and enhancements. See
http://ftp.isc.org/isc/bind9/9.8.0/RELEASE-NOTES-BIND-9.8.html
for more information.
Original commit
Tuesday, 15 Feb 2011
01:50 dougb search for other commits by this committer
Update to 9.8.0rc1, the latest from ISC:

 * The ADB hash table stores informations about which authoritative
   servers to query about particular domains. Previous versions of
   BIND had the hash table size as a fixed value. On a busy recursive
   server, this could lead to hash table collisions in the ADB cache,
   resulting in degraded response time to queries. Bind 9.8 now has a
   dynamically scalable ADB hash table, which helps a busy server to
   avoid hash table collisions and maintain a consistent query
   response time.
Original commit
Saturday, 22 Jan 2011
07:43 dougb search for other commits by this committer
Update to 9.8.0b1, which in addition to DNS64 support also has
the following new features:

* BIND now supports a new zone type, static-stub. This allows the
administrator of a recursive nameserver to force queries for a
particular zone to go to IP addresses of the administrator's choosing,
on a per zone basis, both globally or per view.

* BIND now supports Response Policy Zones, a way of expressing
"reputation" in real time via specially constructed DNS zones. See the
draft specification here:
http://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt

* Dynamically Loadable Zones (DLZ) now support dynamic updates.
Contributed by Andrew Tridgell of the Samba Project.

* Added a "dlopen" DLZ driver, allowing the creation of external DLZ
drivers that can be loaded as shared objects at runtime rather than
having to be linked with named at compile time. Currently this is
switched on via a compile-time option, "configure --with-dlz-dlopen".
Note: the syntax for configuring DLZ zones is likely to be refined in
future releases. Contributed by Andrew Tridgell of the Samba Project.

* numerous GSS-TSIG improvements

* There is a new update-policy match type "external". This allows
named to decide whether to allow a dynamic update by checking with an
external daemon. Contributed by Andrew Tridgell of the Samba Project.

* many other improvements

Feature safe:   yes
Original commit
Saturday, 18 Dec 2010
09:50 dougb search for other commits by this committer
We need _all_ the fixes from ../bind97
Original commit
08:58 dougb search for other commits by this committer
We need the fixes from bind97 for the perl problem here, not bind96
Original commit
Friday, 17 Dec 2010
22:48 dougb search for other commits by this committer
Add a -devel port for 9.8.0a1, which will allow people to experiment
with DNS64. Once 9.8.0 is released officially the -devel tag will be
removed.

BIND version 9 is a major rewrite of nearly all aspects of the underlying BIND
architecture.  Some of the important features of BIND 9 are:

DNS Security: DNSSEC (signed zones), TSIG (signed DNS requests)
IP version 6: Answers DNS queries on IPv6 sockets, IPv6 resource records (AAAA)
     Experimental IPv6 Resolver Library
DNS Protocol Enhancements: IXFR, DDNS, Notify, EDNS0
     Improved standards conformance
Views: One server process can provide multiple "views" of the DNS namespace,
     e.g. an "inside" view to certain clients, and an "outside" view to others.
Multiprocessor Support

BIND 9.8 includes a number of changes from BIND 9.7 and earlier releases,
including:
        Preliminary DNS64 support (AAAA synthesis only initially)

See the CHANGES file for more information on features.

WWW: https://www.isc.org/software/bind
Original commit

Number of commits found: 100