notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Ukraine
This referral link gives you 10% off a Fastmail.com account and gives me a discount on my Fastmail account.

Get notified when packages are built

A new feature has been added. FreshPorts already tracks package built by the FreeBSD project. This information is displayed on each port page. You can now get an email when FreshPorts notices a new package is available for something on one of your watch lists. However, you must opt into that. Click on Report Subscriptions on the right, and New Package Notification box, and click on Update.

Finally, under Watch Lists, click on ABI Package Subscriptions to select your ABI (e.g. FreeBSD:14:amd64) & package set (latest/quarterly) combination for a given watch list. This is what FreshPorts will look for.

Port details
bind99 BIND DNS suite with updated DNSSEC and DNS64
9.9.12_2 dns Deleted on this many watch lists=20 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 9.9.12_2Version of this port present on the latest quarterly branch.
Deprecated DEPRECATED: Going out of support, please migrate to dns/bind911
Expired This port expired on: 2018-06-30
Maintainer: mat@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2012-01-28 05:28:38
Last Update: 2018-07-04 12:57:28
SVN Revision: 473882
People watching this port, also watch:: rsync, bash, postfix, python27
Also Listed In: ipv6 net
License: ISCL
WWW:
https://www.isc.org/software/bind
Description:
BIND version 9 is a major rewrite of nearly all aspects of the underlying BIND architecture. Some of the important features of BIND 9 are: DNS Security: DNSSEC (signed zones), TSIG (signed DNS requests) IP version 6: Answers DNS queries on IPv6 sockets, IPv6 resource records (AAAA) Experimental IPv6 Resolver Library DNS Protocol Enhancements: IXFR, DDNS, Notify, EDNS0 Improved standards conformance Views: One server process can provide multiple "views" of the DNS namespace, e.g. an "inside" view to certain clients, and an "outside" view to others. Multiprocessor Support BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases, including: NXDOMAIN redirection Improved startup and reconfiguration time, especially with large numbers of authoritative zones New "inline-signing" option, allows named to sign zones completely transparently, including static zones Many other new features, especially for DNSSEC See the CHANGES file for more information on features. WWW: https://www.isc.org/software/bind
Homepage    cgit ¦ GitHub ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
pkg-plist: as obtained via: make generate-plist
Expand this list (395 items)
Collapse this list.
  1. /usr/local/share/licenses/bind99-9.9.12_2/catalog.mk
  2. /usr/local/share/licenses/bind99-9.9.12_2/LICENSE
  3. /usr/local/share/licenses/bind99-9.9.12_2/ISCL
  4. bin/arpaname
  5. bin/bind9-config
  6. bin/dig
  7. bin/host
  8. bin/isc-config.sh
  9. bin/nslookup
  10. bin/nsupdate
  11. @sample etc/mtree/BIND.chroot.dist.sample
  12. @sample etc/mtree/BIND.chroot.local.dist.sample
  13. etc/namedb/bind.keys
  14. etc/namedb/master/empty.db
  15. etc/namedb/master/localhost-forward.db
  16. etc/namedb/master/localhost-reverse.db
  17. @sample etc/namedb/named.conf.sample
  18. etc/namedb/named.root
  19. etc/namedb/rndc.conf.sample
  20. include/bind9/check.h
  21. include/bind9/getaddresses.h
  22. include/bind9/version.h
  23. include/dns/acache.h
  24. include/dns/acl.h
  25. include/dns/adb.h
  26. include/dns/bit.h
  27. include/dns/byaddr.h
  28. include/dns/cache.h
  29. include/dns/callbacks.h
  30. include/dns/cert.h
  31. include/dns/client.h
  32. include/dns/clientinfo.h
  33. include/dns/compress.h
  34. include/dns/db.h
  35. include/dns/dbiterator.h
  36. include/dns/dbtable.h
  37. include/dns/diff.h
  38. include/dns/dispatch.h
  39. include/dns/dlz.h
  40. include/dns/dlz_dlopen.h
  41. include/dns/dns64.h
  42. include/dns/dnssec.h
  43. include/dns/ds.h
  44. include/dns/ecdb.h
  45. include/dns/enumclass.h
  46. include/dns/enumtype.h
  47. include/dns/events.h
  48. include/dns/fixedname.h
  49. include/dns/forward.h
  50. include/dns/iptable.h
  51. include/dns/journal.h
  52. include/dns/keydata.h
  53. include/dns/keyflags.h
  54. include/dns/keytable.h
  55. include/dns/keyvalues.h
  56. include/dns/lib.h
  57. include/dns/log.h
  58. include/dns/lookup.h
  59. include/dns/master.h
  60. include/dns/masterdump.h
  61. include/dns/message.h
  62. include/dns/name.h
  63. include/dns/ncache.h
  64. include/dns/nsec.h
  65. include/dns/nsec3.h
  66. include/dns/opcode.h
  67. include/dns/order.h
  68. include/dns/peer.h
  69. include/dns/portlist.h
  70. include/dns/private.h
  71. include/dns/rbt.h
  72. include/dns/rcode.h
  73. include/dns/rdata.h
  74. include/dns/rdataclass.h
  75. include/dns/rdatalist.h
  76. include/dns/rdataset.h
  77. include/dns/rdatasetiter.h
  78. include/dns/rdataslab.h
  79. include/dns/rdatastruct.h
  80. include/dns/rdatatype.h
  81. include/dns/request.h
  82. include/dns/resolver.h
  83. include/dns/result.h
  84. include/dns/rootns.h
  85. include/dns/rpz.h
  86. include/dns/rriterator.h
  87. include/dns/rrl.h
  88. include/dns/sdb.h
  89. include/dns/sdlz.h
  90. include/dns/secalg.h
  91. include/dns/secproto.h
  92. include/dns/soa.h
  93. include/dns/ssu.h
  94. include/dns/stats.h
  95. include/dns/tcpmsg.h
  96. include/dns/time.h
  97. include/dns/timer.h
  98. include/dns/tkey.h
  99. include/dns/tsec.h
  100. include/dns/tsig.h
  101. include/dns/ttl.h
  102. include/dns/types.h
  103. include/dns/update.h
  104. include/dns/validator.h
  105. include/dns/version.h
  106. include/dns/view.h
  107. include/dns/xfrin.h
  108. include/dns/zone.h
  109. include/dns/zonekey.h
  110. include/dns/zt.h
  111. include/dst/dst.h
  112. include/dst/gssapi.h
  113. include/dst/lib.h
  114. include/dst/result.h
  115. include/isc/app.h
  116. include/isc/assertions.h
  117. include/isc/atomic.h
  118. include/isc/backtrace.h
  119. include/isc/base32.h
  120. include/isc/base64.h
  121. include/isc/bind9.h
  122. include/isc/bitstring.h
  123. include/isc/boolean.h
  124. include/isc/buffer.h
  125. include/isc/bufferlist.h
  126. include/isc/commandline.h
  127. include/isc/condition.h
  128. include/isc/counter.h
  129. include/isc/dir.h
  130. include/isc/entropy.h
  131. include/isc/errno.h
  132. include/isc/error.h
  133. include/isc/event.h
  134. include/isc/eventclass.h
  135. include/isc/file.h
  136. include/isc/formatcheck.h
  137. include/isc/fsaccess.h
  138. include/isc/hash.h
  139. include/isc/heap.h
  140. include/isc/hex.h
  141. include/isc/hmacmd5.h
  142. include/isc/hmacsha.h
  143. include/isc/httpd.h
  144. include/isc/int.h
  145. include/isc/interfaceiter.h
  146. include/isc/iterated_hash.h
  147. include/isc/keyboard.h
  148. include/isc/lang.h
  149. include/isc/lex.h
  150. include/isc/lfsr.h
  151. include/isc/lib.h
  152. include/isc/likely.h
  153. include/isc/list.h
  154. include/isc/log.h
  155. include/isc/magic.h
  156. include/isc/md5.h
  157. include/isc/mem.h
  158. include/isc/msgcat.h
  159. include/isc/msgs.h
  160. include/isc/mutex.h
  161. include/isc/mutexblock.h
  162. include/isc/namespace.h
  163. include/isc/net.h
  164. include/isc/netaddr.h
  165. include/isc/netdb.h
  166. include/isc/netscope.h
  167. include/isc/offset.h
  168. include/isc/once.h
  169. include/isc/ondestroy.h
  170. include/isc/os.h
  171. include/isc/parseint.h
  172. include/isc/platform.h
  173. include/isc/pool.h
  174. include/isc/portset.h
  175. include/isc/print.h
  176. include/isc/queue.h
  177. include/isc/quota.h
  178. include/isc/radix.h
  179. include/isc/random.h
  180. include/isc/ratelimiter.h
  181. include/isc/refcount.h
  182. include/isc/regex.h
  183. include/isc/region.h
  184. include/isc/resource.h
  185. include/isc/result.h
  186. include/isc/resultclass.h
  187. include/isc/rwlock.h
  188. include/isc/safe.h
  189. include/isc/serial.h
  190. include/isc/sha1.h
  191. include/isc/sha2.h
  192. include/isc/sockaddr.h
  193. include/isc/socket.h
  194. include/isc/stat.h
  195. include/isc/stats.h
  196. include/isc/stdio.h
  197. include/isc/stdlib.h
  198. include/isc/stdtime.h
  199. include/isc/strerror.h
  200. include/isc/string.h
  201. include/isc/symtab.h
  202. include/isc/syslog.h
  203. include/isc/task.h
  204. include/isc/taskpool.h
  205. include/isc/thread.h
  206. include/isc/time.h
  207. include/isc/timer.h
  208. include/isc/tm.h
  209. include/isc/types.h
  210. include/isc/util.h
  211. include/isc/version.h
  212. include/isc/xml.h
  213. include/isccc/alist.h
  214. include/isccc/base64.h
  215. include/isccc/cc.h
  216. include/isccc/ccmsg.h
  217. include/isccc/events.h
  218. include/isccc/lib.h
  219. include/isccc/result.h
  220. include/isccc/sexpr.h
  221. include/isccc/symtab.h
  222. include/isccc/symtype.h
  223. include/isccc/types.h
  224. include/isccc/util.h
  225. include/isccc/version.h
  226. include/isccfg/aclconf.h
  227. include/isccfg/cfg.h
  228. include/isccfg/dnsconf.h
  229. include/isccfg/grammar.h
  230. include/isccfg/log.h
  231. include/isccfg/namedconf.h
  232. include/isccfg/version.h
  233. include/lwres/context.h
  234. include/lwres/int.h
  235. include/lwres/ipv6.h
  236. include/lwres/lang.h
  237. include/lwres/list.h
  238. include/lwres/lwbuffer.h
  239. include/lwres/lwpacket.h
  240. include/lwres/lwres.h
  241. include/lwres/net.h
  242. include/lwres/netdb.h
  243. include/lwres/platform.h
  244. include/lwres/result.h
  245. include/lwres/stdlib.h
  246. include/lwres/string.h
  247. include/lwres/version.h
  248. lib/libbind9.a
  249. lib/libdns.a
  250. lib/libisc.a
  251. lib/libisccc.a
  252. lib/libisccfg.a
  253. lib/liblwres.a
  254. man/man1/arpaname.1.gz
  255. man/man1/bind9-config.1.gz
  256. man/man1/dig.1.gz
  257. man/man1/host.1.gz
  258. man/man1/isc-config.sh.1.gz
  259. man/man1/nslookup.1.gz
  260. man/man1/nsupdate.1.gz
  261. man/man3/lwres.3.gz
  262. man/man3/lwres_addr_parse.3.gz
  263. man/man3/lwres_buffer.3.gz
  264. man/man3/lwres_buffer_add.3.gz
  265. man/man3/lwres_buffer_back.3.gz
  266. man/man3/lwres_buffer_clear.3.gz
  267. man/man3/lwres_buffer_first.3.gz
  268. man/man3/lwres_buffer_forward.3.gz
  269. man/man3/lwres_buffer_getmem.3.gz
  270. man/man3/lwres_buffer_getuint16.3.gz
  271. man/man3/lwres_buffer_getuint32.3.gz
  272. man/man3/lwres_buffer_getuint8.3.gz
  273. man/man3/lwres_buffer_init.3.gz
  274. man/man3/lwres_buffer_invalidate.3.gz
  275. man/man3/lwres_buffer_putmem.3.gz
  276. man/man3/lwres_buffer_putuint16.3.gz
  277. man/man3/lwres_buffer_putuint32.3.gz
  278. man/man3/lwres_buffer_putuint8.3.gz
  279. man/man3/lwres_buffer_subtract.3.gz
  280. man/man3/lwres_conf_clear.3.gz
  281. man/man3/lwres_conf_get.3.gz
  282. man/man3/lwres_conf_init.3.gz
  283. man/man3/lwres_conf_parse.3.gz
  284. man/man3/lwres_conf_print.3.gz
  285. man/man3/lwres_config.3.gz
  286. man/man3/lwres_context.3.gz
  287. man/man3/lwres_context_allocmem.3.gz
  288. man/man3/lwres_context_create.3.gz
  289. man/man3/lwres_context_destroy.3.gz
  290. man/man3/lwres_context_freemem.3.gz
  291. man/man3/lwres_context_initserial.3.gz
  292. man/man3/lwres_context_nextserial.3.gz
  293. man/man3/lwres_context_sendrecv.3.gz
  294. man/man3/lwres_endhostent.3.gz
  295. man/man3/lwres_endhostent_r.3.gz
  296. man/man3/lwres_freeaddrinfo.3.gz
  297. man/man3/lwres_freehostent.3.gz
  298. man/man3/lwres_gabn.3.gz
  299. man/man3/lwres_gabnrequest_free.3.gz
  300. man/man3/lwres_gabnrequest_parse.3.gz
  301. man/man3/lwres_gabnrequest_render.3.gz
  302. man/man3/lwres_gabnresponse_free.3.gz
  303. man/man3/lwres_gabnresponse_parse.3.gz
  304. man/man3/lwres_gabnresponse_render.3.gz
  305. man/man3/lwres_gai_strerror.3.gz
  306. man/man3/lwres_getaddrinfo.3.gz
  307. man/man3/lwres_getaddrsbyname.3.gz
  308. man/man3/lwres_gethostbyaddr.3.gz
  309. man/man3/lwres_gethostbyaddr_r.3.gz
  310. man/man3/lwres_gethostbyname.3.gz
  311. man/man3/lwres_gethostbyname2.3.gz
  312. man/man3/lwres_gethostbyname_r.3.gz
  313. man/man3/lwres_gethostent.3.gz
  314. man/man3/lwres_gethostent_r.3.gz
  315. man/man3/lwres_getipnode.3.gz
  316. man/man3/lwres_getipnodebyaddr.3.gz
  317. man/man3/lwres_getipnodebyname.3.gz
  318. man/man3/lwres_getnamebyaddr.3.gz
  319. man/man3/lwres_getnameinfo.3.gz
  320. man/man3/lwres_getrrsetbyname.3.gz
  321. man/man3/lwres_gnba.3.gz
  322. man/man3/lwres_gnbarequest_free.3.gz
  323. man/man3/lwres_gnbarequest_parse.3.gz
  324. man/man3/lwres_gnbarequest_render.3.gz
  325. man/man3/lwres_gnbaresponse_free.3.gz
  326. man/man3/lwres_gnbaresponse_parse.3.gz
  327. man/man3/lwres_gnbaresponse_render.3.gz
  328. man/man3/lwres_herror.3.gz
  329. man/man3/lwres_hstrerror.3.gz
  330. man/man3/lwres_inetntop.3.gz
  331. man/man3/lwres_lwpacket_parseheader.3.gz
  332. man/man3/lwres_lwpacket_renderheader.3.gz
  333. man/man3/lwres_net_ntop.3.gz
  334. man/man3/lwres_noop.3.gz
  335. man/man3/lwres_nooprequest_free.3.gz
  336. man/man3/lwres_nooprequest_parse.3.gz
  337. man/man3/lwres_nooprequest_render.3.gz
  338. man/man3/lwres_noopresponse_free.3.gz
  339. man/man3/lwres_noopresponse_parse.3.gz
  340. man/man3/lwres_noopresponse_render.3.gz
  341. man/man3/lwres_packet.3.gz
  342. man/man3/lwres_resutil.3.gz
  343. man/man3/lwres_sethostent.3.gz
  344. man/man3/lwres_sethostent_r.3.gz
  345. man/man3/lwres_string_parse.3.gz
  346. man/man5/named.conf.5.gz
  347. man/man5/rndc.conf.5.gz
  348. man/man8/ddns-confgen.8.gz
  349. man/man8/dnssec-checkds.8.gz
  350. man/man8/dnssec-coverage.8.gz
  351. man/man8/dnssec-dsfromkey.8.gz
  352. man/man8/dnssec-importkey.8.gz
  353. man/man8/dnssec-keyfromlabel.8.gz
  354. man/man8/dnssec-keygen.8.gz
  355. man/man8/dnssec-revoke.8.gz
  356. man/man8/dnssec-settime.8.gz
  357. man/man8/dnssec-signzone.8.gz
  358. man/man8/dnssec-verify.8.gz
  359. man/man8/genrandom.8.gz
  360. man/man8/isc-hmac-fixup.8.gz
  361. man/man8/lwresd.8.gz
  362. man/man8/named-checkconf.8.gz
  363. man/man8/named-checkzone.8.gz
  364. man/man8/named-compilezone.8.gz
  365. man/man8/named-journalprint.8.gz
  366. man/man8/named.8.gz
  367. man/man8/nsec3hash.8.gz
  368. man/man8/rndc-confgen.8.gz
  369. man/man8/rndc.8.gz
  370. sbin/ddns-confgen
  371. sbin/dnssec-checkds
  372. sbin/dnssec-coverage
  373. sbin/dnssec-dsfromkey
  374. sbin/dnssec-importkey
  375. sbin/dnssec-keyfromlabel
  376. sbin/dnssec-keygen
  377. sbin/dnssec-revoke
  378. sbin/dnssec-settime
  379. sbin/dnssec-signzone
  380. sbin/dnssec-verify
  381. sbin/genrandom
  382. sbin/isc-hmac-fixup
  383. sbin/lwresd
  384. sbin/named
  385. sbin/named-checkconf
  386. sbin/named-checkzone
  387. sbin/named-compilezone
  388. sbin/named-journalprint
  389. sbin/nsec3hash
  390. sbin/rndc
  391. sbin/rndc-confgen
  392. @dir(bind,bind,) etc/namedb/dynamic
  393. @dir etc/namedb/master
  394. @dir(bind,bind,) etc/namedb/slave
  395. @dir(bind,bind,) etc/namedb/working
Collapse this list.
Dependency lines:
  • bind99>0:dns/bind99
No installation instructions:
This port has been deleted.
PKGNAME: bind99
Flavors: there is no flavor information for this port.
distinfo:
TIMESTAMP = 1521455029 SHA256 (bind-9.9.12.tar.gz) = 9e39dcd35320c2aeb260a45037ac57c97c964e717d10e3c9f74ff4472f939761 SIZE (bind-9.9.12.tar.gz) = 8694636

No package information for this port in our database
Sometimes this happens. Not all ports have packages.
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. python2.7 : lang/python27
Runtime dependencies:
  1. python2.7 : lang/python27
Library dependencies:
  1. libxml2.so : textproc/libxml2
  2. libidnkit.so : dns/idnkit
  3. libedit.so.0 : devel/libedit
  4. libiconv.so : converters/libiconv
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for bind99-9.9.12_2: DOCS=on: Build and/or install documentation FETCHLIMIT=off: Enable the query quotas for resolvers FILTER_AAAA=on: Enable filtering of AAAA records FIXED_RRSET=off: Enable fixed rrset ordering GOST=off: Enable GOST ciphers, needs SSL IDN=on: International Domain Names support IPV6=on: IPv6 protocol support LARGE_FILE=off: 64-bit file support MINCACHE=off: Use the mincachettl patch NEWSTATS=off: Enable alternate xml statistics channel format PORTREVISION=off: Show PORTREVISION in the version string PYTHON=on: Build with Python utilities QUERYTRACE=off: Enable the very verbose query tracelogging RPZ_NSDNAME=on: Enable RPZ NSDNAME policy records RPZ_NSIP=on: Enable RPZ NSIP trigger rules RRL=on: Response Rate Limiting SIGCHASE=on: dig/host/nslookup will do DNSSEC validation SSL=on: Build with OpenSSL (Required for DNSSEC) START_LATE=off: Start BIND late in the boot process (see help) THREADS=on: Threading support ====> Dynamically Loadable Zones DLZ_POSTGRESQL=off: DLZ Postgres driver DLZ_MYSQL=off: DLZ MySQL driver (no threading) DLZ_BDB=off: DLZ BDB driver DLZ_LDAP=off: DLZ LDAP driver DLZ_FILESYSTEM=on: DLZ filesystem driver DLZ_STUB=off: DLZ stub driver ====> GSSAPI Security API support: you have to select exactly one of them GSSAPI_BASE=off: GSSAPI Security API support (Heimdal in base) GSSAPI_HEIMDAL=off: GSSAPI Security API support (security/heimdal) GSSAPI_MIT=off: GSSAPI Security API support (security/krb5) GSSAPI_NONE=on: No GSSAPI Security API support ===> Use 'make config' to modify these settings
Options name:
N/A
USES:
cpe libedit iconv python ssl
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (12 items)
Collapse this list.
  1. ftp://ftp.ciril.fr/pub/isc/bind9/9.9.12/
  2. ftp://ftp.freenet.de/pub/ftp.isc.org/isc/bind9/9.9.12/
  3. ftp://ftp.funet.fi/pub/mirrors/ftp.isc.org/isc/bind9/9.9.12/
  4. ftp://ftp.iij.ad.jp/pub/network/isc/bind9/9.9.12/
  5. ftp://ftp.isc.org/isc/bind9/9.9.12/
  6. ftp://ftp.mirrorservice.org/sites/ftp.isc.org/isc/bind9/9.9.12/
  7. ftp://ftp.nominum.com/pub/isc/bind9/9.9.12/
  8. ftp://ftp.ntua.gr/pub/net/isc/isc/bind9/9.9.12/
  9. ftp://ftp.ripe.net/mirrors/sites/ftp.isc.org/isc/bind9/9.9.12/
  10. ftp://ftp.task.gda.pl/mirror/ftp.isc.org/isc/bind9/9.9.12/
  11. ftp://ftp.u-aizu.ac.jp/pub/net/isc/bind9/9.9.12/
  12. https://ftp.isc.org/isc/bind9/9.9.12/
Collapse this list.

Number of commits found: 177 (showing only 77 on this page)

«  1 | 2 

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
9.9.5_7
25 Mar 2014 17:25:17
Revision:349162Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Finaly pet rclint.

With help from:	crees
Sponsored by:	Absolight
9.9.5_6
25 Mar 2014 15:46:24
Revision:349154Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove GSSAPI from the default options.

Almost nobody needs it, and people keep having a hard time building BIND
because of this.

Sponsored by:	Absolight
9.9.5_5
17 Mar 2014 18:46:47
Revision:348497Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
- Use SUB_FILES for named.conf and the rc script
- Fix some package installation warnings

Sponsored by:	Absolight
9.9.5_4
06 Mar 2014 17:31:55
Revision:347284Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Always depend on libxml[1]
Add XML newstats support to bind99[2]

PR:		186890[1], 186791[2]
Submitted by:	Jason Mann[1], Matthew Seaman[2]
Sponsored by:	Absolight
9.9.5_3
06 Mar 2014 17:12:52
Revision:347281Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Try and have BIND start earlier.

Sponsored by:	Absolight
9.9.5_2
04 Mar 2014 17:37:54
Revision:347047Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Actually commit what I tested.

Sponsored by:	Absolight
9.9.5_2
04 Mar 2014 17:32:46
Revision:347046Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Don't polute isc-config.sh with gssapi flags.

Submitted by:	hrs
Sponsored by:	Absolight
9.9.5_1
27 Feb 2014 18:10:04
Revision:346383Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Change the BIND ports to use PKGNAMESUFFIX.

Sponsored by:	Absolight
9.9.5_1
07 Feb 2014 09:15:23
Revision:343205Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Add back the RPZ speed improvements patch.

Many thanks to:	Vernon Schryver
Sponsored by:	Absolight
9.9.5
31 Jan 2014 08:58:46
Revision:341947Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Update to 9.9.5.

Changes:	https://lists.isc.org/pipermail/bind-announce/2014-January/000896.html
Sponsored by:	Absolight
9.9.4.2
27 Jan 2014 15:43:42
Revision:341417Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Revert r341073, static libs are not supposed to be PIC
9.9.4.2
25 Jan 2014 18:28:03
Revision:341073Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add -fPIC to CFLAGS for amd64, this fix static libraries

Approved by:	mat@ (maintainer)
9.9.4.2
13 Jan 2014 17:38:28
Revision:339612Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Security update to fix CVE-2014-0591 as reported at
https://kb.isc.org/article/AA-01078/74/

9.9.4 -> 9.9.4-P2
9.8.6 -> 9.8.6-P2
9.6-ESV-R10 -> 9.6-ESV-R10-P2

Security:	CVE-2014-0591 Remote DOS
9.9.4_9
08 Jan 2014 22:52:19
Revision:339186Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fixup rndc.conf.sample installation

Spotted by:	antoine
9.9.4_8
07 Jan 2014 09:55:07
Revision:338989Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
There's always a default value for named_conf now, so no need to
check for it, and espcially not for a wrong value.

Noticed by:	Stefan Bethke <stb@lassitu.de>
Approved by:	mat (maintainer)
9.9.4_7
06 Jan 2014 23:15:20
Revision:338952Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Yet another round of fixes.

This time, it seems all of REPLACE_BASE, not REPLACE_BASE and post Bind removal
from base seem to work consistently.
9.9.4_6
06 Jan 2014 21:39:08
Revision:338943Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix yet another bug, they're creeping like crazy...
9.9.4_5
06 Jan 2014 17:31:55
Revision:338910Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix gssapi options knob.
9.9.4_4
06 Jan 2014 14:29:25
Revision:338882Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix build with LINKS.
9.9.4_4
06 Jan 2014 13:34:48
Revision:338877Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Convert to staging and new options.
9.9.4_3
04 Jan 2014 19:25:57
Revision:338674Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Add the DOCS option to OPTIONS_DEFAULT.
9.9.4_2
02 Jan 2014 13:43:12
Revision:338442Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Hand the BIND ports to a new volunteer.
9.9.4_2
10 Dec 2013 10:01:21
Revision:336054Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix build with GSSAPI option without Kerberos

PR:		184560
Submitted by:	Dewayne <dewayne@heuristicsystems.com.au>
9.9.4_2
08 Dec 2013 19:49:52
Revision:335933Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
bind(96,98,99): Couple OSVERSION with OPSYS

OSVERSION is platform-specific and must be used with OPSYS.

Approved by:	maintainer (erwin)
9.9.4_2
07 Dec 2013 10:50:23
Revision:335824Original commit files touched by this commit This port version is marked as vulnerable.
gjb search for other commits by this committer
To prevent fallout of lowering __FreeBSD_version in releng/10.0 branch,
adjust OSVERSION evaluation in ports that specifically use '100050N'.

Approved by:	affected maintainers (implicit)
Sponsored by:	The FreeBSD Foundation
9.9.4_2
05 Dec 2013 12:54:56
Revision:335667Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Install named.conf as named.conf.sample and don't overwrite on upgrade

Bullet hole in foot:	joeld
Pointy hat:		erwin
9.9.4_1
04 Dec 2013 12:15:53
Revision:335618Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix build with GSSAPI

Submitted by:	sunpoet
9.9.4_1
22 Nov 2013 19:05:01
Revision:334604Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Respect BIND_DESTETC and PREFIX

Submitted by:	sunpoet (myself)
Approved by:	erwin (maintainer)
9.9.4_1
22 Nov 2013 13:41:34
Revision:334593Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix startup script.

PR:		184159 [1]
Submitted by:	Pawel Biernacki <pawel.biernacki@gmail.com> [1],
		Trond Endrestoel <Trond.Endrestol@ximalas.info> (private email)
9.9.4
12 Nov 2013 10:59:20
Revision:333563Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Support FreeBSD 10.0.

On FreeBSD 10.0, all configuration is installed under
/usr/local/etc/namedb and installs its own rc script in
$PREFIX, which no longer support chroot installations.

LINKS and REPLACE_BASE options are not supported on 10.0
for obvious reasons.

Note for FreeBSD 9.x and earlier users, LINKS is no longer
the default option, though still supported.
9.9.4
04 Nov 2013 11:23:11
Revision:332693Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Drop support for REPLACE_BIND option after BIND was removed from base,
there's nothing to replace.
9.9.4
23 Sep 2013 10:20:56
Revision:327967Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Add an option for filter-aaaa

Submitted by:	Matej Gregr <matej.gregr@gmail.com>
9.9.4
20 Sep 2013 16:31:58
Revision:327719Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
dns)
9.9.4
20 Sep 2013 08:22:45
Revision:327668Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.9.4

Note that the Rate Limiting option has been renamed.

Security Fixes

   Previously an error in bounds checking on the private type
   'keydata' could be used to deny service through a deliberately
   triggerable REQUIRE failure (CVE-2013-4854).  [RT #34238]

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

New Features
(Only the first 15 lines of the commit message are shown above View all of this commit message)
9.9.3.2
17 Sep 2013 11:31:49
Revision:327469Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Make GSSAPI support optional

PR:		182122
Submitted by:	Uwe Doering <gemini@geminix.org>
9.9.3.2
05 Sep 2013 20:18:30
Revision:326444Original commit files touched by this commit This port version is marked as vulnerable.
bsam search for other commits by this committer
. introduce ICONV_CONFIGURE_BASE variable at Mk/Uses/iconv.mk. It's value is
  "--with-libiconv=${LOCALBASE}" at systems pre OSVERSION 100043 and "" (null)
  otherwise;
. convert all ports which has CONFIGURE_ARGS=--with-libiconv=${LOCALBASE}.

Approved by:	portmgr (bapt, implicit)
9.9.3.2
27 Jul 2013 21:08:36
Revision:323808Original commit files touched by this commit This port version is marked as vulnerable.
roberto search for other commits by this committer
Update the RPZ+RL patches for both versions.

Approved by:	erwin
9.9.3.2
26 Jul 2013 22:19:27
Revision:323758Original commit files touched by this commit This port version is marked as vulnerable.
roberto search for other commits by this committer
Put back the two patches for RPZ-RL that were removed during the previous
update.
9.9.3.2
26 Jul 2013 22:05:05
Revision:323757Original commit files touched by this commit This port version is marked as vulnerable.
roberto search for other commits by this committer
Security update to fix CVE-2013-4854 as reported at
https://kb.isc.org/article/AA-01015/0

9.9.3-p1 -> 9.9.3-P2
9.8.5-p1 -> 9.8.5-P2

9.6.x is not affected, neither is 10.x.

Security:	CVE-2013-4854 Remote DOS
9.9.3.1
05 Jun 2013 11:51:29
Revision:319984Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.9.3-P1

Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
(Only the first 15 lines of the commit message are shown above View all of this commit message)
9.9.3
31 May 2013 09:49:42
Revision:319476Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.9.3
9.9.2.2
31 May 2013 08:10:57
Revision:319468Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update RPZ and RRL patch set:

  - address the issue raised by Bob Harold. RRL on recursive servers
     applies rate limits after waiting for recursion except on
     sub-domains of domains for which the server is authoritative.

  - fix the bug reported by Roy Arends in which "slipped" NXDOMAIN
     responses had rcode values of 0 (NoError) instead of 3 (NXDOMAIN).

  - move reports of RRL drop and slip actions from the "queries"
     log category to the "query-errors" category. Because they are not
     in the "queres" category, enabling or disabling query logging no
     longer affects them.
9.9.2.2
06 May 2013 07:53:39
Revision:317477Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix typo in RPZRRL_PATCH

Submitted by:	Alexander Yerenkow <yerenkow@gmail.com>
9.9.2.2
24 Apr 2013 13:17:04
Revision:316430Original commit files touched by this commit This port version is marked as vulnerable.
zeising search for other commits by this committer
Readd dns/bind-tools.
This is done in a similar manner as the old bind-tools, but uses bind99
instead of bind97 as master port.
Change bind99 to facilitate the bind-tools slave, in a simlar way as was
done for bind97.

Approved by:	erwin (maintainer)
9.9.2.2
23 Apr 2013 08:26:48
Revision:316321Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Make pkg-message and pkg-install a local file to the bind98 and bind99
ports and not include the one from the deprecated bind97 port, which is
to be removed.
9.9.2.2
17 Apr 2013 07:57:55
Revision:315942Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update RPZ+RRL patchset to the latest version.

The change makes "slip 1;" send only truncated (TC=1) responses.
Without the change, "slip 1;" is the same as the default of "slip 2;".
That default, which alternates truncated with dropped responses
when the rate limit is exceeded, is better for authoritative DNS
servers, because it further reduces the amplification of an attack
from about 1X to about 0.5X.

DNS RRL is not recommended for recursive servers.

Feature safe:	yes
9.9.2.2
27 Mar 2013 07:56:12
Revision:315356Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.9.2-P2

Removed the check for regex.h in configure in order
to disable regex syntax checking, as it exposes
BIND to a critical flaw in libregex on some
platforms. [RT #32688]

Security:       CVE-2013-2266
9.9.2.1
15 Mar 2013 14:47:41
Revision:314305Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update the RPZ+RRL patch files which remove
working files that should not have been in the patches[1]
Also move to a versioned filename for the patches[2]

Submitted by:	Robert Sargent <robtsgt@gmail.com> [1],
		Vernon Schryver <vjs@rhyolite.com> [2]
9.9.2.1
05 Feb 2013 09:34:49
Revision:311683Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update RPZ+RRL patch to 028.23

A serious Multiple Zone Response Policy Zone (RPZ2)
Speed Improvement bug has been fixed.

`./configure --enable-rpz-nsip --enable-rpz-nsdname`
is now the default.

Responses affected by the all-per-second parameter
are always dropped. The slip value has no effect on them.

There are improved log messages for responses that are
dropped or "slipped," because they would require an
excessive identical referral.
9.9.2.1
10 Jan 2013 10:37:18
Revision:310175Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Reduce lenght of the option description for RPZRRL_PATCH to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:   Terry Kennedy <terry@tmk.com>
9.9.2.1
09 Jan 2013 10:20:16
Revision:310131Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update the response rate limiting patch to the latest
released version of January 5, 2013.

This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same
patch.

More information: http://ss.vix.su/~vjs/rrlrpz.html
9.9.2.1
04 Jan 2013 10:47:28
Revision:309925Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Add LICENSE.
9.9.2.1
04 Jan 2013 10:39:41
Revision:309924Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Add experimental option for Response Rate Limiting patch.
9.9.2.1
14 Dec 2012 10:43:36
Revision:308897Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
- Use new OPTIONS_GROUP for DLZ options.[1]
- This also allows more than one DLZ option
  to be set.[2]

Submitted by:	bapt [1] (as RADIO)
Suggested by:	az [2] (thus GROUP instead)
9.9.2.1
05 Dec 2012 07:46:03
Revision:308317Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to the latest patch level from ISC:

  BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
9.9.2
03 Dec 2012 10:52:11
Revision:308136Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Improve the SSL option description

Submitted by:	Kazunori Fujiwara <fujiwara@jprs.co.jp>
Feature safe:	yes
9.9.2
03 Dec 2012 10:48:18
Revision:308135Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Remove gpg signature checking that in itself does not
provide any additional security.

Feature safe:	yes
9.9.2
27 Nov 2012 10:05:32
Revision:307830Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
- Update CONFLICTS
- Fix a typo in the OPTIONSNG conversion
- Add FIXED_RRSET option
- Add RPZ options (9.8 and 9.8 only)

PR:		172586
Submitted by:	Craig Leres <leres@ee.lbl.gov>
Feature safe:	yes
9.9.2
26 Oct 2012 08:37:11
Revision:306427Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Reduce lenght of the option description for DLZ_MYSQL to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:	Terry Kennedy <terry@tmk.com>
Feature safe:	yes
9.9.2
25 Oct 2012 10:53:57
Revision:306379Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
- Convert to OPTIONSNG
- Turn on IPv6 support by default

Feature safe:	yes
9.9.2
19 Oct 2012 13:20:03
Revision:306119Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Force python off to disable build time detection of python.

Submitted by:	zeising
Feature safe:	yes
9.9.2
19 Oct 2012 10:17:28
Revision:306113Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.9.2

Feature safe:	yes
9.9.1.4
10 Oct 2012 11:54:44
Revision:305645Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Upgrade to the latest BIND patch level:

A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Security:	 
http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
9.9.1.3
10 Oct 2012 09:11:41
Revision:305639Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Take maintainership of the BIND ports while I'm working on the latest
security releases.
9.9.1.3
08 Oct 2012 10:38:48
Revision:305526Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Throw my ports back in the pool, and make my intentions clear for the
various ports that I've created.

I bid fond fare well
A chapter closes for me
What opens for you?
9.9.1.3
19 Sep 2012 03:46:36
Revision:304476Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to the latest BIND patch level:

Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.

For more information: https://kb.isc.org/article/AA-00788
9.9.1.2
24 Jul 2012 19:23:23
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
9.9.1.1
04 Jun 2012 21:51:34
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
9.9.1
23 May 2012 04:40:55
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Each version also contains other critical bug fixes.

All BIND users are encouraged to upgrade to these latest versions.
9.9.0_1
23 May 2012 04:40:33
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Remove patch that is incorporated into version 9.9.1
9.9.0_1
04 Apr 2012 22:03:08
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Switch to using the PORTDOCS macro

Feature safe:   yes
9.9.0_1
17 Mar 2012 06:37:10
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Add a patch from ISC slated for 9.9.1 which fixes an assertion failure

Feature safe: yes
9.9.0
29 Feb 2012 18:41:12
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Release version of 9.9.0. Code is identical to rc4.
9.9.0.rc4
24 Feb 2012 07:26:21
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to rc4, rndc and dlz fixes, including DNSSEC key maintenance timer
9.9.0.rc3
19 Feb 2012 02:41:42
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to 9.9.0rc3, various small bug fixes
9.9.0.rc2
01 Feb 2012 02:12:20
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Update to 9.9.0rc2, which addresses mostly in-line signing bugs
9.9.0.rc1
28 Jan 2012 05:28:10
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
By popular demand add a port for the newest BIND branch, 9.9.x. This will
stay as a -devel until it's formally released, which should be soon'ish.

BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases,
including:
        NXDOMAIN redirection
        Improved startup and reconfiguration time, especially with large
                numbers of authoritative zones
        New "inline-signing" option, allows named to sign zones completely
                transparently, including static zones
        Many other new features, especially for DNSSEC

See the CHANGES file for more information on features.

https://kb.isc.org/article/AA-00592

Number of commits found: 177 (showing only 77 on this page)

«  1 | 2