notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
Ukraine
The safest procedure: change your FreshPorts password. Anything you had set before Friday March 24 2023 09:49:20 UTC should be changed. You can read more here: SQL inejection issues fixed and FreshSource code fixes Sorry about the extra work for you.
All known SQL injection issues patched. There is no evidence it was exploited. That doesn’t mean it wasn’t. Please change your password.
non port: dns/bind99/Makefile
SVNWeb

Number of commits found: 166 (showing only 66 on this page)

«  1 | 2 

Tue, 4 Mar 2014
[ 17:32 mat search for other commits by this committer ] Original commit   Revision:347046
Don't polute isc-config.sh with gssapi flags.

Submitted by:	hrs
Sponsored by:	Absolight
Thu, 27 Feb 2014
[ 18:10 mat search for other commits by this committer ] Original commit   Revision:346383
Change the BIND ports to use PKGNAMESUFFIX.

Sponsored by:	Absolight
Fri, 7 Feb 2014
[ 09:15 mat search for other commits by this committer ] Original commit   Revision:343205
Add back the RPZ speed improvements patch.

Many thanks to:	Vernon Schryver
Sponsored by:	Absolight
Fri, 31 Jan 2014
[ 08:58 mat search for other commits by this committer ] Original commit   Revision:341947
Update to 9.9.5.

Changes:	https://lists.isc.org/pipermail/bind-announce/2014-January/000896.html
Sponsored by:	Absolight
Mon, 27 Jan 2014
[ 15:43 garga search for other commits by this committer ] Original commit   Revision:341417
Revert r341073, static libs are not supposed to be PIC
Sat, 25 Jan 2014
[ 18:28 garga search for other commits by this committer ] Original commit   Revision:341073
Add -fPIC to CFLAGS for amd64, this fix static libraries

Approved by:	mat@ (maintainer)
Mon, 13 Jan 2014
[ 17:38 mat search for other commits by this committer ] Original commit   Revision:339612
Security update to fix CVE-2014-0591 as reported at
https://kb.isc.org/article/AA-01078/74/

9.9.4 -> 9.9.4-P2
9.8.6 -> 9.8.6-P2
9.6-ESV-R10 -> 9.6-ESV-R10-P2

Security:	CVE-2014-0591 Remote DOS
Wed, 8 Jan 2014
[ 22:52 mat search for other commits by this committer ] Original commit   Revision:339186
Fixup rndc.conf.sample installation

Spotted by:	antoine
Tue, 7 Jan 2014
[ 09:55 erwin search for other commits by this committer ] Original commit   Revision:338989
There's always a default value for named_conf now, so no need to
check for it, and espcially not for a wrong value.

Noticed by:	Stefan Bethke <stb@lassitu.de>
Approved by:	mat (maintainer)
Mon, 6 Jan 2014
[ 23:15 mat search for other commits by this committer ] Original commit   Revision:338952
Yet another round of fixes.

This time, it seems all of REPLACE_BASE, not REPLACE_BASE and post Bind removal
from base seem to work consistently.
[ 21:39 mat search for other commits by this committer ] Original commit   Revision:338943
Fix yet another bug, they're creeping like crazy...
[ 17:31 mat search for other commits by this committer ] Original commit   Revision:338910
Fix gssapi options knob.
[ 13:34 mat search for other commits by this committer ] Original commit   Revision:338877
Convert to staging and new options.
Sat, 4 Jan 2014
[ 19:25 mat search for other commits by this committer ] Original commit   Revision:338674
Add the DOCS option to OPTIONS_DEFAULT.
Thu, 2 Jan 2014
[ 13:43 erwin search for other commits by this committer ] Original commit   Revision:338442
Hand the BIND ports to a new volunteer.
Tue, 10 Dec 2013
[ 10:01 erwin search for other commits by this committer ] Original commit   Revision:336054
Fix build with GSSAPI option without Kerberos

PR:		184560
Submitted by:	Dewayne <dewayne@heuristicsystems.com.au>
Sun, 8 Dec 2013
[ 19:49 marino search for other commits by this committer ] Original commit   Revision:335933
bind(96,98,99): Couple OSVERSION with OPSYS

OSVERSION is platform-specific and must be used with OPSYS.

Approved by:	maintainer (erwin)
Sat, 7 Dec 2013
[ 10:50 gjb search for other commits by this committer ] Original commit   Revision:335824
To prevent fallout of lowering __FreeBSD_version in releng/10.0 branch,
adjust OSVERSION evaluation in ports that specifically use '100050N'.

Approved by:	affected maintainers (implicit)
Sponsored by:	The FreeBSD Foundation
Thu, 5 Dec 2013
[ 12:54 erwin search for other commits by this committer ] Original commit   Revision:335667
Install named.conf as named.conf.sample and don't overwrite on upgrade

Bullet hole in foot:	joeld
Pointy hat:		erwin
Wed, 4 Dec 2013
[ 12:15 erwin search for other commits by this committer ] Original commit   Revision:335618
Fix build with GSSAPI

Submitted by:	sunpoet
Fri, 22 Nov 2013
[ 13:41 erwin search for other commits by this committer ] Original commit   Revision:334593
Fix startup script.

PR:		184159 [1]
Submitted by:	Pawel Biernacki <pawel.biernacki@gmail.com> [1],
		Trond Endrestoel <Trond.Endrestol@ximalas.info> (private email)
Tue, 12 Nov 2013
[ 10:59 erwin search for other commits by this committer ] Original commit   Revision:333563
Support FreeBSD 10.0.

On FreeBSD 10.0, all configuration is installed under
/usr/local/etc/namedb and installs its own rc script in
$PREFIX, which no longer support chroot installations.

LINKS and REPLACE_BASE options are not supported on 10.0
for obvious reasons.

Note for FreeBSD 9.x and earlier users, LINKS is no longer
the default option, though still supported.
Mon, 4 Nov 2013
[ 11:23 erwin search for other commits by this committer ] Original commit   Revision:332693
Drop support for REPLACE_BIND option after BIND was removed from base,
there's nothing to replace.
Mon, 23 Sep 2013
[ 10:20 erwin search for other commits by this committer ] Original commit   Revision:327967
Add an option for filter-aaaa

Submitted by:	Matej Gregr <matej.gregr@gmail.com>
Fri, 20 Sep 2013
[ 16:31 bapt search for other commits by this committer ] Original commit   Revision:327719 (Only the first 10 of 165 ports in this commit are shown above. View all ports for this commit)
Add NO_STAGE all over the place in preparation for the staging support (cat:
dns)
[ 08:22 erwin search for other commits by this committer ] Original commit   Revision:327668
Update to 9.9.4

Note that the Rate Limiting option has been renamed.

Security Fixes

   Previously an error in bounds checking on the private type
   'keydata' could be used to deny service through a deliberately
   triggerable REQUIRE failure (CVE-2013-4854).  [RT #34238]

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

New Features
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 17 Sep 2013
[ 11:31 erwin search for other commits by this committer ] Original commit   Revision:327469
Make GSSAPI support optional

PR:		182122
Submitted by:	Uwe Doering <gemini@geminix.org>
Thu, 5 Sep 2013
[ 20:18 bsam search for other commits by this committer ] Original commit   Revision:326444 (Only the first 10 of 19 ports in this commit are shown above. View all ports for this commit)
. introduce ICONV_CONFIGURE_BASE variable at Mk/Uses/iconv.mk. It's value is
  "--with-libiconv=${LOCALBASE}" at systems pre OSVERSION 100043 and "" (null)
  otherwise;
. convert all ports which has CONFIGURE_ARGS=--with-libiconv=${LOCALBASE}.

Approved by:	portmgr (bapt, implicit)
Sat, 27 Jul 2013
[ 21:08 roberto search for other commits by this committer ] Original commit   Revision:323808
Update the RPZ+RL patches for both versions.

Approved by:	erwin
Fri, 26 Jul 2013
[ 22:05 roberto search for other commits by this committer ] Original commit   Revision:323757
Security update to fix CVE-2013-4854 as reported at
https://kb.isc.org/article/AA-01015/0

9.9.3-p1 -> 9.9.3-P2
9.8.5-p1 -> 9.8.5-P2

9.6.x is not affected, neither is 10.x.

Security:	CVE-2013-4854 Remote DOS
Wed, 5 Jun 2013
[ 11:51 erwin search for other commits by this committer ] Original commit   Revision:319984
Update to 9.9.3-P1

Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of specific queries that are received.  (CVE-2012-5688)
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Fri, 31 May 2013
[ 09:49 erwin search for other commits by this committer ] Original commit   Revision:319476
Update to 9.9.3
[ 08:10 erwin search for other commits by this committer ] Original commit   Revision:319468
Update RPZ and RRL patch set:

  - address the issue raised by Bob Harold. RRL on recursive servers
     applies rate limits after waiting for recursion except on
     sub-domains of domains for which the server is authoritative.

  - fix the bug reported by Roy Arends in which "slipped" NXDOMAIN
     responses had rcode values of 0 (NoError) instead of 3 (NXDOMAIN).

  - move reports of RRL drop and slip actions from the "queries"
     log category to the "query-errors" category. Because they are not
     in the "queres" category, enabling or disabling query logging no
     longer affects them.
Mon, 6 May 2013
[ 07:53 erwin search for other commits by this committer ] Original commit   Revision:317477
Fix typo in RPZRRL_PATCH

Submitted by:	Alexander Yerenkow <yerenkow@gmail.com>
Wed, 24 Apr 2013
[ 13:17 zeising search for other commits by this committer ] Original commit   Revision:316430
Readd dns/bind-tools.
This is done in a similar manner as the old bind-tools, but uses bind99
instead of bind97 as master port.
Change bind99 to facilitate the bind-tools slave, in a simlar way as was
done for bind97.

Approved by:	erwin (maintainer)
Tue, 23 Apr 2013
[ 08:26 erwin search for other commits by this committer ] Original commit   Revision:316321
Make pkg-message and pkg-install a local file to the bind98 and bind99
ports and not include the one from the deprecated bind97 port, which is
to be removed.
Wed, 17 Apr 2013
[ 07:57 erwin search for other commits by this committer ] Original commit   Revision:315942
Update RPZ+RRL patchset to the latest version.

The change makes "slip 1;" send only truncated (TC=1) responses.
Without the change, "slip 1;" is the same as the default of "slip 2;".
That default, which alternates truncated with dropped responses
when the rate limit is exceeded, is better for authoritative DNS
servers, because it further reduces the amplification of an attack
from about 1X to about 0.5X.

DNS RRL is not recommended for recursive servers.

Feature safe:	yes
Wed, 27 Mar 2013
[ 07:56 erwin search for other commits by this committer ] Original commit   Revision:315356
Update to 9.9.2-P2

Removed the check for regex.h in configure in order
to disable regex syntax checking, as it exposes
BIND to a critical flaw in libregex on some
platforms. [RT #32688]

Security:       CVE-2013-2266
Fri, 15 Mar 2013
[ 14:47 erwin search for other commits by this committer ] Original commit   Revision:314305
Update the RPZ+RRL patch files which remove
working files that should not have been in the patches[1]
Also move to a versioned filename for the patches[2]

Submitted by:	Robert Sargent <robtsgt@gmail.com> [1],
		Vernon Schryver <vjs@rhyolite.com> [2]
Thu, 10 Jan 2013
[ 10:37 erwin search for other commits by this committer ] Original commit   Revision:310175
Reduce lenght of the option description for RPZRRL_PATCH to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:   Terry Kennedy <terry@tmk.com>
Wed, 9 Jan 2013
[ 10:20 erwin search for other commits by this committer ] Original commit   Revision:310131
Update the response rate limiting patch to the latest
released version of January 5, 2013.

This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same
patch.

More information: http://ss.vix.su/~vjs/rrlrpz.html
Fri, 4 Jan 2013
[ 10:47 erwin search for other commits by this committer ] Original commit   Revision:309925
Add LICENSE.
[ 10:39 erwin search for other commits by this committer ] Original commit   Revision:309924
Add experimental option for Response Rate Limiting patch.
Fri, 14 Dec 2012
[ 10:43 erwin search for other commits by this committer ] Original commit   Revision:308897
- Use new OPTIONS_GROUP for DLZ options.[1]
- This also allows more than one DLZ option
  to be set.[2]

Submitted by:	bapt [1] (as RADIO)
Suggested by:	az [2] (thus GROUP instead)
Wed, 5 Dec 2012
[ 07:46 erwin search for other commits by this committer ] Original commit   Revision:308317
Update to the latest patch level from ISC:

  BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
Mon, 3 Dec 2012
[ 10:52 erwin search for other commits by this committer ] Original commit   Revision:308136
Improve the SSL option description

Submitted by:	Kazunori Fujiwara <fujiwara@jprs.co.jp>
Feature safe:	yes
[ 10:48 erwin search for other commits by this committer ] Original commit   Revision:308135
Remove gpg signature checking that in itself does not
provide any additional security.

Feature safe:	yes
Tue, 27 Nov 2012
[ 10:05 erwin search for other commits by this committer ] Original commit   Revision:307830
- Update CONFLICTS
- Fix a typo in the OPTIONSNG conversion
- Add FIXED_RRSET option
- Add RPZ options (9.8 and 9.8 only)

PR:		172586
Submitted by:	Craig Leres <leres@ee.lbl.gov>
Feature safe:	yes
Fri, 26 Oct 2012
[ 08:37 erwin search for other commits by this committer ] Original commit   Revision:306427
Reduce lenght of the option description for DLZ_MYSQL to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:	Terry Kennedy <terry@tmk.com>
Feature safe:	yes
Thu, 25 Oct 2012
[ 10:53 erwin search for other commits by this committer ] Original commit   Revision:306379
- Convert to OPTIONSNG
- Turn on IPv6 support by default

Feature safe:	yes
Fri, 19 Oct 2012
[ 13:20 erwin search for other commits by this committer ] Original commit   Revision:306119
Force python off to disable build time detection of python.

Submitted by:	zeising
Feature safe:	yes
[ 10:17 erwin search for other commits by this committer ] Original commit   Revision:306113
Update to 9.9.2

Feature safe:	yes
Wed, 10 Oct 2012
[ 11:54 erwin search for other commits by this committer ] Original commit   Revision:305645
Upgrade to the latest BIND patch level:

A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Security:	 
http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
[ 09:11 erwin search for other commits by this committer ] Original commit   Revision:305639
Take maintainership of the BIND ports while I'm working on the latest
security releases.
Mon, 8 Oct 2012
[ 10:38 dougb search for other commits by this committer ] Original commit   Revision:305526 (Only the first 10 of 45 ports in this commit are shown above. View all ports for this commit)
Throw my ports back in the pool, and make my intentions clear for the
various ports that I've created.

I bid fond fare well
A chapter closes for me
What opens for you?
Wed, 19 Sep 2012
[ 03:46 dougb search for other commits by this committer ] Original commit   Revision:304476
Upgrade to the latest BIND patch level:

Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.

For more information: https://kb.isc.org/article/AA-00788
Tue, 24 Jul 2012
[ 19:23 dougb search for other commits by this committer ] Original commit 
Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
Mon, 4 Jun 2012
[ 21:51 dougb search for other commits by this committer ] Original commit 
Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
Wed, 23 May 2012
[ 04:40 dougb search for other commits by this committer ] Original commit 
Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Each version also contains other critical bug fixes.

All BIND users are encouraged to upgrade to these latest versions.
Wed, 4 Apr 2012
[ 22:03 dougb search for other commits by this committer ] Original commit 
Switch to using the PORTDOCS macro

Feature safe:   yes
Sat, 17 Mar 2012
[ 06:37 dougb search for other commits by this committer ] Original commit 
Add a patch from ISC slated for 9.9.1 which fixes an assertion failure

Feature safe: yes
Wed, 29 Feb 2012
[ 18:41 dougb search for other commits by this committer ] Original commit 
Release version of 9.9.0. Code is identical to rc4.
Fri, 24 Feb 2012
[ 07:26 dougb search for other commits by this committer ] Original commit 
Upgrade to rc4, rndc and dlz fixes, including DNSSEC key maintenance timer
Sun, 19 Feb 2012
[ 02:41 dougb search for other commits by this committer ] Original commit 
Upgrade to 9.9.0rc3, various small bug fixes
Wed, 1 Feb 2012
[ 02:12 dougb search for other commits by this committer ] Original commit 
Update to 9.9.0rc2, which addresses mostly in-line signing bugs
Sat, 28 Jan 2012
[ 05:28 dougb search for other commits by this committer ] Original commit 
By popular demand add a port for the newest BIND branch, 9.9.x. This will
stay as a -devel until it's formally released, which should be soon'ish.

BIND 9.9 includes a number of changes from BIND 9.8 and earlier releases,
including:
        NXDOMAIN redirection
        Improved startup and reconfiguration time, especially with large
                numbers of authoritative zones
        New "inline-signing" option, allows named to sign zones completely
                transparently, including static zones
        Many other new features, especially for DNSSEC

See the CHANGES file for more information on features.

https://kb.isc.org/article/AA-00592

Number of commits found: 166 (showing only 66 on this page)

«  1 | 2