notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
All times are UTC
Ukraine
All known SQL injection issues patched. There is no evidence it was exploited. That doesn’t mean it wasn’t. Please change your password.
non port: dns/unbound/distinfo
SVNWeb

Number of commits found: 83

Fri, 13 Jan 2023
[ 21:12 Brad Davis (brd) search for other commits by this committer ]    commit hash:850f050401b8270c7b0bac947aa9adda50d78ae7  commit hash:850f050401b8270c7b0bac947aa9adda50d78ae7  commit hash:850f050401b8270c7b0bac947aa9adda50d78ae7  850f050 
dns/unbound: Update to 1.17.1

The release notes can be found at:
https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-17-1

PR:		268913
Approved by:	jaap@NLnetLabs.nl (maintainer)
Sponsored by:	Rubicon Communications, LLC ("Netgate")
Sun, 16 Oct 2022
[ 17:37 Fernando Apesteguía (fernape) search for other commits by this committer Author: Jaap Akkerhuis ]    commit hash:7b0d6de05baabfbcd7a25fd0440ee3bf1f3bc23e  commit hash:7b0d6de05baabfbcd7a25fd0440ee3bf1f3bc23e  commit hash:7b0d6de05baabfbcd7a25fd0440ee3bf1f3bc23e  7b0d6de 
dns/unbound: Update to 1.17.0

ChangeLog: https://www.nlnetlabs.nl/news/2022/Oct/13/unbound-1.17.0-released/

Remove additional MASTER_SITES (certificate error)

PR:		267018
Reported by:	jaap@NLnetLabs.nl (maintainer)
Reviewed by:	diizzy@
Thu, 29 Sep 2022
[ 05:39 Fernando Apesteguía (fernape) search for other commits by this committer Author: Herbert J. Skuhra ]    commit hash:2efbd2b027c85ab8a3ec41de872affb7dc5963de  commit hash:2efbd2b027c85ab8a3ec41de872affb7dc5963de  commit hash:2efbd2b027c85ab8a3ec41de872affb7dc5963de  2efbd2b 
dns/unbound: Update to 1.16.3

ChangeLog: https://nlnetlabs.nl/news/2022/Sep/21/unbound-1.16.3-released/

Fixes Non-Responsive Delegation Attack.

PR:		266654
Reported by:	herbert@gojira.at
Approved by:	jaap@NLnetLabs.nl (maintainer)
Security:	CVE-2022-3204
Fri, 5 Aug 2022
[ 18:58 Bernard Spil (brnrd) search for other commits by this committer ]    commit hash:9ed08e850c5cebd7a68fc1562c255382366c8d3c  commit hash:9ed08e850c5cebd7a68fc1562c255382366c8d3c  commit hash:9ed08e850c5cebd7a68fc1562c255382366c8d3c  9ed08e8 
dns/unbound: Security update to 1.6.2

PR:		265645
Reported by:	Jaap Akkerhuis <jaap NLnetLabs nl> (maintainer)
Security:	bc43a578-14ec-11ed-856e-d4c9ef517024
MFH:		2022Q3
Tue, 12 Jul 2022
[ 17:47 Fernando Apesteguía (fernape) search for other commits by this committer Author: Jaap Akkerhuis ]    commit hash:0046203e3a7db2ee7b37e63cd000cbf87f908d2c  commit hash:0046203e3a7db2ee7b37e63cd000cbf87f908d2c  commit hash:0046203e3a7db2ee7b37e63cd000cbf87f908d2c  0046203 
dns/unbound: Update to 1.16.1

ChangeLog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-16-1

PR:	265151
Reported by:	jaap@NLnetLabs.nl (maintainer)
MFH:	2022Q3 (bugfixes)
Wed, 8 Jun 2022
[ 10:33 Li-Wen Hsu (lwhsu) search for other commits by this committer Author: Jaap Akkerhuis ]    commit hash:993f58d32eede8a1783ab0270b2cccf3db218d95  commit hash:993f58d32eede8a1783ab0270b2cccf3db218d95  commit hash:993f58d32eede8a1783ab0270b2cccf3db218d95  993f58d 
dns/unbound: Update to 1.16.0

This release has EDE support, for extended EDNS error reporting,
it fixes unsupported ZONEMD algorithms to load, and has more bug fixes.

The EDE errors can be turned on by `ede: yes`, it is default disabled.
Validation errors and other errors are then reported. If you also want
stale answers for expired responses to have an error code, the option
`ede-serve-expired: yes` can be used.

On request, the port now also has dnscrypt support default enabled.

PR:		264538
Thu, 17 Feb 2022
[ 21:21 Dries Michiels (driesm) search for other commits by this committer Author: Jaap Akkerhuis ]    commit hash:cfd10e7accaa70a2ca3b7f7954d0dd7aa10a66b9  commit hash:cfd10e7accaa70a2ca3b7f7954d0dd7aa10a66b9  commit hash:cfd10e7accaa70a2ca3b7f7954d0dd7aa10a66b9  cfd10e7 
dns/unbound: Update to 1.15.0

[The Makefile of the port got cleaned up to make portfmt happy]

This release has bug fixes for crashes that happened on heavy network
usage. The default for the aggressive-nsec option has changed, it is now
enabled.

The ratelimit logic had to be reworked for the crash fixes. As a result,
there are new options to control the behaviour of ratelimiting.
The ratelimit-backoff and ip-ratelimit-backoff options can be used to
control how severe the backoff is when the ratelimit is exceeded.

The rpz-signal-nxdomain-ra option can be used to unset the RA flag, for
NXDOMAIN answers from RPZ. That is used by some clients to detect that
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 14 Dec 2021
[ 21:06 Cy Schubert (cy) search for other commits by this committer Author: Jaap Akkerhuis ]    commit hash:0d90eb78507a50feb81110aeca63e118761f5a07  commit hash:0d90eb78507a50feb81110aeca63e118761f5a07  commit hash:0d90eb78507a50feb81110aeca63e118761f5a07  0d90eb7 
dns/unbound: Update to 1.14.0

Changelog:

This release contains bug fixes and a full set of RPZ triggers and
actions that are supported. This works with RPZ zones, configured with
`rpz:`.

It is possible to selectively enable use of TCP for stub zones and
forward zones, without having enable it server wide, by enabling it
with the `stub-tcp-upstream: yes` and `forward-tcp-upstream: yes` options.

The added contrib/Dockerfile.tests from ziollek can be used to setup
a Docker environment to run tests in. The documentation is in the
doc/README.tests file.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Mon, 16 Aug 2021
[ 23:18 Renato Botelho (garga) search for other commits by this committer Author: Jaap Akkerhuis ]    commit hash:42ac7e7f9340538fe67de858198323991d326087  commit hash:42ac7e7f9340538fe67de858198323991d326087  commit hash:42ac7e7f9340538fe67de858198323991d326087  42ac7e7 
dns/unbound: Update to 1.13.2

Added a new option DEP-RSA1024 to enable --with-deprecate-rsa-1024

Changelog:

- Merge PR #317: ZONEMD Zone Verification, with RFC 8976 support.
  ZONEMD records are checked for zones loaded as auth-zone,
  with DNSSEC if available.  There is an added option
  zonemd-permissive-mode that makes it log but not fail wrong zones.
  With zonemd-reject-absence for an auth-zone the presence of a
  zonemd can be mandated for specific zones.
- Fix: Resolve interface names on control-interface too.
- Merge #470 from edevil: Allow configuration of persistent TCP
  connections.
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Tue, 9 Feb 2021
[ 19:49 nc search for other commits by this committer ] Original commit   Revision:564806
dns/unbound: Update to 1.13.1

Changes: https://nlnetlabs.nl/news/2021/Feb/09/unbound-1.13.1-released/

PR:		253376
Submitted by:	Jaap Akkerhuis <jaap AT NLnetLabs DOT nl> (maintainer)
Sat, 12 Dec 2020
[ 16:54 brnrd search for other commits by this committer ] Original commit   Revision:557836
dns/unbound: Security update to 1.13.0

 * Sort options and port_docs while here

PR:		251563
Submitted by:	Jaap Akkerhuis <jaap nlnetlabs nl> (maintainer)
Approved by:	maintainer (implicit)
MFH:		2020Q4
Security:	388ebb5b-3c95-11eb-929d-d4c9ef517024
Mon, 12 Oct 2020
[ 15:33 garga search for other commits by this committer ] Original commit   Revision:552135
dns/unbound: Update to 1.12.0

PR:		250199
Submitted by:	maintainer
Sponsored by:	Rubicon Communications, LLC (Netgate)
Fri, 21 Aug 2020
[ 14:17 lwhsu search for other commits by this committer ] Original commit   Revision:545599
dns/unbound: Update to 1.11.0

PR:		248808
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Tue, 19 May 2020
[ 19:02 delphij search for other commits by this committer ] Original commit   Revision:535884
dns/unbound: update to 1.10.1.

PR:		246569
Submitted by:	Jaap Akkerhuis (maintainer)
MFH:		2020Q2
Security:	CVE-2020-12662, CVE-2020-12663
Sat, 22 Feb 2020
[ 13:59 pi search for other commits by this committer ] Original commit   Revision:526776
dns/unbound: update 1.9.6 -> 1.10.0

PR:		244244
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Relnotes:	https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=244244#c0
Mon, 16 Dec 2019
[ 09:44 joneum search for other commits by this committer ] Original commit   Revision:520238
Update to 1.9.6

PR:		242603
Sponsored by:	Netzkommune GmbH
Sat, 23 Nov 2019
[ 12:54 joneum search for other commits by this committer ] Original commit   Revision:518229
Update to 1.9.5

Changelog:
https://nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-ipsec-module

PR:		242075
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
MFH:		2019Q4
Sponsored by:	Netzkommune GmbH
Thu, 3 Oct 2019
[ 19:28 sunpoet search for other commits by this committer ] Original commit   Revision:513730
Update to 1.9.4

Changes:	https://github.com/NLnetLabs/unbound/blob/master/doc/Changelog
PR:		241033
Reported by:	C <cm@appliedprivacy.net>
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Security:	108a4be3-e612-11e9-9963-5f1753e0aca0
MFH:		2019Q4
Mon, 2 Sep 2019
[ 16:31 swills search for other commits by this committer ] Original commit   Revision:510824
dns/unbound: update to 1.9.3

Whil here, improve rc script

PR:		240163
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Wed, 19 Jun 2019
[ 04:56 joneum search for other commits by this committer ] Original commit   Revision:504511
Update to 1.9.2

PR:		238651
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Sponsored by:	Netzkommune GmbH
Mon, 18 Mar 2019
[ 11:35 swills search for other commits by this committer ] Original commit   Revision:496136
dns/unbound: update to 1.9.1

PR:		236575
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Tue, 5 Feb 2019
[ 14:27 sunpoet search for other commits by this committer ] Original commit   Revision:492239
Update to 1.9.0

Changes:	https://www.nlnetlabs.nl/svn/unbound/tags/release-1.9.0/doc/Changelog
PR:		235522
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Wed, 26 Dec 2018
[ 22:20 swills search for other commits by this committer ] Original commit   Revision:488471
dns/unbound: Update to 1.8.3

PR:		233933
Submitted by:	jaap@NLnetLabs.nl
Sun, 9 Dec 2018
[ 01:06 swills search for other commits by this committer ] Original commit   Revision:487005
dns/unbound: Update to 1.8.2

PR:		233796
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Mon, 8 Oct 2018
[ 17:29 swills search for other commits by this committer ] Original commit   Revision:481552
dns/unbound upgrade to 1.8.1

PR:		232070
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Tue, 18 Sep 2018
[ 18:24 swills search for other commits by this committer ] Original commit   Revision:480056
dns/unbound: update to 1.8.0

Bump PORTREVISION on consumers due to library major version change

PR:		231283
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Thu, 21 Jun 2018
[ 21:12 sunpoet search for other commits by this committer ] Original commit   Revision:473002
Update to 1.7.3

Changes:	https://www.nlnetlabs.nl/svn/unbound/tags/release-1.7.3/doc/Changelog
PR:		229202
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Thu, 14 Jun 2018
[ 23:22 swills search for other commits by this committer ] Original commit   Revision:472412
dns/unbound: upgrade to 1.7.2

PR:		228889
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Thu, 10 May 2018
[ 14:50 miwi search for other commits by this committer ] Original commit   Revision:469556
- Update to 2.5.9
- Update WWW

PR:	227949
Submitted by:	maintainer
Sponsored by:     iXsystems Inc.
Wed, 21 Mar 2018
[ 17:00 pi search for other commits by this committer ] Original commit   Revision:465195
dns/unbound: upgrade 1.6.8 -> 1.7.0

Features
- auth-zone provides a way to configure RFC7706 from unbound.conf,
  eg. with auth-zone: name: "." for-downstream: no for-upstream: yes
  fallback-enabled: yes and masters or a zonefile with data.
- Aggressive use of NSEC implementation. Use cached NSEC records to
  generate NXDOMAIN, NODATA and positive wildcard answers.
- Accept tls-upstream in unbound.conf, the ssl-upstream keyword is
  also recognized and means the same.  Also for tls-port,
  tls-service-key, tls-service-pem, stub-tls-upstream and
  forward-tls-upstream.
- [dnscrypt] introduce dnscrypt-provider-cert-rotated option,
  from Manu Bretelle.
  This option allows handling multiple cert/key pairs while only
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Fri, 19 Jan 2018
[ 16:27 dbaio search for other commits by this committer ] Original commit   Revision:459435
dns/unbound: Update to 1.6.8, Fixes security vulnerability

PR:		225313
Submitted by:	jaap@NLnetLabs.nl (maintainer)
MFH:		2018Q1
Security:	8d3bae09-fd28-11e7-95f2-005056925db4
Thu, 12 Oct 2017
[ 14:44 dbaio search for other commits by this committer ] Original commit   Revision:451881
dns/unbound: Update to 1.6.7

Changes:	http://www.unbound.net/pipermail/unbound-users/2017-October/004972.html

PR:		222941
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Fri, 22 Sep 2017
[ 00:51 dbaio search for other commits by this committer ] Original commit   Revision:450314
dns/unbound: Update to 1.6.6

Changes:	http://www.unbound.net/pipermail/unbound-users/2017-September/004936.html

PR:		222503
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Mon, 21 Aug 2017
[ 21:45 swills search for other commits by this committer ] Original commit   Revision:448504
dns/unbound: Upgrade to 1.6.5

PR:		221692
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Wed, 12 Jul 2017
[ 22:44 dbaio search for other commits by this committer ] Original commit   Revision:445613
dns/unbound: Update to 1.6.4

Changes:	http://www.unbound.net/pipermail/unbound-users/2017-June/004818.html

PR:		220673
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Approved by:	garga (mentor, implicit)
Tue, 13 Jun 2017
[ 20:37 adamw search for other commits by this committer ] Original commit   Revision:443538
Update unbound to 1.6.3.

This release fixes a spurious assertion failure when unbound receives a
malformed packet with 0x20 enabled.

Bug Fixes
- Fix #1280: Unbound fails assert when response from authoritative
  contains malformed qname. When 0x20 caps-for-id is enabled, when
  assertions are not enabled the malformed qname is handled correctly.

PR:		219958
Submitted by:	maintainer (jaap NLnetLabs nl)
Sat, 29 Apr 2017
[ 20:59 pi search for other commits by this committer ] Original commit   Revision:439775
dns/unbound: update 1.6.1 -> 1.6.2

PR:		218872
Changes:	http://www.unbound.net/pipermail/unbound-users/2017-April/004762.html
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Wed, 8 Mar 2017
[ 01:48 wen search for other commits by this committer ] Original commit   Revision:435651
- Update to 1.6.1

PR:		217614
Submitted by:	jaap@NLnetLabs.nl(maintainer)
Sat, 17 Dec 2016
[ 13:20 sunpoet search for other commits by this committer ] Original commit   Revision:428760
- Update to 1.6.0
- Do not silence installation message
- While I'm here:
  - Move LIB_DEPENDS upwards
  - Use = instead of += for CONFIGURE_ARGS and USES
  - Convert to options helper
  - Use TEST_TARGET

Changes:	https://unbound.nlnetlabs.nl/pipermail/unbound-users/2016-December/004587.html
PR:		215322
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Sun, 2 Oct 2016
[ 10:30 pawel search for other commits by this committer ] Original commit   Revision:423108
Update to version 1.5.10

In this release there is a fix for long downtime after connectivity
loss, which was a longstanding unsolved issue.  Features for tcp, TCP
Fast Open and timeout pressure to close connections when the tcp
connections are getting full.  Option to use ipv6 /64 for extra entropy.

Features
- Create a pkg-config file for libunbound in contrib.
- TCP Fast open patch from Sara Dickinson.
- Finegrained localzone control with define-tag, access-control-tag,
  access-control-tag-action, access-control-tag-data, local-zone-tag, and
  local-zone-override. And added types always_transparent, always_refuse,
  always_nxdomain with that.
- If more than half of tcp connections are in use, a shorter timeout
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sat, 18 Jun 2016
[ 21:53 rm search for other commits by this committer ] Original commit   Revision:417091
dns/unbound: update to 1.5.9

PR:		210257
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Tue, 15 Mar 2016
[ 06:19 ohauer search for other commits by this committer ] Original commit   Revision:411142
- Update unbound to version 1.5.8

- add OPTION for DNSTAP logging support
- rename OPTION s/MUNIN/MUNIN_PLUGIN/ so it is consistent with nsd
- use OPTIONS_SUB
- use ${opt}_target
- use @sample macro for unbound.conf
- sort pkg-plist

Features
- ip-transparent option for FreeBSD with IP_BINDANY socket option.
- insecure-lan-zones: yesno config option, patch from Dag-Erling Smorgrav.
- RR Type CSYNC support RFC 7477, in debug printout and config input.
- RR Type OPENPGPKEY support (draft-ietf-dane-openpgpkey-07).
- [bugzilla: 731 ] tcp-mss, outgoing-tcp-mss options for unbound.conf, patch
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Thu, 4 Feb 2016
[ 15:58 erwin search for other commits by this committer ] Original commit   Revision:408047
- Update unbound to 1.5.7
- Bump PORTREVISIOn on dependent ports

Some Upgrade Notes:

This release fixes a validation failure for nodata with wildcards and
emptynonterminals. Fixes OpenSSL Library compability. Fixes correct
response for malformed EDNS queries. For crypto in libunbound there is
libnettle support.

Qname minimisation is implemented. Use qname-minimisation: yes to
enable it. This version sends the full query name when an error is
found for intermediate names. It should therefore not fail for names
on nonconformant servers. It combines well with
harden-below-nxdomain: yes because those nxdomains are probed by the
(Only the first 15 lines of the commit message are shown above View all of this commit message)
Sun, 11 Oct 2015
[ 12:58 sem search for other commits by this committer ] Original commit   Revision:399086
- Update to 1.5.5
Mon, 17 Aug 2015
[ 19:31 sem search for other commits by this committer ] Original commit   Revision:394528
- Update to 1.5.4
- Disable FILTER_AAAA option. The patch is obsolated.

PR:		202385
Submitted by:	edwin
Thu, 12 Mar 2015
[ 14:47 sem search for other commits by this committer ] Original commit   Revision:381096
- Update to 1.5.3

PR:		198538
Submitted by:	garga
Thu, 19 Feb 2015
[ 17:55 sem search for other commits by this committer ] Original commit   Revision:379354
- Update to 1.5.2
Tue, 9 Dec 2014
[ 02:18 sem search for other commits by this committer ] Original commit   Revision:374343
- Upgrade to 1.5.1. It fixes CVE-2014-8602.
- Mark python support as broken: does not build.

PR:		195814, 195803
Submitted by:	Kenji Rikitake, Jeroen
Fri, 5 Dec 2014
[ 18:52 sem search for other commits by this committer ] Original commit   Revision:374077
- Update to 1.5.0
- Removed FreeBSD 10 check for libevent, because of upstream fixes (as stated in
changelog)
- Converted files/patch-Makefile.in to sed patch, which is position independent

PR:		195674
Submitted by:	lightside@gmx.com
Thu, 13 Mar 2014
[ 11:07 sem search for other commits by this committer ] Original commit   Revision:348053
- Update to 1.4.22
Mon, 23 Sep 2013
[ 02:39 sem search for other commits by this committer ] Original commit   Revision:327903
- Update to 1.4.21
Mon, 25 Mar 2013
[ 16:03 sem search for other commits by this committer ] Original commit   Revision:315236
- Update to 1.4.20
Fri, 14 Dec 2012
[ 13:56 sem search for other commits by this committer ] Original commit   Revision:308903
- Update to 1.1.19
Fri, 3 Aug 2012
[ 10:05 sem search for other commits by this committer ] Original commit 
- Update to 1.4.18
Thu, 24 May 2012
[ 15:02 sem search for other commits by this committer ] Original commit 
- Update to 1.4.17
  * Use ECDSA by default
  * Add a hack to build ldns with ECDSA support if it's not installed

Feature safe:   Yes
Thu, 2 Feb 2012
[ 13:53 sem search for other commits by this committer ] Original commit 
- Update to 1.4.16
  * Bugfix release
Thu, 26 Jan 2012
[ 13:44 sem search for other commits by this committer ] Original commit 
- Update to 1.4.15
  * Fixed a little memory leak
  * Couple other bugs fixed
- Run unbound-checkconf before start.
Mon, 19 Dec 2011
[ 13:44 sem search for other commits by this committer ] Original commit 
- Update to 1.4.14
  * CVE-2011-4528 fixed
Thu, 15 Sep 2011
[ 12:04 sem search for other commits by this committer ] Original commit 
- Update to 1.4.13
Fri, 15 Jul 2011
[ 12:53 sem search for other commits by this committer ] Original commit 
- Update to 1.4.12 (a bugfix release)
- Disable GOST by default
- Depend on dns/ldns
Fri, 1 Jul 2011
[ 14:46 sem search for other commits by this committer ] Original commit 
- Update to 1.4.11
Wed, 25 May 2011
[ 09:30 sem search for other commits by this committer ] Original commit 
- Update to 1.4.10
  * CVE-2011-1922 VU#531342 fixed
Thu, 24 Mar 2011
[ 13:24 sem search for other commits by this committer ] Original commit 
- Update to 1.4.9
Mon, 24 Jan 2011
[ 16:19 sem search for other commits by this committer ] Original commit 
- Update to 1.4.8

Feature safe:   yes
Tue, 9 Nov 2010
[ 14:09 sem search for other commits by this committer ] Original commit 
- Update to 1.4.7
  * It uses GOST by default and depends on port's openssl 1.0.0
    (may be turned off by an option).
Wed, 4 Aug 2010
[ 11:06 sem search for other commits by this committer ] Original commit 
- Update to 1.4.6
Tue, 15 Jun 2010
[ 15:46 sem search for other commits by this committer ] Original commit 
- Update to 1.4.5
Thu, 22 Apr 2010
[ 12:06 sem search for other commits by this committer ] Original commit 
- Update to 1.4.4
 * mistly bugs fix release
 * ECC-GOST is not supported by the port yet because of it requires
   OpenSSL 1.0.0 from ports. (There is in TODO).
Fri, 12 Mar 2010
[ 12:54 sem search for other commits by this committer ] Original commit 
- Update to 1.4.3
Thu, 17 Dec 2009
[ 12:45 sem search for other commits by this committer ] Original commit 
- Update to 1.4.1
- Use --disable-sha2 on 6.4 because of broken OpenSSL in base.
Thu, 26 Nov 2009
[ 15:19 sem search for other commits by this committer ] Original commit 
- Update to 1.4.0
Tue, 17 Nov 2009
[ 14:38 sem search for other commits by this committer ] Original commit 
- Update to 1.3.4

PR:             ports/140639
Submitted by:   Kurt Jaeger <pi at fa8.opsec.eu>
Wed, 5 Aug 2009
[ 17:21 sem search for other commits by this committer ] Original commit 
- Update to 1.3.3
Thu, 9 Jul 2009
[ 17:38 sem search for other commits by this committer ] Original commit 
- Update to 1.3.1
Tue, 16 Jun 2009
[ 13:35 sem search for other commits by this committer ] Original commit 
- Update to 1.3.0
Tue, 10 Feb 2009
[ 14:05 sem search for other commits by this committer ] Original commit 
- Update to 1.2.1
Wed, 14 Jan 2009
[ 08:49 sem search for other commits by this committer ] Original commit 
- Update to 1.2.0
  Bugs fix release. Includes important security fix.
Thu, 20 Nov 2008
[ 19:39 sem search for other commits by this committer ] Original commit 
- Update to 1.1.1
  Urgent bugs fix release.
Wed, 19 Nov 2008
[ 20:59 sem search for other commits by this committer ] Original commit 
- Update to 1.1.0
Thu, 7 Aug 2008
[ 10:45 sem search for other commits by this committer ] Original commit 
- Update to 1.0.2
Wed, 16 Jul 2008
[ 19:43 sem search for other commits by this committer ] Original commit 
- Update to 1.0.1
Wed, 21 May 2008
[ 17:12 sem search for other commits by this committer ] Original commit 
- Update to 1.0
Tue, 29 Apr 2008
[ 07:35 sem search for other commits by this committer ] Original commit 
- New port: dns/unbound

Unbound is designed as a set of modular components, so that also
DNSSEC (secure DNS) validation and stub-resolvers (that do not run as
a server, but are linked into an application) are easily possible.

Goals:
    * A validating recursive DNS resolver.
    * Code diversity in the DNS resolver monoculture.
    * Drop-in replacement for BIND apart from config.
    * DNSSEC support.
    * Fully RFC compliant.
    * High performance
          o even with validation.
    * Used as
(Only the first 15 lines of the commit message are shown above View all of this commit message)

Number of commits found: 83