summaryrefslogtreecommitdiff
path: root/net/bind9
AgeCommit message (Collapse)AuthorFilesLines
2010-02-10Retire bind9.joerg20-1106/+0
2010-02-01Fix version number. Just assume that -P always should be translated tojoerg1-2/+2
pl.
2010-01-21security update:spz2-7/+6
BIND 9.4.3-P4 is a SECURITY PATCH for BIND 9.4.3. It addresses a potential cache poisoning vulnerability, in which data in the additional section of a response could be cached without proper DNSSEC validation. Changes since 9.4.3-P3: 2772. [security] When validating, track whether pending data was from the additional section or not and only return it if validates as secure. [RT #20438] BIND 9.4.3-P5 is a SECURITY PATCH for BIND 9.4.3. It addresses two potential cache poisoning vulnerabilities, both of which could allow a validating recursive nameserver to cache data which had not been authenticated or was invalid. CVE identifiers: CVE-2009-4022, CVE-2010-0097 CERT advisories: VU#418861, VU#360341 Changes since 9.4.3-P4: 2831. [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] 2828. [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] 2827. [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712]
2010-01-17Recursive PKGREVISION bump for jpeg update to 8.wiz2-4/+4
2009-12-11Modify named9.sh to create /dev/random in chrooted environmenttaca2-6/+12
as base system's /etc/rc.d/named. Bump PKGREVISION.
2009-11-25Prepare for libtool-2.2: use --tag=CC when calling gcc instead of cc.joerg3-10/+34
2009-07-28Updated to 9.4.3-P3 for security issue:reed2-7/+7
https://www.isc.org/node/474
2009-07-24Update HOMEPAGE url.obache1-2/+2
2009-06-14Remove @dirrm related logic.joerg1-5/+1
2009-06-14Remove @dirrm entries from PLISTsjoerg1-8/+1
2009-04-07Make these compile on DragonFly master.hasso2-3/+39
2009-03-23Add URL for mirror on "ftp.belnet.be" to master site list.tron1-2/+3
2009-03-22--- 9.4.3-P2 released ---adrianp2-7/+7
2579. [bug] DNSSEC lookaside validation failed to handle unknown algorithms. [RT #19479]
2009-03-20Simply and speed up buildlink3.mk files and processing.joerg1-13/+6
This changes the buildlink3.mk files to use an include guard for the recursive include. The use of BUILDLINK_DEPTH, BUILDLINK_DEPENDS, BUILDLINK_PACKAGES and BUILDLINK_ORDER is handled by a single new variable BUILDLINK_TREE. Each buildlink3.mk file adds a pair of enter/exit marker, which can be used to reconstruct the tree and to determine first level includes. Avoiding := for large variables (BUILDLINK_ORDER) speeds up parse time as += has linear complexity. The include guard reduces system time by avoiding reading files over and over again. For complex packages this reduces both %user and %sys time to half of the former time.
2009-02-21Fix build on OpenSolarisadrianp2-6/+28
http://src.opensolaris.org/source/xref/sfw/usr/src/cmd/bind/getaddrinfo.c.patch
2009-01-08Changes since 9.4.3:adrianp2-6/+10
2522. [security] Handle -1 from DSA_do_verify(). 2498. [bug] Removed a bogus function argument used with ISC_SOCKET_USE_POLLWATCH: it could cause compiler warning or crash named with the debug 1 level of logging. [RT #18917]
2009-01-04Update to 9.4.3adrianp5-51/+33
Resolver could try unreachable servers multiple times. Adb's handling of lame addresses was different for IPv4 and IPv6. Remove NULL pointer dereference in dns_journal_print(). libbind: Out of bounds reference in dns_ho.c:addrsort. Set initial timeout to 800ms. TSIG context leak For all the details see: http://oldwww.isc.org/sw/bind/view/?release=9.4.3#RELEASE
2008-08-03Changes since 9.4.2-P1:adrianp2-7/+7
--- 9.4.2-P2 released --- 2406. [bug] Some operating systems have FD_SETSIZE set to a low value by default, which can cause resource exhaustion when many simultaneous connections are open. Linux in particular makes it difficult to increase this value. To use more sockets with select(), set ISC_SOCKET_FDSETSIZE. Example: STD_CDEFINES="-DISC_SOCKET_FDSETSIZE=4096" ./configure (This should not be necessary in most cases, and never for an authoritative-only server.) [RT #18328] 2404. [port] hpux: files unlimited support. 2403. [bug] TSIG context leak. [RT #18341] 2402. [port] Support Solaris 2.11 and over. [RT #18362] 2401. [bug] Expect to get E[MN]FILE errno internal_accept() (from accept() or fcntl() system calls). [RT #18358] 2399. [bug] Abort timeout queries to reduce the number of open UDP sockets. [RT #18367] 2398. [bug] Improve file descriptor management. New, temporary, named.conf option reserved-sockets, default 512. [RT #18344] 2396. [bug] Don't set SO_REUSEADDR for randomized ports. [RT #18336] 2395. [port] Avoid warning and no effect from "files unlimited" on Linux when running as root. [RT #18335] 2394. [bug] Default configuration options set the limit for open files to 'unlimited' as described in the documentation. [RT #18331] 2392. [bug] remove 'grep -q' from acl test script, some platforms don't support it. [RT #18253] 2322. [port] MacOS: work around the limitation of setrlimit() for RLIMIT_NOFILE. [RT #17526]
2008-07-10Update to 9.4.2-P1adrianp4-27/+25
Please see CHANGES for all the details but the driving factor of this update is: 2375. [security] Fully randomize UDP query ports to improve forgery resilience. [RT #17949]
2008-06-21Fix two typos: inclue => includeadrianp4-9/+9
2008-06-20Add DESTDIR support.joerg1-14/+14
2008-05-26Second round of explicit pax dependencies. As reminded by tnn@,joerg1-2/+3
many packages used to use ${PAX}. Use the common way of directly calling pax, it is created as tool after all.
2008-05-11Fix CVE-2008-0122 for libbind (as contained in bind). A misplaced boundarytonnerre3-3/+20
check can be abused for implementation specific exploitation: depending on the use of libbind, this can result in denial of service or even remote code execution.
2008-04-12Convert to use PLIST_VARS instead of manually passing "@comment "jlam2-6/+5
through PLIST_SUBST to the plist module.
2008-01-18Per the process outlined in revbump(1), perform a recursive revbumptnn2-4/+4
on packages that are affected by the switch from the openssl 0.9.7 branch to the 0.9.8 branch. ok jlam@
2007-09-07Convert packages that test and use USE_INET6 to use the options frameworkjlam1-7/+6
and to support the "inet6" option instead. Remaining usage of USE_INET6 was solely for the benefit of the scripts that generate the README.html files. Replace: BUILD_DEFS+= USE_INET6 with BUILD_DEFS+= IPV6_READY and teach the README-generation tools to look for that instead. This nukes USE_INET6 from pkgsrc proper. We leave a tiny bit of code to continue to support USE_INET6 for pkgsrc-wip until it has been nuked from there as well.
2007-08-08Fix two typos. I didn't test this. Bump PKGREVISION as onreed4-8/+9
"dragonfly" this may change the build.
2007-08-01Fix for bind package name pointed out by John Klos on tech-pkg@adrianp1-1/+2
2007-07-28Update to 9.4.1-P1adrianp2-7/+6
2206. [security] "allow-query-cache" and "allow-recursion" now cross inherit from each other. If allow-query-cache is not set in named.conf then allow-recursion is used if set, otherwise allow-query is used if set, otherwise the default (localnets; localhost;) is used. If allow-recursion is not set in named.conf then allow-query-cache is used if set, otherwise allow-query is used if set, otherwise the default (localnets; localhost;) is used. 2203. [security] Query id generation was cryptographically weak. 2202. [security] The default acls for allow-query-cache and allow-recursion were not being applied. 2193. [port] win32: BINDInstall.exe is now linked statically. 2192. [port] win32: use vcredist_x86.exe to install Visual Studio's redistributable dlls if building with Visual Stdio 2005 or later.
2007-07-04Make it easier to build and install packages "unprivileged", wherejlam1-2/+5
the owner of all installed files is a non-root user. This change affects most packages that require special users or groups by making them use the specified unprivileged user and group instead. (1) Add two new variables PKG_GROUPS_VARS and PKG_USERS_VARS to unprivileged.mk. These two variables are lists of other bmake variables that define package-specific users and groups. Packages that have user-settable variables for users and groups, e.g. apache and APACHE_{USER,GROUP}, courier-mta and COURIER_{USER,GROUP}, etc., should list these variables in PKG_USERS_VARS and PKG_GROUPS_VARS so that unprivileged.mk can know to set them to ${UNPRIVILEGED_USER} and ${UNPRIVILEGED_GROUP}. (2) Modify packages to use PKG_GROUPS_VARS and PKG_USERS_VARS.
2007-06-12Automatically include pthread variables. Bump revision as it mightjoerg1-1/+3
change some of the binaries.
2007-05-02Update BIND to 9.4.1:cjs2-6/+6
CVE-2007-2241: A sequence of queries can cause a recursive nameserver to exit. While it is unlikely these will occur in normal operation, an attack can use them to cause the affected versions to exit. This attack is a denial of service, and does not allow an attacker to gain control of affected systems.
2007-04-15Upgrade BIND to 9.4.0.cjs4-14/+17
I won't attempt to summarize 221 lines of changes in README here.
2007-01-30Fix permission problems:tron1-1/+4
- "share/doc/bind9" shouldn't be group-writable. - "share/doc/bind9/arm/Bv9ARM.pdf" shouldn't be executable. Bump package revision because of these fixes.
2007-01-28Update to 9.3.4adrianp5-164/+14
Lots of changes, see http://www.isc.org/sw/bind/view/?release=9.3.4#RELEASE for all the details: In brief: 2126. [security] Serialise validation of type ANY responses. 2124. [security] It was possible to dereference a freed fetch context. 2089. [security] Raise the minimum safe OpenSSL versions to OpenSSL 0.9.7l and OpenSSL 0.9.8d. Versions prior to these have known security flaws which are (potentially) exploitable in named. 2088. [security] Change the default RSA exponent from 3 to 65537. 2066. [security] Handle SIG queries gracefully. 1941. [bug] ncache_adderesult() should set eresult even if no rdataset is passed to it.
2006-11-23Disable threading on sparc and sparc64hubertf1-2/+4
sparc64 tested successfully by Volkmar Seifert <vs@nifelheim.info> OK'd by (and sparc included per suggestion of) martin@
2006-11-05Don't install doc/*/Makefile{,.in} as theses do not pass the CHECK_WRKREFseb1-6/+5
check. Also don't install utility perl scripts for building the docs. Use pax to install all the doc files in one go. Bump PKGREVISION to 3 for the PLIST changes.
2006-09-05Fixes for CVE-2006-4095 and CVE-2006-4096 from bind-9.3.2-P1adrianp4-3/+153
* Assertion failure in ISC BIND SIG query processing (CVE-2006-4095) - Recursive servers Queries for SIG records will trigger an assertion failure if more than one RRset is returned. However exposure can be minimized by restricting which sources can ask for recursion. - Authoritative servers If a nameserver is serving a RFC 2535 DNSSEC zone and is queried for the SIG records where there are multiple RRsets, then the named program will trigger an assertion failure when it tries to construct the response. * INSIST failure in ISC BIND recursive query handling code (CVE-2006-4096) It is possible to trigger an INSIST failure by sending enough recursive queries such that the response to the query arrives after all the clients waiting for the response have left the recursion queue. However exposure can be minimized by restricting which sources can ask for recursion.
2006-09-03Added the relevant variables to BUILD_DEFS.rillig1-1/+3
2006-08-28Bump PKGREVISION to 1.seb4-2/+49
Fix build on NetBSD/sparc64 3.x: sync CPP symbols usage between struct addrinfo definition and its usage in getaddrinfo(). While here define struct addrinfo's pad members the same way as in NetBSD's /usr/include/netbsd.h and sync code in lib/bind/irs/getaddrinfo.c:getaddrinfo(). This had been reported to bind9-bugs at isc dot org.
2006-08-17Update bind to 9.3.2.taca12-208/+187
Changes are huge, so please see http://www.isc.org/sw/bind/bind9.3.php.
2006-07-08Change the format of BUILDLINK_ORDER to contain depth information as well,jlam1-2/+2
and add a new helper target and script, "show-buildlink3", that outputs a listing of the buildlink3.mk files included as well as the depth at which they are included. For example, "make show-buildlink3" in fonts/Xft2 displays: zlib fontconfig iconv zlib freetype2 expat freetype2 Xrender renderproto
2006-07-08Track information in a new variable BUILDLINK_ORDER that informs usjlam1-1/+2
of the order in which buildlink3.mk files are (recursively) included by a package Makefile.
2006-06-20The contents of include/bind vary widly between systems as bind9abs2-29/+6
dutifully installs whatever it thinks might be missing or just substandard on the current system. As the Makefile already adds the contents of share/doc/bind9 dynamically to the PLIST, do the same for include/bind. Fixes the PLIST on RedHat EL 2 & 3, and does not break it on NetBSD/3 No PKGREVISION bump as no change to anything but generated PLIST
2006-04-25Remove as maintainer of this package. I'm no longer using it on anytron1-2/+2
system I administrate.
2006-04-23Modify packages that set PKG_USERS and PKG_GROUPS to follow the newjlam1-2/+5
syntax as specified in pkgsrc/mk/install/bsd.pkginstall.mk:1.47.
2006-04-12Aligned the last line of the buildlink3.mk files with the first line, sorillig1-2/+2
that they look nicer.
2006-04-06Over 1200 files touched but no revisions bumped :)reed2-5/+5
RECOMMENDED is removed. It becomes ABI_DEPENDS. BUILDLINK_RECOMMENDED.foo becomes BUILDLINK_ABI_DEPENDS.foo. BUILDLINK_DEPENDS.foo becomes BUILDLINK_API_DEPENDS.foo. BUILDLINK_DEPENDS does not change. IGNORE_RECOMMENDED (which defaulted to "no") becomes USE_ABI_DEPENDS which defaults to "yes". Added to obsolete.mk checking for IGNORE_RECOMMENDED. I did not manually go through and fix any aesthetic tab/spacing issues. I have tested the above patch on DragonFly building and packaging subversion and pkglint and their many dependencies. I have also tested USE_ABI_DEPENDS=no on my NetBSD workstation (where I have used IGNORE_RECOMMENDED for a long time). I have been an active user of IGNORE_RECOMMENDED since it was available. As suggested, I removed the documentation sentences suggesting bumping for "security" issues. As discussed on tech-pkg. I will commit to revbump, pkglint, pkg_install, createbuildlink separately. Note that if you use wip, it will fail! I will commit to pkgsrc-wip later (within day).
2006-03-30Avoid extra stat() calls by not repeatedly checking whether a filejlam1-2/+3
exists on the disk -- we can just check whether a variable defined by find-files.mk is "__nonexistent__" or not.
2006-03-22Add DragonFly support.joerg3-6/+53