summaryrefslogtreecommitdiff
path: root/net/maradns
AgeCommit message (Collapse)AuthorFilesLines
2021-10-26net: Replace RMD160 checksums with BLAKE2s checksumsnia1-2/+2
All checksums have been double-checked against existing RMD160 and SHA512 hashes Not committed (merge conflicts...): net/radsecproxy/distinfo The following distfiles could not be fetched (fetched conditionally?): ./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz ./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch ./net/djbdns/distinfo djbdns-1.05-test28.diff.xz ./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch ./net/djbdns/distinfo djbdns-1.05-multiip.diff ./net/djbdns/distinfo djbdns-cachestats.patch
2021-10-07net: Remove SHA1 hashes for distfilesnia1-2/+1
2019-11-03net: align variable assignmentsrillig1-5/+5
pkglint -Wall -F --only aligned --only indent -r No manual corrections.
2019-10-06maradns: Update to 2.0.17nia3-14/+16
maradns-2.0.17: This is the stable release of MaraDNS. No security updates were made. Deadwood updated to 3.2.14 Default max_mem value doubled as discussed in GitHub issue #52.
2019-01-18Update maradns to 2.0.16.bsiegert3-11/+11
maradns-2.0.16: This is the stable release of MaraDNS. A very minor security update was made. Deadwood updated to 3.2.12 maradns-2.0.15: This is the stable release of MaraDNS. No security updates were done in this release. Deadwood updated to 3.2.11 maradns-2.0.14: This is the stable release of MaraDNS. No security updates were done in this release. Deadwood updated to 3.2.10
2015-11-04Add SHA512 digests for distfiles for net categoryagc1-1/+2
Problems found with existing digests: Package haproxy distfile haproxy-1.5.14.tar.gz 159f5beb8fdc6b8059ae51b53dc935d91c0fb51f [recorded] da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated] Problems found locating distfiles: Package bsddip: missing distfile bsddip-1.02.tar.Z Package citrix_ica: missing distfile citrix_ica-10.6.115659/en.linuxx86.tar.gz Package djbdns: missing distfile djbdns-1.05-test25.diff.bz2 Package djbdns: missing distfile djbdns-cachestats.patch Package djbdns: missing distfile 0002-dnscache-cache-soa-records.patch Package gated: missing distfile gated-3-5-11.tar.gz Package owncloudclient: missing distfile owncloudclient-2.0.2.tar.xz Package poink: missing distfile poink-1.6.tar.gz Package ra-rtsp-proxy: missing distfile rtspd-src-1.0.0.0.tar.gz Package ucspi-ssl: missing distfile ucspi-ssl-0.70-ucspitls-0.1.patch Package waste: missing distfile waste-source.tar.gz Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
2015-09-26Update to 2.0.13wen3-12/+13
Add LICENSE Upstream changes: maradns-2.0.13: This is the stable release of MaraDNS. Two non-critical buffer overflows from ParseMaraRc fixed. One can never be exploited; the other one can only be exploted by the (usually) root user by writing to the system mararc file. Deadwood updated to 3.2.09 (2015-09-25) maradns-2.0.12: This is the stable release of MaraDNS. Security fix for improper free() in zoneserver Deadwood updated to 3.2.08 Zone transfers now work with newer versions of dig Documentation updates (2015.08.19) maradns-2.0.11: This is the stable release of MaraDNS. Deadwood updated to 3.2.07 (2015.01.30) maradns-2.0.10: This is the stable release of MaraDNS. Deadwood updated to 3.2.06 Zoneserver now compiles and runs in Cygwin (so Windows users can have DNS-over-TCP support). (2015.01.24) maradns-2.0.09: This is the stable release of MaraDNS. Deadwood updated to 3.2.05 Startup scripts are now chkconfig-compatible (2014.02.12) maradns-2.0.08: This is the stable release of MaraDNS. Deadwood updated to 3.2.04 Make DNS packet compression case-insensitive Attach IPv6 glue to NS and MX records when MaraDNS is compiled for IPv6 Remove warning when MaraDNS is compiled for IPv6 Remove warning when compiling getzone.c (2014.01.14) maradns-2.0.07d: This is the stable release of MaraDNS. Deadwood updated to 3.2.03d to patch security hole discussed at samiam.org/blog/20131202.html (2013.12.02) maradns-2.0.07c: This is the stable release of MaraDNS. Seven-line fix to Deadwood to fix resolution problem; more details in blog (2013.07.20; declared stable 2013.09.20) maradns-2.0.07b: This is the stable release of MaraDNS. One-line fix to Deadwood to fix resolution problem (2013.04.23; declared stable 2013.06.22) maradns-2.0.07: This is the stable release of MaraDNS. MaraDNS updated for CentOS 6 Deadwood updated to 3.2.03 GPG key updated Installs and tests pass in new CentOS install (2013.01.20) maradns-2.0.06: This is a stable release of MaraDNS. Deadwood updated to 3.2.02 (2012.03.11)
2012-10-23Drop superfluous PKG_DESTDIR_SUPPORT, "user-destdir" is default these days.asau1-3/+1
2012-02-28Update to 2.0.05 by package maintainer + my fixes.cheusov15-180/+104
maradns-2.0.05: This is a stable release of MaraDNS. * Security bugfix for CVE-2011-5056 * Deadwood updated to Deadwood 3.2.01 * Nicholas Bamber's Makefile.freebsd file added. (2012.02.12) maradns-1.4.10: The hash compression function has better collision resistance. More details at http://bam2.vk.tj (2012.01.13) maradns-1.4.09: Hotfix: The hash randomization now has 31 bits of entropy, and the hash does a fairly good job of choosing a random hash bucket again. More details at http://al72.vk.tj (2011.12.30) maradns-1.4.08: Security hotfix: Hash randomization added to MaraDNS 1's recursive resolver. MaraDNS 2 is not impacted (it's been using a randomized hash since 2007). More details at http://al62.vk.tj (2011.12.29) maradns-1.4.07: This is a legacy release of MaraDNS. All patches are backports of MaraDNS 2.0 bug fixes. * A typo fix for fetchzone * AXFR-over-UDP packets are now correctly marked "truncated" * It is now possible to have the '/' in hostnames * Fix for Debian bug #607739: Hostname shown when complaining about DDIP issues * AngelD's issue with zone transfers when there are a lot of FQDN4 records fixed. * Karim's issue with '/read' directive fixed (2011.11.11)
2012-02-20Set MAINTAINER (Kozachuk Oleksandr) by requestcheusov1-2/+2
2011-05-06Update maradns to 1.4.06.obache3-16/+15
maradns-1.4.06: This is the stable branch of MaraDNS. * Fix for CVE-2011-0520 * Deadwood updated to 3.0.02 (2011.01.28) maradns-1.4.05: This is a stable branch of MaraDNS. * Deadwood updated to the stable 3.0.01 release. * MicroDNS now returns "not implemented" when given an EDNS packet * FAQ updated. (2010.09.25) maradns-1.4.04: This is the stable branch of MaraDNS. * Bugfix: NAPTR records now work when ~ is used to separate records * NAPTR records now documented * Bugfix: ANY queries now correctly work with NS referrals * Example IPv6 addresses now use RFC-4193 compliant IPs * Website updated to point out that Deadwood is now feature complete and ready for beta-testing * Some updates to the SQA regressions * Deadwood updated to Deadwood 2.9.02 * Windows-only mkSecretTxt program added (*NIX users can just type in "dd if=/dev/urandom of=secret.txt bs=64 count=1"; this gives Windows the same ability). (2010.07.31)
2010-06-25Fix PLIST. Bump revision.joerg2-3/+23
2010-05-23updated to 1.4.03schwarz9-115/+95
patched to support Darwin
2009-06-14Convert @exec/@unexec to @pkgdir or drop it.joerg1-2/+2
2009-06-14Remove @dirrm entries from PLISTsjoerg1-16/+1
2008-03-19Fix a Denial-of-Service vulnerability in maradns version 1.2.12.06tonnerre3-2/+38
Crafted CNAME entries can be used to DoS MaraDNS without this patch See CVE-2008-0061 for more details Approved-by: wiz
2007-08-23Remove patches that were scheduled for removal with the last maradnsjoerg3-37/+0
update.
2007-08-12Update to maradns-1.2.12.06.joerg11-156/+328
Most important changes: - full Y2038 compliance - full support for DNS over TCP - some changes in the zone format.
2007-03-24Prepare for switching to NO_MTREE=yes.joerg1-1/+4
2006-12-13Update maradns to 1.0.39.obache4-12/+14
changelog: maradns-1.0.39: * Backport of memory leak fix to 1.0 branch of MaraDNS (2006.07.24) maradns-1.0.38: Backport of MaraDNS 1.2.09 Microsoft.com fix to legacy 1.0 branch (2006.06.16) maradns-1.0.37: This is an update for the 1.0 legacy branch of MaraDNS * Removed all example mararc files which allow any IP on the internet to perform recursive queries (these can be used for denial of service attacks) (2006.04.07) maradns-1.0.36: This is a bugfix release for the legacy 1.0 branch of MaraDNS. * A backport of the 2-line patch recently posted to the mailing list concerning incorrect dangling CNAME warnings (2005.12.31) maradns-1.0.35: * Backport of 1.1.x fix of csv1 example in documentation * Backport of 1.1.x fix of MINFO RR description * Backport of 1.1.x security fix. (2005.11.20) maradns-1.0.34: * Hotfix: recursion works again * Regression procedure added. (2005.10.26) maradns-1.0.33: * Fixed occassional crash that happens while reading zone files at MaraDNS startup. * Fixed occassional compression error which shows up in MaraDNS logs. * Update man page to point out some unimplemented features will be in 1.2 (2005.10.24) maradns-1.0.32: Hotfix: RR rotation now works again. (2005.08.08) maradns-1.0.31: Two patches by Albert Lee that improve Maras stability. (2005.08.07) maradns-1.0.30: * Warn the user when they have dangling CNAME records * Fix bug with MX records with preferences > 255 in getzone tool (2005.06.30) maradns-1.0.29: This release improves how MaraDNS'recursive resolver parses packets so that Mara can interoperate better with some stub resolvers that dont bother looking past the header of a DNS packet. (2005.05.13)
2006-04-27Use 3rd person for DESCR.ghen1-1/+1
2006-03-04Point MAINTAINER to pkgsrc-users@NetBSD.org in the case where nojlam1-2/+2
developer is officially maintaining the package. The rationale for changing this from "tech-pkg" to "pkgsrc-users" is that it implies that any user can try to maintain the package (by submitting patches to the mailing list). Since the folks most likely to care about the package are the folks that want to use it or are already using it, this would leverage the energy of users who aren't developers.
2006-01-25DragonFly also needs sys/time.h before sys/resource.h.joerg2-1/+15
2005-12-29Remove USE_PKGINSTALL from pkgsrc now that mk/install/pkginstall.mkjlam1-2/+1
automatically detects whether we want the pkginstall machinery to be used by the package Makefile.
2005-05-13Update to version 1.0.28salo11-30/+130
Too many changes to list, see CHANGELOG within the source tarball. This update was prompted by an issue with random number generator, see the following url for details: http://www.maradns.org/download/patches/maradns-1.0.26-rekey_rng
2005-04-11Remove USE_BUILDLINK3 and NO_BUILDLINK; these are no longer used.tv1-2/+1
2005-03-14Remove broken rc.d script. Fixes PR 24587. Bump PKGREVISION.wiz2-21/+2
2005-02-24Add RMD160 digests.agc1-1/+2
2004-12-28The default location of the pkgsrc-installed rc.d scripts is nowreed1-2/+2
under share/examples/rc.d. The variable name already was named RCD_SCRIPTS_EXAMPLEDIR. This is from ideas from Greg Woods and others. Also bumped PKGREVISION for all packages using RCD_SCRIPTS mechanism (as requested by wiz).
2004-12-04Set PTHREAD_AUTO_VARS to "yes" after pthread.buildlink3.mk was changedjlam1-2/+3
not to automatically add pthread-related CFLAGS, LDFLAGS, and LIBS to the configure and build processes.
2004-12-04Fix build (missing PTHREAD_LDFLAGS).wiz1-2/+2
2004-11-27Reset maintainer on his request.wiz1-2/+2
2004-11-12Remove redundant uses of PTHREAD_{CFLAGS,LDFLAGS} now that they're addedjlam1-4/+4
automatically by pthread.buildlink3.mk. Also, factor out the pthread library out of PTHREAD_LDFLAGS into a standalone variable PTHREAD_LIBS and use it in packages where necessary (usually the ones that don't have a GNU configure script).
2004-04-25Convert to buildlink3.snj1-3/+3
2004-04-23mk/bsd.pkg.install.mk now automatically registersreed1-2/+1
the RCD_SCRIPTS rc.d script(s) to the PLIST. This GENERATE_PLIST idea is part of Greg A. Woods' PR #22954. This helps when the RC_SCRIPTS are installed to a different ${RCD_SCRIPTS_EXAMPLEDIR}. (Later, the default RCD_SCRIPTS_EXAMPLEDIR will be changed to be more clear that they are the examples.) These patches also remove the etc/rc.d/ scripts from PLISTs (of packages that use RCD_SCRIPTS). (This also removes now unused references from openssh* makefiles. Note that qmail package has not been changed yet.) I have been doing automatic PLIST registration for RC_SCRIPTS for over a year. Not all of these packages have been tested, but many have been tested and used. Somethings maybe to do: - a few packages still manually install the rc.d scripts to hard-coded etc/rc.d. These need to be fixed. - maybe remove from mk/${OPSYS}.pkg.dist mtree specifications too.
2003-11-14o Better handling of pthreads dependencycube6-8/+67
o Fixes to make building and installing more easy o Make MaraDNS actually look into ${PKG_SYSCONFDIR} for its configuration file, thus bumping PKGREVISION.
2003-11-14Make build with pth.wiz2-1/+15
2003-09-27Add pthread's buildlink and fix typo (fixes bulk build by hubertf@)xtraeme2-5/+7
2003-09-26Reimplace removal of ${PREFIX}/doc after installation.jmmv1-1/+2
(Note that anyway, maradns' installation process is screwed up. It uses cp and mkdir to install things, it copies useless stuff like Makefiles, installs duplicates of manpages, etc...)
2003-09-26Updated to 1.0.18xtraeme3-8/+16
Changes: Cleaned up and fixed a bug in the MaraDNS startup script. Now, the only prorcesses that will be killed will be bona fide MaraDNS processes. Closes PR pkg/22963.
2003-09-25Initial import of maradns 1.0.17.xtraeme5-0/+235
Package provided by pancake <pancake@phreaker.net> via pkgsrc-wip. MaraDNS is a package that implements the Domain Name Service (DNS), an essential internet service. MaraDNS is intended for environments where a DNS server must be secure and where the server must use the absolute minimum number of resources possible. MaraDNS was created in response to issues people had with the DNS servers available in early 2001; and has the following design goals: Security-aware programming. A DNS server needs to be secure. I have a number of security features in the code, including: 1. The code uses a special string library which is resistant to buffer overflows. 2. The code, if started as root, mandates running as an unpriviledged user in a chroot() jail. Open-Source. The 1.0 release of the DNS server is public-domain code; the 1.2 release will be released under a very liberal BSD-style license. Simplicity. This DNS server has the minimum number of features needed to correctly act as an authoritative and/or recursive name server.