<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/contrib/bind9/lib/dns, branch main</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=main</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2013-09-30T17:23:45Z</updated>
<entry>
<title>Remove BIND.</title>
<updated>2013-09-30T17:23:45Z</updated>
<author>
<name>Dag-Erling Smørgrav</name>
<email>des@FreeBSD.org</email>
</author>
<published>2013-09-30T17:23:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=56b72efe825d4190e0e2fdbc07ebb295cac299df'/>
<id>urn:sha1:56b72efe825d4190e0e2fdbc07ebb295cac299df</id>
<content type='text'>
Approved by:	re (gjb)
</content>
</entry>
<entry>
<title>Update Bind to 9.9.3-P2</title>
<updated>2013-08-22T08:15:03Z</updated>
<author>
<name>Erwin Lansing</name>
<email>erwin@FreeBSD.org</email>
</author>
<published>2013-08-22T08:15:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=08e6ea976b86b6591f317d290bfc9743d11c21ac'/>
<id>urn:sha1:08e6ea976b86b6591f317d290bfc9743d11c21ac</id>
<content type='text'>
Notable new features:

*  Elliptic Curve Digital Signature Algorithm keys and signatures in
   DNSSEC are now supported per RFC 6605. [RT #21918]

*  Introduces a new tool "dnssec-verify" that validates a signed zone,
   checking for the correctness of signatures and NSEC/NSEC3 chains.
   [RT #23673]

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

*  The new "inline-signing" option, in combination with the
   "auto-dnssec" option that was introduced in BIND 9.7, allows
   named to sign zones completely transparently.

Approved by:	delphij (mentor)
MFC after:	3 days
Sponsored by:	DK Hostmaster A/S
</content>
</entry>
<entry>
<title>Update Bind to 9.8.5-P2</title>
<updated>2013-08-06T06:22:54Z</updated>
<author>
<name>Erwin Lansing</name>
<email>erwin@FreeBSD.org</email>
</author>
<published>2013-08-06T06:22:54Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a273027f9224fda6fd8740a05fb25286641770b2'/>
<id>urn:sha1:a273027f9224fda6fd8740a05fb25286641770b2</id>
<content type='text'>
New Features

   Adds a new configuration option, "check-spf"; valid values are
   "warn" (default) and "ignore".  When set to "warn", checks SPF
   and TXT records in spf format, warning if either resource record
   type occurs without a corresponding record of the other resource
   record type.  [RT #33355]

   Adds support for Uniform Resource Identifier (URI) resource
   records. [RT #23386]

   Adds support for the EUI48 and EUI64 RR types. [RT #33082]

   Adds support for the RFC 6742 ILNP record types (NID, LP, L32,
   and L64). [RT #31836]

Feature Changes

   Changes timing of when slave zones send NOTIFY messages after
   loading a new copy of the zone.  They now send the NOTIFY before
   writing the zone data to disk.  This will result in quicker
   propagation of updates in multi-level server structures. [RT #27242]
   "named -V" can now report a source ID string.  (This is will be
   of most interest to developers and troubleshooters).  The source

   ID for ISC's production versions of BIND is defined in the "srcid"
   file in the build tree and is normally set to the most recent
   git hash. [RT #31494]

   Response Policy Zone performance enhancements.  New "response-policy"
   option "min-ns-dots".  "nsip" and "nsdname" now enabled by default
   with RPZ. [RT #32251]

Approved by:	delphij (mentor)
Sponsored by:	DK Hostmaster A/S
</content>
</entry>
<entry>
<title>Fix Denial of Service vulnerability in named(8). [13:07]</title>
<updated>2013-07-26T22:40:17Z</updated>
<author>
<name>Xin LI</name>
<email>delphij@FreeBSD.org</email>
</author>
<published>2013-07-26T22:40:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4202b2ded466900040bbc9646f900b485218bc05'/>
<id>urn:sha1:4202b2ded466900040bbc9646f900b485218bc05</id>
<content type='text'>
Security:	CVE-2013-4854
Security:	FreeBSD-SA-13:07.bind
Approved by:	so
</content>
</entry>
<entry>
<title>Update to 9.8.4-P1.</title>
<updated>2012-12-07T12:39:58Z</updated>
<author>
<name>Erwin Lansing</name>
<email>erwin@FreeBSD.org</email>
</author>
<published>2012-12-07T12:39:58Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=cfd4d2c42e1c88d28ef6b9bca1ffbab32de3e7ff'/>
<id>urn:sha1:cfd4d2c42e1c88d28ef6b9bca1ffbab32de3e7ff</id>
<content type='text'>
Security Fixes

   Prevents named from aborting with a require assertion failure
   on servers with DNS64 enabled.  These crashes might occur as a
   result of  specific queries that are received.

New Features

*  Elliptic Curve Digital Signature Algorithm keys and signatures in
   DNSSEC are now supported per RFC 6605. [RT #21918]

Feature Changes

*  Improves OpenSSL error logging [RT #29932]

*  nslookup now returns a nonzero exit code when it is unable to get
   an answer.  [RT #29492]

Other critical bug fixes are included.

Approved by:	delphij (mentor)
MFC after:	3 days
Security:	CVE-2012-5688
Sponsored by:	DK Hostmaster A/S
</content>
</entry>
<entry>
<title>Upgrade to 9.8.3-P3:</title>
<updated>2012-09-20T04:12:09Z</updated>
<author>
<name>Doug Barton</name>
<email>dougb@FreeBSD.org</email>
</author>
<published>2012-09-20T04:12:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8888cf1ddc96d2c9d9fae50cd84da8e325999de0'/>
<id>urn:sha1:8888cf1ddc96d2c9d9fae50cd84da8e325999de0</id>
<content type='text'>
Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.

For more information: https://kb.isc.org/article/AA-00788
</content>
</entry>
<entry>
<title>Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure</title>
<updated>2012-07-24T18:53:28Z</updated>
<author>
<name>Doug Barton</name>
<email>dougb@FreeBSD.org</email>
</author>
<published>2012-07-24T18:53:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=dae131adadf2228ac2d399aff98da427886d845b'/>
<id>urn:sha1:dae131adadf2228ac2d399aff98da427886d845b</id>
<content type='text'>
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
</content>
</entry>
<entry>
<title>Upgrade to 9.8.3-P1, the latest from ISC. This version contains</title>
<updated>2012-06-04T22:11:20Z</updated>
<author>
<name>Doug Barton</name>
<email>dougb@FreeBSD.org</email>
</author>
<published>2012-06-04T22:11:20Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=fe5cfeb46bdfc05b7e0a7e78d5de976f6a4e2df4'/>
<id>urn:sha1:fe5cfeb46bdfc05b7e0a7e78d5de976f6a4e2df4</id>
<content type='text'>
a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
</content>
</entry>
<entry>
<title>Upgrade to BIND version 9.8.3, the latest from ISC.</title>
<updated>2012-05-28T19:47:56Z</updated>
<author>
<name>Doug Barton</name>
<email>dougb@FreeBSD.org</email>
</author>
<published>2012-05-28T19:47:56Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=687aeb3821cb3144a06fb18268c456be2af6e4a7'/>
<id>urn:sha1:687aeb3821cb3144a06fb18268c456be2af6e4a7</id>
<content type='text'>
Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Other critical bug fixes are included.

All BIND users are encouraged to upgrade.
</content>
</entry>
<entry>
<title>Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.</title>
<updated>2012-04-05T04:29:35Z</updated>
<author>
<name>Doug Barton</name>
<email>dougb@FreeBSD.org</email>
</author>
<published>2012-04-05T04:29:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d0f6280db790de2ad69bd01a1275e350cbd2840d'/>
<id>urn:sha1:d0f6280db790de2ad69bd01a1275e350cbd2840d</id>
<content type='text'>
</content>
</entry>
</feed>
