NOTICE: This package has been removed from pkgsrc

./net/bind9, Version 9 of the Berkeley Internet Name Daemon, implementation of DNS

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ]


Branch: CURRENT, Version: 9.4.3pl5, Package name: bind-9.4.3pl5, Maintainer: pkgsrc-users

BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:

- DNS Security
DNSSEC (signed zones)
TSIG (signed DNS requests)

- IP version 6
Answers DNS queries on IPv6 sockets
IPv6 resource records (A6, DNAME, etc.)
Bitstring Labels
Experimental IPv6 Resolver Library

- DNS Protocol Enhancements
IXFR, DDNS, Notify, EDNS0
Improved standards conformance

- Views
One server process can provide multiple "views" of the
DNS namespace to different clients.

- Multiprocessor Support
- Improved Portability Architecture


Required to build:
[devel/libtool-base]

Master sites: (Expand)

SHA1: 9b7f0bd84be0f91fe1085cedc91c7c14f1e0f97a
RMD160: 680146e4120aaa89f2899d4205c17fee5e9e4aa9
Filesize: 6296.384 KB

Version history: (Expand)


CVS history: (Expand)


   2010-02-10 18:30:26 by Joerg Sonnenberger | Files touched by this commit (20) | Package removed
Log message:
Retire bind9.
   2010-02-01 13:56:28 by Joerg Sonnenberger | Files touched by this commit (1)
Log message:
Fix version number. Just assume that -P always should be translated to
pl.
   2010-01-21 20:54:33 by S.P.Zeidler | Files touched by this commit (2) | Package updated
Log message:
security update:
BIND 9.4.3-P4 is a SECURITY PATCH for BIND 9.4.3.  It addresses a
potential cache poisoning vulnerability, in which data in the additional
section of a response could be cached without proper DNSSEC validation.

Changes since 9.4.3-P3:

2772.	[security]	When validating, track whether pending data was from
			the additional section or not and only return it if
			validates as secure. [RT #20438]

BIND 9.4.3-P5 is a SECURITY PATCH for BIND 9.4.3.  It addresses two
potential cache poisoning vulnerabilities, both of which could allow
a validating recursive nameserver to cache data which had not been
authenticated or was invalid.

CVE identifiers: CVE-2009-4022, CVE-2010-0097
CERT advisories: VU#418861, VU#360341

Changes since 9.4.3-P4:

2831.	[security]	Do not attempt to validate or cache
			out-of-bailiwick data returned with a secure
			answer; it must be re-fetched from its original
			source and validated in that context. [RT #20819]

2828.	[security]	Cached CNAME or DNAME RR could be returned to clients
			without DNSSEC validation. [RT #20737]

2827.	[security]	Bogus NXDOMAIN could be cached as if valid. [RT #20712]
   2010-01-17 13:02:58 by Thomas Klausner | Files touched by this commit (724) | Package updated
Log message:
Recursive PKGREVISION bump for jpeg update to 8.
   2009-12-11 17:21:21 by Takahiro Kambe | Files touched by this commit (2)
Log message:
Modify named9.sh to create /dev/random in chrooted environment
as base system's /etc/rc.d/named.

Bump PKGREVISION.
   2009-11-25 23:29:35 by Joerg Sonnenberger | Files touched by this commit (3)
Log message:
Prepare for libtool-2.2: use --tag=CC when calling gcc instead  of cc.
   2009-07-28 22:39:45 by Jeremy C. Reed | Files touched by this commit (2)
Log message:
Updated to 9.4.3-P3 for security issue:
https://www.isc.org/node/474
   2009-07-24 14:30:00 by OBATA Akio | Files touched by this commit (3)
Log message:
Update HOMEPAGE url.