NOTICE: This package has been removed from pkgsrc
/bind95, Version 9 of the Berkeley Internet Name Daemon, implementation of DNS
9.5.2pl4, Package name:
bind-9.5.2pl4, Maintainer: pkgsrc-users
BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:
- DNS Security
DNSSEC (signed zones)
TSIG (signed DNS requests)
- IP version 6
Answers DNS queries on IPv6 sockets
IPv6 resource records (A6, DNAME, etc.)
Experimental IPv6 Resolver Library
- DNS Protocol Enhancements
IXFR, DDNS, Notify, EDNS0
Improved standards conformance
One server process can provide multiple "views" of the
DNS namespace to different clients.
- Multiprocessor Support
- Improved Portability Architecture
Required to build:
Master sites: (Expand) SHA1:
Version history: (Expand)
- (2011-02-10) Package deleted from pkgsrc
- (2010-05-26) Updated to version: bind-9.5.2pl4
- (2010-04-23) Updated to version: bind-9.5.2pl2nb1
- (2010-01-22) Updated to version: bind-9.5.2pl2
- (2010-01-17) Updated to version: bind-9.5.2pl1nb2
- (2009-12-11) Updated to version: bind-9.5.2pl1nb1
CVS history: (Expand)
| 2011-02-09 17:19:17 by Takahiro Kambe | Files touched by this commit (21) | |
Delete bind95 pacakge, it has been eol May, 2010.
| 2010-05-26 17:56:39 by Takahiro Kambe | Files touched by this commit (9) | |
Update net/bind95 package to 9.5.2pl4(9.5.2-P4).
--- 9.5.2-P4 released ---
2876. [bug] Named could return SERVFAIL for negative responses
from unsigned zones. [RT #21131]
--- 9.5.2-P3 released ---
2852. [bug] Handle broken DNSSEC trust chains better. [RT #15619]
| 2010-04-22 22:21:09 by Guillaume Lasmayous | Files touched by this commit (1) | |
Disable kqueue on Dragonfly to make bind95 work.
As reported by Justin Sherrill in PR pkg/43195.
| 2010-01-21 20:42:16 by S.P.Zeidler | Files touched by this commit (2) | |
BIND 9.5.2-P2 is a SECURITY PATCH for BIND 9.5.2. It addresses two
potential cache poisoning vulnerabilities, both of which could allow
a validating recursive nameserver to cache data which had not been
authenticated or was invalid.
CVE identifiers: CVE-2009-4022, CVE-2010-0097
CERT advisories: VU#418861, VU#360341
Changes since 9.5.2-P1:
2831. [security] Do not attempt to validate or cache
out-of-bailiwick data returned with a secure
answer; it must be re-fetched from its original
source and validated in that context. [RT #20819]
2828. [security] Cached CNAME or DNAME RR could be returned to clients
without DNSSEC validation. [RT #20737]
2827. [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712]
| 2010-01-17 13:02:58 by Thomas Klausner | Files touched by this commit (724) | |
Recursive PKGREVISION bump for jpeg update to 8.
| 2009-12-11 17:22:08 by Takahiro Kambe | Files touched by this commit (2) | |
Modify named9.sh to create /dev/random in chrooted environment
as base system's /etc/rc.d/named.
| 2009-11-30 12:58:30 by Matthias Scheler | Files touched by this commit (6) | |
Update "bind95" package to version 9.5.2pl1. Changes since 9.5.1pl3:
- Security fix for CVE-2009-4022 (incorrect DNSSEC validation)
- Bug fixes
| 2009-11-26 00:25:44 by Joerg Sonnenberger | Files touched by this commit (4) |
Not MAKE_JOBS_SAFE. Prepare for libtool-2.2.