./net/isc-dhcp4, ISC Dynamic Host Configuration Protocol (DHCP) Base

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 4.4.3p1nb2, Package name: isc-dhcp-4.4.3p1nb2, Maintainer: pkgsrc-users

ISC's Dynamic Host Configuration Protocol Distribution provides a
freely redistributable reference implementation of all aspects of
DHCP, through a suite of DHCP tools:

* A DHCP server
* A DHCP client
* A DHCP relay agent

These tools all use a modular API which is designed to be sufficiently
general that it can easily be made to work on POSIX-compliant
operating systems and also non-POSIX systems like Windows NT and
MacOS.

The DHCP server, client and relay agent are provided both as
reference implementations of the protocol and as working, fully-featured
sample implementations. Both the client and the server provide
functionality that, while not strictly required by the protocol,
is very useful in practice. The DHCP server also makes allowances
for non-compliant clients which one might still like to support.

This package contains the Base component.


Required to run:
[security/openssl]

Required to build:
[pkgtools/cwrappers]

Package options: inet6

Master sites:

Filesize: 9844.78 KB

Version history: (Expand)


CVS history: (Expand)


   2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298)
Log message:
*: bump for openssl 3
   2023-08-14 07:25:36 by Thomas Klausner | Files touched by this commit (1247)
Log message:
*: recursive bump for Python 3.11 as new default
   2022-10-05 18:16:54 by Takahiro Kambe | Files touched by this commit (2) | Package updated
Log message:
net/isc-dhcp4: update to 4.4.3p1

4.4.3p1 (ISC DHCP 4.4.3-P1), 2022-10-05

		Changes since 4.4.3 (Bug Fixes)

! Corrected a reference count leak that occurs when the server builds
  responses to leasequery packets. Thanks to VictorV of Cyber Kunlun
  Lab for reporting the issue.
  [Gitlab #253]
  CVE: CVE-2022-2928

! Corrected a memory leak that occurs when unpacking a packet that has an
  FQDN option (81) that contains a label with length greater than 63 bytes.
  Thanks to VictorV of Cyber Kunlun Lab for reporting the issue.
  [Gitlab #254]
  CVE: CVE-2022-2929
   2022-08-06 19:22:08 by Havard Eidnes | Files touched by this commit (2)
Log message:
net/isc-dhcp4: convert to using mk/atomic64.mk.
   2022-07-24 21:52:41 by Havard Eidnes | Files touched by this commit (1)
Log message:
net/isc-dhcp4: add hacks.mk to use libatomic on powerpc.

Fixes build problem on NetBSD/macppc when the internal libdns is built.
   2022-03-31 11:50:54 by Jonathan Perkin | Files touched by this commit (1)
Log message:
isc-dhcp*: SunOS needs libnsl.
   2022-03-13 16:24:38 by Takahiro Kambe | Files touched by this commit (4) | Package updated
Log message:
net/isc-dhcp4: update to 4.4.3

                Internet Systems Consortium DHCP Distribution
                            Version 4.4.3
                            9 March 2022
                            Release Notes

                            NEW FEATURES

Please note that that ISC DHCP is licensed under the Mozilla Public
License, MPL 2.0. Please see https://www.mozilla.org/en-US/MPL/2.0/ to read
the MPL 2.0 license terms.

NOTE: The client and relay components are now End-Of-Life.
4.4.3 is the final release for those components.

For information on how to install, configure, and run this software, as
well as how to find documentation and report bugs, please consult the
README file.

ISC DHCP uses the standard GNU configure command for installation. Please review the
output of `./configure --help` to see what options are available.

The system has only been tested on Linux and FreeBSD, and may not work on
other platforms. Please subscribe to the dhcp-users mailing list at
https://lists.isc.org/mailman/listinfo/dhcp-users and report any problems
and/or suggested fixes to dhcp-users@lists.isc.org.

ISC DHCP is open source software maintained by Internet Systems
Consortium.  This product includes cryptographic software written
by Eric Young (eay@cryptsoft.com).

		Changes since 4.4.2-P1 (New Features)

- Two new OMAPI function calls were added, `dhcpctl_timed_connect()`
  and `dhcpctl_timed_wait_for_completion()`. These provide timed
  versions of creating a connection and waiting for an operation
  to complete.
  [GitLab #76]

- The BIND libraries have been updated to the latest version, 9.11.36. This \ 
fixes a number
  of compilation issues on various systems, including OpenWRT. Thanks to
  Philip Prindeville for testing on OpenWRT.
  [GitLab #218, #171, #180, #192]

- Support was added for the new DHCPv4 option v6-only-preferred, specified
  in RFC 8925. A new reason code, V6ONLY, was added to the client script
  and the client Linux script sample was updated.
  [GitLab #132]

		Changes since 4.4.2-P1 (Bug Fixes)

- Minor corrections were made to allow compilation under gcc 10.
  [GitLab #117]

- The logic in dhclient that causes it to decline DHCPv4 leases if the
  client script exits abnormally (i.e. crashes) has been corrected.
  [GitLab #123]

- The limit on the size of a lease file that can be loaded at startup
  is now only enforced on 32-bit systems.
  [GitLab #92]

- The PRNG initialization has been improved. It now uses the configure flag
  `--with-randomdev=PATH`, which specifies the device from which to read the
  initial seed. That is typically `/dev/random` (the default value) or
  `/dev/urandom`, but may be specified otherwise on the local system. The old
  behavior can be forced by disabling this feature (`--with-randomdev=no`).
  If the initialization is disabled or reading from the random device fails,
  the previous algorithm (retrieve the last four bytes of hardware addresses
  from all network interfaces that have them, and use the current time and
  process ID) is used.
  [GitLab #197]

- A minor dhclient code fix was made to remove compilation warnings.
  [GitLab #190]

- The hard-coded MD5 algorithm name was removed in OMAPI connection logic.
  Previously, using any other algorithm via a key-algorithm statement would
  allow OMAPI connections to be made, but subsequent actions such as updating
  an object would fail.
  [GitLab #148]

- The parallel build has been improved. Thanks to Sergei Trofimovich for
  the patch. The parallel build is still experimental, as officially the
  BIND 9 code does not support the parallel build for libraries.
  [GitLab #91]

- Handling of LDAP options (`ldap-gssapi-principal` and `ldap-gssapi-keytab`)
  has been improved. This is contributed code that has not been tested by ISC. Thank
  you to Petr Mensik and Pavel Zhukov for the patches!
  [GitLab !56,!75]

- It is now possible to use `option -g ipaddr` in the dhcrelay to replace the \ 
giaddr sent to
  clients with the given ipaddr, to work around bogus clients like Solaris 11
  grub which use giaddr instead of the announced router (3) to set up their
  default route. Thanks to Jens Elkner for the patch!
  [GitLab #223, !86, !92]
   2021-10-26 13:07:15 by Nia Alarie | Files touched by this commit (958)
Log message:
net: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Not committed (merge conflicts...):

net/radsecproxy/distinfo

The following distfiles could not be fetched (fetched conditionally?):

./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz
./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch
./net/djbdns/distinfo djbdns-1.05-test28.diff.xz
./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch
./net/djbdns/distinfo djbdns-1.05-multiip.diff
./net/djbdns/distinfo djbdns-cachestats.patch