Path to this page:
./
net/bind911,
Berkeley Internet Name Daemon implementation of DNS, version 9.11
Branch: pkgsrc-2020Q2,
Version: 9.11.22,
Package name: bind-9.11.22,
Maintainer: pkgsrc-usersBIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture. Some
of the important features of BIND-9 are:
- DNS Security
- IP version 6
- DNS Protocol Enhancements
- Views
- Multiprocessor Support
- Improved Portability Architecture
- Full NSEC3 support
- Automatic zone re-signing
- New update-policy methods tcp-self and 6to4-self
This package contains the BIND 9.11 release.
- Catalog Zones, a new method for provisioning servers
- "dnstap", a fast and flexible method of capturing and logging
DNS traffic.
- "dyndb", a new API for loading zone data from an external database
- dnssec-keymgr, a new key mainenance utility
- mdig, an alternate version of dig utility
- And more...
MESSAGE.rcd [+/-]===========================================================================
$NetBSD: MESSAGE.rcd,v 1.1 2019/06/20 12:26:33 jperkin Exp $
Please consider running BIND under the pseudo user account "${BIND_USER}"
in a chroot environment for security reasons.
To achieve this, set the variable "named_chrootdir" in /etc/rc.conf to
the directory with the chroot environment e.g. "${BIND_DIR}".
Note: named(8) requires writable directories under "/etc/namedb" which
specified by "directory" in "options" statement:
cache
keys
nta
Make sure to these directories exists with writable by "${BIND_USER}" user.
===========================================================================
Required to run:[
security/openssl]
Package options: inet6, readline, threads
Master sites:
SHA1: 10104100e265bc9e4b8975b3dc6266cd2d40b597
RMD160: 142024c9808b981544048676ce57cfbf47170f48
Filesize: 8054.767 KB
Version history: (Expand)
- (2020-08-28) Updated to version: bind-9.11.22
- (2020-07-01) Package added to pkgsrc.se, version bind-9.11.20 (created)
CVS history: (Expand)
2020-08-28 17:57:47 by Benny Siegert | Files touched by this commit (2) | |
Log message:
Pullup ticket #6311 - requested by taca
net/bind911: security fix
Revisions pulled up:
- net/bind911/Makefile 1.29
- net/bind911/distinfo 1.21
---
Module Name: pkgsrc
Committed By: taca
Date: Fri Aug 21 16:09:44 UTC 2020
Modified Files:
pkgsrc/net/bind911: Makefile distinfo
Log message:
net/bind911: update to 9.11.22
Update bind911 to 9.11.22 (BIND 9.11.22).
--- 9.11.22 released ---
5481. [security] "update-policy" rules of type \
"subdomain" were
incorrectly treated as "zonesub" rules, which allowed
keys used in "subdomain" rules to update names outside
of the specified subdomains. The problem was fixed by
making sure "subdomain" rules are again processed as
described in the ARM. (CVE-2020-8624) [GL #2055]
5480. [security] When BIND 9 was compiled with native PKCS#11 support, it
was possible to trigger an assertion failure in code
determining the number of bits in the PKCS#11 RSA public
key with a specially crafted packet. (CVE-2020-8623)
[GL #2037]
5476. [security] It was possible to trigger an assertion failure when
verifying the response to a TSIG-signed request.
(CVE-2020-8622) [GL #2028]
5475. [bug] Wildcard RPZ passthru rules could incorrectly be
overridden by other rules that were loaded from RPZ
zones which appeared later in the "response-policy"
statement. This has been fixed. [GL #1619]
5474. [bug] dns_rdata_hip_next() failed to return ISC_R_NOMORE
when it should have. [GL !3880]
5465. [func] Added fallback to built-in trust-anchors, managed-keys,
or trusted-keys if the bindkeys-file (bind.keys) cannot
be parsed. [GL #1235]
5463. [bug] Address a potential NULL pointer dereference when out of
memory in dnstap.c. [GL #2010]
5462. [bug] Move LMDB locking from LMDB itself to named. [GL #1976]
|