2011-05-06 13:36:24 by OBATA Akio | Files touched by this commit (3) | |
Log message:
Update maradns to 1.4.06.
maradns-1.4.06:
This is the stable branch of MaraDNS.
* Fix for CVE-2011-0520
* Deadwood updated to 3.0.02
(2011.01.28)
maradns-1.4.05:
This is a stable branch of MaraDNS.
* Deadwood updated to the stable 3.0.01 release.
* MicroDNS now returns "not implemented" when given an EDNS packet
* FAQ updated.
(2010.09.25)
maradns-1.4.04:
This is the stable branch of MaraDNS.
* Bugfix: NAPTR records now work when ~ is used to separate
records
* NAPTR records now documented
* Bugfix: ANY queries now correctly work with NS referrals
* Example IPv6 addresses now use RFC-4193 compliant IPs
* Website updated to point out that Deadwood is now feature
complete and ready for beta-testing
* Some updates to the SQA regressions
* Deadwood updated to Deadwood 2.9.02
* Windows-only mkSecretTxt program added (*NIX users can
just type in "dd if=/dev/urandom of=secret.txt bs=64
count=1"; this gives Windows the same ability).
(2010.07.31)
|
2010-06-25 23:40:32 by Joerg Sonnenberger | Files touched by this commit (2) |
Log message:
Fix PLIST. Bump revision.
|
2010-05-23 19:30:31 by Georg Schwarz | Files touched by this commit (9) | |
Log message:
updated to 1.4.03
patched to support Darwin
|
2009-06-14 23:00:05 by Joerg Sonnenberger | Files touched by this commit (29) |
Log message:
Convert @exec/@unexec to @pkgdir or drop it.
|
2009-06-14 20:09:49 by Joerg Sonnenberger | Files touched by this commit (291) |
Log message:
Remove @dirrm entries from PLISTs
|
2008-03-19 23:55:21 by Tonnerre Lombard | Files touched by this commit (3) |
Log message:
Fix a Denial-of-Service vulnerability in maradns version 1.2.12.06
Crafted CNAME entries can be used to DoS MaraDNS without this patch
See CVE-2008-0061 for more details
Approved-by: wiz
|
2007-08-23 11:53:13 by Joerg Sonnenberger | Files touched by this commit (3) | |
Log message:
Remove patches that were scheduled for removal with the last maradns
update.
|
2007-08-12 03:14:31 by Joerg Sonnenberger | Files touched by this commit (11) |
Log message:
Update to maradns-1.2.12.06.
Most important changes:
- full Y2038 compliance
- full support for DNS over TCP
- some changes in the zone format.
|
2007-03-24 20:21:34 by Joerg Sonnenberger | Files touched by this commit (124) |
Log message:
Prepare for switching to NO_MTREE=yes.
|
2006-12-13 05:35:16 by OBATA Akio | Files touched by this commit (4) | |
Log message:
Update maradns to 1.0.39.
changelog:
maradns-1.0.39:
* Backport of memory leak fix to 1.0 branch of MaraDNS
(2006.07.24)
maradns-1.0.38:
Backport of MaraDNS 1.2.09 Microsoft.com fix to legacy 1.0 branch
(2006.06.16)
maradns-1.0.37:
This is an update for the 1.0 legacy branch of MaraDNS
* Removed all example mararc files which allow any IP on the
internet to perform recursive queries (these can be used for
denial of service attacks)
(2006.04.07)
maradns-1.0.36:
This is a bugfix release for the legacy 1.0 branch of MaraDNS.
* A backport of the 2-line patch recently posted to the mailing
list concerning incorrect dangling CNAME warnings
(2005.12.31)
maradns-1.0.35:
* Backport of 1.1.x fix of csv1 example in documentation
* Backport of 1.1.x fix of MINFO RR description
* Backport of 1.1.x security fix.
(2005.11.20)
maradns-1.0.34:
* Hotfix: recursion works again
* Regression procedure added.
(2005.10.26)
maradns-1.0.33:
* Fixed occassional crash that happens while reading zone files at
MaraDNS startup.
* Fixed occassional compression error which shows up in MaraDNS
logs.
* Update man page to point out some unimplemented features will be
in 1.2
(2005.10.24)
maradns-1.0.32:
Hotfix: RR rotation now works again.
(2005.08.08)
maradns-1.0.31:
Two patches by Albert Lee that improve Maras stability.
(2005.08.07)
maradns-1.0.30:
* Warn the user when they have dangling CNAME records
* Fix bug with MX records with preferences > 255 in getzone tool
(2005.06.30)
maradns-1.0.29:
This release improves how MaraDNS'recursive resolver parses
packets so that Mara can interoperate better with some stub
resolvers that dont bother looking past the header of a DNS
packet.
(2005.05.13)
|