Path to this page:
./
net/bind916,
Berkeley Internet Name Daemon implementation of DNS, version 9.16
Branch: CURRENT,
Version: 9.16.45,
Package name: bind-9.16.45,
Maintainer: pkgsrc-usersBIND, the Berkeley Internet Name Daemon.
This package contains the BIND 9.16 release. Upstream labels it as
receiving security fixes only.
MESSAGE.rcd [+/-]===========================================================================
$NetBSD: MESSAGE.rcd,v 1.1 2020/08/09 15:20:21 taca Exp $
Please consider running BIND under the pseudo user account "${BIND_USER}"
in a chroot environment for security reasons.
To achieve this, set the variable "named_chrootdir" in /etc/rc.conf to
the directory with the chroot environment e.g. "${BIND_DIR}".
Note: named(8) requires writable directories under "/etc/namedb" which
specified by "directory" in "options" statement:
cache
keys
nta
Make sure to these directories exists with writable by "${BIND_USER}" user.
===========================================================================
Package options: blacklist, readline, threads
Master sites:
Filesize: 5006.914 KB
Version history: (Expand)
- (2023-11-19) Updated to version: bind-9.16.45
- (2023-11-15) Updated to version: bind-9.16.44nb4
- (2023-11-08) Updated to version: bind-9.16.44nb3
- (2023-11-02) Updated to version: bind-9.16.44nb2
- (2023-10-25) Updated to version: bind-9.16.44nb1
- (2023-09-20) Updated to version: bind-9.16.44
CVS history: (Expand)
2023-11-18 05:05:50 by Takahiro Kambe | Files touched by this commit (2) |
Log message:
net/bind916: updte to 9.16.45
Note: B.ROOT-SERVERS.NET's addresses will be changed November 27, 2023.
9.16.45 (2023-11-15)
6269. [maint] B.ROOT-SERVERS.NET addresses are now 170.247.170.2 and
2801:1b8:10::b. [GL #4101]
6254. [cleanup] Add semantic patch to do an explicit cast from char
to unsigned char in ctype.h class of functions.
[GL #4327]
6250. [bug] The wrong covered value was being set by
dns_ncache_current for RRSIG records in the returned
rdataset structure. This resulted in TYPE0 being
reported as the covered value of the RRSIG when dumping
the cache contents. [GL #4314]
|
2023-11-15 19:14:46 by Thomas Klausner | Files touched by this commit (55) |
Log message:
*: bump for protobuf 25
|
2023-11-08 14:21:43 by Thomas Klausner | Files touched by this commit (2377) |
Log message:
*: recursive bump for icu 74.1
|
2023-11-02 13:20:06 by Thomas Klausner | Files touched by this commit (54) |
Log message:
*: recursive bump for protobuf
|
2023-10-25 00:11:51 by Thomas Klausner | Files touched by this commit (2298) |
Log message:
*: bump for openssl 3
|
2023-09-20 15:35:24 by Takahiro Kambe | Files touched by this commit (2) |  |
Log message:
net/bind916: update to 9.16.44
9.16.44 (2023-09-20)
6245. [security] Limit the amount of recursion that can be performed
by isccc_cc_fromwire. (CVE-2023-3341) [GL #4152]
6235. [doc] Clarify BIND 9 time formats. [GL #4266]
6230. [bug] Prevent an unnecessary query restart if a synthesized
CNAME target points to the CNAME owner. [GL #3835]
|
2023-09-19 15:28:52 by Greg Troxel | Files touched by this commit (2) |
Log message:
net/bind*: Fix DESCR
Drop NEWS-type content from bind916.
all: Add final paragraph describing which version this is, and
upstream support status.
|
2023-08-29 16:46:00 by Takahiro Kambe | Files touched by this commit (2) |  |
Log message:
net/bind916: update to 9.16.43
--- 9.16.43 released ---
6212. [bug] Don't process detach and close netmgr events when
the netmgr has been paused. [GL #4200]
|