SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG
DONATE


YUM REPOSITORY

 
 
Changelog for libbind9-160-9.11.2-304.1.x86_64.rpm :
Mon Dec 10 13:00:00 2018 Franck Bui
- Don\'t rely on /etc/insserv.conf anymore for proper dependencies
against nss-lookup.target in named.service and lwresd.service
(bsc#1118367 bsc#1118368)

Tue Sep 25 14:00:00 2018 Christophe Giboudeaux
- Update named.root. One of the root servers IP has changed.
- Install the LICENSE file.

Fri Jul 6 14:00:00 2018 kukukAATTsuse.de
- Add bind.conf and bind-chrootenv.conf to install the default
files in /var/lib/named and create chroot environment on systems
using transactional-updates [bsc#1100369] [FATE#325524].

Fri Jun 22 14:00:00 2018 kukukAATTsuse.de
- Cleanup pre/post install: remove all old code which was needed to
update to SLES8.

Wed Jun 6 14:00:00 2018 navin.kukrejaAATTsuse.com
- Fix a patch error in dnszone-schema file (bsc#901577)

Tue Jun 5 14:00:00 2018 navin.kukrejaAATTsuse.com
- Add SPF records in dnszone-schema file (bsc#901577)

Tue Jun 5 14:00:00 2018 navin.kukrejaAATTsuse.com
- Fix the hostname in ldapdump to be valid (bsc#965748)
- Patch file - bind-ldapdump-use-valid-host.patch

Mon May 21 14:00:00 2018 scabreroAATTsuse.de
- Add bug-4697-Restore-workaround-for-Microsoft-Windows-T.patch
Fixes dynamic DNS updates against samba and Microsoft DNS servers
(bsc#1094236).

Thu May 17 14:00:00 2018 navin.kukrejaAATTsuse.com
- Move chroot related files from bind to bind-chrootenv
(bsc#1093338)

Wed May 16 14:00:00 2018 navin.kukrejaAATTsuse.com
- Remove rndc.key generation from bind.spec file because bind
should create it on first boot (bsc#1092283)
- Add misisng rndc.key check and generation code is lwresd.init
script

Mon Feb 26 13:00:00 2018 sweet_f_aAATTgmx.de
- build with --enable-filter-aaaa to make it possible to use
config option \"filter-aaaa-on-v4 yes\". Useful to workaround
broken websites like netflix which block traffic from certain
IPv6 tunnel providers. (bsc#1069633)

Fri Feb 16 13:00:00 2018 bwiedemannAATTsuse.com
- Add /dev/urandom to chroot env

Wed Feb 7 13:00:00 2018 navin.kukrejaAATTsuse.com
- Implement systemd init scripts for bind and lwresd (fate#323155)

Tue Jan 23 13:00:00 2018 navin.kukrejaAATTsuse.com
- Apply bind-CVE-2017-3145.patch to fix CVE-2017-3145 (bsc#1076118)

Wed Dec 6 13:00:00 2017 vcizekAATTsuse.com
- Use getent when adding user/group
- update changelog to mention removed options

Sat Nov 25 13:00:00 2017 meissnerAATTsuse.com
- license changed to MPL-2.0 according to legal.

Thu Nov 23 13:00:00 2017 rbrownAATTsuse.com
- Replace references to /var/adm/fillup-templates with new
%_fillupdir macro (boo#1069468)

Wed Nov 22 13:00:00 2017 vcizekAATTsuse.com
- Add back init scripts, systemd units aren\'t ready yet

Tue Nov 21 13:00:00 2017 tchvatalAATTsuse.com
- Add python3-bind subpackage to allow python bind interactions

Tue Nov 21 13:00:00 2017 tchvatalAATTsuse.com
- Sync configure options with RH package and remove unused ones

* Enable python3

* Enable gssapi

* Enable dnssec scripts

* Remove no longer recognized --enable-rrl

Tue Nov 21 13:00:00 2017 tchvatalAATTsuse.com
- Drop idnkit from the build, the bind uses libidn since 2007 to run
all the resolutions in dig/etc. bsc#1030306
- Add patch to make sure we build against system idn:

* bind-99-libidn.patch
- Refresh patch:

* pie_compile.diff
- Remove patches that are unused due to above:

* idnkit-powerpc-ltconfig.patch

* runidn.diff

Tue Nov 21 13:00:00 2017 vcizekAATTsuse.com
- drop bind-openssl11.patch (merged upstream)

Fri Nov 17 13:00:00 2017 tchvatalAATTsuse.com
- Remove systemd conditionals as we are not building on sle11 anyway
- Force the systemd to be base for the initscript deployment

Wed Nov 15 13:00:00 2017 vcizekAATTsuse.com
- Bump up version of most of the libraries
- Rename the subpackages to match the version updates
- Add macros for easier handling of the library package names
- Drop more unneeded patches

* dns_dynamic_db.patch (upstream)

Tue Nov 14 13:00:00 2017 tchvatalAATTsuse.com
- Update to 9.11.2 release:

* Many changes compared to 9.10 see the README file for in-depth listing

* For detailed changes with issues see CHANGES file

* Fixes for CVE-2017-3141 CVE-2017-3140 CVE-2017-3138 CVE-2017-3137
CVE-3136 CVE-2016-9778

* OpenSSL 1.1 support
- Remove support for some old distributions and cleanup the spec file
to require only what is really needed
- Switch to systemd (bsc#1053808)
- Remove german from the postinst messages
- Remove patches merged upstream:

* bind-CVE-2017-3135.patch

* bind-CVE-2017-3142-and-3143.patch
- Refresh named.root with another update

Mon Nov 13 13:00:00 2017 mpluskalAATTsuse.com
- Use python3 by default (fate#323526)

Mon Sep 11 14:00:00 2017 meissnerAATTsuse.com
- bind-openssl11.patch: add a patch for enabling
openssl 1.1 support (builds for 1.0 and 1.1 openssl).
(bsc#1042635)

Tue Aug 1 14:00:00 2017 jcnengelAATTgmail.com
- Enable JSON statistics

Fri Jul 14 14:00:00 2017 meissnerAATTsuse.com
- named.root: refreshed from internic to 2017060102 (bsc#1048729)

Mon Jul 3 14:00:00 2017 dimstarAATTopensuse.org
- Run systemctl daemon-reload even when this is not build with
systemd support: if installing bind on a systemd service and not
reloading systemd daemon, then the service \'named\' is not known
right after package installation, causing confusion.

Fri Jun 30 14:00:00 2017 sfleesAATTsuse.de
- Added bind-CVE-2017-3142-and-3143.patch to fix a security issue
where an attacker with the ability to send and receive messages
to an authoritative DNS server was able to circumvent TSIG
authentication of AXFR requests. A server that relies solely on
TSIG keys for protection with no other ACL protection could be
manipulated into (1) providing an AXFR of a zone to an
unauthorized recipient and (2) accepting bogus Notify packets.
[bsc#1046554, CVE-2017-3142, bsc#1046555, CVE-2017-3143]

Sat May 20 14:00:00 2017 dimstarAATTopensuse.org
- Fix named init script to dynamically find the location of the
openssl engines (boo#1040027).

Mon Mar 20 13:00:00 2017 kukukAATTsuse.de
- Add with_systemd define with default off, since we still use init
scripts and no systemd units.

Sat Feb 18 13:00:00 2017 kukukAATTsuse.com
- Don\'t require and call insserv if we use systemd

Wed Feb 15 13:00:00 2017 navin.kukrejaAATTsuse.com
- Fix assertion failure or a NULL pointer read for configurations using both DNS64 and RPZ

* CVE-2017-3135, bsc#1024130

* bind-CVE-2017-3135.patch

Thu Jan 12 13:00:00 2017 sfleesAATTsuse.de
- Update to latest release in the 9.10.X series

* Security fixes in 9.10.4

* Duplicate EDNS COOKIE options in a response could trigger an assertion failure.
CVE-2016-2088. [RT #41809]

* The resolver could abort with an assertion failure due to improper DNAME handling
when parsing fetch reply messages. CVE-2016-1286. [RT #41753]

* Malformed control messages can trigger assertions in named and rndc.
CVE-2016-1285. [RT #41666]

* Certain errors that could be encountered when printing out or logging an OPT record containing
a CLIENT-SUBNET option could be mishandled, resulting in an assertion failure. CVE-2015-8705. [RT #41397]

* Specific APL data could trigger an INSIST. CVE-2015-8704. [RT #41396]

* Incorrect reference counting could result in an INSIST failure if a socket error occurred while performing
a lookup. CVE-2015-8461. [RT#40945]

* Insufficient testing when parsing a message allowed records with an incorrect class to be be accepted,
triggering a REQUIRE failure when those records were subsequently cached. CVE-2015-8000. [RT #40987]

* For Features and other fixes in 9.10.4 see https://kb.isc.org/article/AA-01380/0/BIND-9.10.4-Release-Notes.html

* Description of patch changes

* BIND 9.10.4-P5 addresses the security issues described in CVE-2016-9131, CVE-2016-9147 and CVE-2016-9444. [bsc#1018699]

* BIND 9.10.4-P4 addresses the security issue described in CVE-2016-8864.

* BIND 9.10.4-P3 addresses the security issue described in CVE-2016-2776 and addresses an interoperability issue with ECS clients.

* BIND 9.10.4-P2 addresses the security issue described in CVE-2016-2775.

* BIND 9.10.4-P1 addresses Windows installation issues, the %z modifier is not supported under Windows and
a race condition in the rbt/rbtdb implementation resulting in named exiting due to assertion failures being detected.

* Following patches removed, fixed upstream

* cve-2016-2776.patch

* cve-2016-8864.patch

Tue Nov 1 13:00:00 2016 psimonsAATTsuse.com
- Apply cve-2016-8864.patch to fix CVE-2016-8864 (bsc#1007829).

Tue Sep 27 14:00:00 2016 psimonsAATTsuse.com
- Apply cve-2016-2776.patch to fix CVE-2016-2776 (bsc#1000362).

Thu Jun 16 14:00:00 2016 maxAATTsuse.com
- Remove the start/stop dependency of named and lwresd on remote-fs
to break a service dependency cycle (bsc#947483, bsc#963971).
- Make /var/lib/named owned by the named user (bsc#908850,
bsc#875691).
- Call systemd service macros with the full service name.

Thu Apr 14 14:00:00 2016 lnusselAATTsuse.de
- remove BuildRequire libcap. That is only a legacy library, not
actually used for building. libcap-devel pulls in the right one.

Fri Mar 11 13:00:00 2016 maxAATTsuse.com
- Security update 9.10.3-P4:

* CVE-2016-1285, bsc#970072: assert failure on input parsing can
cause premature exit.

* CVE-2016-1286, bsc#970073: An error when parsing signature
records for DNAME can lead to named exiting due to an assertion
failure.

* CVE-2016-2088, bsc#970074: a deliberately misconstructed packet
containing multiple cookie options to cause named to terminate
with an assertion failure.

Thu Feb 25 13:00:00 2016 bwiedemannAATTsuse.com
- drop a changing timestamp making build reproducible

Fri Feb 12 13:00:00 2016 crrodriguezAATTopensuse.org
- Build with --with-randomdev=/dev/urandom otherwise
libisc will use /dev/random to gather entropy and that might
block, short read etc..

Wed Jan 20 13:00:00 2016 maxAATTsuse.com
- Security update 9.10.3-P3:

* Specific APL data could trigger an INSIST (CVE-2015-8704,
bsc#962189).

* Certain errors that could be encountered when printing out or
logging an OPT record containing a CLIENT-SUBNET option could
be mishandled, resulting in an assertion failure
(CVE-2015-8705, bsc#962190).

* Authoritative servers that were marked as bogus (e.g.
blackholed in configuration or with invalid addresses) were
being queried anyway.

Mon Dec 21 13:00:00 2015 maxAATTsuse.com
- Update to version 9.10.3-P2 to fix a remote denial of service by
misparsing incoming responses (CVE-2015-8000, bsc#958861).

Sun Oct 4 14:00:00 2015 jengelhAATTinai.de
- Avoid double %setup, it confuses some versions of quilt.
- Summary/description update

Tue Sep 22 14:00:00 2015 meissnerAATTsuse.com
- Update to version 9.10.2-P4

* An incorrect boundary boundary check in the OPENPGPKEY
rdatatype could trigger an assertion failure.
(CVE-2015-5986) [RT #40286] (bsc#944107)

* A buffer accounting error could trigger an
assertion failure when parsing certain malformed
DNSSEC keys. (CVE-2015-5722) [RT #40212] (bsc#944066)

Wed Jul 29 14:00:00 2015 lmuelleAATTsuse.com
- Update to version 9.10.2-P3
Security Fixes

* A specially crafted query could trigger an assertion failure in message.c.
This flaw was discovered by Jonathan Foote, and is disclosed in
CVE-2015-5477. [RT #39795]

* On servers configured to perform DNSSEC validation, an assertion failure
could be triggered on answers from a specially configured server.
This flaw was discovered by Breno Silveira Soares, and is disclosed
in CVE-2015-4620. [RT #39795]
Bug Fixes

* Asynchronous zone loads were not handled correctly when the zone load was
already in progress; this could trigger a crash in zt.c. [RT #37573]

* Several bugs have been fixed in the RPZ implementation:
+ Policy zones that did not specifically require recursion could be treated
as if they did; consequently, setting qname-wait-recurse no; was
sometimes ineffective. This has been corrected. In most configurations,
behavioral changes due to this fix will not be noticeable. [RT #39229]
+ The server could crash if policy zones were updated (e.g. via
rndc reload or an incoming zone transfer) while RPZ processing
was still ongoing for an active query. [RT #39415]
+ On servers with one or more policy zones configured as slaves, if a
policy zone updated during regular operation (rather than at startup)
using a full zone reload, such as via AXFR, a bug could allow the RPZ
summary data to fall out of sync, potentially leading to an assertion
failure in rpz.c when further incremental updates were made to the zone,
such as via IXFR. [RT #39567]
+ The server could match a shorter prefix than what was
available in CLIENT-IP policy triggers, and so, an unexpected
action could be taken. This has been corrected. [RT #39481]
+ The server could crash if a reload of an RPZ zone was initiated while
another reload of the same zone was already in progress. [RT #39649]

Fri Jul 10 14:00:00 2015 lmuelleAATTsuse.com
- Update to version 9.10.2-P2
- An uninitialized value in validator.c could result in an assertion failure.
(CVE-2015-4620) [RT #39795]
- Update to version 9.10.2-P1
- Include client-ip rules when logging the number of RPZ rules of each type.
[RT #39670]
- Addressed further problems with reloading RPZ zones. [RT #39649]
- Addressed a regression introduced in change #4121. [RT #39611]
- The server could match a shorter prefix than what was available in
CLIENT-IP policy triggers, and so, an unexpected action could be taken.
This has been corrected. [RT #39481]
- On servers with one or more policy zones configured as slaves, if a policy
zone updated during regular operation (rather than at startup) using a full
zone reload, such as via AXFR, a bug could allow the RPZ summary data to
fall out of sync, potentially leading to an assertion failure in rpz.c when
further incremental updates were made to the zone, such as via IXFR.
[RT #39567]
- A bug in RPZ could cause the server to crash if policy zones were updated
while recursion was pending for RPZ processing of an active query.
[RT #39415]
- Fix a bug in RPZ that could cause some policy zones that did not
specifically require recursion to be treated as if they did; consequently,
setting qname-wait-recurse no; was sometimes ineffective. [RT #39229]
- Asynchronous zone loads were not handled correctly when the zone load was
already in progress; this could trigger a crash in zt.c. [RT #37573]
- Fix an out-of-bounds read in RPZ code. If the read succeeded, it doesn\'t
result in a bug during operation. If the read failed, named could segfault.
[RT #38559]

Wed May 13 14:00:00 2015 hguoAATTsuse.com
- Fix inappropriate use of /var/lib/named for locating dynamic-DB plugins.
Dynamic-DB plugins are now loaded from %{_libexecdir}/bind, consistent with
openSUSE packaging guideline.
- Install additional header files which are helpful to the development of
dynamic-DB plugins.

Fri May 8 14:00:00 2015 lmuelleAATTsuse.com
- Depend on systemd macros and sysvinit on post-12.3 only.
- Create empty lwresd.conf at build time.
- Reduce file list pre-13.1.

Fri May 8 14:00:00 2015 lmuelleAATTsuse.com
- Update to version 9.10.2
- Handle timeout in legacy system test. [RT #38573]
- dns_rdata_freestruct could be called on a uninitialised structure when
handling a error. [RT #38568]
- Addressed valgrind warnings. [RT #38549]
- UDP dispatches could use the wrong pseudorandom
number generator context. [RT #38578]
- Fixed several small bugs in automatic trust anchor management, including a
memory leak and a possible loss of key state information. [RT #38458]
- \'dnssec-dsfromkey -T 0\' failed to add ttl field. [RT #38565]
- Revoking a managed trust anchor and supplying an untrusted replacement
could cause named to crash with an assertion failure.
(CVE-2015-1349) [RT #38344]
- Fix a leak of query fetchlock. [RT #38454]
- Fix a leak of pthread_mutexattr_t. [RT #38454]
- RPZ could send spurious SERVFAILs in response
to duplicate queries. [RT #38510]
- CDS and CDNSKEY had the wrong attributes. [RT #38491]
- adb hash table was not being grown. [RT #38470]
- Update bind.keyring
- Update baselibs.conf due to updates to libdns160 and libisc148

Fri May 8 14:00:00 2015 hguoAATTsuse.com
- Enable export libraries to support plugin development.
Install DNSSEC root key.
Expose new interface for developing dynamic zone database.
+ dns_dynamic_db.patch

Tue Feb 10 13:00:00 2015 dvaleevAATTsuse.com
- PowerPC can build shared libraries for sure.
idnkit-powerpc-ltconfig.patch

Fri Dec 12 13:00:00 2014 jengelhAATTinai.de
- Explicitly BuildRequire systemd-rpm-macros since it is used
for lwresd %post etc. Then drop pre-12.x material.
Remove configure.in.diff2.

Thu Dec 11 13:00:00 2014 jengelhAATTinai.de
- Corrections to baselibs.conf

Tue Dec 9 13:00:00 2014 lmuelleAATTsuse.com
- Update to version 9.10.1-P1
- A flaw in delegation handling could be exploited to put named into an
infinite loop. This has been addressed by placing limits on the number of
levels of recursion named will allow (default 7), and the number of
iterative queries that it will send (default 50) before terminating a
recursive query (CVE-2014-8500); (bnc#908994).
The recursion depth limit is configured via the \"max-recursion-depth\"
option, and the query limit via the \"max-recursion-queries\" option.
[RT #37580]
- When geoip-directory was reconfigured during named run-time, the
previously loaded GeoIP data could remain, potentially causing wrong ACLs
to be used or wrong results to be served based on geolocation
(CVE-2014-8680). [RT #37720]; (bnc#908995).
- Lookups in GeoIP databases that were not loaded could cause an assertion
failure (CVE-2014-8680). [RT #37679]; (bnc#908995).
- The caching of GeoIP lookups did not always handle address families
correctly, potentially resulting in an assertion failure (CVE-2014-8680).
[RT #37672]; (bnc#908995).

Sun Dec 7 13:00:00 2014 jengelhAATTinai.de
- Convert some hard PreReq to leaner Requires(pre).
- Typographical and orthographic fixes to description texts.

Fri Dec 5 13:00:00 2014 Led
- Fix bashisms in the createNamedConfInclude script.
- Post scripts: remove \'-e\' option of \'echo\' that may be unsupported
in some POSIX-compliant shells.

Fri Dec 5 13:00:00 2014 lmuelleAATTsuse.com
- Add openssl engines to the lwresd chroot.
- Add /etc/lwresd.conf with attribute ghost to the list of files.
- Add /run/lwresd to the list of files of the lwresd package.
- Shift /run/named from the chroot sub to the main bind package.
- Drop /proc from the chroot as multi CPU systems work fine even without it.

Thu Dec 4 13:00:00 2014 lmuelleAATTsuse.com
- Add a versioned dependency when obsoleting packages.

Thu Dec 4 13:00:00 2014 lmuelleAATTsuse.com
- Remove superfluous obsoletes
*-64bit in the ifarch ppc64 case; (bnc#437293).

Wed Dec 3 13:00:00 2014 lmuelleAATTsuse.com
- Fix gssapi_krb configure time header detection.

Sun Nov 30 13:00:00 2014 lmuelleAATTsuse.com
- Update root zone (dated Nov 5, 2014).

Sat Nov 29 13:00:00 2014 lmuelleAATTsuse.com
- Update to version 9.10.1
- This release addresses the security flaws described in CVE-2014-3214 and
CVE-2014-3859.
- Update to version 9.10.0
- DNS Response-rate limiting (DNS RRL), which blunts the impact of
reflection and amplification attacks, is always compiled in and no longer
requires a compile-time option to enable it.
- An experimental \"Source Identity Token\" (SIT) EDNS option is now available.
- A new zone file format, \"map\", stores zone data in a
format that can be mapped directly into memory, allowing
significantly faster zone loading.
- \"delv\" (domain entity lookup and validation) is a new tool with dig-like
semantics for looking up DNS data and performing internal DNSSEC
validation.
- Improved EDNS(0) processing for better resolver performance
and reliability over slow or lossy connections.
- Substantial improvement in response-policy zone (RPZ) performance. Up to
32 response-policy zones can be configured with minimal performance loss.
- To improve recursive resolver performance, cache records which are still
being requested by clients can now be automatically refreshed from the
authoritative server before they expire, reducing or eliminating the time
window in which no answer is available in the cache.
- New \"rpz-client-ip\" triggers and drop policies allowing
response policies based on the IP address of the client.
- ACLs can now be specified based on geographic location using the MaxMind
GeoIP databases. Use \"configure --with-geoip\" to enable.
- Zone data can now be shared between views, allowing multiple views to serve
the same zones authoritatively without storing multiple copies in memory.
- New XML schema (version 3) for the statistics channel includes many new
statistics and uses a flattened XML tree for faster parsing. The older
schema is now deprecated.
- A new stylesheet, based on the Google Charts API, displays XML statistics
in charts and graphs on javascript-enabled browsers.
- The statistics channel can now provide data in JSON format as well as XML.
- New stats counters track TCP and UDP queries received
per zone, and EDNS options received in total.
- The internal and export versions of the BIND libraries (libisc, libdns,
etc) have been unified so that external library clients can use the same
libraries as BIND itself.
- A new compile-time option, \"configure --enable-native-pkcs11\", allows BIND
9 cryptography functions to use the PKCS#11 API natively, so that BIND can
drive a cryptographic hardware service module (HSM) directly instead of
using a modified OpenSSL as an intermediary.
- The new \"max-zone-ttl\" option enforces maximum TTLs for zones. This can
simplify the process of rolling DNSSEC keys by guaranteeing that cached
signatures will have expired within the specified amount of time.
- \"dig +subnet\" sends an EDNS CLIENT-SUBNET option when querying.
- \"dig +expire\" sends an EDNS EXPIRE option when querying.
- New \"dnssec-coverage\" tool to check DNSSEC key coverage for a zone and
report if a lapse in signing coverage has been inadvertently scheduled.
- Signing algorithm flexibility and other improvements
for the \"rndc\" control channel.
- \"named-checkzone\" and \"named-compilezone\" can now read
journal files, allowing them to process dynamic zones.
- Multiple DLZ databases can now be configured. Individual zones can be
configured to be served from a specific DLZ database. DLZ databases now
serve zones of type \"master\" and \"redirect\".
- \"rndc zonestatus\" reports information about a specified zone.
- \"named\" now listens on IPv6 as well as IPv4 interfaces by default.
- \"named\" now preserves the capitalization of names
when responding to queries.
- new \"dnssec-importkey\" command allows the use of offline
DNSSEC keys with automatic DNSKEY management.
- New \"named-rrchecker\" tool to verify the syntactic
correctness of individual resource records.
- When re-signing a zone, the new \"dnssec-signzone -Q\" option drops
signatures from keys that are still published but are no longer active.
- \"named-checkconf -px\" will print the contents of configuration files with
the shared secrets obscured, making it easier to share configuration (e.g.
when submitting a bug report) without revealing private information.
- \"rndc scan\" causes named to re-scan network interfaces for
changes in local addresses.
- On operating systems with support for routing sockets, network interfaces
are re-scanned automatically whenever they change.
- \"tsig-keygen\" is now available as an alternate command
name to use for \"ddns-confgen\".
- Update to version 9.9.6
New Features
- Support for CAA record types, as described in RFC 6844 \"DNS
Certification Authority Authorization (CAA) Resource Record\",
was added. [RT#36625] [RT #36737]
- Disallow \"request-ixfr\" from being specified in zone statements where it
is not valid (it is only valid for slave and redirect zones) [RT #36608]
- Support for CDS and CDNSKEY resource record types was added. For
details see the proposed Informational Internet-Draft \"Automating
DNSSEC Delegation Trust Maintenance\" at
http://tools.ietf.org/html/draft-ietf-dnsop-delegation-trust-maintainance-14.
[RT #36333]
- Added version printing options to various BIND utilities. [RT #26057]
[RT #10686]
- Added a \"no-case-compress\" ACL, which causes named to use case-insensitive
compression (disabling change #3645) for specified clients. (This is useful
when dealing with broken client implementations that use case-sensitive
name comparisons, rejecting responses that fail to match the capitalization
of the query that was sent.) [RT #35300]
Feature Changes
- Adds RPZ SOA to the additional section of responses to clearly
indicate the use of RPZ in a manner that is intended to avoid
causing issues for downstream resolvers and forwarders [RT #36507]
- rndc now gives distinct error messages when an unqualified zone
name matches multiple views vs. matching no views [RT #36691]
- Improves the accuracy of dig\'s reported round trip times. [RT #36611]
- When an SPF record exists in a zone but no equivalent TXT record
does, a warning will be issued. The warning for the reverse
condition is no longer issued. See the check-spf option in the
documentation for details. [RT #36210]
- \"named\" will now log explicitly when using rndc.key to configure
command channel. [RT #35316]
- The default setting for the -U option (setting the number of UDP
listeners per interface) has been adjusted to improve performance.
[RT #35417]
- Aging of smoothed round-trip time measurements is now limited
to no more than once per second, to improve accuracy in selecting
the best name server. [RT #32909]
- DNSSEC keys that have been marked active but have no publication
date are no longer presumed to be publishable. [RT #35063]
Bug Fixes
- The Makefile in bin/python was changed to work around a bmake
bug in FreeBSD 10 and NetBSD 6. [RT #36993] (
*
*)
- Corrected bugs in the handling of wildcard records by the DNSSEC
validator: invalid wildcard expansions could be treated as valid
if signed, and valid wildcard expansions in NSEC3 opt-out ranges
had the AD bit set incorrectly in responses. [RT #37093] [RT #37072]
- When resigning, dnssec-signzone was removing all signatures from
delegation nodes. It now retains DS and (if applicable) NSEC
signatures. [RT #36946]
- The AD flag was being set inappopriately on RPZ responses. [RT #36833]
- Updates the URI record type to current draft standard,
draft-faltstrom-uri-08, and allows the value field to be zero
length [RT #36642] [RT #36737]
- RRSIG sets that were not loaded in a single transaction at start
up were not being correctly added to re-signing heaps. [RT #36302]
- Setting \'-t aaaa\' in .digrc had unintended side-effects. [RT #36452]
- A race condition could cause a crash in isc_event_free during
shutdown. [RT #36720]
- Addresses a race condition issue in dispatch. [RT #36731]
- acl elements could be miscounted, causing a crash while loading
a config [RT #36675]
- Corrects a deadlock between view.c and adb.c. [RT #36341]
- liblwres wasn\'t properly handling link-local addresses in
nameserver clauses in resolv.conf. [RT #36039]
- Buffers in isc_print_vsnprintf were not properly initialized
leading to potential overflows when printing out quad values.
[RT #36505]
- Don\'t call qsort() with a null pointer, and disable the GCC 4.9
\"delete null pointer check\" optimizer option. This fixes problems
when using GNU GCC 4.9.0 where its compiler code optimizations
may cause crashes in BIND. For more information, see the operational
advisory at https://kb.isc.org/article/AA-01167/. [RT #35968]
- Fixed a bug that could cause repeated resigning of records in
dynamically signed zones. [RT #35273]
- Fixed a bug that could cause an assertion failure after forwarding
was disabled. [RT #35979]
- Fixed a bug that caused SERVFAILs when using RPZ on a system
configured as a forwarder. [RT #36060]
- Worked around a limitation in Solaris\'s /dev/poll implementation
that could cause named to fail to start when configured to use
more sockets than the system could accomodate. [RT #35878]
- Remove merged rpz2+rl-9.9.5.patch and obsoleted rpz2+rl-9.9.5.patch
- Removed pid-path.diff patch as /run/{named,lwresd}/ are used by default.
- Update baselibs.conf (added libirs and library interface version updates).

Fri Nov 14 13:00:00 2014 dimstarAATTopensuse.org
- No longer perform gpg validation; osc source_validator does it
implicit:
+ Drop gpg-offline BuildRequires.
+ No longer execute gpg_verify.

Wed Oct 1 14:00:00 2014 jengelhAATTinai.de
- Implement shlib packaging guidelines and give an improved
description on the library components
- Put idnkit components in separate packages
- Add runidn.diff to resolve runidn not working at all

Mon Sep 8 14:00:00 2014 wernerAATTsuse.de
- Require systemd-rpm-macros at build

Mon Sep 8 14:00:00 2014 wernerAATTsuse.de
- Use the systemd service macros to make sure init scripts are
registered properly (bnc#894627)

Wed Sep 3 14:00:00 2014 maxAATTsuse.com
- Version 9.9.5P1 also fixes a problem with zone transfers on
multicore machines (bnc#882511).

Thu Jul 31 14:00:00 2014 lmuelleAATTsuse.com
- Package dnssec-checkds and dnssec-coverage binaries and man pages only on
post-11.1 systems.

Thu Jul 31 14:00:00 2014 lmuelleAATTsuse.com
- Update to version 9.9.5P1
Various bugfixes and some feature fixes. (see CHANGES files)
Security and maintenance issues:
- [bug] Don\'t call qsort with a null pointer. [RT #35968]
- [bug] Disable GCC 4.9 \"delete null pointer check\". [RT #35968]
- [port] linux: libcap support: declare curval at start of block. [RT #35387]
- Update to version 9.9.5
- [bug] Address double dns_zone_detach when switching to using automatic
empty zones from regular zones. [RT #35177]
- [port] Use built-in versions of strptime() and timegm() on all platforms
to avoid portability issues. [RT #35183]
- [bug] Address a portentry locking issue in dispatch.c. [RT #35128]
- [bug] irs_resconf_load now returns ISC_R_FILENOTFOUND on a missing
resolv.conf file and initializes the structure as if it had been
configured with nameserver ::1 nameserver 127.0.0.1 [RT #35194]
- [contrib] queryperf: Fixed a possible integer overflow when printing
results. [RT #35182]
- [protocol] Accept integer timestamps in RRSIG records. [RT #35185]
- [func] named-checkconf can now obscure shared secrets when printing by
specifying \'-x\'. [RT #34465]
- [bug] Improvements to statistics channel XSL stylesheet: the stylesheet can
now be cached by the browser; section headers are omitted from the stats
display when there is no data in those sections to be displayed; counters
are now right-justified for easier readability. (Only available with
configure --enable-newstats.) [RT #35117]
- [cleanup] Replaced all uses of memcpy() with memmove(). [RT #35120]
- [bug] Handle \".\" as a search list element when IDN support is enabled.
[RT #35133]
- [bug] dig failed to handle AXFR style IXFR responses which span multiple
messages. [RT #35137]
- [bug] Address a possible race in dispatch.c. [RT #35107]
- [bug] Warn when a key-directory is configured for a zone, but does not
exist or is not a directory. [RT #35108]
- [security] memcpy was incorrectly called with overlapping ranges resulting
in malformed names being generated on some platforms. This could cause
INSIST failures when serving NSEC3 signed zones (CVE-2014-0591).
[RT #35120]
- [bug] Two calls to dns_db_getoriginnode were fatal if there was no data at
the node. [RT #35080]
- [bug] Iterative responses could be missed when the source port for an
upstream query was the same as the listener port (53). [RT #34925]
- [bug] Fixed a bug causing an insecure delegation from one static-stub zone
to another to fail with a broken trust chain. [RT #35081]
- [bug] loadnode could return a freed node on out of memory. [RT #35106]
- [bug] Address null pointer dereference in zone_xfrdone. [RT #35042]
- [func] \"dnssec-signzone -Q\" drops signatures from keys that are still
published but no longer active. [RT #34990]
- [bug] \"rndc refresh\" didn\'t work correctly with slave zones usingi
inline-signing. [RT #35105]
- [cleanup] Add a more detailed \"not found\" message to rndc commands which
specify a zone name. [RT #35059]
- [bug] Correct the behavior of rndc retransfer to allow inline-signing slave
zones to retain NSEC3 parameters instead of reverting to NSEC. [RT #34745]
- [port] Update the Windows build system to support feature selection and
WIN64 builds. This is a work in progress. [RT #34160]
- [bug] dig could fail to clean up TCP sockets still waiting on connect().
[RT #35074]
- [port] Update config.guess and config.sub. [RT #35060]
- [bug] \'nsupdate\' leaked memory if \'realm\' was used multiple times.
[RT #35073]
- [bug] \"named-checkconf -z\" now checks zones of type hint and redirect as
well as master. [RT #35046]
- [misc] Provide a place for third parties to add version information for
their extensions in the version file by setting the EXTENSIONS variable.
- [bug] RPZ zeroed ttls if the query type was \'
*\'. [RT #35026]
- [func] Local address can now be specified when using dns_client API.
[RT #34811]
- [bug] Don\'t allow dnssec-importkey overwrite a existing non-imported
private key.
- [bug] Address read after free in server side of lwres_getrrsetbyname.
[RT #29075]
- [bug] Fix cast in lex.c which could see 0xff treated as eof. [RT #34993]
- [bug] Failure to release lock on error in receive_secure_db. [RT #34944]
- [bug] Updated OpenSSL PKCS#11 patches to fix active list locking and other
bugs. [RT #34855]
- [bug] Address bugs in dns_rdata_fromstruct and dns_rdata_tostruct for WKS
and ISDN types. [RT #34910]
- [bug] \'host\' could die if a UDP query timed out. [RT #34870]
- [bug] Address lock order reversal deadlock with inline zones. [RT #34856]
- [cleanup] Changed the name of \"isc-config.sh\" to \"bind9-config\".
[RT #23825]
- [port] linux: Address platform specific compilation issue when libcap-devel
is installed. [RT #34838]
- [port] Some readline clones don\'t accept NULL pointers when calling
add_history. [RT #34842]
- [cleanup] Simplify TCP message processing when requesting a zone transfer.
[RT #34825]
- [bug] Address race condition with manual notify requests. [RT #34806]
- [func] Create delegations for all \"children\" of empty zones except
\"forward first\". [RT #34826]
- [tuning] Adjust when a master server is deemed unreachable. [RT #27075]
- [tuning] Use separate rate limiting queues for refresh and notify
requests. [RT #30589]
- [cleanup] Include a comment in .nzf files, giving the name of the
associated view. [RT #34765]
- [bug] Address a race condition when shutting down a zone. [RT #34750]
- [bug] Journal filename string could be set incorrectly, causing garbage in
log messages. [RT #34738]
- [protocol] Use case sensitive compression when responding to queries.
[RT #34737]
- [protocol] Check that EDNS subnet client options are well formed.
[RT #34718]
- [func] Allow externally generated DNSKEY to be imported into the DNSKEY
management framework. A new tool dnssec-importkey is used to do this.
[RT #34698]
- [bug] Handle changes to sig-validity-interval settings better. [RT #34625]
- [bug] ndots was not being checked when searching. Only continue searching
on NXDOMAIN responses. Add the ability to specify ndots to nslookup.
[RT #34711]
- [bug] Treat type 65533 (KEYDATA) as opaque except when used in a key zone.
[RT #34238]
- Updated to current rpz patch from·http://ss.vix.su/~vjs/rrlrpz.html
- rpz2-9.9.4.patch
+ rpz2+rl-9.9.5.patch

Sun Jun 1 14:00:00 2014 chrisAATTcomputersalat.de
- add stuff for DNSSEC validation to named.conf

* dnssec-enable, dnssec-validation

Sun May 25 14:00:00 2014 crrodriguezAATTopensuse.org
- Build with LFS_CFLAGS in 32 bit systems.

Thu May 8 14:00:00 2014 roAATTsuse.de
- use %_rundir macro

Fri Mar 28 13:00:00 2014 lchiquittoAATTsuse.de
- Remove obsolete patch \"workaround-compile-problem.diff\"

Fri Jan 24 13:00:00 2014 maxAATTsuse.com
- Add the sdb-ldap backend module (fate#313216).
- Details can be found here:

* http://bind9-ldap.bayour.com/

* http://bind9-ldap.bayour.com/dnszonehowto.html

Tue Jan 21 13:00:00 2014 maxAATTsuse.com
- Update to version 9.9.4P2

* Fixes named crash when handling malformed NSEC3-signed zones
(CVE-2014-0591, bnc#858639)

* Obsoletes workaround-compile-problem.diff
- Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now
supported upstream (--enable-rrl).

Mon Dec 9 13:00:00 2013 maxAATTsuse.com
- Fix generation of /etc/named.conf.include
(bnc#828678, bnc#848777, bnc#814978).

Wed Aug 7 14:00:00 2013 maxAATTsuse.com
- Systemd doesn\'t set $TERM, and hence breaks tput (bnc#823175).

Tue Aug 6 14:00:00 2013 maxAATTsuse.com
- Improve pie_compile.diff (bnc#828874).
- dnssec-checkds and dnssec-coverage need python-base.
- disable rpath in libtool.

Mon Aug 5 14:00:00 2013 maxAATTsuse.com
- Update to 9.9.3P2 fixes CVE-2013-4854, bnc#831899.

* Incorrect bounds checking on private type \'keydata\' can lead
to a remotely triggerable REQUIRE failure.

Wed Jul 24 14:00:00 2013 maxAATTsuse.com
- Remove non-working apparmor profiles (bnc#740327).

Wed Jul 17 14:00:00 2013 mlsAATTsuse.de
- the README file is not a directory, drop the dir attribute

Mon Jun 24 14:00:00 2013 meissnerAATTsuse.com
- Updated to 9.9.3-P1
Various bugfixes and some feature fixes. (see CHANGES files)
Security and maintenance issues:
- [security] Caching data from an incompletely signed zone could
trigger an assertion failure in resolver.c [RT #33690]
- [security] Support NAPTR regular expression validation on
all platforms without using libregex, which
can be vulnerable to memory exhaustion attack
(CVE-2013-2266). [RT #32688]
- [security] RPZ rules to generate A records (but not AAAA records)
could trigger an assertion failure when used in
conjunction with DNS64 (CVE-2012-5689). [RT #32141]
- [bug] Fixed several Coverity warnings.
Note: This change includes a fix for a bug that
was subsequently determined to be an exploitable
security vulnerability, CVE-2012-5688: named could
die on specific queries with dns64 enabled.
[RT #30996]
- [maint] Added AAAA for D.ROOT-SERVERS.NET.
- [maint] D.ROOT-SERVERS.NET is now 199.7.91.13.
- Updated to current rate limiting + rpz patch from
http://ss.vix.su/~vjs/rrlrpz.html
- moved dnssec-
* helpers to bind-utils package. bnc#813911

Wed May 8 14:00:00 2013 schwabAATTsuse.de
- Use updated config.guess/sub in the embedded idnkit sources

Wed Mar 27 13:00:00 2013 meissnerAATTsuse.com
- Updated to 9.9.2-P2 (bnc#811876)
Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266

* Security Fixes
Removed the check for regex.h in configure in order to disable regex
syntax checking, as it exposes BIND to a critical flaw in libregex
on some platforms. [RT #32688]
- added gpg key source verification

Thu Dec 6 13:00:00 2012 meissnerAATTsuse.com
- Updated to 9.9.2-P1 (bnc#792926)
https://kb.isc.org/article/AA-00828

* Security Fixes
Prevents named from aborting with a require assertion failure on
servers with DNS64 enabled. These crashes might occur as a result of
specific queries that are received. (Note that this fix is a subset
of a series of updates that will be included in full in BIND 9.8.5
and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792]
A deliberately constructed combination of records could cause
named to hang while populating the additional section of a
response. [CVE-2012-5166] [RT #31090]
Prevents a named assert (crash) when queried for a record whose
RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416]
Prevents a named assert (crash) when validating caused by using
\"Bad cache\" data before it has been initialized. [CVE-2012-3817]
[RT #30025]
A condition has been corrected where improper handling of zero-length
RDATA could cause undesirable behavior, including termination of
the named process. [CVE-2012-1667] [RT #29644]
ISC_QUEUE handling for recursive clients was updated to address a race
condition that could cause a memory leak. This rarely occurred with
UDP clients, but could be a significant problem for a server handling
a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233]
New Features
Elliptic Curve Digital Signature Algorithm keys and signatures in
DNSSEC are now supported per RFC 6605. [RT #21918]
Introduces a new tool \"dnssec-checkds\" command that checks a zone to
determine which DS records should be published in the parent zone,
or which DLV records should be published in a DLV zone, and queries
the DNS to ensure that it exists. (Note: This tool depends on python;
it will not be built or installed on systems that do not have a
python interpreter.) [RT #28099]
Introduces a new tool \"dnssec-verify\" that validates a signed zone,
checking for the correctness of signatures and NSEC/NSEC3 chains.
[RT #23673]
Adds configuration option \"max-rsa-exponent-size ;\" that
can be used to specify the maximum rsa exponent size that will be
accepted when validating [RT #29228]
Feature Changes
Improves OpenSSL error logging [RT #29932]
nslookup now returns a nonzero exit code when it is unable to get
an answer. [RT #29492]
Bug Fixes
Uses binary mode to open raw files on Windows. [RT #30944]
When using DNSSEC inline signing with \"rndc signing -nsec3param\", a
salt value of \"-\" can now be used to indicate \'no salt\'. [RT #30099]
Prevents race conditions (address use after free) that could be
encountered when named is shutting down and releasing structures
used to manage recursive clients. [RT #30241]
Static-stub zones now accept \"forward\" and \"fowarders\" options
(often needed for subdomains of the zone referenced to override
global forwarding options). These options are already available
with traditional stub zones and their omission from zones of type
\"static-stub\" was an inadvertent oversight. [RT #30482]
Limits the TTL of signed RRsets in cache when their RRSIGs are
approaching expiry. This prevents the persistence in cache of
invalid RRSIGs in order to assist recovery from a situation where
zone re-signing doesn\'t occur in a timely manner. With this change,
named will attempt to obtain new RRSIGs from the authoritative server
once the original ones have expired, and even if the TTL of the old
records would in other circumstances cause them to be kept in cache
for longer. [RT #26429]
Corrects the syntax of isc_atomic_xadd() and isc_atomic_cmpxchg()
which are employed on Itanium systems to speed up lock management
by making use of atomic operations. Without the syntax correction
it is possible that concurrent access to the same structures could
accidentally occur with unpredictable results. [RT #25181]
Improves OpenSSL error logging [RT #29932]
The configure script now supports and detects libxml2-2.8.x correctly
[RT #30440]
The host command should no longer assert on some architectures
and builds while handling the time values used with the -w (wait
forever) option. [RT #18723]
Invalid zero settings for max-retry-time, min-retry-time,
max-refresh-time, min-refresh-time will now be detected during parsing
of named.conf and an error emitted instead of triggering an assertion
failure on startup. [RT #27730]
Removes spurious newlines from log messages in zone.c [RT #30675]
When built with readline support (i.e. on a system with readline
installed) nsupdate no longer terminates unexpectedly in interactive
mode. [RT #29550]
All named tasks that perform task-exclusive operations now share the
same single task. Prior to this change, there was the possibility of
a race condition between rndc operations and other functions such as
re-sizing the adb hash table. If the race condition was encountered,
named would in most cases terminate unexpectedly with an assert.
[RT #29872]
Ensures that servers are expired from the ADB cache when the timeout
limit is reached so that their learned attributes can be refreshed.
Prior to this change, servers that were frequently queried might
never have their entries removed and reinitialized. This is of
particular importance to DNSSEC-validating recursive servers that
might erroneously set \"no-edns\" for an authoritative server following
a period of intermittent connectivity. [RT #29856]
Adds additional resilience to a previous security change (3218) by
preventing RRSIG data from being added to cache when a pseudo-record
matching the covering type and proving non-existence exists at a
higher trust level. The earlier change prevented this inconsistent
data from being retrieved from cache in response to client queries -
with this additional change, the RRSIG records are no longer inserted
into cache at all. [RT #26809]
dnssec-settime will now issue a warning when the writing of a new
private key file would cause a change in the permissions of the
existing file. [RT #27724]
Fixes the defect introduced by change #3314 that was causing failures
when saving stub zones to disk (resulting in excessive CPU usage in
some cases). [RT #29952]
Address race condition in units tests: asyncload_zone and
asyncload_zt. [RT #26100]
It is now possible to using multiple control keys again - this
functionality was inadvertently broken by change #3924 (RT #28265)
which addressed a memory leak. [RT #29694]
Named now holds a zone table reference while performing an
asynchronous load of a zone. This removes a race condition that
could cause named to crash when zones are added using rndc addzone
or by manually editing named\'s configuration file followed by rndc
reconfig/reload. [RT #28326]
Setting resolver-query-timeout too low could cause named problems
recovering after a loss of connectivity. [RT #29623]
Reduces the potential build-up of stale RRsets in cache on a busy
recursive nameserver by re-using cached DS and RRSIG rrsets when
possible [RT #29446]
Corrects a failure to authenticate non-existence of resource records
in some circumstances when RPZ has been configured. Also:
adds an optional \"recursive-only yes|no\" to the response-policy
statement
adds an optional \"max-policy-ttl\" to the response-policy statement
to limit the false data that \"recursive-only no\" can introduce
into resolvers\' caches
introduces a predefined encoding of PASSTHRU policy by adding
\"rpz-passthru\" to be used as the target of CNAME policy records
(the old encoding is still accepted.)
adds a RPZ performance test to bin/tests/system/rpz when queryperf is available. [RT #26172]
Upper-case/lower-case handling of RRSIG signer-names is now handled
consistently: RRSIG records are generated with the signer-name in
lower case. They are accepted with any case, but if they fail to
validate, we try again in lower case. [RT #27451]

Sun Nov 18 13:00:00 2012 meissnerAATTsuse.com
- added a ratelimiting (draft RFC) patch from Paul Vixie.
see http://www.redbarn.org/dns/ratelimits
suggested by Stefan Schaefer

Wed Nov 14 13:00:00 2012 meissnerAATTsuse.com
- updated to 9.9.2
https://kb.isc.org/article/AA-00798
Security:

* A deliberately constructed combination of records could cause
named to hang while populating the additional section of a
response. [CVE-2012-5166] [RT #31090]

* Prevents a named assert (crash) when queried for a record whose
RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416]

* Prevents a named assert (crash) when validating caused by using \"Bad
cache\" data before it has been initialized. [CVE-2012-3817] [RT #30025]

* A condition has been corrected where improper handling of zero-length
RDATA could cause undesirable behavior, including termination of the
named process. [CVE-2012-1667] [RT #29644]

* ISC_QUEUE handling for recursive clients was updated to address a race
condition that could cause a memory leak. This rarely occurred with
UDP clients, but could be a significant problem for a server handling
a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233]
New Features

* Elliptic Curve Digital Signature Algorithm keys and signatures in
DNSSEC are now supported per RFC 6605. [RT #21918]

* Introduces a new tool \"dnssec-checkds\" command that checks a zone
to determine which DS records should be published in the parent zone,
or which DLV records should be published in a DLV zone, and queries
the DNS to ensure that it exists. (Note: This tool depends on python;
it will not be built or installed on systems that do not have a python
interpreter.) [RT #28099]

* Introduces a new tool \"dnssec-verify\" that validates a signed zone,
checking for the correctness of signatures and NSEC/NSEC3 chains.
[RT #23673]

* Adds configuration option \"max-rsa-exponent-size ;\" that can
be used to specify the maximum rsa exponent size that will be accepted
when validating [RT #29228]
Feature Changes

* Improves OpenSSL error logging [RT #29932]

* nslookup now returns a nonzero exit code when it is unable to get an answer. [RT #29492]
Lots of bugfixes.
- unfuzzed patches:
perl-path.diff
pie_compile.diff
workaround-compile-problem.diff

Fri Oct 19 14:00:00 2012 meissnerAATTsuse.com
- Specially crafted DNS data can cause a lockup in named.
CVE-2012-5166, bnc#784602.
- 9.9.1-P4

Sat Sep 15 14:00:00 2012 meissnerAATTsuse.com
- Named could die on specially crafted record.
[RT #30416] (bnc#780157) CVE-2012-4244
- 9.9.1-P3
- updated dnszone-schema.txt from upstream.

Thu Jul 26 14:00:00 2012 ugAATTsuse.de
- Prevents a named assert (crash) when validating caused by using
\"Bad cache\" data before it has been initialized. [RT #30025]
(bnc#772945)
- ISC_QUEUE handling for recursive clients was updated to address a
race condition that could cause a memory leak. This rarely occurred
with UDP clients, but could be a significant problem for a server
handling a steady rate of TCP queries. [RT #29539 & #30233]
- Under heavy incoming TCP query loads named could experience a
memory leak which could lead to significant reductions in query
response or cause the server to be terminated on systems with
\"out of memory\" killers. [RT #29539]
(bnc#772946)
- A condition has been corrected where improper handling of zero-length
RDATA could cause undesirable behavior, including termination of
the named process. [RT #29644]
- 9.9.1-P2

Thu Jul 12 14:00:00 2012 cfarrellAATTsuse.com
- license update: ISC
ISC is generally seen as the correct license for bind

Tue Jun 5 14:00:00 2012 ugAATTsuse.de
- updated dnszone-schema.txt

Mon Jun 4 14:00:00 2012 ugAATTsuse.de
- VUL-0: bind remote DoS via zero length rdata field
CVE-2012-1667
bnc#765315
- 9.9.1-P1

Tue May 22 14:00:00 2012 ugAATTsuse.de
- this version has no new features but only bugfixes
- Addresses a race condition that can cause named to to crash when
the masters list for a zone is updated via rndc reload/reconfig
- Fixes a race condition in zone.c that can cause named to crash
during the processing of rndc delzone
- Prevents a named segfault from resolver.c due to procedure
fctx_finddone() not being thread-safe
- SDB now handles unexpected errors from back-end database drivers
gracefully instead of exiting on an assert.
- Prevents named crashes as a result of dereferencing a NULL pointer
in zmgr_start_xfrin_ifquota if the zone was being removed while
there were zone transfers still pending
- Corrects a parser bug that could cause named to crash while
reading a malformed zone file
- many more smaller fixes
- version 9.9.1

Thu May 10 14:00:00 2012 ugAATTsuse.de
- added patch to fix an assertion failure

Fri May 4 14:00:00 2012 ugAATTsuse.de
- many dnssec fixes and features (too many to list them
here, check the changelog)
- improved startup time
- improved scalability
- Added support for Uniform Resource Identifier (URI) resource
records
- Local copies of slave zones are now saved in raw format by
default to improve startup performance
BIND 9.9 changes the default storage format for slave zone
files from text to raw. Because named\'s behavior when a slave
server cannot read or parse a zone file is to move the offending
file out of the way and retransfer the zone, slave servers
that are updated from a pre-9.9.0 version of BIND and which
have existing copies of slave zone data may wind up with
extraneous copies of zone data stored, as the existing
text-format zone file copies will be moved aside to filenames
of the format db-###### and journal files to the format
jn-###### (where # represents a hexadecimal digit.)
- many many bugfixes. Please read changelog for details
- fixed handling of TXT records in ldapdump
(bnc#743758)
- 9.9.0

Mon Feb 13 13:00:00 2012 cooloAATTsuse.com
- patch license to follow spdx.org standard

Wed Dec 21 13:00:00 2011 larsAATTsamba.org
- Ensure to create the required dir or sym link in /var/run; (bnc#738156).

Mon Dec 5 13:00:00 2011 ugAATTsuse.de
- root nameserver updated (root.hint file)

Mon Dec 5 13:00:00 2011 ugAATTsuse.de
- added managed-keys-directory to named.conf

Tue Nov 22 13:00:00 2011 ugAATTsuse.de
- fixed apparmor profile for lib and lib64 in chroot
(bnc#716745)

Thu Nov 17 13:00:00 2011 fteodoriAATTsuse.de
- Cache lookup could return RRSIG data associated with nonexistent
records, leading to an assertion failure. CVE-2011-4313; (bnc#730995).

Wed Oct 26 14:00:00 2011 ugAATTsuse.de
- on a 64bit system a chrooted bind failed to start if 32bit
libs were installed (bnc#716745)

Fri Sep 30 14:00:00 2011 cooloAATTsuse.com
- add libtool as buildrequire to make the spec file more reliable

Sat Sep 17 14:00:00 2011 jengelhAATTmedozas.de
- Remove redundant tags/sections from specfile
- Use %_smp_mflags for parallel build

Fri Sep 16 14:00:00 2011 ugAATTsuse.de
- very first restart can create broken chroot
(bnc#718441)

Mon Sep 5 14:00:00 2011 ugAATTsuse.de

* fixed SSL in chroot environment (bnc#715881)

Mon Sep 5 14:00:00 2011 ugAATTsuse.de

* Added a new include file with function typedefs for the DLZ
\"dlopen\" driver. [RT #23629]

* Added a tool able to generate malformed packets to allow testing of
how named handles them. [RT #24096]

* The root key is now provided in the file bind.keys allowing DNSSEC
validation to be switched on at start up by adding
\"dnssec-validation auto;\" to named.conf. If the root key provided
has expired, named will log the expiration and validation will not
work. More information and the most current copy of bind.keys can
be found at http://www.isc.org/bind-keys.
*Please note this feature
was actually added in 9.8.0 but was not included in the 9.8.0
release notes. [RT #21727]

* If named is configured with a response policy zone (RPZ) and a
query of type RRSIG is received for a name configured for RRset
replacement in that RPZ, it will trigger an INSIST and crash the
server. RRSIG. [RT #24280]

* named, set up to be a caching resolver, is vulnerable to a user
querying a domain with very large resource record sets (RRSets)
when trying to negatively cache the response. Due to an off-by-one
error, caching the response could cause named to crash. [RT #24650]
[CVE-2011-1910]

* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
query type independant. [RT #24715]

* Using Response Policy Zone (RPZ) with DNAME records and querying
the subdomain of that label can cause named to crash. Now logs that
DNAME is not supported. [RT #24766]

* Change #2912 populated the message section in replies to UPDATE
requests, which some Windows clients wanted. This exposed a latent
bug that allowed the response message to crash named. With this
fix, change 2912 has been reduced to copy only the zone section to
the reply. A more complete fix for the latent bug will be released
later. [RT #24777]

* many bugfixes (see CHANGELOG)

* 9.8.1

Wed Aug 31 14:00:00 2011 rhaferAATTsuse.de
- Fixed the ldapdump tool to also respect the \"uri\" setting in
/etc/openldap/ldap.conf (bnc#710430)

Tue Jul 5 14:00:00 2011 ugAATTsuse.de

* Using Response Policy Zone (RPZ) with DNAME records and querying
the subdomain of that label can cause named to crash. Now logs that
DNAME is not supported. [RT #24766]

* If named is configured to be both authoritative and resursive and
receives a recursive query for a CNAME in a zone that it is
authoritative for, if that CNAME also points to a zone the server
is authoritative for, the recursive part of name will not follow
the CNAME change and the response will not be a complete CNAME
chain. [RT #24455]

* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
query type independant. [RT #24715] [CVE-2011-1907]

* Change #2912 (see CHANGES) exposed a latent bug in the DNS message
processing code that could allow certain UPDATE requests to crash
named. This was fixed by disambiguating internal database
representation vs DNS wire format data. [RT #24777] [CVE-2011-2464]

* 9.8.0-P4

Tue Jun 7 14:00:00 2011 ugAATTsuse.de
- A large RRSET from a remote authoritative server that results in
the recursive resolver trying to negatively cache the response can
hit an off by one code error in named, resulting in named crashing.
[RT #24650] [CVE-2011-1910]
- Zones that have a DS record in the parent zone but are also listed
in a DLV and won\'t validate without DLV could fail to validate. [RT
[#24631]]

Mon May 23 14:00:00 2011 crrodriguezAATTopensuse.org
- Build with -DNO_VERSION_DATE to avoid timestamps in binaries.

Thu May 19 14:00:00 2011 meissnerAATTsuse.de
- buildreq update-desktop-files for newer rpms

Thu May 5 14:00:00 2011 ugAATTsuse.de
- The ADB hash table stores informations about which authoritative
servers to query about particular domains
- BIND now supports a new zone type, static-stub
- BIND now supports Response Policy Zones
- BIND 9.8.0 now has DNS64 support
- Dynamically Loadable Zones (DLZ) now support dynamic updates.
- Added a \"dlopen\" DLZ driver, allowing the creation of external DLZ
drivers that can be loaded as shared objects at runtime rather than
having to be linked with named
- named now retains GSS-TSIG keys across restarts
- There is a new update-policy match type \"external\".
- bugfixes
- version to 9.8.0

Thu Feb 24 13:00:00 2011 ugAATTsuse.de
- fixed security issue
VUL-0: bind: IXFR or DDNS update combined with high query rate
DoS vulnerability (CVE-2011-0414 bnc#674431)
- version to 9.7.3

Wed Jan 5 13:00:00 2011 meissnerAATTsuse.de
- ifdef the sysvinit specific prereqs for openSUSE 11.4 and later

Thu Dec 9 13:00:00 2010 mvyskocilAATTsuse.cz
- fix bnc#656509 - direct mount of /proc in chroot

Tue Dec 7 13:00:00 2010 cooloAATTnovell.com
- prereq init scripts syslog and network

Thu Dec 2 13:00:00 2010 ugAATTsuse.de
- fixed VUL-0: bind: Key algorithm rollover bug
bnc#657102, CVE-2010-3614
- fixed VUL-0: bind: allow-query processed incorrectly
bnc#657120, CVE-2010-3615
- fixed VUL-0: bind: cache incorrectly allows a ncache entry and a rrsig for the same type
bnc#657129, CVE-2010-3613

Tue Nov 23 13:00:00 2010 ugAATTsuse.de
- fixed return code of \"rcnamed status\"
- added gssapi support

Tue Oct 12 14:00:00 2010 ugAATTsuse.de
- Zones may be dynamically added and removed with the \"rndc addzone\"
and \"rndc delzone\" commands. These dynamically added zones are
written to a per-view configuration file. Do not rely on the
configuration file name nor contents as this will change in a
future release. This is an experimental feature at this time.
- Added new \"filter-aaaa-on-v4\" access control list to select which
IPv4 clients have AAAA record filtering applied.
- A new command \"rndc secroots\" was added to dump a combined summary
of the currently managed keys combined with statically configured
trust anchors.
- Added support to load new keys into managed zones without signing
immediately with \"rndc loadkeys\". Added support to link keys with
\"dnssec-keygen -S\" and \"dnssec-settime -S\".
- Documentation improvements
- ORCHID prefixes were removed from the automatic empty zone list.
- Improved handling of GSSAPI security contexts. Specifically, better
memory management of cached contexts, limited lifetime of a context
to 1 hour, and added a \"realm\" command to nsupdate to allow
selection of a non-default realm name.
- The contributed tool \"ztk\" was updated to version 1.0.
- version 9.7.1 to 9.7.2-P2

Mon Jul 26 14:00:00 2010 ugAATTsuse.de
- chrooted bind failed to start (bnc#625019)

Mon Jun 21 14:00:00 2010 ugAATTsuse.de
- genrandom: add support for the generation of multiple
files.
- Update empty-zones list to match
draft-ietf-dnsop-default-local-zones-13.
- Incrementally write the master file after performing
a AXFR.
- Add AAAA address for L.ROOT-SERVERS.NET.
- around 50 bugs fixed (see CHANGELOG for details)
- version 9.7.1

Thu May 20 14:00:00 2010 ugAATTsuse.de
- Handle broken DNSSEC trust chains better. [RT #15619]
- Named could return SERVFAIL for negative responses
from unsigned zones. [RT #21131
- version 9.7.0-P2

Sat May 1 14:00:00 2010 ajAATTsuse.de
- Handle /var/run on tmpfs.
- do not use run_ldconfig.

Wed Feb 24 13:00:00 2010 jengelhAATTmedozas.de
- Enable DLZ-LDAP (supersedes sdb_ldap) and add a patch

Wed Feb 17 13:00:00 2010 ugAATTsuse.de
- Fully automatic signing of zones by \"named\".
- Simplified configuration of DNSSEC Lookaside Validation (DLV).
- Simplified configuration of Dynamic DNS, using the \"ddns-confgen\"
command line tool or the \"local\" update-policy option. (As a side
effect, this also makes it easier to configure automatic zone
re-signing.)
- New named option \"attach-cache\" that allows multiple views to
share a single cache.
- DNS rebinding attack prevention.
- New default values for dnssec-keygen parameters.
- Support for RFC 5011 automated trust anchor maintenance
- Smart signing: simplified tools for zone signing and key
maintenance.
- The \"statistics-channels\" option is now available on Windows.
- A new DNSSEC-aware libdns API for use by non-BIND9 applications
- On some platforms, named and other binaries can now print out
a stack backtrace on assertion failure, to aid in debugging.
- A \"tools only\" installation mode on Windows, which only installs
dig, host, nslookup and nsupdate.
- Improved PKCS#11 support, including Keyper support and explicit
OpenSSL engine selection.
- version 9.7.0

Wed Jan 20 13:00:00 2010 ugAATTsuse.de
- [security] Do not attempt to validate or cache
out-of-bailiwick data returned with a secure
answer; it must be re-fetched from its original
source and validated in that context. [RT #20819]
- [security] Cached CNAME or DNAME RR could be returned to clients
without DNSSEC validation. [RT #20737]
- [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712]
- version 9.6.1-P3

Mon Jan 4 13:00:00 2010 ugAATTsuse.de
- removed the syntax check for include files (bnc#567593)

Tue Dec 15 13:00:00 2009 jengelhAATTmedozas.de
- add baselibs.conf as a source
- enable parallel building
- add baselibs for SPARC
- package documentation as noarch

Wed Nov 25 13:00:00 2009 ugAATTsuse.de
- Security fix
When validating, track whether pending data was from
the additional section or not and only return it if
validates as secure. [RT #20438]
CVE-2009-4022
bnc#558260
- update from P1 to P2

Fri Nov 20 13:00:00 2009 ugAATTsuse.de
- added localhost for ipv6 to default config (bnc#539529)

Wed Nov 18 13:00:00 2009 ugAATTsuse.de
- fixed apparmor profile (bnc#544181)

Tue Nov 3 13:00:00 2009 cooloAATTnovell.com
- updated patches to apply with fuzz=0

Wed Sep 30 14:00:00 2009 ugAATTsuse.de
- using start_daemon instead of startproc (bnc#539532)

Mon Aug 10 14:00:00 2009 ugAATTsuse.de
- version update to 9.6.1-P1
(security fix CVE-2009-0696)
bnc#526185

Tue Jun 30 14:00:00 2009 ugAATTsuse.de
- enabled MySQL DLZ (Dynamically Loadable Zones)

Tue Jun 16 14:00:00 2009 ugAATTsuse.de
- around 50 bugfixes against 9.6.0p1
See changelog for details
- version 9.6.1

Thu Apr 9 14:00:00 2009 ugAATTsuse.de
- not all include files were copied into chroot (bnc#466800)

Tue Mar 3 13:00:00 2009 ugAATTsuse.de
- /etc/named.conf does not include /etc/named.d/forwarders.conf
by default (bnc#480334)