Commit Graph

148 Commits

Author SHA1 Message Date
joerg
963949fb1a Replace arithmetic using undefined behavior with exhaustive list of type
size limits.
2015-09-12 19:03:11 +00:00
christos
949b98fd7b Changes for 9.10.2-P4:
4170.  [security]      An incorrect boundary check in the OPENPGPKEY
                       rdatatype could trigger an assertion failure.
                       (CVE-2015-5986) [RT #40286]

4168.  [security]      A buffer accounting error could trigger an
                       assertion failure when parsing certain malformed
                       DNSSEC keys. (CVE-2015-5722) [RT #40212]
2015-09-03 07:33:34 +00:00
christos
cf002b08b1 Import bind 9.10.2-P4 2015-09-03 07:21:32 +00:00
christos
b4a6c5034b merge conflicts for bind-9.10.2-P3 to address CVE-2015-5477. 2015-07-28 18:55:16 +00:00
christos
3f9a56fe3c Import bind 9.10.2-P3 2015-07-28 18:48:08 +00:00
christos
bd2de39390 Merge changes. 2015-07-08 17:28:54 +00:00
christos
acc357c293 Import bind 9.10.2-P2 2015-07-08 15:37:30 +00:00
christos
1fe3f30303 Print syslog errors in one line, like we do for stderr so that the
duplicate line detection of syslogd can merge them.
2015-03-06 00:44:04 +00:00
spz
99759bb8ef security patch for bind from ISC (to 9.10.1-P2).
Only the change to lib/dns/zone.c is security relevant

Upstream changelog:

        --- 9.10.1-P2 released ---

4053.   [security]      Revoking a managed trust anchor and supplying
                        an untrusted replacement could cause named
                        to crash with an assertion failure.
                        (CVE-2015-1349) [RT #38344]

4027.   [port]          Net::DNS 0.81 compatibility. [RT #38165]
2015-02-21 20:19:22 +00:00
christos
b668dd1072 remove debugging. 2015-01-25 16:17:20 +00:00
christos
a79eafe515 blacklist new files 2015-01-25 15:52:12 +00:00
christos
1bff67df9c blasklist hooks 2015-01-25 15:51:53 +00:00
he
53f679e766 What ISC wraps under ISC_PLATFORM_HAVEXADD appears to be 32-bit
atomic adds, and I beleive all our platforms can do that.  Therefore,
no need to conditionalize that definition under __HAVE_ATOMIC64_OPS.
2015-01-01 15:28:30 +00:00
christos
f6799648ae merge conflicts. 2014-12-10 04:37:50 +00:00
christos
ba1c350cba Import bind 9.10.1-P1 2014-12-10 03:34:22 +00:00
christos
442a409943 Import bind 9.10.1-P1 2014-12-10 03:31:12 +00:00
christos
37a454e05c Import bind 9.10.1-P1 2014-12-10 02:25:10 +00:00
christos
b65f2d484f ALLOW_FILTER_AAAA_ON_V4 has been renamed to ALLOW_FILTER_AAAA (John D. Baker) 2014-08-18 04:40:51 +00:00
christos
232e37ca29 one more quoted comment 2014-07-22 01:03:22 +00:00
christos
a02ee300bc fix lint build 2014-07-22 00:11:22 +00:00
tls
916085404d Make named and the rest of BIND seed their RNG from /dev/urandom, not /dev/random. Better would be to rip the enormous gonkulating RNG machinery out of libisc entirely. Later. 2014-07-13 22:06:56 +00:00
christos
28ea6bcb05 Remove irs re-implementation of getaddrinfo, getnameinfo, gai_strerror
that libc provides. XXX: Perhaps it is better to just make irs a private
library since not many things use it, and it is so small after we removed
the stuff that is provided by libc.
2014-07-13 14:54:22 +00:00
martin
7744c1c346 Add missing -lisccfg (hopefully fixing static builds) 2014-07-08 19:08:43 +00:00
martin
615bbe71bd Make it compilable: avoid void* arithmetic 2014-07-08 09:08:05 +00:00
spz
773189b334 infrastructure for bind-9.10.0-P2:
adding the tools delv and dnssec-importkey
adding libirs to support delv
2014-07-08 05:55:33 +00:00
spz
084fe027a3 two merge escapees 2014-07-08 05:47:36 +00:00
spz
9638304d0b merge for bind 9.10.0-P2, first go 2014-07-08 05:43:37 +00:00
spz
cda1b76b69 Import bind-9.10.0-P2
Changes since the last import:
	--- 9.10.0-P2 released ---

3861.	[security]	Missing isc_buffer_availablelength check results
			in a REQUIRE assertion when printing out a packet
			(CVE-2014-3859).  [RT #36078]

3858.	[bug]		Disable GCC 4.9 "delete null pointer check".
			[RT #35968]

3853.	[cleanup]	Refactor dns_rdataslab_fromrdataset to seperate out
			the handling of a rdataset with no records. [RT #35968]

3850.	[bug]		Disabling forwarding could trigger a REQUIRE assertion.
			[RT #35979]

3843.	[bug]		Use the x64 version of the Microsoft Visual C++
			Redistributable when built for 64 bit Windows.
			[RT #35973]

3838.	[protocol]	EDNS EXPIRE as been assigned a code point of 9.

	--- 9.10.0-P1 released ---

3837.	[security]	A NULL pointer is passed to query_prefetch resulting
			a REQUIRE assertion failure when a fetch is actually
			initiated (CVE-2014-3214).  [RT #35899]

	--- 9.10.0 released ---

3824.	[bug]		A collision between two flag values could cause
			problems with cache cleaning when SIT was enabled.
			[RT #35858]

	--- 9.10.0rc2 released ---

3817.	[func]		The "delve" command is now spelled "delv" to avoid
			a namespace collision with the Xapian project.
			[RT #35801]

3815.	[doc]		Clarify "nsupdate -y" usage in man page. [RT #35808]

3810.	[bug]		Work around broken nameservers that fail to ignore
			unknown EDNS options. [RT #35766]

3809.	[doc]		Fix SIT and NSID documentation.

3808.	[doc]		Clean up "prefetch" documentation. [RT #35751]

3807.	[bug]		Fix sign extention bug in dns_name_fromtext when
			lowercase is set. [RT #35743]

3806.	[test]		Improved system test portability. [RT #35625]

3805.	[contrib]	Added contrib/perftcpdns, a performance testing tool
			for DNS over TCP. [RT #35710]

	--- 9.10.0rc1 released ---

3804.	[bug]		Corrected a race condition in dispatch.c in which
			portentry could be reset leading to an assertion
			failure in socket_search(). (Change #3708
			addressed the same issue but was incomplete.)
			[RT #35128]

3803.	[bug]		"named-checkconf -z" incorrectly rejected zones
			using alternate data sources for not having a "file"
			option. [RT #35685]

3802.	[bug]		Various header files were not being installed.

3801.	[port]		Fix probing for gssapi support on FreeBSD. [RT #35615]

3800.	[bug]		A pending event on the route socket could cause an
			assertion failure when shutting down named. [RT #35674]

3799.	[bug]		Improve named's command line error reporting.
			[RT #35603]

3798.	[bug]		'rndc zonestatus' was reporting the wrong re-signing
			time. [RT #35659]

3797.	[port]		netbsd: geoip support probing was broken. [RT #35642]

3796.	[bug]		Register dns and pkcs#11 error codes. [RT #35629]

3795.	[bug]		Make named-checkconf detect raw masterfiles for
			hint zones and reject them. [RT #35268]

3794.	[maint]		Added AAAA for C.ROOT-SERVERS.NET.

3793.	[bug]		zone.c:save_nsec3param() could assert when out of
			memory. [RT #35621]

3792.	[func]		Provide links to the alternate statistics views when
			displaying in a browser.  [RT #35605]

3791.	[placeholder]

3790.	[bug]		Handle broken nameservers that send BADVERS in
			response to unknown EDNS options.  Maintain
			statistics on BADVERS responses.

3789.	[bug]		Null pointer dereference on rbt creation failure.

3788.	[bug]		dns_peer_getrequestsit was returning request_nsid by
			mistake.

	--- 9.10.0b2 released ---

3787.	[bug]		The code that checks whether "auto-dnssec" is
			allowed was ignoring "allow-update" ACLs set at
			the options or view level. [RT #29536]

3786.	[func]		Provide more detailed error codes when using
			native PKCS#11. "pkcs11-tokens" now fails robustly
			rather than asserting when run against an HSM with
			an incomplete PKCS#11 API implementation. [RT #35479]

3785.	[bug]		Debugging code dumphex didn't accept arbitrarily long
			input (only compiled with -DDEBUG). [RT #35544]

3784.	[bug]		Using "rrset-order fixed" when it had not been
			enabled at compile time caused inconsistent
			results. It now works as documented, defaulting
			to cyclic mode. [RT #28104]

3783.	[func]		"tsig-keygen" is now available as an alternate
			command name for "ddns-confgen".  It generates
			a TSIG key in named.conf format without comments.
			[RT #35503]

3782.	[func]		Specifying "auto" as the salt when using
			"rndc signing -nsec3param" causes named to
			generate a 64-bit salt at random. [RT #35322]

3781.	[tuning]	Use adaptive mutex locks when available; this
			has been found to improve performance under load
			on many systems. "configure --with-locktype=standard"
			restores conventional mutex locks. [RT #32576]

3780.	[bug]		$GENERATE handled negative numbers incorrectly.
			[RT #25528]

3779.	[cleanup]	Clarify the error message when using an option
			that was not enabled at compile time. [RT #35504]

3778.	[bug]		Log a warning when the wrong address family is
			used in "listen-on" or "listen-on-v6". [RT #17848]

3777.	[bug]		EDNS EXPIRE code could dump core when processing
			DLZ queries. [RT #35493]

3776.	[func]		"rndc -q" suppresses output from successful
			rndc commands. Errors are printed on stderr.
			[RT #21393]

3775.	[bug]		dlz_dlopen driver could return the wrong error
			code on API version mismatch, leading to a segfault.
			[RT #35495]

3774.	[func]		When using "request-nsid", log the NSID value in
			printable form as well as hex. [RT #20864]

3773.	[func]		"host", "nslookup" and "nsupdate" now have
			options to print the version number and exit.
			[RT #26057]

3772.	[contrib]	Added sqlite3 dynamically-loadable DLZ module.
			(Based in part on a contribution from Tim Tessier.)
			[RT #20822]

3771.	[cleanup]	Adjusted log level for "using built-in key"
			messages. [RT #24383]

3770.	[bug]		"dig +trace" could fail with an assertion when it
			needed to fall back to TCP due to a truncated
			response. [RT #24660]

3769.	[doc]		Improved documentation of "rndc signing -list".
			[RT #30652]

3768.	[bug]		"dnssec-checkds" was missing the SHA-384 digest
			algorithm. [RT #34000]

3767.	[func]		Log explicitly when using rndc.key to configure
			command channel. [RT #35316]

3766.	[cleanup]	Fixed problems with building outside the source
			tree when using native PKCS#11. [RT #35459]

3765.	[bug]		Fixed a bug in "rndc secroots" that could crash
			named when dumping an empty keynode. [RT #35469]

3764.	[bug]		The dnssec-keygen/settime -S and -i options
			(to set up a successor key and set the prepublication
			interval) were missing from dnssec-keyfromlabel.
			[RT #35394]

3763.	[bug]		delve: Cache DNSSEC records to avoid the need to
			re-fetch them when restarting validation. [RT #35476]

3762.	[bug]		Address build problems with --pkcs11-native +
			--with-openssl with ECDSA support. [RT #35467]

3761.	[bug]		Address dangling reference bug in dns_keytable_add.
			[RT #35471]

3760.	[bug]		Improve SIT with native PKCS#11 and on Windows.
			[RT #35433]

3759.	[port]		Enable delve on Windows. [RT #35441]

3758.	[port]		Enable export library APIs on Windows. [RT #35382]

3757.	[port]		Enable Python tools (dnssec-coverage,
			dnssec-checkds) to run on Windows. [RT #34355]

3756.	[bug]		GSSAPI Kerberos realm checking was broken in
			check_config leading to spurious messages being
			logged.  [RT #35443]
2014-07-08 04:44:50 +00:00
dholland
b7b7574d3b Reorg docs, part 1:
Move all the reference manuals to subdirs of /usr/share/doc/reference.
We have subdirs ref1-ref9, corresponding to man page sections 1-9.

Everything that's the reference manual for a program (sections 1, 6,
8), C interface (sections 2, 3), driver or file system (section 4),
format or configuration (section 5), or kernel internal interface
(section 9) belongs in here.

Section 7 is a little less clear: some things that might go in section
7 if they were a man page aren't really reference manuals. So I'm only
putting things in reference section 7 that are (to me) clearly
reference material, rather than e.g. tutorials, guides, FAQs, etc.
This obviously leaves some room for debate, especially without first
editing the docs with this distinction in mind, but if people hate
what I've done things can always be moved again.

Note also that while roff macro man pages traditionally go in section
7, I have put all the roff documentation (macros, tools, etc.) in one
place in reference/ref1/roff. This will make it easier to find and
also easier to edit it into some kind of coherent form.
2014-07-05 19:22:41 +00:00
joerg
b7b04e0e6d Match #if change in task.c. 2014-03-29 22:44:20 +00:00
christos
2cad6262db add missing #else Takahiro Hayashi 2014-03-29 19:34:23 +00:00
christos
a1aa0d7245 Since the sigwait stuff is conditional to isc_bind9, we cannot block
SIGHUP,SIGINT,SIGTERM on startup, so make those also conditional to isc_bind9.
The net effect of this was that dhclient blocked the 3 signals for both
itself and its progeny so /etc/rc.d/dhclient restart would not work.
2014-03-15 18:28:22 +00:00
christos
ed1a42bd3d allow AAAA filtering (from John Baker) 2014-03-07 23:22:26 +00:00
christos
76024df3a5 bid the libtool.m4 lossage. 2014-03-06 02:12:56 +00:00
christos
806892a224 move it to something that does not confuse cvs 2014-03-05 20:37:11 +00:00
christos
752e86217f fix indentation 2014-03-01 22:53:11 +00:00
christos
a65528eb10 remove blank line 2014-03-01 22:52:19 +00:00
christos
dedba65ce7 fix indentation 2014-03-01 22:49:49 +00:00
christos
1f9947ec5c fix indentation 2014-03-01 22:45:32 +00:00
christos
001b5d71b5 remove local init 2014-03-01 22:43:35 +00:00
christos
0a9fbeb5aa put back init that got accidentally removed. 2014-03-01 22:42:46 +00:00
christos
6563301284 remove local init stuff 2014-03-01 22:41:50 +00:00
dsl
6a3f865843 Add missing #endif 2014-03-01 12:12:57 +00:00
christos
93e69cc3fd resolve conflicts; undo many local changes that have been done upstream
differently.
2014-03-01 03:24:32 +00:00
christos
83a8544b1b Introduction
BIND 9.10.0b1 is the first beta development release of BIND 9.10,
   a new branch of BIND 9.

   This document summarizes features added or significantly changed
   since the previous major release, BIND 9.9. Items that were not
   in the previous development release, BIND 9.10.0a2, are marked
   with asterisks (**). Bug fixes since the previous development
   release are also summarized.

   Please see the CHANGES file in the source code release for a
   complete list of all changes.

Download

   The latest versions of BIND 9 software can always be found on
   our web site at http://www.isc.org/downloads/. There you will
   find additional information about each release, source code, and
   pre-compiled versions for Microsoft Windows operating systems.

Support

   Professional support is provided by Internet Systems Consortium,
   Inc., doing business as DNSco.  Information about paid support
   options is available at http://www.dns-co.com/solutions/.  Free
   support is provided by our user community via a mailing list.
   Information on all public email lists is available at
   https://www.isc.org/community/mailing-list/.

New Features

   DNS Response-rate limiting (DNS RRL), which blunts the impact
   of reflection and amplification attacks, is always compiled in
   and no longer requires a compile-time option to enable it.

   An experimental "Source Identity Token" (SIT) EDNS option is now
   available.  Similar to DNS Cookies (as invented by Donald Eastlake
   III and described in draft-eastlake-dnsext-cookies-04), these
   are designed to enable clients to detect off-path spoofed
   responses, and to enable servers to detect spoofed-source queries.
   Servers can be configured to send smaller responses to clients
   that have not identified themselves using a SIT option, reducing
   the effectiveness of amplification attacks.  RRL processing has
   also been updated: clients proven to be legitimate via SIT are
   not subject to rate limiting.  Use "configure --enable-sit" to
   enable this feature in BIND 9.  [RT #35389]  **

   A new zone file format, "map", stores zone data in a format that
   can be mapped directly into memory, allowing significantly faster
   zone loading. [RT #25419]

   "delve" (domain entity lookup and validation engine) is a new
   tool with dig-like semantics for looking up DNS data and performing
   internal DNSSEC validation.  This allows easy validation in
   environments where the resolver may not be trustworthy, and
   assists with troubleshooting of DNSSEC problems. (Note: not yet
   available on Windows.) [RT #32406] **

   The new "prefetch" option can improve recursive resolver
   performance: when it is in use, cache records that are still
   being requested by clients will automatically be refreshed from
   the authoritative server before they expire, reducing or eliminating
   the time window in which no answer is available in the cache.
   [RT #35041]

   Improved EDNS processing allows better resolver performance and
   reliability over slow or lossy connections. [RT #30655]

   Substantial improvements have been made in response-policy zone
   (RPZ) performance.  Up to 32 response-policy zones can now be
   configured.  Performance loss due to adding additional RPZs is
   minimal.

   RPZ now allows response policies to be configured based on the
   IP address of the client.

   ACLs can now be specified based on geographic location using the
   MaxMind GeoIP databases. Use "configure --with-geoip" to enable
   this feature in BIND 9. Thanks to Ken Brownfield for the
   contribution. [RT #30681]

   The version 3 XML schema for the statistics channel, including
   new statistics and a flattened XML tree for faster parsing, is
   no longer optional. The version 2 XML schema is now deprecated.
   [RT #30023]

   Improvements have been made to the XSL stylesheet used for XML
   statistics: The stylesheet can now be cached by the browser;
   section headers are omitted when the sections have no data to
   display; counter readability has been improved. Also, broken-out
   subgroups of XML statistics (server, zones, net, tasks, mem, and
   status) can now be requested. Thanks to Timothe Litt for the
   assistance.  [RT #35115] [RT #35117]

   The statistics channel can now provide data in JSON format as
   well as XML.

   Per-zone stats counters have been added to track TCP and UDP
   queries. [RT #35375] **

   Server-wide stats counters have been added to track EDNS options
   received. [RT #35447] **

   The new "in-view" zone option allows zone data to be shared
   between views, so that multiple views can serve the same zones
   authoritatively without storing multiple copies in memory. [RT #32968]

   A new compile-time option, "configure --enable-native-pkcs11",
   allows the BIND 9 cryptography functions to use the PKCS#11 API
   natively, so that BIND can drive a cryptographic hardware service
   module (HSM) directly instead of using a modified OpenSSL as an
   intermediary.  This has been tested with the Thales nShield HSM
   and with SoftHSMv2 from the OpenDNSSEC project. [RT #29031]

   When re-signing a zone, the new "dnssec-signzone -Q" option drops
   signatures from keys that are still published but are no longer
   active. Thanks to Pierre Beyssac for the contribution.  [RT #34990]

   New options have been added to "dnssec-coverage": -z and -k
   indicate whether to limit coverage checks to ZSK's or KSK's, and
   -l limits coverage checking to a specified duration.  Thanks to
   Peter Palfrader for the contribution. [RT #35168]

   "named-checkconf -px" will print the contents of configuration
   files with the shared secrets obscured, making it easier to share
   configuration (e.g. when submitting a bug report) without revealing
   private information. [RT #34465]

   Added a "no-case-compress" ACL, which causes "named" to use
   case-insensitive compression for specified clients. This is
   useful when dealing with broken client implementations that use
   case-sensitive name comparisons, rejecting responses that fail
   to match the capitalization of the query that was sent.

   "named" now preserves the capitalization of names when responding
   to queries: for instance, a query for "example.com" may be
   answered with "example.COM" if the name was configured that way
   in the zone file.  Some clients have a bug causing them to depend
   on the older behavior, in which the case of the answer always
   matched the case of the query, rather than the case of the name
   configured in the DNS.  Such clients can now be specified in the
   new "no-case-compress" ACL; this will restore the older behavior
   of "named" for those clients only. [RT #35300] **

   On operating systems that support routing sockets, including Mac
   OSX, *BSD and Linux, network interfaces are re-scanned automatically
   whenever they change.  Use "automatic-interface-scan no;" to
   disable this feature. [RT #23027] **

   Added "rndc scan" to trigger an interface scan manually. [RT #23027] **

   A new compile-time option, "configure --with-tuning=3Dlarge", tunes
   various compiled-in constants and default settings to values
   suited to large servers with abundant memory. This can improve
   performance on such servers, but will consume more memory and
   may degrade performance on smaller systems. [RT #29538] **

   The new "max-zone-ttl" option enforces maximum TTLs for zones.
   If loading a zone containing a higher TTL, the load fails. DDNS
   updates with higher TTLs are accepted but the TTL is truncated.
   (Note: Currently supported for master zones only; inline-signing
   slaves will be added.) [RT #38405] **

   Added a new "dig +subnet" option to send an EDNS CLIENT-SUBNET
   option (as described in draft-vandergaast-edns-client-subnet-02)
   containing the specified address/prefix when querying. Thanks
   to Wilmer van der Gaast for the contribution. [RT #35415] **

   Partially implemented the EDNS EXPIRE option (as described in
   draft-andrews-dnsext-expire-00).  "dig +expire" sends an EXPIRE
   option when querying.  When this option is sent with an SOA query
   to a slave zone running on a server that supports the option,
   the response will report the time until the slave zone expires.
   EXPIRE uses an experimental option code (65002), which is subject
   to change when a permanent code is assigned by IANA. [RT #35416] **

   Multiple DLZ databases can now be configured, and are searched
   in order to find one that can answer an incoming query.  Individual
   zones can now be configured to be served from a specific DLZ
   database.  DLZ databases can serve zones of type "master" and
   "redirect".

   "named-checkzone" and "named-compilezone" can now read journal
   files, allowing them to process dynamic zones without the zones
   needing to be frozen first.

   The "rndc" command now supports new key algorithms in addition
   to HMAC-MD5, including HMAC-SHA1, -SHA224, -SHA256, -SHA384, and
   -SHA512.  The -A option to rndc-confgen can be used to select
   the algorithm for the generated key. (The default is still
   HMAC-MD5; this may change in a future release.) [RT #20363]

   The internal and export versions of the BIND libraries (libisc,
   libdns, etc) have been unified so that external library clients
   can use the same libraries as BIND itself. [RT #33131]

   Added a "Configure" script for Windows to simplify enabling or
   disabling optional features. All versions of Visual Studio up
   to 2013 are now supported, and support has been added for 64-bit
   builds. Zip files containing pre-compiled 64-bit versions of
   BIND 9 are now included with releases. [RT #34160] **

   "rndc zonestatus" reports information about a specified zone.

   "named" now listens on IPv6 as well as IPv4 interfaces by default.

Feature Changes

   The default setting for the -U option (setting the number of UDP
   listeners per interface) has been adjusted to improve performance.
   [RT #35417] **

   Updated zkt and nslint in the contrib directory to the newest
   versions: zkt 1.1.2 and nslint-3.0a2. **

   The isc_bitstring API is no longer used and has been removed
   from the libisc library. [RT #35284] **

   The word "never" can now be used as a synonym for "none" when
   configuring key event dates in the dnssec tools.  [RT #35277]
   **

   The new libiscpk11 library, introduced in the previous development
   release to support native PKCS#11, has been merged into libisc
   to simplify dependencies. [RT #35205] **

   Documentation of native PKCS#11 has been expanded, specifically
   to describe the new pkcs11: URI format used in key labels. [RT #35287] *=
*

   The Windows installer now places files in the Program Files area
   rather than system services. [RT #35361] **

   The timestamps included in RRSIG records can now be read as
   integers indicating the number of seconds since the UNIX epoch,
   in addition to being read as formatted dates in YYYYMMDDHHMMSS
   format. [RT #35185]

   The irs_resconf_load() function, used for reading /etc/resolv.conf,
   now returns ISC_R_FILENOTFOUND when the file is missing or
   unreadable.  However, it will still initialize an irs_resconf
   structure as if the file had been configured with nameservers
   at the IPv4 and IPv6 localhost addresses.  Existing code that
   uses irs_resconf_load() will need to be updated to treat
   ISC_R_FILENOTFOUND as a qualified success, or it may leak memory
   due to treating the result as a failure even though an irs_resconf
   structure was allocated; see CHANGES for sample C code that
   implements the correct behavior [RT #35194]

Bug Fixes

   "dnssec-keygen" could set the publication date incorrectly when
   only the activation date was specified on the command line. [RT #35278]

   Fixed a type mismatch causing the ODBC DLZ driver to dump core
   on 64-bit systems. [RT #35324]

   Improved building with libtool. [RT #35314]

   When a server is specified by name in "nsupdate", all addresses
   for that name will be tried before giving up.  Previously, if
   the first address for the server name was not reachable the
   update would fail. [RT #25784]

   Fixed an assertion failure caused by using "rndc retransfer"
   with inline-signing zones. [RT #35353]

   Fixed a build failure from using "./configure --enable-openssl-hash".
   [RT #35343]

   The "delegation-only" flag now works in zones of type "forward".
   (This had previously been documented to work, but this was
   actually rejected by the configuration parser.)  [RT #35392]

   Fixed a race condition which could lead to a core dump when
   destroying a resolver fetch object. [RT #35385]

   Addressed a potential REQUIRE failure that could occur when
   printing out an rdataset using a format that includes comment
   data.

   The "allow-notify" ACL formerly ignored TSIG keys; this has been
   corrected. [RT #35425]

   Fixed an uninitialized pointer in log.c that could potentially
   have caused a core dump on some platforms. [RT #35260]

Thank You

   Thank you to everyone who assisted us in making this release
   possible. If you would like to contribute to ISC to assist us
   in continuing to make quality open source software, please visit
   our donations page at http://www.isc.org/donate/.

(c) 2001-2014 Internet Systems Consortium
2014-02-28 17:40:04 +00:00
spz
5c974b3074 a fix by ISC for CVE-2014-0591:
3693.  [security]      memcpy was incorrectly called with overlapping
                       ranges resulting in malformed names being generated
                       on some platforms.  This could cause INSIST failures
                       when serving NSEC3 signed zones.  [RT #35120]
2014-01-14 08:03:07 +00:00
christos
47379f4665 rename libtool.m4 m4 2014-01-02 04:03:16 +00:00
christos
b57e84e2d7 merge conflicts 2013-12-31 20:24:38 +00:00
christos
c1c9a8d904 changes for 9.9.5b1 2013-12-31 20:23:12 +00:00
christos
f9a251e72a Import bind 9.9.5b1 2013-12-31 20:09:42 +00:00