Commit Graph

74 Commits

Author SHA1 Message Date
he 2b2bbd444f Resolve conflicts from import of bind 9.5.0-P2. 2008-08-15 14:51:26 +00:00
he 8df376afb4 Import bind 9.5.0-P2 2008-08-15 14:39:30 +00:00
christos 7d50e0f80c resolve conflicts 2008-07-10 21:18:37 +00:00
christos 0a48355ff6 Import bind 9.5.0-P1 2008-07-10 14:17:08 +00:00
christos 362bb1e6c4 don't initialize the same variable twice. 2008-06-23 17:54:01 +00:00
christos b06624789f fix prototype 2008-06-21 20:55:56 +00:00
christos c3d3a6e4b6 Resolve conflicts 2008-06-21 18:59:24 +00:00
christos d50bc8ead7 import bind-9-5-0 2008-06-21 18:25:42 +00:00
matt c27877a59b progname is const char *, not char * 2008-02-20 18:24:22 +00:00
matt 05ec472001 constify a few arrays 2008-02-20 18:23:50 +00:00
matt 273fa51a4d progname is defined as const char *, not char * 2008-02-20 18:21:39 +00:00
christos 92b1ea3abe Import bind 9.4.1-P1 2007-07-24 23:32:11 +00:00
christos 2d0d2fc81d merge conflicts 2007-05-01 22:15:12 +00:00
ghen 94364b1084 Resolve conflicts. 2007-03-30 19:40:47 +00:00
ghen cc483ecacb Import bind-9.4.0. 2007-03-30 19:15:20 +00:00
christos 4674124bb1 resolve conflicts 2007-01-27 21:24:09 +00:00
christos c1a4ad93e3 Import bind-9.4.0-rc2 from ftp.isc.org 2007-01-27 21:02:43 +00:00
reed 93b5694767 Remove () from end of the BIND 9 ARM as it is not a man page.
(I am not committing the fix to dist/bind/bin/named/named.conf.docbook
as we don't use that docbook file.)
2006-12-14 02:17:14 +00:00
adrianp ee74a1421a Fixes for CVE-2006-4095 and CVE-2006-4096 from bind-9.3.2-P1
* Assertion failure in ISC BIND SIG query processing (CVE-2006-4095)

- Recursive servers
Queries for SIG records will trigger an assertion failure if more
than one RRset is returned. However exposure can be minimized by
restricting which sources can ask for recursion.

- Authoritative servers
If a nameserver is serving a RFC 2535 DNSSEC zone and is queried
for the SIG records where there are multiple RRsets, then the
named program will trigger an assertion failure when it tries
to construct the response.

* INSIST failure in ISC BIND recursive query handling code (CVE-2006-4096)

It is possible to trigger an INSIST failure by sending enough
recursive queries such that the response to the query arrives after
all the clients waiting for the response have left the recursion
queue. However exposure can be minimized by restricting which sources
can ask for recursion.

ok'ed christos@
2006-09-05 19:31:47 +00:00
jnemeth 79d79919df Coverity CID: 682 -- remove dead code 2006-07-26 06:23:59 +00:00
mrg 3394a47b32 move is_zone initialisation earlier to avoid a GCC warning. 2006-05-11 09:28:45 +00:00
elad 91ce49cce6 xref named.conf(5) after a complaint from tiocsti. okay veego@.
xml docbook change will be fed upstream as requested by hubertf@
and veego@.
2006-01-16 19:20:15 +00:00
christos 719d30b842 resolve conflicts. 2005-12-22 00:26:23 +00:00
christos 7ccb4c5f89 import the real 9.3.2 not 9.2.3. 2005-12-21 23:06:48 +00:00
christos 292526bfd4 Resolve conflicts. 2005-12-21 22:34:31 +00:00
christos 348525eba6 from ftp.isc.org 2005-12-21 19:50:15 +00:00
christos efbc48848e Resolve conflicts 2004-11-07 00:16:59 +00:00
christos dfd98c8a16 Import bind-9.3.0 2004-11-06 23:53:21 +00:00
christos 178bd22d01 unsigned int initialized to ULONG_MAX? jeez. 2004-05-18 03:08:24 +00:00
christos b6ea89f1ee width arg in printf string must be int. 2004-05-18 03:08:00 +00:00
christos 53a0028e47 Resolve conflicts 2004-05-18 00:03:56 +00:00
christos 1885fbb90d Import bind 9.3.0beta3 2004-05-17 23:43:04 +00:00
itojun dd1d0fe0c8 sync w/ bind837 2003-11-26 01:35:31 +00:00
agc 865595bdf3 Move UCB-licensed code from 4-clause to 3-clause licence.
Patches provided by Joel Baker in PR 22253, verified by myself.
2003-08-07 09:20:39 +00:00
itojun edc2bcfc9f resolve conflicts 2003-06-09 13:19:33 +00:00
itojun 8912e04d45 sync w/ 8.3.5 2003-06-03 07:33:24 +00:00
wiz 7bd6fd354d unknown, not unkown. Noted by mjl. 2003-01-28 22:19:22 +00:00
itojun 729df1257b sync with bind 8.3.4. 2002-11-17 14:09:52 +00:00
itojun 90a2edbc75 apply http://www.isc.org/products/BIND/patches/bind833.diff to fix recent
vulnerabilities:

* BIND: Remote Execution of Code (BIND 4 & 8)
* BIND: Multiple Denial of Service (BIND 8 only)
2002-11-14 02:04:27 +00:00
itojun 73c2dd3286 fix dig -x ip6addr. PR 18193. 2002-09-06 04:50:02 +00:00
itojun 44f496c00a sync with audit result from kame.
- sprintf() can return negative value on error, so p += sprintf(p, blah)
  is unsafe
- signed/unsigned mixup
- wrong assumption: sizeof(time_t) <= sizeof(int)
- need to init errno to 0 before strtoul()
2002-07-04 23:30:39 +00:00
itojun 2200386ee7 sync with 8.3.3. 2002-06-28 06:11:47 +00:00
itojun 65ef1d4426 correct conflicts.
sync document with reality (dig/host/nslookup now does IPv6 transport!)
2002-06-20 12:01:49 +00:00
itojun ce924b0f55 sync with 8.3.2. 99% of conflicts were due to $NetBSD$ tag. 2002-06-20 11:42:53 +00:00
itojun 123de7c9ca ISC BIND 8.3.2. various IPv6 fixes and correctins. 2002-06-20 10:29:14 +00:00
simonb 1706b9a6ec There's no use assigning the output of strtoul() to a 32-bit variable
then checking that against ULONG_MAX.  Instead use a "unsigned long"
as the temporary variable.  Then check against UINT32_MAX before
assigning back to the original variable.
2002-05-09 03:14:14 +00:00
wiz 4c99916337 va_{start,end} audit:
Make sure that each va_start has one and only one matching va_end,
especially in error cases.
If the va_list is used multiple times, do multiple va_starts/va_ends.
If a function gets va_list as argument, don't let it use va_end (since
it's the callers responsibility).

Improved by comments from enami and christos -- thanks!

Heimdal/krb4/KAME changes already fed back, rest to follow.

Inspired by, but not not based on, OpenBSD.
2001-09-24 13:22:25 +00:00
mrg 0a8258e16a back out previous; it is handled by etc/rc.d/named. 2001-08-24 13:25:57 +00:00
mrg d7003aa4a3 reapply (relevant parts of) lost patch:
revision 1.3
date: 1999/02/22 02:37:27;  author: mrg;  state: Exp;  lines: +19 -1
if we are chrooting, write a symlink for the pid file so that ndc, etc,
continue to work as normal.  this allows named to run in a chroot jail
with zero loss of functionality.
2001-08-24 08:37:33 +00:00
itojun 4cd3525823 upgrade to 8.2.4. 2001-05-17 22:59:37 +00:00