32 Commits

Author SHA1 Message Date
sthen
bcda563f68 update to bind-9.16.9 2020-11-25 21:14:42 +00:00
sthen
1a13acd21c update to BIND 9.16.5 2020-07-16 10:07:53 +00:00
sthen
de6d69b0eb update to BIND 9.16.4
- It was possible to trigger an assertion when attempting to fill an
oversized TCP buffer. This was disclosed in CVE-2020-8618. [GL #1850]

- It was possible to trigger an INSIST failure when a zone with an
interior wildcard label was queried in a certain pattern. This was
disclosed in CVE-2020-8619. [GL #1111] [GL #1718]
2020-06-17 20:46:54 +00:00
sthen
e752a2954d isc-bind: drop most of the outdated sample config files (including a very
old root.hint, the compiled-in defaults are better). there isn't really a
"one size fits all" configuration, these files gave bad examples (combined
recursive+auth hasn't been recommended in years), and as this is not the
default nameserver on the OS any more hand-holding isn't really needed.

by way of compensation: install the docs.
2020-05-29 20:05:37 +00:00
sthen
1defa1cfdd update to BIND 9.16.3
CVE-2020-8616: BIND does not sufficiently limit the number of fetches
performed when processing referrals

CVE-2020-8617: A logic error in code which checks TSIG validity can be
used to trigger an assertion failure in tsig.c

More info on the referral problem in http://www.nxnsattack.com/dns-ns-paper.pdf
2020-05-19 09:32:38 +00:00
sthen
9a817f1e5e update net/isc-bind to 9.16.1 2020-03-19 17:07:20 +00:00
sthen
0cbf314906 update to BIND 9.16.0 (new stable/ESV release) 2020-02-20 14:00:32 +00:00
sthen
0dc71803fb update to bind 9.14.9 (released today)
remove the no_openssl flavour, openssl/libressl is required in the
current versions
2019-12-18 19:38:17 +00:00
sthen
e4c52ff719 major version update to BIND 9.14.8 2019-12-18 15:05:43 +00:00
sthen
4fd6b85d82 add edig/ehost/enslookup symlinks
move another pledge to a better place, drop some rpath
2019-12-17 14:18:43 +00:00
sthen
6dcc331f9c update to bind-9.11.13
CVE-2019-6477, TCP-pipelined queries can bypass tcp-clients limit
2019-11-20 22:15:58 +00:00
sthen
2c7731e662 update to bind-9.11.10 2019-08-22 16:16:46 +00:00
sthen
05c6373d73 update to isc-bind 9.11.9, switch the geoip support to newly added geoip2/libmaxminddb
CVE-2019-6471
2019-07-18 07:24:58 +00:00
sthen
3633dd875c drop back to isc-bind 9.11.x pending investigation into how to fix the
named's requirement that cwd is writable.

install bind.keys to the right path (it used the compiled-in default
anyway but this gives the wrong cue to anyone wanting to update dnssec
root zone trust anchors).

problems reported by Mikolaj Kucharski
2018-12-02 13:25:44 +00:00
sthen
a4878ebe1c update to BIND 9.12.3, switching to 9.12.x branch 2018-11-06 13:48:40 +00:00
sthen
25b7234045 update to isc-bind-9.11.4 2018-07-12 10:12:30 +00:00
sthen
75eb7f397b update BIND to 9.11.2, switching from 9.10 to 9.11 branch (which is a long
term support branch).

note, the license changed to MPL.
2018-01-12 17:08:01 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
605258dc87 update to BIND 9.10.5 2017-05-03 20:20:42 +00:00
sthen
d4c0b14bbc Add a no_ssl flavour to BIND.
Expand the comment about json-c as that's broken on mips64 as well as hppa.
2015-08-24 20:46:49 +00:00
sthen
7a32acb9fa Update to BIND 9.10.1-P1, including query limits for recursion (DoS avoidance,
CVE-2014-8500), assertion DoS (recursive only, only with prefetch enabled,
CVE-2014-3214), assertion DoS (EDNS option processing, CVE-2014-3859) and
fixes to GeoIP (CVE-2014-8680 and another unclassified).

https://kb.isc.org/article/AA-01223/81/BIND-9.10.1-P1-Release-Notes.html

Add a local patch to increase the default query limit, during testing it
appears that the standard defaults can be easily falsely triggered during
priming at startup.
2014-12-09 17:21:36 +00:00
sthen
17fb16aa76 update to BIND 9.10.1 2014-09-23 09:42:41 +00:00
sthen
2f2ec0320e install sample configs and switch to running as _bind uid 2014-08-22 20:32:13 +00:00
sthen
d19ad24200 update to BIND 9.10.0 and add a flavour for the new geolocation support 2014-05-01 20:19:25 +00:00
sthen
488ad17aee update to BIND 9.9.5
- patch to add another missing stdint.h inclusion for uintptr_t
- enable regression tests (these set temporary aliases on lo0;
should be safe, but I've set TEST_INTERACTIVE to avoid any unintended
consequences on bulk test runs).
2014-01-31 10:12:57 +00:00
sthen
23629488a3 update to BIND 9.9.4 - this release rolls in the RRL patches (ratelimit
flavour) to the main release, so pkgpath/conflict markers are set so that
updates are handled correctly
2013-09-19 23:33:11 +00:00
sthen
486289fc80 update to BIND 9.9.3 2013-05-29 20:19:15 +00:00
sthen
f245b54399 Normally newer versions of BIND default to one UDP listener per interface
per CPU. As found by Marc Peters, this doesn't work too well on a t5120
with 64 threads, so change the default settings in the rc.d script to -U 4
to cap this to 4, or the number of CPUs if less.

As usual with rc.d scripts, if you need to override flags, set
isc_named_flags="..." in rc.conf.local.
2013-04-03 20:17:23 +00:00
sthen
27468621ac SECURITY update for ports/net/isc-bind (affects 9.7 and up), CVE-2013-2266
"A critical defect in BIND 9 allows an attacker to cause excessive memory
consumption in named or other programs linked to libdns.

The problem is encountered when a program compiled to link to libdns
receives a maliciously-constructed regular expression via any of several
delivery methods."

https://kb.isc.org/article/AA-0087
2013-03-28 09:18:51 +00:00
sthen
fc9a44a25b SECURITY update to BIND 9.9.2-P1
A specific query can cause BIND nameservers using DNS64 to exit
with a REQUIRE assertion failure.

BIND nameservers that are not using DNS64 are not at risk.
https://kb.isc.org/article/AA-00828  CVE-2012-5688
2012-12-04 21:48:27 +00:00
sthen
94ec942f9f add "ratelimit" flavour to net/isc-bind to build it with the experimental DNS
response rate limiting (DNS RRL) patchset, http://www.redbarn.org/dns/ratelimits
2012-08-31 09:16:35 +00:00
sthen
1fae95c381 import BIND 9.9.1-P1 as ports/net/isc-bind - this is newer than the
version of BIND than is in the base OS (some people require features
from this version e.g. DNS64), but note that it does not include
the hardening changes made to the version in base.

feedback from naddy@ giovanni@, ok giovanni@.

"BIND is open source software that implements the Domain Name System
(DNS) protocols for the Internet. It is a reference implementation
of those protocols, but it is also production-grade software,
suitable for use in high-volume and high-reliability applications."
2012-07-19 08:36:45 +00:00