Commit Graph

28 Commits

Author SHA1 Message Date
sthen
f380382ce8 fix a remote-triggerable assertion crash in pre-fetch in the recursor,
introduced in BIND 9.10.0 (we only updated to this recently so no -stable
impact).  workaround "prefetch 0;".  CVE-2014-3214
2014-05-08 22:14:56 +00:00
sthen
d19ad24200 update to BIND 9.10.0 and add a flavour for the new geolocation support 2014-05-01 20:19:25 +00:00
ajacoutot
cfe4be35c5 No need to explicitely SUBST_VARS LOCALSTATEDIR anymore. 2014-04-15 08:53:04 +00:00
sthen
62adf653e3 sync upstream lib versions in comments in SHARED_LIBS lines; no pkg change 2014-01-31 10:14:46 +00:00
sthen
488ad17aee update to BIND 9.9.5
- patch to add another missing stdint.h inclusion for uintptr_t
- enable regression tests (these set temporary aliases on lo0;
should be safe, but I've set TEST_INTERACTIVE to avoid any unintended
consequences on bulk test runs).
2014-01-31 10:12:57 +00:00
sthen
fe5124d90c Update to BIND 9.9.4-P2, CVE-2014-0591 - an assertion can be triggered by
a crafted query against an NSEC3-signed zone, causing the server to exit.
Affects authoritative nameservers serving at least one NSEC3-signed zone.
Does not affect recursive-only servers, or auth servers which do not serve
NSEC3-signed zones.
2014-01-13 17:13:11 +00:00
sthen
aff1a21337 Update to BIND 9.9.4-PL1 - treat an all-zero netmask as invalid when
generating the localnets acl.
2013-11-06 20:37:11 +00:00
sthen
b9abfc174a don't use arc4random_addrandom to seed 2013-10-22 08:26:12 +00:00
sthen
23629488a3 update to BIND 9.9.4 - this release rolls in the RRL patches (ratelimit
flavour) to the main release, so pkgpath/conflict markers are set so that
updates are handled correctly
2013-09-19 23:33:11 +00:00
rpe
e3281ab567 RRL patches version naming scheme changed and
bump REVISION due to slightly changed patch file

with feedback from and ok sthen@
2013-08-28 20:55:22 +00:00
sthen
5ca215842a SECURITY update to BIND 9.9.3p2. CVE-2013-4854: A specially crafted
query that includes malformed rdata can cause named to terminate with an
assertion failure while rejecting the malformed query. Authoritative and
recursive servers are equally vulnerable. Intentional exploitation of
this condition can cause a denial of service in all nameservers running
affected versions of BIND 9. Access Control Lists do not provide any
protection from malicious clients.
2013-08-06 20:09:00 +00:00
sthen
d4e35b1d28 CVE-2013-3919 update to BIND 9.9.3-P1, recursive resolver can be crashed by
a query for a malformed zone. This was introduced in the recent 9.9.3 release.
2013-06-05 00:32:18 +00:00
sthen
a71ebd72fe switch to upstream RRL patches now they're available. 2013-05-31 10:09:03 +00:00
sthen
486289fc80 update to BIND 9.9.3 2013-05-29 20:19:15 +00:00
sthen
4338c642c8 update to newer RRL patch (affects FLAVOR=ratelimit only) 2013-04-13 12:41:01 +00:00
sthen
f245b54399 Normally newer versions of BIND default to one UDP listener per interface
per CPU. As found by Marc Peters, this doesn't work too well on a t5120
with 64 threads, so change the default settings in the rc.d script to -U 4
to cap this to 4, or the number of CPUs if less.

As usual with rc.d scripts, if you need to override flags, set
isc_named_flags="..." in rc.conf.local.
2013-04-03 20:17:23 +00:00
sthen
27468621ac SECURITY update for ports/net/isc-bind (affects 9.7 and up), CVE-2013-2266
"A critical defect in BIND 9 allows an attacker to cause excessive memory
consumption in named or other programs linked to libdns.

The problem is encountered when a program compiled to link to libdns
receives a maliciously-constructed regular expression via any of several
delivery methods."

https://kb.isc.org/article/AA-0087
2013-03-28 09:18:51 +00:00
ajacoutot
58f1a6f9f6 USE_LIBTOOL=Yes is the default now. 2013-03-21 08:45:11 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
f5a323c546 Don't use ${FLAVOR:L}, we only support lower-case flavours now.
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00
sthen
8f1bb57bea sync new address for D root 2013-01-04 13:34:51 +00:00
sthen
fc9a44a25b SECURITY update to BIND 9.9.2-P1
A specific query can cause BIND nameservers using DNS64 to exit
with a REQUIRE assertion failure.

BIND nameservers that are not using DNS64 are not at risk.
https://kb.isc.org/article/AA-00828  CVE-2012-5688
2012-12-04 21:48:27 +00:00
sthen
8878756014 Update to BIND 9.9.1P4: CVE-2012-5166
If specific combinations of RDATA are loaded into a nameserver, either
via cache or an authoritative zone, a subsequent query for a related
record will cause named to lock up.

See https://kb.isc.org/article/AA-00801 for more details.
2012-10-09 22:46:17 +00:00
sthen
26a3298ab2 SECURITY update to BIND 9.9.1-P3, fixes CVE-2012-4244
https://kb.isc.org/article/AA-00778

If a record with RDATA in excess of 65535 bytes is loaded into a
nameserver, a subsequent query for that record will cause named to exit
with an assertion failure.

This vulnerability can be exploited remotely against recursive servers
by inducing them to query for records provided by an authoritative
server. It affects authoritative servers if a zone containing this type
of resource record is loaded from file or provided via zone transfer.
2012-09-12 17:21:52 +00:00
naddy
4b2c0bced6 bump after DESCR changed when ratelimit flavor was added 2012-09-02 10:55:59 +00:00
sthen
94ec942f9f add "ratelimit" flavour to net/isc-bind to build it with the experimental DNS
response rate limiting (DNS RRL) patchset, http://www.redbarn.org/dns/ratelimits
2012-08-31 09:16:35 +00:00
sthen
c4cebc1945 Security update to BIND 9.9.1-P2, from Brad.
CVE-2012-3868: High TCP Query Load Can Trigger a Memory Leak
CVE-2012-3817: Heavy DNSSEC Validation Load Can Cause a "Bad Cache"
Assertion Failure
2012-08-07 07:44:27 +00:00
sthen
1fae95c381 import BIND 9.9.1-P1 as ports/net/isc-bind - this is newer than the
version of BIND than is in the base OS (some people require features
from this version e.g. DNS64), but note that it does not include
the hardening changes made to the version in base.

feedback from naddy@ giovanni@, ok giovanni@.

"BIND is open source software that implements the Domain Name System
(DNS) protocols for the Internet. It is a reference implementation
of those protocols, but it is also production-grade software,
suitable for use in high-volume and high-reliability applications."
2012-07-19 08:36:45 +00:00