58 Commits

Author SHA1 Message Date
sthen
7924de779f update to bind-9.10.4 2016-04-29 11:01:02 +00:00
naddy
ce859edcb4 garbage collect CONFIGURE_SHARED 2016-03-11 20:28:21 +00:00
sthen
d5803c3bbe update to BIND 9.10.3-P4, fixes crashes (assertion failures), one present
since 9.0.0.  CVE-2016-1285 CVE-2016-1286 CVE-2016-2088
2016-03-10 00:03:34 +00:00
sthen
99d5f42fce bump (GeoIP pkgpath change) 2016-03-01 00:07:17 +00:00
sthen
1268bf479e update to BIND 9.10.3P3
- Fixed a regression in resolver.c:possibly_mark() which caused
known-bogus servers to be queried anyway. [RT #41321]

- render_ecs errors were mishandled when printing out a OPT record
resulting in a assertion failure. (CVE-2015-8705) [RT #41397]

- Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396]
2016-01-19 22:24:05 +00:00
sthen
64e6e88b23 bump isc-bind REVISION to avoid warnings with updates (different deps
between 5.8-stable and -current)
2015-12-17 17:07:41 +00:00
sthen
73a350007e update to bind-9.10.3-P2
4260.   [security]      Insufficient testing when parsing a message allowed
                        records with an incorrect class to be be accepted,
                        triggering a REQUIRE failure when those records
                        were subsequently cached. (CVE-2015-8000) [RT #40987]

4253.   [security]      Address fetch context reference count handling error
                        on socket error. (CVE-2015-8461) [RT#40945]
2015-12-15 22:43:37 +00:00
sthen
aec87238b3 oops, forgot to re-add json-c to WANTLIB/LIB_DEPENDS in previous commit.
spotted by nigel@
2015-10-07 19:36:50 +00:00
sthen
bbf0003393 reenable json stats in BIND, there used to be a problem with build on arch
without sync_val_compare_and_swap_4 but this was worked around in json-c.
reminded by jca.
2015-10-03 19:44:51 +00:00
sthen
c8c817ea19 build dig with SIGCHASE support 2015-09-25 14:02:31 +00:00
sthen
eef49f1bf6 update to BIND 9.10.3. add a bunch of patches because they now support
OpenSSL 1.1 api (OPENSSL_VERSION_NUMBER < / >= 0x10100000L checks).
2015-09-16 15:28:16 +00:00
sthen
a14d71ae63 SECURITY update to bind-9.10.2-P4: CVE-2015-5722, CVE-2015-5986 2015-09-02 20:25:43 +00:00
sthen
d4c0b14bbc Add a no_ssl flavour to BIND.
Expand the comment about json-c as that's broken on mips64 as well as hppa.
2015-08-24 20:46:49 +00:00
sthen
ac18a8a106 Security update to BIND 9.10.2p3 - a failure to reset a value to NULL in tkey.c
could result in an assertion failure. (CVE-2015-5477)
2015-07-28 20:03:35 +00:00
sthen
0aa3723bfe Build BIND with --enable-filter-aaaa, no change by default, but this allows
use of the filter-aaaa-on-v4 config option. Req'd by Marcus Andree.
2015-07-15 06:43:31 +00:00
sthen
b806684a18 update to BIND 9.10.2-P2, fixes CVE-2015-4620 - querying a malicious zone can
trigger a "REQUIRE" assertion failure in the resolver if DNSSEC validation
is enabled.
2015-07-07 19:32:47 +00:00
sthen
6f9fbef6a0 SECURITY update to BIND 9.10.2-P1, various problems with RPZ (policy zones),
and a possible crash with async zone loads. https://kb.isc.org/article/AA-01266

    "If you are using RPZ in BIND 9.10 in a production environment, and
    particularly if you have multiple policy zones, you should upgrade to
    BIND 9.10.2-P1. Otherwise, this upgrade is not urgent."
2015-06-10 22:40:41 +00:00
kettenis
5b67b7d496 Use $CC to link shared library to make sure crtbeginS.o gets linked in.
Switches CONFIGURE_STYLE to autoconf to make sure configure gets regenerated.

ok (and help from) sthen@
2015-05-16 10:15:53 +00:00
sthen
d10584daed take MAINTAINER 2015-03-14 22:26:21 +00:00
sthen
d46cd7c56f update to BIND 9.10.2 2015-03-14 21:01:54 +00:00
sthen
ebab207e7e update to BIND 9.10.2P2
On servers configured to perform DNSSEC validation using managed
   trust anchors (i.e., keys configured explicitly via managed-keys, or
   implicitly via dnssec-validation auto; or dnssec-lookaside auto;),
   revoking a trust anchor and sending a new untrusted replacement could
   cause named to crash with an assertion failure.  This could occur in
   the event of a botched key rollover, or potentially as a result of a
   deliberate attack if the attacker was in position to monitor the
   victim's DNS traffic.  This flaw was discovered by Jan-Piet Mens, and
   is disclosed in [CVE-2015-1349] [RT #38344] (**)
2015-02-18 22:49:44 +00:00
sthen
0591485581 previous change ("Disable json stats in bind") resulted in losing a couple
of symbols from libdns; bump SHARED_LIBS version and REVISION.
2015-01-30 15:15:42 +00:00
sthen
76f2dbf9cd Disable json stats in bind and zap BROKEN-hppa. 2015-01-15 22:34:02 +00:00
landry
f4253852ed BROKEN-hppa = uses json-c which requires atomic ops 2015-01-15 18:10:38 +00:00
sthen
9aa3e64853 Revert previous BIND workaround for query failures when coming up cold.
Instead, cherrypick a fix from git at source.isc.org; this exempts TLD and
root zone lookups from max-recursion-queries and changes the default to 75.
2014-12-17 23:39:17 +00:00
sthen
7a32acb9fa Update to BIND 9.10.1-P1, including query limits for recursion (DoS avoidance,
CVE-2014-8500), assertion DoS (recursive only, only with prefetch enabled,
CVE-2014-3214), assertion DoS (EDNS option processing, CVE-2014-3859) and
fixes to GeoIP (CVE-2014-8680 and another unclassified).

https://kb.isc.org/article/AA-01223/81/BIND-9.10.1-P1-Release-Notes.html

Add a local patch to increase the default query limit, during testing it
appears that the standard defaults can be easily falsely triggered during
priming at startup.
2014-12-09 17:21:36 +00:00
sthen
17fb16aa76 update to BIND 9.10.1 2014-09-23 09:42:41 +00:00
sthen
6e060bc8aa add comment (notes for possible renamings, things are a tad inconsistent at present) 2014-08-22 20:56:00 +00:00
sthen
2f2ec0320e install sample configs and switch to running as _bind uid 2014-08-22 20:32:13 +00:00
sthen
8cdfa4f6bf Update to BIND 9.10.0-P2, fixes CVE-2014-3859 "A query specially crafted to
exploit a defect in EDNS option processing can cause named to terminate with
an assertion failure. This fixes a missing isc_buffer_availablelength check
when printing out a packet." (This doesn't affect 9.9.x in 5.5-stable).

A few other fixes most of which don't affect us (one notable one is a
fix for GCC 4.9.0 optimizing away a null pointer check, more info on this
at https://kb.isc.org/article/AA-01167/)
2014-06-11 22:44:05 +00:00
sthen
f380382ce8 fix a remote-triggerable assertion crash in pre-fetch in the recursor,
introduced in BIND 9.10.0 (we only updated to this recently so no -stable
impact).  workaround "prefetch 0;".  CVE-2014-3214
2014-05-08 22:14:56 +00:00
sthen
d19ad24200 update to BIND 9.10.0 and add a flavour for the new geolocation support 2014-05-01 20:19:25 +00:00
ajacoutot
cfe4be35c5 No need to explicitely SUBST_VARS LOCALSTATEDIR anymore. 2014-04-15 08:53:04 +00:00
sthen
62adf653e3 sync upstream lib versions in comments in SHARED_LIBS lines; no pkg change 2014-01-31 10:14:46 +00:00
sthen
488ad17aee update to BIND 9.9.5
- patch to add another missing stdint.h inclusion for uintptr_t
- enable regression tests (these set temporary aliases on lo0;
should be safe, but I've set TEST_INTERACTIVE to avoid any unintended
consequences on bulk test runs).
2014-01-31 10:12:57 +00:00
sthen
fe5124d90c Update to BIND 9.9.4-P2, CVE-2014-0591 - an assertion can be triggered by
a crafted query against an NSEC3-signed zone, causing the server to exit.
Affects authoritative nameservers serving at least one NSEC3-signed zone.
Does not affect recursive-only servers, or auth servers which do not serve
NSEC3-signed zones.
2014-01-13 17:13:11 +00:00
sthen
aff1a21337 Update to BIND 9.9.4-PL1 - treat an all-zero netmask as invalid when
generating the localnets acl.
2013-11-06 20:37:11 +00:00
sthen
b9abfc174a don't use arc4random_addrandom to seed 2013-10-22 08:26:12 +00:00
sthen
23629488a3 update to BIND 9.9.4 - this release rolls in the RRL patches (ratelimit
flavour) to the main release, so pkgpath/conflict markers are set so that
updates are handled correctly
2013-09-19 23:33:11 +00:00
rpe
e3281ab567 RRL patches version naming scheme changed and
bump REVISION due to slightly changed patch file

with feedback from and ok sthen@
2013-08-28 20:55:22 +00:00
sthen
5ca215842a SECURITY update to BIND 9.9.3p2. CVE-2013-4854: A specially crafted
query that includes malformed rdata can cause named to terminate with an
assertion failure while rejecting the malformed query. Authoritative and
recursive servers are equally vulnerable. Intentional exploitation of
this condition can cause a denial of service in all nameservers running
affected versions of BIND 9. Access Control Lists do not provide any
protection from malicious clients.
2013-08-06 20:09:00 +00:00
sthen
d4e35b1d28 CVE-2013-3919 update to BIND 9.9.3-P1, recursive resolver can be crashed by
a query for a malformed zone. This was introduced in the recent 9.9.3 release.
2013-06-05 00:32:18 +00:00
sthen
a71ebd72fe switch to upstream RRL patches now they're available. 2013-05-31 10:09:03 +00:00
sthen
486289fc80 update to BIND 9.9.3 2013-05-29 20:19:15 +00:00
sthen
4338c642c8 update to newer RRL patch (affects FLAVOR=ratelimit only) 2013-04-13 12:41:01 +00:00
sthen
f245b54399 Normally newer versions of BIND default to one UDP listener per interface
per CPU. As found by Marc Peters, this doesn't work too well on a t5120
with 64 threads, so change the default settings in the rc.d script to -U 4
to cap this to 4, or the number of CPUs if less.

As usual with rc.d scripts, if you need to override flags, set
isc_named_flags="..." in rc.conf.local.
2013-04-03 20:17:23 +00:00
sthen
27468621ac SECURITY update for ports/net/isc-bind (affects 9.7 and up), CVE-2013-2266
"A critical defect in BIND 9 allows an attacker to cause excessive memory
consumption in named or other programs linked to libdns.

The problem is encountered when a program compiled to link to libdns
receives a maliciously-constructed regular expression via any of several
delivery methods."

https://kb.isc.org/article/AA-0087
2013-03-28 09:18:51 +00:00
ajacoutot
58f1a6f9f6 USE_LIBTOOL=Yes is the default now. 2013-03-21 08:45:11 +00:00
espie
eae66e4a7b PERMIT_* / REGRESS->TEST sweep 2013-03-11 11:35:43 +00:00
sthen
f5a323c546 Don't use ${FLAVOR:L}, we only support lower-case flavours now.
OK ajacoutot@ espie@
2013-02-09 14:49:50 +00:00