85 Commits

Author SHA1 Message Date
sthen
794a748a41 fix; we now have ECDSA_SIG accessors 2018-03-18 23:56:59 +00:00
sthen
a323878aee add a comment re upstream supported version policy 2018-03-16 15:02:04 +00:00
sthen
91f0e035f4 update to bind-9.11.3 2018-03-15 00:59:18 +00:00
sthen
307a93ca6a typo in ifdef, thanks patrick keshishian for noticing. 2018-03-04 21:12:03 +00:00
sthen
2ba0a9b0a4 fix, we have all the DH_ DSA_ RSA_ needed 2018-02-20 21:02:13 +00:00
sthen
7285026abb fix; we now have DSA_set0_key DH_set0_key 2018-02-19 18:19:28 +00:00
sthen
1b8f6daf1c handle next round of libressl changes 2018-02-18 14:09:40 +00:00
sthen
758d9b454a fix: various get0_key/pqg functions, ok jsing 2018-02-18 11:52:03 +00:00
sthen
ea032018e5 security update to BIND 9.11.2-P1
* Addresses could be referenced after being freed during resolver
processing, causing an assertion failure. The chances of this happening
were remote, but the introduction of a delay in resolution increased
them. (The delay will be addressed in an upcoming maintenance release.)
This bug is disclosed in CVE-2017-3145. [RT #46839]
2018-01-16 22:13:59 +00:00
sthen
75eb7f397b update BIND to 9.11.2, switching from 9.10 to 9.11 branch (which is a long
term support branch).

note, the license changed to MPL.
2018-01-12 17:08:01 +00:00
rpe
9a8b5ccd06 Change the shebang line from /bin/sh to /bin/ksh in all ports rc.d
daemon scripts and bump subpackages that contain the *.rc scripts.

discussed with and OK aja@
OK tb
2018-01-11 19:27:01 +00:00
sthen
b4415079f5 Force use of /dev/random for BIND, overriding an OpenBSD-specific check in
upstream's autoconf script to prefer /dev/arandom. One of a couple of options
suggested by naddy@.
2017-10-30 22:19:38 +00:00
sthen
c9959dc190 update to bind 9.10.6 2017-07-28 23:38:06 +00:00
espie
7f713eb1f5 let it build with clang, just grab the unwinder from c++abi 2017-07-28 20:53:33 +00:00
sthen
807c691ab5 update to BIND-9.10.5-P3
9.10.5-P2 broke verification of TSIG signed TCP message sequences where
not all the messages contain TSIG records. These may be used in AXFR and
IXFR responses. [RT #45509]
2017-07-10 07:38:04 +00:00
sthen
ab9e1e6794 Update to BIND 9.10.5-P2
An error in TSIG handling could permit unauthorized zone transfers
or zone updates. CVE-2017-3142, CVE-2017-3143.

Also updates the address of b.root in hints.
2017-06-29 21:14:54 +00:00
sthen
ad2da6a263 update to BIND 9.10.5-P1
* With certain RPZ configurations, a response with TTL 0 could cause
named to go into an infinite query loop. This flaw is disclosed in
CVE-2017-3140. [RT #45181]

A server is potentially vulnerable to degradation of service if
1. the server is configured to use RPZ,
2. the server uses NSDNAME or NSIP policy rules, and
3. an attacker can cause the server to process a specific query
2017-06-15 09:01:49 +00:00
sthen
605258dc87 update to BIND 9.10.5 2017-05-03 20:20:42 +00:00
sthen
3699ab4692 update to BIND 9.10.4-P8 (-P7 was withdrawn)
CVE-2017-3136: An error handling synthesized records could cause an
assertion failure when using DNS64 with "break-dnssec yes;"

CVE-2017-3137: A response packet can cause a resolver to terminate when
processing an answer containing a CNAME or DNAME

CVE-2017-3138: named exits with a REQUIRE assertion failure if it receives
a null command string on its control channel
2017-04-13 10:35:33 +00:00
sthen
b3152d3371 update to BIND 9.10.4-P6
* If a server is configured with a response policy zone (RPZ) that
rewrites an answer with local data, and is also configured for DNS64
address mapping, a NULL pointer can be read triggering a server crash.
This flaw is disclosed in CVE-2017-3135. [RT #44434]

* A synthesized CNAME record appearing in a response before the associated
DNAME could be cached, when it should not have been. This was a
regression introduced while addressing CVE-2016-8864. [RT #44318]
2017-02-09 00:04:40 +00:00
sthen
50473a77bb add pledges for dig/host/nslookup in the ports version of BIND. initial
pledge is "stdio rpath inet unix dns", dropping to "stdio inet dns"
after argument parsing.

access to resolv.conf is required late; the dns pledge is used for this
rather than requiring full rpath; however contrary to the version in
base, inet is allowed as well, so that it can be used as a debug tool
for servers on alternate ports.

works fine for me; no feedback after posting yet so committing to get
real-world testing. please report any issues.
2017-01-24 11:46:35 +00:00
sthen
59278df8ab SECURITY update to BIND 9.10.4-P5
Named could mishandle authority sections that were missing RRSIGs triggering
an assertion failure.  CVE-2016-9444

Named mishandled some responses where covering RRSIG records are returned
without the requested data resulting in a assertion failure.  CVE-2016-9147

Named incorrectly tried to cache TKEY records which could trigger an
assertion failure when there was a class mismatch.  CVE-2016-9131
2017-01-12 12:22:20 +00:00
sthen
773d2b6dc7 update to BIND 9.10.4-P1, fixing a resolver DoS in DNAME handling. CVE-2016-8864 2016-11-01 21:02:03 +00:00
sthen
fe29ebcaad update to BIND 9.10.4-P3, fixing
https://kb.isc.org/article/AA-01393/74/CVE-2016-2775 (lwres only)
https://kb.isc.org/article/AA-01419/74/CVE-2016-2776 ("all servers if
they can receive request packets from any source")
2016-09-27 19:49:10 +00:00
naddy
2594c2979f replace libiconv module 2016-09-13 16:12:14 +00:00
sthen
2b012a1821 Update to BIND 9.10.4-P2, fixes CVE-2016-2775 ("getrrsetbyname with a non
absolute name could trigger an infinite recursion bug in lwres[..]"; affects
users of lwresd and users with "lwres" enabled in their configuration).
Also has a couple of regression fixes. OK naddy@
2016-07-19 10:46:15 +00:00
sthen
159edcc4ce update to BIND 9.10.4-P1, fixing a problem where adjacent bitfields
were protected by different locks.

See http://fanf.livejournal.com/144615.html for an informative write-up
on the issue: "Even the Deathstation 9000 can't screw up the BIND 9.10.4
fix".
2016-05-26 09:25:25 +00:00
sthen
7924de779f update to bind-9.10.4 2016-04-29 11:01:02 +00:00
naddy
ce859edcb4 garbage collect CONFIGURE_SHARED 2016-03-11 20:28:21 +00:00
sthen
d5803c3bbe update to BIND 9.10.3-P4, fixes crashes (assertion failures), one present
since 9.0.0.  CVE-2016-1285 CVE-2016-1286 CVE-2016-2088
2016-03-10 00:03:34 +00:00
sthen
99d5f42fce bump (GeoIP pkgpath change) 2016-03-01 00:07:17 +00:00
sthen
1268bf479e update to BIND 9.10.3P3
- Fixed a regression in resolver.c:possibly_mark() which caused
known-bogus servers to be queried anyway. [RT #41321]

- render_ecs errors were mishandled when printing out a OPT record
resulting in a assertion failure. (CVE-2015-8705) [RT #41397]

- Specific APL data could trigger a INSIST. (CVE-2015-8704) [RT #41396]
2016-01-19 22:24:05 +00:00
sthen
64e6e88b23 bump isc-bind REVISION to avoid warnings with updates (different deps
between 5.8-stable and -current)
2015-12-17 17:07:41 +00:00
sthen
73a350007e update to bind-9.10.3-P2
4260.   [security]      Insufficient testing when parsing a message allowed
                        records with an incorrect class to be be accepted,
                        triggering a REQUIRE failure when those records
                        were subsequently cached. (CVE-2015-8000) [RT #40987]

4253.   [security]      Address fetch context reference count handling error
                        on socket error. (CVE-2015-8461) [RT#40945]
2015-12-15 22:43:37 +00:00
sthen
aec87238b3 oops, forgot to re-add json-c to WANTLIB/LIB_DEPENDS in previous commit.
spotted by nigel@
2015-10-07 19:36:50 +00:00
sthen
bbf0003393 reenable json stats in BIND, there used to be a problem with build on arch
without sync_val_compare_and_swap_4 but this was worked around in json-c.
reminded by jca.
2015-10-03 19:44:51 +00:00
sthen
c8c817ea19 build dig with SIGCHASE support 2015-09-25 14:02:31 +00:00
sthen
eef49f1bf6 update to BIND 9.10.3. add a bunch of patches because they now support
OpenSSL 1.1 api (OPENSSL_VERSION_NUMBER < / >= 0x10100000L checks).
2015-09-16 15:28:16 +00:00
sthen
a14d71ae63 SECURITY update to bind-9.10.2-P4: CVE-2015-5722, CVE-2015-5986 2015-09-02 20:25:43 +00:00
sthen
d4c0b14bbc Add a no_ssl flavour to BIND.
Expand the comment about json-c as that's broken on mips64 as well as hppa.
2015-08-24 20:46:49 +00:00
sthen
ac18a8a106 Security update to BIND 9.10.2p3 - a failure to reset a value to NULL in tkey.c
could result in an assertion failure. (CVE-2015-5477)
2015-07-28 20:03:35 +00:00
sthen
0aa3723bfe Build BIND with --enable-filter-aaaa, no change by default, but this allows
use of the filter-aaaa-on-v4 config option. Req'd by Marcus Andree.
2015-07-15 06:43:31 +00:00
sthen
b806684a18 update to BIND 9.10.2-P2, fixes CVE-2015-4620 - querying a malicious zone can
trigger a "REQUIRE" assertion failure in the resolver if DNSSEC validation
is enabled.
2015-07-07 19:32:47 +00:00
sthen
6f9fbef6a0 SECURITY update to BIND 9.10.2-P1, various problems with RPZ (policy zones),
and a possible crash with async zone loads. https://kb.isc.org/article/AA-01266

    "If you are using RPZ in BIND 9.10 in a production environment, and
    particularly if you have multiple policy zones, you should upgrade to
    BIND 9.10.2-P1. Otherwise, this upgrade is not urgent."
2015-06-10 22:40:41 +00:00
kettenis
5b67b7d496 Use $CC to link shared library to make sure crtbeginS.o gets linked in.
Switches CONFIGURE_STYLE to autoconf to make sure configure gets regenerated.

ok (and help from) sthen@
2015-05-16 10:15:53 +00:00
sthen
d10584daed take MAINTAINER 2015-03-14 22:26:21 +00:00
sthen
d46cd7c56f update to BIND 9.10.2 2015-03-14 21:01:54 +00:00
sthen
ebab207e7e update to BIND 9.10.2P2
On servers configured to perform DNSSEC validation using managed
   trust anchors (i.e., keys configured explicitly via managed-keys, or
   implicitly via dnssec-validation auto; or dnssec-lookaside auto;),
   revoking a trust anchor and sending a new untrusted replacement could
   cause named to crash with an assertion failure.  This could occur in
   the event of a botched key rollover, or potentially as a result of a
   deliberate attack if the attacker was in position to monitor the
   victim's DNS traffic.  This flaw was discovered by Jan-Piet Mens, and
   is disclosed in [CVE-2015-1349] [RT #38344] (**)
2015-02-18 22:49:44 +00:00
sthen
0591485581 previous change ("Disable json stats in bind") resulted in losing a couple
of symbols from libdns; bump SHARED_LIBS version and REVISION.
2015-01-30 15:15:42 +00:00
sthen
76f2dbf9cd Disable json stats in bind and zap BROKEN-hppa. 2015-01-15 22:34:02 +00:00