142 Commits

Author SHA1 Message Date
sthen
b30e0ea157 "upgrade" bind again, this time to 9.16.10, in comparison with what we
currently have this removes the feature that it leaks memory when you
reload it
2021-02-27 20:56:03 +00:00
sthen
c39d9068da isc-bind: backport https://gitlab.isc.org/isc-projects/bind9/-/issues/2413 fix
found the hard way by Christian Gut, thanks for tracking this down.

12c5b2a1b8.patch
2021-02-25 16:37:22 +00:00
sthen
745105c362 automatically handle ports which use the python module and have flavours
other than the usual "python3/<blank>" python version selection and
remove setting MODPY_VERSION=${MODPY_DEFAULT_VERSION_3} again from the
affected ports.
2021-02-23 22:04:35 +00:00
sthen
761c9f34ff ports which use the python module and have flavours other than the
usual "python3/<blank>" python version selection still require setting
MODPY_VERSION for now.
2021-02-23 21:45:49 +00:00
sthen
3cbe1c2f30 Reverse the polarity of MODPY_VERSION; default is now 3.x,
if a port needs 2.x then set MODPY_VERSION=${MODPY_DEFAULT_VERSION_2}.

This commit doesn't change any versions currently used; it may be that
some ports have MODPY_DEFAULT_VERSION_2 but don't require it, those
should be cleaned up in the course of updating ports where possible.

Python module ports providing py3-* packages should still use
FLAVOR=python3 so that we don't have a mixture of dependencies some
using ${MODPY_FLAVOR} and others not.
2021-02-23 19:39:08 +00:00
sthen
7948330fd4 upgrade from BIND 9.16.12 to 9.16.11 plus backported patch for
CVE-2020-8625. also add more recently committed "Rollback setting
IP_DONTFRAG option on the UDP sockets" patch fixing
https://gitlab.isc.org/isc-projects/bind9/-/issues/2466
https://gitlab.isc.org/isc-projects/bind9/-/issues/2487

re
https://kb.isc.org/docs/operational-notification-enabling-new-bind-option-stale-answer-client-timeout-can-result-in-unexpected-server-termination
https://kb.isc.org/docs/operational-notification-zone-journal-jnl-file-incompatibility-after-upgrading-to-bind-91612-and-917
2021-02-20 15:49:52 +00:00
sthen
26affe81d1 update to BIND 9.16.12
https://kb.isc.org/docs/cve-2020-8625
https://downloads.isc.org/isc/bind9/9.16.12/doc/arm/html/notes.html#notes-for-bind-9-16-12
2021-02-17 20:40:16 +00:00
sthen
cb78032923 update to isc-bind-9.16.11 2021-01-21 13:38:54 +00:00
sthen
5dfe12e207 minor update to bind-9.16.10 2020-12-16 21:44:49 +00:00
sthen
2b6b9a42fc tweak comment 2020-11-25 21:22:23 +00:00
sthen
bcda563f68 update to bind-9.16.9 2020-11-25 21:14:42 +00:00
sthen
52a2d8e4fa update to BIND 9.16.8 2020-10-22 11:30:05 +00:00
sthen
a0ffd373ef update to BIND-9.16.7 2020-09-17 08:16:03 +00:00
sthen
1db1986487 update to BIND 9.16.6, fixes various assertion failures. https://downloads.isc.org/isc/bind9/9.16.6/doc/arm/html/notes.html#notes-for-bind-9-16-6 2020-08-21 06:03:11 +00:00
sthen
1a13acd21c update to BIND 9.16.5 2020-07-16 10:07:53 +00:00
sthen
6cc9779250 switch my maintainer email addresses to my own domain 2020-07-11 22:54:35 +00:00
sthen
46bc2bd3d3 bump; plist changed but no forced python dep 2020-07-04 09:45:38 +00:00
sthen
de6d69b0eb update to BIND 9.16.4
- It was possible to trigger an assertion when attempting to fill an
oversized TCP buffer. This was disclosed in CVE-2020-8618. [GL #1850]

- It was possible to trigger an INSIST failure when a zone with an
interior wildcard label was queried in a certain pattern. This was
disclosed in CVE-2020-8619. [GL #1111] [GL #1718]
2020-06-17 20:46:54 +00:00
sthen
e752a2954d isc-bind: drop most of the outdated sample config files (including a very
old root.hint, the compiled-in defaults are better). there isn't really a
"one size fits all" configuration, these files gave bad examples (combined
recursive+auth hasn't been recommended in years), and as this is not the
default nameserver on the OS any more hand-holding isn't really needed.

by way of compensation: install the docs.
2020-05-29 20:05:37 +00:00
sthen
1defa1cfdd update to BIND 9.16.3
CVE-2020-8616: BIND does not sufficiently limit the number of fetches
performed when processing referrals

CVE-2020-8617: A logic error in code which checks TSIG validity can be
used to trigger an assertion failure in tsig.c

More info on the referral problem in http://www.nxnsattack.com/dns-ns-paper.pdf
2020-05-19 09:32:38 +00:00
sthen
e20b190a81 isc-bind: remove obsolote CONFIGURE_ARGS (noop; they were ignored anyway).
From Claus Assmann.
2020-04-19 15:38:58 +00:00
sthen
f3f6d5c6d2 update to BIND 9.16.2, various fixes including "Fix ineffective DNS
rebinding protection when BIND is configured as a forwarding DNS server."
2020-04-15 18:41:07 +00:00
sthen
b0a0272a53 fix atomic for macppc base-clang 2020-04-06 22:10:30 +00:00
sthen
dae9e69f29 isc-bind: don't pick up cmocka if present at autoconf time 2020-03-19 19:05:22 +00:00
sthen
9a817f1e5e update net/isc-bind to 9.16.1 2020-03-19 17:07:20 +00:00
sthen
6a2eff1a2d net/isc-bind: apply upstream patch for problem with TCP client quota limits
https://kb.isc.org/docs/operational-notification-an-error-in-handling-tcp-client-quota-limits-can-exhaust-tcp-connections-in-bind-9160
2020-03-06 12:08:46 +00:00
sthen
0cbf314906 update to BIND 9.16.0 (new stable/ESV release) 2020-02-20 14:00:32 +00:00
sthen
c4c4e1c5f2 get rid of some of bind's "|| defined(LIBRESSL_VERSION_NUMBER)" for things
that libressl now has
2020-01-23 22:08:08 +00:00
sthen
d5bf3a27aa update to BIND 9.14.10 2020-01-23 20:52:05 +00:00
sthen
c64ca89299 garbage-collect DIG_SIGCHASE, no longer used upstream
(use delv if you want to do full validation)
2020-01-06 18:05:12 +00:00
sthen
9baafb97ce struct stat definition is in sys/stat.h, not sys/fcntl.h. fix so that
libisc knows that we do have nsec timestamps. spotted by florian@ in
src/usr.sbin/bind.
2020-01-06 14:45:39 +00:00
sthen
7e31cb7dcc disable SEPARATE_BUILD, fixes build failure (on a system which doesn't
already have bind installed) reported by naddy
2019-12-19 15:42:00 +00:00
sthen
0dc71803fb update to bind 9.14.9 (released today)
remove the no_openssl flavour, openssl/libressl is required in the
current versions
2019-12-18 19:38:17 +00:00
sthen
e4c52ff719 major version update to BIND 9.14.8 2019-12-18 15:05:43 +00:00
sthen
b4f2dcb9ef update HOMEPAGE 2019-12-17 18:03:22 +00:00
sthen
4fd6b85d82 add edig/ehost/enslookup symlinks
move another pledge to a better place, drop some rpath
2019-12-17 14:18:43 +00:00
sthen
33b647a4ee move down the second ratchetted pledge in the ports-BIND version of dig,
it should have been done after loading a tsig keyfile.

drop rpath from that pledge, it used to be needed for charset conversion
with idn names, but this just prints "Cannot represent '%s' in the current
locale" now for !utf8 locales (maybe as a result of dropping the !utf8
ctype files?)
2019-12-17 00:46:15 +00:00
sthen
6dcc331f9c update to bind-9.11.13
CVE-2019-6477, TCP-pipelined queries can bypass tcp-clients limit
2019-11-20 22:15:58 +00:00
sthen
952b2075b4 update to isc-bind-9.11.12 2019-10-16 21:33:06 +00:00
sthen
c7fb374db3 update to isc-bind-9.11.11 2019-09-19 14:46:47 +00:00
sthen
2c7731e662 update to bind-9.11.10 2019-08-22 16:16:46 +00:00
sthen
d3ad4631aa the geoip flavour requires COMPILER=base-clang ports-gcc / COMPILER_LANGS=c 2019-07-27 14:01:45 +00:00
sthen
05c6373d73 update to isc-bind 9.11.9, switch the geoip support to newly added geoip2/libmaxminddb
CVE-2019-6471
2019-07-18 07:24:58 +00:00
sthen
9e7573b1f1 update to BIND 9.11.8
CVE-2019-6471:  A race condition when discarding malformed
packets can cause BIND to exit with an assertion failure
https://kb.isc.org/docs/cve-2019-6471
2019-06-20 14:44:20 +00:00
sthen
9c6e9626b9 s/PERMIT_PACKAGE_CDROM/PERMIT_PACKAGE/ and some light whitespace tidying
in ports which I maintain
2019-06-03 16:06:50 +00:00
sthen
587c11a359 update to BIND 9.11.7 2019-05-17 12:52:46 +00:00
sthen
e39953dc90 Security update to bind 9.11.6-P1, plus patches ("Replace atomic
operations in bin/named/client.c with isc_refcount reference counting")
from https://gitlab.isc.org/isc-projects/bind9/merge_requests/1864.patch
for wider arch support.

Fixes:

CVE-2018-5743: Limiting simultaneous TCP clients is ineffective
https://kb.isc.org/docs/cve-2018-5743
2019-04-27 22:26:55 +00:00
sthen
cd845628d0 update to BIND 9.11.6 2019-03-01 17:17:08 +00:00
sthen
115e360822 security update to isc-bind 9.11.5-P4
CVE-2018-5744: A specially crafted packet can cause named to leak memory
...
A failure to free memory can occur when processing messages
having a specific combination of EDNS options.

By exploiting this condition, an attacker can potentially cause
named's memory use to grow without bounds until all memory
available to the process is exhausted. Typically a server process
is limited as to the amount of memory it can use but if the named
process is not limited by the operating system all free memory
on the server could be exhausted.
...

CVE-2018-5745: An assertion failure can occur if a trust anchor
rolls over to an unsupported key algorithm when using managed-keys

(there is also CVE-2019-6465 but we don't build dlz)
2019-02-21 23:35:34 +00:00
sthen
d45adb82a3 update to BIND 9.11.5-P1
5108.   [bug]           Named could fail to determine bottom of zone when
                        removing out of date keys leading to invalid NSEC
                        and NSEC3 records being added to the zone. [GL #771]
2018-12-13 14:27:47 +00:00