151 Commits

Author SHA1 Message Date
sthen
f2ad30e8cb update to BIND 9.16.21 2021-09-15 08:21:24 +00:00
sthen
e315af21a6 Add patch for https://kb.isc.org/docs/map-zone-format-incompatibility-in-bind-9-16-20-and-9-17-17 2021-08-20 17:46:19 +00:00
sthen
e5b688eb00 update to bind-9.16.20
CVE-2021-25218: A too-strict assertion check could be triggered when
responses in BIND 9.16.19 and 9.17.16 require UDP fragmentation if RRL
is in use.
2021-08-18 19:55:36 +00:00
sthen
c93819af5f patch isc-bind to stop using the IPV6_DONTFRAG socket option on OpenBSD;
this was added in the recent update, but the port is patched to use pledge
which doesn't allow this, resulting in it getting killed when trying to
do a lookup over IPv6.

found while checking that I did indeed have v6 glue on my domain when
trying to receive mail from someone whose work network is currently
carrying out an IPv6-only experiment (perhaps not intentionally ;)
2021-07-27 12:46:56 +00:00
sthen
1853d23268 let's try an update to bind-9.16.19 2021-07-22 12:28:53 +00:00
sthen
8e58eaf1ea Revert to BIND 9.16.16 to fix some issues with Ws. 2021-06-18 18:12:10 +00:00
sthen
5b7f347966 update to isc-bind-9.16.17 2021-06-16 22:03:54 +00:00
sthen
364e8091ee update to isc-bind-9.16.16 2021-05-24 16:27:37 +00:00
sthen
eba113a83d update to bind-9.16.15 for fixes for these 3 CVEs; if you are running
this please test and report back if you see problems; in the run-up
to OpenBSD 6.9 we dropped back to 9.16.10 due to problems in interim
releases


CVE-2021-25214: A broken inbound incremental zone update (IXFR)
can cause named to terminate unexpectedly
https://kb.isc.org/docs/cve-2021-25214

CVE-2021-25215: An assertion check can fail while answering queries for
DNAME records that require the DNAME to be processed to resolve itself
https://kb.isc.org/docs/cve-2021-25215

CVE-2021-25216: A second vulnerability in BIND's GSSAPI security policy
negotiation can be targeted by a buffer overflow attack
https://kb.isc.org/docs/cve-2021-25216
2021-04-29 09:28:31 +00:00
sthen
b30e0ea157 "upgrade" bind again, this time to 9.16.10, in comparison with what we
currently have this removes the feature that it leaks memory when you
reload it
2021-02-27 20:56:03 +00:00
sthen
c39d9068da isc-bind: backport https://gitlab.isc.org/isc-projects/bind9/-/issues/2413 fix
found the hard way by Christian Gut, thanks for tracking this down.

12c5b2a1b8.patch
2021-02-25 16:37:22 +00:00
sthen
745105c362 automatically handle ports which use the python module and have flavours
other than the usual "python3/<blank>" python version selection and
remove setting MODPY_VERSION=${MODPY_DEFAULT_VERSION_3} again from the
affected ports.
2021-02-23 22:04:35 +00:00
sthen
761c9f34ff ports which use the python module and have flavours other than the
usual "python3/<blank>" python version selection still require setting
MODPY_VERSION for now.
2021-02-23 21:45:49 +00:00
sthen
3cbe1c2f30 Reverse the polarity of MODPY_VERSION; default is now 3.x,
if a port needs 2.x then set MODPY_VERSION=${MODPY_DEFAULT_VERSION_2}.

This commit doesn't change any versions currently used; it may be that
some ports have MODPY_DEFAULT_VERSION_2 but don't require it, those
should be cleaned up in the course of updating ports where possible.

Python module ports providing py3-* packages should still use
FLAVOR=python3 so that we don't have a mixture of dependencies some
using ${MODPY_FLAVOR} and others not.
2021-02-23 19:39:08 +00:00
sthen
7948330fd4 upgrade from BIND 9.16.12 to 9.16.11 plus backported patch for
CVE-2020-8625. also add more recently committed "Rollback setting
IP_DONTFRAG option on the UDP sockets" patch fixing
https://gitlab.isc.org/isc-projects/bind9/-/issues/2466
https://gitlab.isc.org/isc-projects/bind9/-/issues/2487

re
https://kb.isc.org/docs/operational-notification-enabling-new-bind-option-stale-answer-client-timeout-can-result-in-unexpected-server-termination
https://kb.isc.org/docs/operational-notification-zone-journal-jnl-file-incompatibility-after-upgrading-to-bind-91612-and-917
2021-02-20 15:49:52 +00:00
sthen
26affe81d1 update to BIND 9.16.12
https://kb.isc.org/docs/cve-2020-8625
https://downloads.isc.org/isc/bind9/9.16.12/doc/arm/html/notes.html#notes-for-bind-9-16-12
2021-02-17 20:40:16 +00:00
sthen
cb78032923 update to isc-bind-9.16.11 2021-01-21 13:38:54 +00:00
sthen
5dfe12e207 minor update to bind-9.16.10 2020-12-16 21:44:49 +00:00
sthen
2b6b9a42fc tweak comment 2020-11-25 21:22:23 +00:00
sthen
bcda563f68 update to bind-9.16.9 2020-11-25 21:14:42 +00:00
sthen
52a2d8e4fa update to BIND 9.16.8 2020-10-22 11:30:05 +00:00
sthen
a0ffd373ef update to BIND-9.16.7 2020-09-17 08:16:03 +00:00
sthen
1db1986487 update to BIND 9.16.6, fixes various assertion failures. https://downloads.isc.org/isc/bind9/9.16.6/doc/arm/html/notes.html#notes-for-bind-9-16-6 2020-08-21 06:03:11 +00:00
sthen
1a13acd21c update to BIND 9.16.5 2020-07-16 10:07:53 +00:00
sthen
6cc9779250 switch my maintainer email addresses to my own domain 2020-07-11 22:54:35 +00:00
sthen
46bc2bd3d3 bump; plist changed but no forced python dep 2020-07-04 09:45:38 +00:00
sthen
de6d69b0eb update to BIND 9.16.4
- It was possible to trigger an assertion when attempting to fill an
oversized TCP buffer. This was disclosed in CVE-2020-8618. [GL #1850]

- It was possible to trigger an INSIST failure when a zone with an
interior wildcard label was queried in a certain pattern. This was
disclosed in CVE-2020-8619. [GL #1111] [GL #1718]
2020-06-17 20:46:54 +00:00
sthen
e752a2954d isc-bind: drop most of the outdated sample config files (including a very
old root.hint, the compiled-in defaults are better). there isn't really a
"one size fits all" configuration, these files gave bad examples (combined
recursive+auth hasn't been recommended in years), and as this is not the
default nameserver on the OS any more hand-holding isn't really needed.

by way of compensation: install the docs.
2020-05-29 20:05:37 +00:00
sthen
1defa1cfdd update to BIND 9.16.3
CVE-2020-8616: BIND does not sufficiently limit the number of fetches
performed when processing referrals

CVE-2020-8617: A logic error in code which checks TSIG validity can be
used to trigger an assertion failure in tsig.c

More info on the referral problem in http://www.nxnsattack.com/dns-ns-paper.pdf
2020-05-19 09:32:38 +00:00
sthen
e20b190a81 isc-bind: remove obsolote CONFIGURE_ARGS (noop; they were ignored anyway).
From Claus Assmann.
2020-04-19 15:38:58 +00:00
sthen
f3f6d5c6d2 update to BIND 9.16.2, various fixes including "Fix ineffective DNS
rebinding protection when BIND is configured as a forwarding DNS server."
2020-04-15 18:41:07 +00:00
sthen
b0a0272a53 fix atomic for macppc base-clang 2020-04-06 22:10:30 +00:00
sthen
dae9e69f29 isc-bind: don't pick up cmocka if present at autoconf time 2020-03-19 19:05:22 +00:00
sthen
9a817f1e5e update net/isc-bind to 9.16.1 2020-03-19 17:07:20 +00:00
sthen
6a2eff1a2d net/isc-bind: apply upstream patch for problem with TCP client quota limits
https://kb.isc.org/docs/operational-notification-an-error-in-handling-tcp-client-quota-limits-can-exhaust-tcp-connections-in-bind-9160
2020-03-06 12:08:46 +00:00
sthen
0cbf314906 update to BIND 9.16.0 (new stable/ESV release) 2020-02-20 14:00:32 +00:00
sthen
c4c4e1c5f2 get rid of some of bind's "|| defined(LIBRESSL_VERSION_NUMBER)" for things
that libressl now has
2020-01-23 22:08:08 +00:00
sthen
d5bf3a27aa update to BIND 9.14.10 2020-01-23 20:52:05 +00:00
sthen
c64ca89299 garbage-collect DIG_SIGCHASE, no longer used upstream
(use delv if you want to do full validation)
2020-01-06 18:05:12 +00:00
sthen
9baafb97ce struct stat definition is in sys/stat.h, not sys/fcntl.h. fix so that
libisc knows that we do have nsec timestamps. spotted by florian@ in
src/usr.sbin/bind.
2020-01-06 14:45:39 +00:00
sthen
7e31cb7dcc disable SEPARATE_BUILD, fixes build failure (on a system which doesn't
already have bind installed) reported by naddy
2019-12-19 15:42:00 +00:00
sthen
0dc71803fb update to bind 9.14.9 (released today)
remove the no_openssl flavour, openssl/libressl is required in the
current versions
2019-12-18 19:38:17 +00:00
sthen
e4c52ff719 major version update to BIND 9.14.8 2019-12-18 15:05:43 +00:00
sthen
b4f2dcb9ef update HOMEPAGE 2019-12-17 18:03:22 +00:00
sthen
4fd6b85d82 add edig/ehost/enslookup symlinks
move another pledge to a better place, drop some rpath
2019-12-17 14:18:43 +00:00
sthen
33b647a4ee move down the second ratchetted pledge in the ports-BIND version of dig,
it should have been done after loading a tsig keyfile.

drop rpath from that pledge, it used to be needed for charset conversion
with idn names, but this just prints "Cannot represent '%s' in the current
locale" now for !utf8 locales (maybe as a result of dropping the !utf8
ctype files?)
2019-12-17 00:46:15 +00:00
sthen
6dcc331f9c update to bind-9.11.13
CVE-2019-6477, TCP-pipelined queries can bypass tcp-clients limit
2019-11-20 22:15:58 +00:00
sthen
952b2075b4 update to isc-bind-9.11.12 2019-10-16 21:33:06 +00:00
sthen
c7fb374db3 update to isc-bind-9.11.11 2019-09-19 14:46:47 +00:00
sthen
2c7731e662 update to bind-9.11.10 2019-08-22 16:16:46 +00:00