* With certain RPZ configurations, a response with TTL 0 could cause named to go into an infinite query loop. This flaw is disclosed in CVE-2017-3140. [RT #45181] A server is potentially vulnerable to degradation of service if 1. the server is configured to use RPZ, 2. the server uses NSDNAME or NSIP policy rules, and 3. an attacker can cause the server to process a specific query
Documentation for the ports tree: ports(7), packages(7), mirroring-ports(7), library-specs(7), bsd.port.mk(5), bsd.port.arch.mk(5), port-modules(5). dpb(1), bulk(8) (manpages under ${PORTSDIR}/infrastructure/man) for bulk builds. See also the OpenBSD Porter's Handbook http://www.openbsd.org/faq/ports/ $OpenBSD: README,v 1.22 2016/10/17 16:26:52 danj Exp $
Description
Public git conversion mirror of OpenBSD's official cvs ports repository. Pull requests not accepted - send diffs to the ports@ mailing list.
Languages
Makefile
61%
PHP
18.9%
Perl
6.5%
C
4.6%
HTML
2.3%
Other
6.4%