openbsd-ports/net/unbound/Makefile
sthen fcb33424c5 SECURITY update to Unbound 1.4.14, incorporating various diffs from Brad,
jakob@ and myself. See http://www.unbound.net/downloads/CVE-2011-4528.txt
for more details, summary from the above is below:

--
Unbound crashes when confronted with a non-standard response from a
server for a domain. This domain produces duplicate RRs from a certain
type and is DNSSEC signed.Unbound also crashes when confronted with a
query that eventually, and under specific circumstances, resolves to a
domain that misses expected NSEC3 records.

These two problems were discovered within 24 hours, hence a combined
vulnerability disclosure.

By constructing the non standard responses an attacker can use these
vulnerabilities for a DOS attack.

To our knowledge 'denial of service' is the only type of exploit possible.
--
2011-12-20 10:49:19 +00:00

46 lines
1.1 KiB
Makefile

# $OpenBSD: Makefile,v 1.34 2011/12/20 10:49:19 sthen Exp $
COMMENT= validating DNS resolver
DISTNAME= unbound-1.4.14
CATEGORIES= net
MASTER_SITES= http://www.unbound.net/downloads/
HOMEPAGE= http://www.unbound.net/
MAINTAINER= Jakob Schlyter <jakob@openbsd.org>
# BSD
PERMIT_PACKAGE_CDROM= Yes
PERMIT_PACKAGE_FTP= Yes
PERMIT_DISTFILES_CDROM= Yes
PERMIT_DISTFILES_FTP= Yes
SEPARATE_BUILD= concurrent
CONFIGURE_STYLE= autoconf
AUTOCONF_VERSION= 2.68
USE_LIBTOOL= Yes
NO_REGRESS= Yes
SHARED_LIBS+= unbound 3.0
WANTLIB= c crypto event expat ldns>=4.9 ssl
LIB_DEPENDS+= net/ldns/libldns>=1.6.11
CONFIGURE_ARGS+= --enable-allsymbols \
--with-ssl=/usr \
--with-libevent=/usr \
--with-libexpat=/usr \
--with-ldns=${LOCALBASE} \
--without-pthreads \
--with-chroot-dir=/var/unbound \
--with-pidfile=/var/unbound/var/run/unbound.pid \
--with-conf-file=/var/unbound/etc/unbound.conf \
--with-username=_unbound
post-install:
${INSTALL_DATA_DIR} ${PREFIX}/share/examples/unbound
${INSTALL_DATA} ${WRKINST}/var/unbound/etc/unbound.conf ${PREFIX}/share/examples/unbound
.include <bsd.port.mk>