Domain Name System (DNS) Server (named)

Edit Package bind

Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols and provides an openly redistributable
reference implementation of the major components of the Domain Name
System. This package includes the components to operate a DNS server.

Refresh
Refresh
Source Files
Filename Size Changed
Makefile.in.diff 0000000638 638 Bytes
baselibs.conf 0000000302 302 Bytes
bind-9.8.1.tar.gz 0008450567 8.06 MB
bind.changes 0000046304 45.2 KB
bind.spec 0000025840 25.2 KB
configure.in.diff 0000000278 278 Bytes
configure.in.diff2 0000000293 293 Bytes
dlz-schema.txt 0000006292 6.14 KB
dlz_compile.diff 0000000228 228 Bytes
dnszone-schema.txt 0000004322 4.22 KB
ldapdump-allow-uri.diff 0000000549 549 Bytes
named-bootconf.diff 0000000573 573 Bytes
named-direct-proc-mount.diff 0000000734 734 Bytes
named.root 0000002878 2.81 KB
perl-path.diff 0000000970 970 Bytes
pid-path.diff 0000000815 815 Bytes
pie_compile.diff 0000002557 2.5 KB
tmpfs.patch 0000001110 1.08 KB
vendor-files.tar.bz2 0000020892 20.4 KB
Revision 70 (latest revision is 208)
Lars Vogdt's avatar Lars Vogdt (lrupp) accepted request 80897 from Uwe Gansert's avatar Uwe Gansert (ug) (revision 70)
* fixed SSL in chroot environment (bnc#715881)

* Added a new include file with function typedefs for the DLZ
  "dlopen" driver. [RT #23629]
* Added a tool able to generate malformed packets to allow testing of
  how named handles them. [RT #24096]
* The root key is now provided in the file bind.keys allowing DNSSEC
  validation to be switched on at start up by adding
  "dnssec-validation auto;" to named.conf. If the root key provided
  has expired, named will log the expiration and validation will not
  work. More information and the most current copy of bind.keys can
  be found at http://www.isc.org/bind-keys. *Please note this feature
  was actually added in 9.8.0 but was not included in the 9.8.0
  release notes. [RT #21727]
* If named is configured with a response policy zone (RPZ) and a
  query of type RRSIG is received for a name configured for RRset
  replacement in that RPZ, it will trigger an INSIST and crash the
  server. RRSIG. [RT #24280]
* named, set up to be a caching resolver, is vulnerable to a user
  querying a domain with very large resource record sets (RRSets)
  when trying to negatively cache the response. Due to an off-by-one
  error, caching the response could cause named to crash. [RT #24650]
  [CVE-2011-1910]
* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
  with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
  query type independant. [RT #24715]
* Using Response Policy Zone (RPZ) with DNAME records and querying
  the subdomain of that label can cause named to crash. Now logs that
  DNAME is not supported. [RT #24766]
* Change #2912 populated the message section in replies to UPDATE
Comments 2


openSUSE Build Service is sponsored by