Domain Name System (DNS) Server (named)
Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols and provides an openly redistributable
reference implementation of the major components of the Domain Name
System. This package includes the components to operate a DNS server.
- Developed at network
- Sources inherited from project openSUSE:Factory
-
9
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:SLECandidates/bind && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
Makefile.in.diff | 0000000753 753 Bytes | |
baselibs.conf | 0000000302 302 Bytes | |
bind-9.9.2.tar.gz | 0007285050 6.95 MB | |
bind.changes | 0000054675 53.4 KB | |
bind.spec | 0000024854 24.3 KB | |
configure.in.diff | 0000000389 389 Bytes | |
configure.in.diff2 | 0000000293 293 Bytes | |
dlz-schema.txt | 0000006292 6.14 KB | |
dnszone-schema.txt | 0000005418 5.29 KB | |
named-bootconf.diff | 0000000699 699 Bytes | |
named.root | 0000003048 2.98 KB | |
perl-path.diff | 0000001284 1.25 KB | |
pid-path.diff | 0000001033 1.01 KB | |
pie_compile.diff | 0000003650 3.56 KB | |
vendor-files.tar.bz2 | 0000020828 20.3 KB | |
workaround-compile-problem.diff | 0000000415 415 Bytes |
Revision 84 (latest revision is 208)
- updated to 9.9.2 https://kb.isc.org/article/AA-00798 Security: * A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] * Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] * Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] * A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] * ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features * Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] * Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; it will not be built or installed on systems that do not have a python interpreter.) [RT #28099] * Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] * Adds configuration option "max-rsa-exponent-size <value>;" that can
Comments 2
bind 9.12.2 has been released; https://www.isc.org/downloads/
Link to bits: ftp://ftp.isc.org/isc/bind9/9.13.2/bind-9.13.2.tar.gz