Domain Name System (DNS) Server (named)

Edit Package bind

Berkeley Internet Name Domain (BIND) is an implementation of the Domain
Name System (DNS) protocols and provides an openly redistributable
reference implementation of the major components of the Domain Name
System. This package includes the components to operate a DNS server.

Refresh
Refresh
Source Files
Filename Size Changed
Makefile.in.diff 0000000753 753 Bytes
baselibs.conf 0000000302 302 Bytes
bind-9.9.2.tar.gz 0007285050 6.95 MB
bind.changes 0000054675 53.4 KB
bind.spec 0000024854 24.3 KB
configure.in.diff 0000000389 389 Bytes
configure.in.diff2 0000000293 293 Bytes
dlz-schema.txt 0000006292 6.14 KB
dnszone-schema.txt 0000005418 5.29 KB
named-bootconf.diff 0000000699 699 Bytes
named.root 0000003048 2.98 KB
perl-path.diff 0000001284 1.25 KB
pid-path.diff 0000001033 1.01 KB
pie_compile.diff 0000003650 3.56 KB
vendor-files.tar.bz2 0000020828 20.3 KB
workaround-compile-problem.diff 0000000415 415 Bytes
Revision 84 (latest revision is 208)
Stephan Kulow's avatar Stephan Kulow (coolo) accepted request 141386 from Marcus Meissner's avatar Marcus Meissner (msmeissn) (revision 84)
- updated to 9.9.2
  https://kb.isc.org/article/AA-00798
  Security:
  * A deliberately constructed combination of records could cause
    named to hang while populating the additional section of a
    response. [CVE-2012-5166] [RT #31090]
  * Prevents a named assert (crash) when queried for a record whose
    RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
  * Prevents a named assert (crash) when validating caused by using "Bad
    cache" data before it has been initialized. [CVE-2012-3817]  [RT #30025]
  * A condition has been corrected where improper handling of zero-length
    RDATA could cause undesirable behavior, including termination of the
    named process. [CVE-2012-1667]  [RT #29644]
  * ISC_QUEUE handling for recursive clients was updated to address a race
    condition that could cause a memory leak. This rarely occurred with
    UDP clients, but could be a significant problem for a server handling
    a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
  New Features
  * Elliptic Curve Digital Signature Algorithm keys and signatures in
    DNSSEC are now supported per RFC 6605. [RT #21918]
  * Introduces a new tool "dnssec-checkds" command that checks a zone
    to determine which DS records should be published in the parent zone,
    or which DLV records should be published in a DLV zone, and queries
    the DNS to ensure that it exists. (Note: This tool depends on python;
    it will not be built or installed on systems that do not have a python
    interpreter.)  [RT #28099]
  * Introduces a new tool "dnssec-verify" that validates a signed zone,
    checking for the correctness of signatures and NSEC/NSEC3 chains.
    [RT #23673]
  * Adds configuration option "max-rsa-exponent-size <value>;" that can
Comments 2


openSUSE Build Service is sponsored by