notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)
Want a good monitor light? See my photosAll times are UTC
Remember
I remember
2024-11-06 brought a new category: filesystems. Sadly, the website did not process it well. I''m working on that. It may take a few days.
Port details
bind98 BIND DNS suite with updated DNSSEC and DNS64
9.8.8 dns Deleted on this many watch lists=11 search for ports that depend on this port This port version is marked as vulnerable. Find issues related to this port Report an issue related to this port View this port on Repology. pkg-fallout 9.8.8Version of this port present on the latest quarterly branch.
Deprecated DEPRECATED: Will be EOL as of September 2014.
Expired This port expired on: 2014-09-30
Maintainer: mat@FreeBSD.org search for ports maintained by this maintainer
Port Added: 2010-12-17 22:49:08
Last Update: 2014-10-21 12:06:11
SVN Revision: 371318
People watching this port, also watch:: net-snmp, portmaster, rsync, postfix
Also Listed In: ipv6 net
License: ISCL
WWW:
https://www.isc.org/software/bind
Description:
BIND version 9 is a major rewrite of nearly all aspects of the underlying BIND architecture. Some of the important features of BIND 9 are: DNS Security: DNSSEC (signed zones), TSIG (signed DNS requests) IP version 6: Answers DNS queries on IPv6 sockets, IPv6 resource records (AAAA) Experimental IPv6 Resolver Library DNS Protocol Enhancements: IXFR, DDNS, Notify, EDNS0 Improved standards conformance Views: One server process can provide multiple "views" of the DNS namespace, e.g. an "inside" view to certain clients, and an "outside" view to others. Multiprocessor Support BIND 9.8 includes a number of changes from BIND 9.7 and earlier releases, including: Preliminary DNS64 support (AAAA synthesis only initially) See the CHANGES file for more information on features. WWW: https://www.isc.org/software/bind
Homepage    cgit ¦ GitHub ¦ GitHub ¦ GitLab ¦ SVNWeb

Manual pages:
FreshPorts has no man page information for this port.
pkg-plist: as obtained via: make generate-plist
There is no configure plist information for this port.
Dependency lines:
  • bind98>0:dns/bind98
No installation instructions:
This port has been deleted.
PKGNAME: bind98
Flavors: there is no flavor information for this port.
distinfo:
There is no distinfo for this port.

No package information for this port in our database
Sometimes this happens. Not all ports have packages. Perhaps there is a build error. Check the fallout link: pkg-fallout
Dependencies
NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
Build dependencies:
  1. libcrypto.so.8 : security/openssl
Runtime dependencies:
  1. libcrypto.so.8 : security/openssl
Library dependencies:
  1. libxml2.so : textproc/libxml2
There are no ports dependent upon this port

Configuration Options:
===> The following configuration options are available for bind98-9.8.8: DOCS=on: Build and/or install documentation FILTER_AAAA=off: Enable filtering of AAAA records FIXED_RRSET=off: Enable fixed rrset ordering GOST=off: Enable GOST ciphers (DSO incompatible with chroot) IDN=off: International Domain Names support IPV6=on: IPv6 protocol support LARGE_FILE=off: 64-bit file support LINKS=off: Create conf file symlinks in /usr/local REPLACE_BASE=off: Replace base BIND (FreeBSD 9.x and earlier) RPZRRL_PATCH=on: RPZ improvements + RRL patch (experimental) RPZ_NSDNAME=off: Enable RPZ NSDNAME policy records RPZ_NSIP=off: Enable RPZ NSIP trigger rules SIGCHASE=off: dig/host/nslookup will do DNSSEC validation SSL=on: Build with OpenSSL (Required for DNSSEC) THREADS=on: Threading support ====> Dynamically Loadable Zones DLZ_POSTGRESQL=off: DLZ Postgres driver DLZ_MYSQL=off: DLZ MySQL driver (no threading) DLZ_BDB=off: DLZ BDB driver DLZ_LDAP=off: DLZ LDAP driver DLZ_FILESYSTEM=off: DLZ filesystem driver DLZ_STUB=off: DLZ stub driver ====> GSSAPI Security API support: you have to select exactly one of them GSSAPI_BASE=off: GSSAPI Security API support (Heimdal in base) GSSAPI_HEIMDAL=off: GSSAPI Security API support (security/heimdal) GSSAPI_MIT=off: GSSAPI Security API support (security/krb5) GSSAPI_NONE=on: No GSSAPI Security API support ===> Use 'make config' to modify these settings
Options name:
N/A
FreshPorts was unable to extract/find any pkg message
Master Sites:
Expand this list (15 items)
Collapse this list.
  1. ftp://ftp.ciril.fr/pub/isc/bind9/9.8.8/
  2. ftp://ftp.dti.ad.jp/pub/net/isc/bind9/9.8.8/
  3. ftp://ftp.freenet.de/pub/ftp.isc.org/isc/bind9/9.8.8/
  4. ftp://ftp.funet.fi/pub/mirrors/ftp.isc.org/isc/bind9/9.8.8/
  5. ftp://ftp.iij.ad.jp/pub/network/isc/bind9/9.8.8/
  6. ftp://ftp.isc.org/isc/bind9/9.8.8/
  7. ftp://ftp.mirrorservice.org/sites/ftp.isc.org/isc/bind9/9.8.8/
  8. ftp://ftp.nominum.com/pub/isc/bind9/9.8.8/
  9. ftp://ftp.ntua.gr/pub/net/isc/isc/bind9/9.8.8/
  10. ftp://ftp.ripe.net/mirrors/sites/ftp.isc.org/isc/bind9/9.8.8/
  11. ftp://ftp.sunet.se/pub/network/isc/bind9/9.8.8/
  12. ftp://ftp.task.gda.pl/mirror/ftp.isc.org/isc/bind9/9.8.8/
  13. ftp://ftp.u-aizu.ac.jp/pub/net/isc/bind9/9.8.8/
  14. http://distcache.FreeBSD.org/ports-distfiles/
  15. http://ftp.isc.org/isc/bind9/9.8.8/
Collapse this list.

Number of commits found: 110 (showing only 100 on this page)

1 | 2  »  

Commit History - (may be incomplete: for full details, see links to repositories near top of page)
CommitCreditsLog message
9.8.8
21 Oct 2014 12:06:11
Revision:371318Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove dns/bind98, it is EOL.

Chase remaining dependencies.

Sponsored by:	Absolight
9.8.8
23 Sep 2014 14:16:46
Revision:369063Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Update to 9.8.8.

Sponsored by:	Absolight
9.8.7P1_5
07 Sep 2014 10:24:59
Revision:367505Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
configure no longer has problems detecting our arch like it had in bind95's
time, so remove ARCH modification, which leads to other problems, like [1]

PR:		193359 [1]
Submitted by:	dinoex [1]
Sponsored by:	Absolight
9.8.7P1_5
07 Aug 2014 08:40:26
Revision:364250Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Push back expiration to the end of the month.

Sponsored by:	Absolight
9.8.7P1_5
29 Jul 2014 22:16:12
Revision:363400Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Enable RRL by default.

Requested by:	so many my head hurts
Sponsored by:	Absolight
9.8.7P1_4
24 Jul 2014 18:34:16
Revision:362835Original commit files touched by this commit This port version is marked as vulnerable.
tijl search for other commits by this committer
net/openldap24-*:
- Convert to USES=libtool and bump dependent ports
- Avoid USE_AUTOTOOLS
- Don't use PTHREAD_LIBS
- Use MAKE_CMD

databases/glom:
- Drop :keepla
- Add INSTALL_TARGET=install-strip

databases/libgda4* databases/libgda5*:
- Convert to USES=libtool and bump dependent ports
- USES=tar:xz
- Use INSTALL_TARGET=install-strip
- Use @sample
(Only the first 15 lines of the commit message are shown above View all of this commit message)
9.8.7P1_3
11 Jul 2014 16:03:10
Revision:361560Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Add the expiration date of BIND 9.8.

Sponsored by:	Absolight
9.8.7P1_2
11 Jul 2014 15:38:42
Revision:361553Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
And it's supposed to be lower case.

Sponsored by:	Absolight
9.8.7P1_2
11 Jul 2014 15:28:13
Revision:361548Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Add CPE to BIND9.

Sponsored by:	Absolight
9.8.7P1_2
17 Jun 2014 17:16:33
Revision:358151Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove test bits.

Pointy hat to:	mat
Sponsored by:	Absolight
17 Jun 2014 15:01:25
Revision:358127Original commit files touched by this commit Refresh
mat search for other commits by this committer
Convert dns/bind9* to USES=gssapi.

Sponsored by:	Absolight
9.8.7P1
13 Jun 2014 13:14:32
Revision:357679Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Correct local path for rpz* patchs.

Sponsored by:	Absolight
9.8.7P1
12 Jun 2014 12:30:30
Revision:357587Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Update to 9.8.7-P1

Changes:	https://lists.isc.org/pipermail/bind-announce/2014-June/000912.html
Sponsored by:	Absolight
9.8.7_16
09 Jun 2014 14:17:37
Revision:357152Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Do install a rndc.conf.sample.

Sponsored by:	Absolight
9.8.7_16
09 Jun 2014 10:24:24
Revision:357127Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Unbreak, it seems not everybody as switched to pkg yet...

Sponsored by:	Absolight
9.8.7_15
06 Jun 2014 10:59:46
Revision:356762Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Don't install rndc.conf

It is generated by the rc script during the first startup.  And if
the file is present, it messes up the rndc.key generation.

Poked by:	Alain Audebert
Sponsored by:	Absolight
9.8.7_14
17 May 2014 21:30:25
Revision:354375Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix build with GOST (on 10, base OpenSSL doesn't have it)
Make sure OpenSSL from ports is used < 10.

Sponsored by:	Absolight
9.8.7_13
16 May 2014 03:13:58
Revision:354193Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Ok, revert r354129, it was a bad idea.

Poked by:	many
Sponsored by:	Absolight
9.8.7_12
15 May 2014 14:12:34
Revision:354129Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Try and fix the plist for bind9* ports when <10.

Poked by:	swills
Sponsored by:	Absolight
9.8.7_11
14 May 2014 23:59:14
Revision:354095Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Make GOST in BIND 9.* optional

Test Plan: Currently testing in poudriere

Differential Revision: https://phabric.freebsd.org/D12
9.8.7_10
17 Apr 2014 16:43:49
Revision:351487Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix the rc script reload command.

Noticed by:	David Samms
Sponsored by:	Absolight
9.8.7_9
16 Apr 2014 18:28:50
Revision:351411Original commit files touched by this commit This port version is marked as vulnerable.
zeising search for other commits by this committer
The FreeBSD x11@ and graphics team proudly presents
a zeising, kwm production, with help from dumbbell, bdrewery:

NEW XORG ON FREEBSD 9-STABLE AND 10-STABLE

This update switches over to use the new xorg stack by default on FreeBSD 9
and 10 stable, on osversions where vt(9) is available.
It is still possible to use the old stack by specifying WITHOUT_NEW_XORG in
/etc/make.conf .
FreeBSD 8-STABLE and released versions of FreeBSD still use
the old version.
A package repository with binary packages for new xorg will
be available soon.

This patch also contains updates of libxcb and related ports, pixman, as well
(Only the first 15 lines of the commit message are shown above View all of this commit message)
9.8.7_8
12 Apr 2014 19:23:10
Revision:351124Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Use @sample for my port, cleanup an etc/PORTNAME into ETCDIR.

Sponsored by:	Absolight
9.8.7_8
10 Apr 2014 20:43:50
Revision:350848Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Two changes to the RC script
- Add a dependency on ldconfig
- Allow people to change the pidfile

PR:		188439
Submitted by:	Oliver Lehmann
Sponsored by:	Absolight
9.8.7_7
10 Apr 2014 15:45:03
Revision:350817Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove noop patch.

Sponsored by:	Absolight
9.8.7_7
27 Mar 2014 13:30:12
Revision:349338Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
- Fix startup script
- Fix whitespace

PR:		188011
Submitted by:	takefu
Sponsored by:	Absolight
9.8.7_6
25 Mar 2014 17:25:17
Revision:349162Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Finaly pet rclint.

With help from:	crees
Sponsored by:	Absolight
9.8.7_5
25 Mar 2014 15:46:24
Revision:349154Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Remove GSSAPI from the default options.

Almost nobody needs it, and people keep having a hard time building BIND
because of this.

Sponsored by:	Absolight
9.8.7_4
17 Mar 2014 18:46:47
Revision:348497Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
- Use SUB_FILES for named.conf and the rc script
- Fix some package installation warnings

Sponsored by:	Absolight
9.8.7_3
07 Mar 2014 19:15:51
Revision:347417Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Pet PORTSCOUT.

Sponsored by:	Absolight
9.8.7_3
06 Mar 2014 17:31:55
Revision:347284Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Always depend on libxml[1]
Add XML newstats support to bind99[2]

PR:		186890[1], 186791[2]
Submitted by:	Jason Mann[1], Matthew Seaman[2]
Sponsored by:	Absolight
9.8.7_2
06 Mar 2014 17:12:52
Revision:347281Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Try and have BIND start earlier.

Sponsored by:	Absolight
9.8.7_1
04 Mar 2014 17:32:46
Revision:347046Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Don't polute isc-config.sh with gssapi flags.

Submitted by:	hrs
Sponsored by:	Absolight
9.8.7
27 Feb 2014 18:10:04
Revision:346383Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Change the BIND ports to use PKGNAMESUFFIX.

Sponsored by:	Absolight
9.8.7
07 Feb 2014 09:16:26
Revision:343206Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Use a permanent name for the patch. (same file, the other was a symlink.)

Sponsored by:	Absolight
9.8.7
07 Feb 2014 09:10:45
Revision:343204Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Unbreak in the RPZRRL_PATCH case, patch has been released.

Many thanks to:	Vernon Schryver
Sponsored by:	Absolight
9.8.7
31 Jan 2014 09:50:57
Revision:341969Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Note that the RPZRRL patch doesn't work yet with that release.

Sponsored by:	Absolight
9.8.7
31 Jan 2014 09:06:58
Revision:341951Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Update to 9.8.7.

Changes:	https://lists.isc.org/pipermail/bind-announce/2014-January/000895.html
Sponsored by:	Absolight
9.8.6.2
27 Jan 2014 15:43:42
Revision:341417Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Revert r341073, static libs are not supposed to be PIC
9.8.6.2
25 Jan 2014 18:28:03
Revision:341073Original commit files touched by this commit This port version is marked as vulnerable.
garga search for other commits by this committer
Add -fPIC to CFLAGS for amd64, this fix static libraries

Approved by:	mat@ (maintainer)
9.8.6.2
13 Jan 2014 17:38:28
Revision:339612Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Security update to fix CVE-2014-0591 as reported at
https://kb.isc.org/article/AA-01078/74/

9.9.4 -> 9.9.4-P2
9.8.6 -> 9.8.6-P2
9.6-ESV-R10 -> 9.6-ESV-R10-P2

Security:	CVE-2014-0591 Remote DOS
9.8.6_8
08 Jan 2014 22:52:19
Revision:339186Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fixup rndc.conf.sample installation

Spotted by:	antoine
9.8.6_7
07 Jan 2014 09:55:07
Revision:338989Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
There's always a default value for named_conf now, so no need to
check for it, and espcially not for a wrong value.

Noticed by:	Stefan Bethke <stb@lassitu.de>
Approved by:	mat (maintainer)
9.8.6_6
06 Jan 2014 23:15:20
Revision:338952Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Yet another round of fixes.

This time, it seems all of REPLACE_BASE, not REPLACE_BASE and post Bind removal
from base seem to work consistently.
9.8.6_5
06 Jan 2014 21:39:08
Revision:338943Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix yet another bug, they're creeping like crazy...
9.8.6_4
06 Jan 2014 14:29:25
Revision:338882Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Fix build with LINKS.
9.8.6_4
06 Jan 2014 13:34:48
Revision:338877Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Convert to staging and new options.
9.8.6_3
04 Jan 2014 19:25:57
Revision:338674Original commit files touched by this commit This port version is marked as vulnerable.
mat search for other commits by this committer
Add the DOCS option to OPTIONS_DEFAULT.
9.8.6_2
02 Jan 2014 13:43:12
Revision:338442Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Hand the BIND ports to a new volunteer.
9.8.6_2
10 Dec 2013 10:01:21
Revision:336054Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix build with GSSAPI option without Kerberos

PR:		184560
Submitted by:	Dewayne <dewayne@heuristicsystems.com.au>
9.8.6_2
08 Dec 2013 19:49:52
Revision:335933Original commit files touched by this commit This port version is marked as vulnerable.
marino search for other commits by this committer
bind(96,98,99): Couple OSVERSION with OPSYS

OSVERSION is platform-specific and must be used with OPSYS.

Approved by:	maintainer (erwin)
9.8.6_2
07 Dec 2013 10:50:23
Revision:335824Original commit files touched by this commit This port version is marked as vulnerable.
gjb search for other commits by this committer
To prevent fallout of lowering __FreeBSD_version in releng/10.0 branch,
adjust OSVERSION evaluation in ports that specifically use '100050N'.

Approved by:	affected maintainers (implicit)
Sponsored by:	The FreeBSD Foundation
9.8.6_2
05 Dec 2013 12:54:56
Revision:335667Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Install named.conf as named.conf.sample and don't overwrite on upgrade

Bullet hole in foot:	joeld
Pointy hat:		erwin
9.8.6_1
04 Dec 2013 12:15:53
Revision:335618Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix build with GSSAPI

Submitted by:	sunpoet
9.8.6_1
22 Nov 2013 19:05:01
Revision:334604Original commit files touched by this commit This port version is marked as vulnerable.
sunpoet search for other commits by this committer
- Respect BIND_DESTETC and PREFIX

Submitted by:	sunpoet (myself)
Approved by:	erwin (maintainer)
9.8.6_1
22 Nov 2013 13:41:34
Revision:334593Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix startup script.

PR:		184159 [1]
Submitted by:	Pawel Biernacki <pawel.biernacki@gmail.com> [1],
		Trond Endrestoel <Trond.Endrestol@ximalas.info> (private email)
9.8.6
12 Nov 2013 08:55:46
Revision:333550Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Create pid directory if it doesn't exist.
9.8.6
12 Nov 2013 07:38:56
Revision:333546Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Support FreeBSD 10.0.

On FreeBSD 10.0, all configuration is installed under
/usr/local/etc/namedb and installs its own rc script in
$PREFIX, which no longer support chroot installations.

LINKS and REPLACE_BASE options are not supported on 10.0
for obvious reasons.

Note for FreeBSD 9.x and earlier users, LINKS is no longer
the default option, though still supported.

An UPDATING entry will follow after bind96 and bind99 are fixed
as well.
9.8.6
04 Nov 2013 11:23:11
Revision:332693Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Drop support for REPLACE_BIND option after BIND was removed from base,
there's nothing to replace.
9.8.6
01 Nov 2013 10:26:17
Revision:332348Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Fix PATCH_SITES

Submitted by:	"Felix J. Ogris" <fjo@ogris.de>
9.8.6
28 Sep 2013 12:32:53
Revision:328564Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.8.6
9.8.5.2
23 Sep 2013 10:20:56
Revision:327967Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Add an option for filter-aaaa

Submitted by:	Matej Gregr <matej.gregr@gmail.com>
9.8.5.2
20 Sep 2013 16:31:58
Revision:327719Original commit files touched by this commit This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
dns)
9.8.5.2
17 Sep 2013 11:31:49
Revision:327469Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Make GSSAPI support optional

PR:		182122
Submitted by:	Uwe Doering <gemini@geminix.org>
9.8.5.2
05 Sep 2013 20:18:30
Revision:326444Original commit files touched by this commit This port version is marked as vulnerable.
bsam search for other commits by this committer
. introduce ICONV_CONFIGURE_BASE variable at Mk/Uses/iconv.mk. It's value is
  "--with-libiconv=${LOCALBASE}" at systems pre OSVERSION 100043 and "" (null)
  otherwise;
. convert all ports which has CONFIGURE_ARGS=--with-libiconv=${LOCALBASE}.

Approved by:	portmgr (bapt, implicit)
9.8.5.2
27 Jul 2013 21:08:36
Revision:323808Original commit files touched by this commit This port version is marked as vulnerable.
roberto search for other commits by this committer
Update the RPZ+RL patches for both versions.

Approved by:	erwin
9.8.5.2
26 Jul 2013 22:19:27
Revision:323758Original commit files touched by this commit This port version is marked as vulnerable.
roberto search for other commits by this committer
Put back the two patches for RPZ-RL that were removed during the previous
update.
9.8.5.2
26 Jul 2013 22:05:05
Revision:323757Original commit files touched by this commit This port version is marked as vulnerable.
roberto search for other commits by this committer
Security update to fix CVE-2013-4854 as reported at
https://kb.isc.org/article/AA-01015/0

9.9.3-p1 -> 9.9.3-P2
9.8.5-p1 -> 9.8.5-P2

9.6.x is not affected, neither is 10.x.

Security:	CVE-2013-4854 Remote DOS
9.8.5.1
05 Jun 2013 11:49:51
Revision:319983Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.8.5-P1

Security Fixes

   Prevents exploitation of a runtime_check which can crash named
   when satisfying a recursive query for particular malformed zones.
   (CVE-2013-3919) [RT #33690]

   A deliberately constructed combination of records could cause
   named to hang while populating the additional section of a
   response. (CVE-2012-5166) [RT #31090]

   Now supports NAPTR regular expression validation on all platforms,
   and avoids memory exhaustion compiling pathological regular
   expressions. (CVE-2013-2266)  [RT #32688]
(Only the first 15 lines of the commit message are shown above View all of this commit message)
9.8.5
31 May 2013 09:32:29
Revision:319472Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.8.5
9.8.4.2
31 May 2013 08:10:57
Revision:319468Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update RPZ and RRL patch set:

  - address the issue raised by Bob Harold. RRL on recursive servers
     applies rate limits after waiting for recursion except on
     sub-domains of domains for which the server is authoritative.

  - fix the bug reported by Roy Arends in which "slipped" NXDOMAIN
     responses had rcode values of 0 (NoError) instead of 3 (NXDOMAIN).

  - move reports of RRL drop and slip actions from the "queries"
     log category to the "query-errors" category. Because they are not
     in the "queres" category, enabling or disabling query logging no
     longer affects them.
9.8.4.2
23 Apr 2013 08:26:48
Revision:316321Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Make pkg-message and pkg-install a local file to the bind98 and bind99
ports and not include the one from the deprecated bind97 port, which is
to be removed.
9.8.4.2
17 Apr 2013 07:57:55
Revision:315942Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update RPZ+RRL patchset to the latest version.

The change makes "slip 1;" send only truncated (TC=1) responses.
Without the change, "slip 1;" is the same as the default of "slip 2;".
That default, which alternates truncated with dropped responses
when the rate limit is exceeded, is better for authoritative DNS
servers, because it further reduces the amplification of an attack
from about 1X to about 0.5X.

DNS RRL is not recommended for recursive servers.

Feature safe:	yes
9.8.4.2
27 Mar 2013 07:55:22
Revision:315355Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.8.4-P2

Removed the check for regex.h in configure in order
to disable regex syntax checking, as it exposes
BIND to a critical flaw in libregex on some
platforms. [RT #32688]

Security:	CVE-2013-2266
9.8.4.1
15 Mar 2013 10:56:33
Revision:314294Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update the RPZ+RRL patch files which remove
working files that should not have been in the patches[1]
Also move to a versioned filename for the patches[2]

Submitted by:	Robert Sargent <robtsgt@gmail.com> [1],
		Vernon Schryver <vjs@rhyolite.com> [2]
9.8.4.1
05 Feb 2013 09:35:28
Revision:311684Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update RPZ+RRL patch to 028.23

A serious Multiple Zone Response Policy Zone (RPZ2)
Speed Improvement bug has been fixed.

`./configure --enable-rpz-nsip --enable-rpz-nsdname`
is now the default.

Responses affected by the all-per-second parameter
are always dropped. The slip value has no effect on them.

There are improved log messages for responses that aredropped or "slipped,"
because they would require an
excessive identical referral.
9.8.4.1
10 Jan 2013 10:37:18
Revision:310175Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Reduce lenght of the option description for RPZRRL_PATCH to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:   Terry Kennedy <terry@tmk.com>
9.8.4.1
09 Jan 2013 10:20:16
Revision:310131Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update the response rate limiting patch to the latest
released version of January 5, 2013.

This also includes performance patches to the BIND9
Response Policy Zones (DNS RPZ), Single Zone Response
Policy Zone (RPZ) Speed Improvement, in the same
patch.

More information: http://ss.vix.su/~vjs/rrlrpz.html
9.8.4.1
04 Jan 2013 10:47:28
Revision:309925Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Add LICENSE.
9.8.4.1
04 Jan 2013 10:39:41
Revision:309924Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Add experimental option for Response Rate Limiting patch.
9.8.4.1
14 Dec 2012 10:43:36
Revision:308897Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
- Use new OPTIONS_GROUP for DLZ options.[1]
- This also allows more than one DLZ option
  to be set.[2]

Submitted by:	bapt [1] (as RADIO)
Suggested by:	az [2] (thus GROUP instead)
9.8.4.1
05 Dec 2012 07:46:03
Revision:308317Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to the latest patch level from ISC:

  BIND 9 nameservers using the DNS64 IPv6 transition mechanism are
  vulnerable to a software defect that allows a crafted query to
  crash the server with a REQUIRE assertion failure.  Remote
  exploitation of this defect can be achieved without extensive
  effort, resulting in a denial-of-service (DoS) vector against
  affected servers.

Security:	2892a8e2-3d68-11e2-8e01-0800273fe665
		CVE-2012-5688
Feature safe:	yes
9.8.4
03 Dec 2012 10:52:11
Revision:308136Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Improve the SSL option description

Submitted by:	Kazunori Fujiwara <fujiwara@jprs.co.jp>
Feature safe:	yes
9.8.4
03 Dec 2012 10:48:18
Revision:308135Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Remove gpg signature checking that in itself does not
provide any additional security.

Feature safe:	yes
9.8.4
27 Nov 2012 10:05:32
Revision:307830Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
- Update CONFLICTS
- Fix a typo in the OPTIONSNG conversion
- Add FIXED_RRSET option
- Add RPZ options (9.8 and 9.8 only)

PR:		172586
Submitted by:	Craig Leres <leres@ee.lbl.gov>
Feature safe:	yes
9.8.4
26 Oct 2012 08:37:11
Revision:306427Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Reduce lenght of the option description for DLZ_MYSQL to
avoid problems with the older dialog(1) on FreeBSD 8.x

Noticed by:	Terry Kennedy <terry@tmk.com>
Feature safe:	yes
9.8.4
25 Oct 2012 10:53:57
Revision:306379Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
- Convert to OPTIONSNG
- Turn on IPv6 support by default

Feature safe:	yes
9.8.4
19 Oct 2012 09:32:00
Revision:306112Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Update to 9.8.4

Feature safe:	yes
9.8.3.4
10 Oct 2012 11:54:44
Revision:305645Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Upgrade to the latest BIND patch level:

A deliberately constructed combination of records could cause named
to hang while populating the additional section of a response.

Security:	 
http://www.vuxml.org/freebsd/57a700f9-12c0-11e2-9f86-001d923933b6.html
9.8.3.3
10 Oct 2012 09:11:41
Revision:305639Original commit files touched by this commit This port version is marked as vulnerable.
erwin search for other commits by this committer
Take maintainership of the BIND ports while I'm working on the latest
security releases.
9.8.3.3
08 Oct 2012 10:38:48
Revision:305526Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Throw my ports back in the pool, and make my intentions clear for the
various ports that I've created.

I bid fond fare well
A chapter closes for me
What opens for you?
9.8.3.3
19 Sep 2012 03:46:36
Revision:304476Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to the latest BIND patch level:

Prevents a crash when queried for a record whose RDATA exceeds
65535 bytes.

Prevents a crash when validating caused by using "Bad cache" data
before it has been initialized.

ISC_QUEUE handling for recursive clients was updated to address
a race condition that could cause a memory leak. This rarely
occurred with UDP clients, but could be a significant problem
for a server handling a steady rate of TCP queries.

A condition has been corrected where improper handling of
zero-length RDATA could cause undesirable behavior, including
termination of the named process.

For more information: https://kb.isc.org/article/AA-00788
9.8.3.2
24 Jul 2012 19:23:23
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failure
in BIND9

High numbers of queries with DNSSEC validation enabled can cause an
assertion failure in named, caused by using a "bad cache" data structure
before it has been initialized.

CVE: CVE-2012-3817
Posting date: 24 July, 2012
9.8.3.1
04 Jun 2012 21:51:34
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latest
from ISC. These patched versions contain a critical bugfix:

  Processing of DNS resource records where the rdata field is zero length
  may cause various issues for the servers handling them.

  Processing of these records may lead to unexpected outcomes. Recursive
  servers may crash or disclose some portion of memory to the client.
  Secondary servers may crash on restart after transferring a zone
  containing these records. Master servers may corrupt zone data if the
  zone option "auto-dnssec" is set to "maintain". Other unexpected
  problems that are not listed here may also be encountered.

All BIND users are strongly encouraged to upgrade.
9.8.3
23 May 2012 04:41:19
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,
the latest from ISC. These versions all contain the following:

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)
   [RT #28989]

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Each version also contains other critical bug fixes.

All BIND users are encouraged to upgrade to these latest versions.
9.8.2
12 Apr 2012 00:56:32
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
BIND 9.8.2 tarball was re-rolled to remove 9.8.1 release notes. This change
was noticed by ISC at:

https://lists.isc.org/pipermail/bind-users/2012-April/087345.html

and verified by me both by comparing the contents of the old and new
distfiles and by verifying the PGP signature on the new distfile.

No PORTREVISION bump because these files were not installed.
9.8.2
04 Apr 2012 21:41:32
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.

For the port, switch to using the PORTDOCS macro.

Feature safe:   yes
9.8.1.1
16 Nov 2011 23:41:13
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to the latest security patch releases to address the
following DDOS bug:

Recursive name servers are failing with an assertion:
INSIST(! dns_rdataset_isassociated(sigrdataset))

At this time it is not thought that authoritative-only servers
are affected, but information about this bug is evolving rapidly.

Because it may be possible to trigger this bug even on networks
that do not allow untrusted users to access the recursive name
servers (perhaps via specially crafted e-mail messages, and/or
malicious web sites) it is recommended that ALL operators of
recursive name servers upgrade immediately.

For more information see:
https://www.isc.org/software/bind/advisories/cve-2011-tbd
which will be updated as more information becomes available.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313

Feature safe:   yes
9.8.1
24 Oct 2011 04:17:38
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Remove more tags from pkg-descr files fo the form:

- Name
em@i.l

or variations thereof. While I'm here also fix some whitespace and other
formatting errors, including moving WWW: to the last line in the file.
9.8.1
01 Sep 2011 04:43:58
Original commit files touched by this commit This port version is marked as vulnerable.
dougb search for other commits by this committer
Upgrade to version 9.8.1. Release notes at:

https://deepthought.isc.org/article/AA-00446/81/
or
/usr/local/share/doc/bind98/CHANGES

Remove the patch incorporated upstream, and add new include to plist.

Number of commits found: 110 (showing only 100 on this page)

1 | 2  »