Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
1.22.0_1 18 Oct 2024 20:33:31 |
Rodrigo Osorio (rodrigo) |
dns/unbound: restores DNS over QUIC and HTTPS
There was a line missing in the Makefile for the port.
This commit correct it and restores DNS over QUIC and HTTPS
PR: 282183
Reported by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.22.0 18 Oct 2024 13:18:00 |
Rodrigo Osorio (rodrigo) |
dns/unbound: update to 1.22.0
Changelog: https://nlnetlabs.nl/news/2024/Oct/17/unbound-1.22.0-released/
Full changelog: https://nlnetlabs.nl/projects/unbound/download/#unbound-1-22-0
PR: 282172
Reported by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.21.1 06 Oct 2024 16:16:21 |
Robert Clausecker (fuz) Author: Jaap Akkerhuis |
dns/unbound: Update to version 1.21.1
- patch for users who use base OpenSSL
PR: 281894, 281804
Security: 2368755b-83f6-11ef-8d2e-a04a5edf46d9
Security: CVE-2024-8508 |
1.21.0 16 Aug 2024 16:12:38 |
Vladimir Druzenko (vvd) Author: Jaap Akkerhuis |
dns/unbound: Update 1.20.0 → 1.21.0
Release announcement:
https://nlnetlabs.nl/news/2024/Aug/15/unbound-1.21.0-released/
PR: 280853
MFH: 2024Q3 |
1.20.0_1 20 May 2024 10:33:03 |
Vsevolod Stakhov (vsevolod) |
security/libsodium: update to 1.0.19, bump dependent ports
PR: 278259
Reported by: Andrey Korobkov <alster-vinterdalen.se> |
1.20.0 10 May 2024 17:59:57 |
Fernando Apesteguía (fernape) Author: Jaap Akkerhuis |
dns/unbound: Uodate to 1.20.0
ChangeLog: https://nlnetlabs.nl/news/2024/May/08/unbound-1.20.0-released/
Summary of the DNSBomb vulnerability CVE-2024-33655.
The DNSBomb attack, via specially timed DNS queries and answers, can cause a
Denial of Service on resolvers and spoofed targets.
Unbound itself is not vulnerable for DoS, rather it can be used to take part in
a pulsing DoS amplification attack.
PR: 278870
Reported by: jaap@NLnetLabs.nl (maintainer)
Security: CVE-2024-33655 |
1.19.3 15 Mar 2024 12:29:31 |
Dan Langille (dvl) Author: Jaap Akkerhuis |
dns/unbound: Update to unbound 1.19.3
This release has a number of bug fixes. The CNAME synthesized for a
DNAME record uses the original TTL, of the DNAME record, and that means
it can be cached for the TTL, instead of 0.
There is a fix that when a message was stored in cache, but one of the
RRsets was not updated due to cache policy, it now restricts the message
TTL if the cache version of the RRset has a shorter TTL. It avoids a
bug where the message is not expired, but its contents is expired.
For dnstap, it logs type DoH and DoT correctly, if that is used for
the message.
The b.root-servers.net address is updated in the default root hints. (Only the first 15 lines of the commit message are shown above ) |
1.19.1 14 Feb 2024 14:56:30 |
Cy Schubert (cy) |
dns/unbound: Update to 1.19.1
Release notes at
https://www.nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
Security: CVE-2023-50387, CVE-2023-50868
Approved by: Jaap Akkerhuis <jaap@NLnetLabs.nl>
MFH: 2024Q1 |
1.19.0_1 28 Jan 2024 22:14:18 |
Muhammad Moinur Rahman (bofh) |
dns/unbound: Moved man to share/man
Approved by: portmgr (blanket) |
1.19.0 13 Nov 2023 17:53:19 |
Fernando Apesteguía (fernape) Author: Jaap Akkerhuis |
dns/unbound: Update to 1.19.0
ChangeLog: https://nlnetlabs.nl/news/2023/Nov/08/unbound-1.19.0-released/
Features
* Fix #850: [FR] Ability to use specific database in Redis, with new
redis-logical-db configuration option.
* Merge #944: Disable EDNS DO. Disable the EDNS DO flag in upstream requests.
This can be helpful for devices that cannot handle DNSSEC information. But it
should not be enabled otherwise, because that would stop DNSSEC validation.
The DNSSEC validation would not work for Unbound itself, and also not for
downstream users. Default is no. The option is disable-edns-do: no
* Expose the script filename in the Python module environment 'mod_env' instead
of the config_file structure which includes the linked list of scripts in a
multi Python module setup; fixes #79. (Only the first 15 lines of the commit message are shown above ) |
1.18.0_1 13 Oct 2023 13:21:05 |
Cy Schubert (cy) |
dns/unbound: Fix loop when ENOBUFS is returned
- Fix send of udp retries when ENOBUFS is returned. It stops looping
and also waits for the condition to go away. Reported to upstream
by Florian Obser.
PR: 274352, 274446
Approved by: jaap@NLnetLabs.nl (maintainer)
MFH: 2023Q4 |
1.18.0 02 Sep 2023 15:29:57 |
Fernando Apesteguía (fernape) Author: R. Christian McDonald |
dns/unbound: update to 1.18.0
ChangeLog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-18-0
PR: 273456
Reported by: rcm@rcm.sh
Approved by: jaap@NLnetLabs.nl (maintainer) |
1.17.1_2 07 Feb 2023 15:23:14 |
Fernando Apesteguía (fernape) Author: Jaap Akkerhuis |
dns/unbound: fix build with AAAA option ON
PR: 269337
Reported by: void@f-m.fm
MFH: 2023Q1 (build fix) |
1.17.1_1 18 Jan 2023 18:18:31 |
Adam Weinberger (adamw) |
dns/unbound: Clarify DYNLIB_DESC
The DYNLIB option doesn't change whether unbound itself is dynamically
or statically linked, it enables support for third-party shlibs.
Approved by: maintainer |
1.17.1_1 16 Jan 2023 12:44:02 |
Fernando Apesteguía (fernape) |
dns/unbound: add dynlib port option
PR: 268942
Reported by: me@rcm.sh
Approved by: jaap@NLnetLabs.nl (maintainer) |
1.17.1 13 Jan 2023 21:12:27 |
Brad Davis (brd) |
dns/unbound: Update to 1.17.1
The release notes can be found at:
https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-17-1
PR: 268913
Approved by: jaap@NLnetLabs.nl (maintainer)
Sponsored by: Rubicon Communications, LLC ("Netgate") |
1.17.0 16 Oct 2022 17:37:54 |
Fernando Apesteguía (fernape) Author: Jaap Akkerhuis |
dns/unbound: Update to 1.17.0
ChangeLog: https://www.nlnetlabs.nl/news/2022/Oct/13/unbound-1.17.0-released/
Remove additional MASTER_SITES (certificate error)
PR: 267018
Reported by: jaap@NLnetLabs.nl (maintainer)
Reviewed by: diizzy@ |
1.16.3 29 Sep 2022 05:39:14 |
Fernando Apesteguía (fernape) Author: Herbert J. Skuhra |
dns/unbound: Update to 1.16.3
ChangeLog: https://nlnetlabs.nl/news/2022/Sep/21/unbound-1.16.3-released/
Fixes Non-Responsive Delegation Attack.
PR: 266654
Reported by: herbert@gojira.at
Approved by: jaap@NLnetLabs.nl (maintainer)
Security: CVE-2022-3204 |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
1.16.2 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
1.16.2 05 Aug 2022 18:58:00 |
Bernard Spil (brnrd) |
dns/unbound: Security update to 1.6.2
PR: 265645
Reported by: Jaap Akkerhuis <jaap NLnetLabs nl> (maintainer)
Security: bc43a578-14ec-11ed-856e-d4c9ef517024
MFH: 2022Q3 |
1.16.1 20 Jul 2022 14:21:47 |
Tobias C. Berner (tcberner) |
dns: remove 'Created by' lines
A big Thank You to the original contributors of these ports:
* Aaron Dalton <aaron@FreeBSD.org>
* Akinori MUSHA aka knu <knu@idaemons.org>
* Alex Samorukov <samm@freebsd.org>
* Alexey Dokuchaev <danfe@FreeBSD.org>
* Allan Jude <allanjude@freebsd.org>
* Amar Takhar <verm@drunkmonk.net>
* Anders Nordby <anders@fix.no>
* Andrew Greenwood <greenwood.andy@gmail.com>
* Anton Berezin <tobez@FreeBSD.org>
* Ashish SHUKLA <ashish@FreeBSD.org>
* Attila Nagy <bra@fsn.hu> (Only the first 15 lines of the commit message are shown above ) |
1.16.1 12 Jul 2022 17:47:33 |
Fernando Apesteguía (fernape) Author: Jaap Akkerhuis |
dns/unbound: Update to 1.16.1
ChangeLog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-16-1
PR: 265151
Reported by: jaap@NLnetLabs.nl (maintainer)
MFH: 2022Q3 (bugfixes) |
1.16.0 08 Jun 2022 10:33:33 |
Li-Wen Hsu (lwhsu) Author: Jaap Akkerhuis |
dns/unbound: Update to 1.16.0
This release has EDE support, for extended EDNS error reporting,
it fixes unsupported ZONEMD algorithms to load, and has more bug fixes.
The EDE errors can be turned on by `ede: yes`, it is default disabled.
Validation errors and other errors are then reported. If you also want
stale answers for expired responses to have an error code, the option
`ede-serve-expired: yes` can be used.
On request, the port now also has dnscrypt support default enabled.
PR: 264538 |
1.15.0_1 26 Feb 2022 22:29:48 |
Kevin Bowling (kbowling) Author: Jaap Akkerhuis |
dns/unbound: Fix DoH compilation
PR: 262145
Reported by: freebsd@rail.eu.org
Tested by: freebsd@rail.eu.org |
1.15.0 17 Feb 2022 21:21:08 |
Dries Michiels (driesm) Author: Jaap Akkerhuis |
dns/unbound: Update to 1.15.0
[The Makefile of the port got cleaned up to make portfmt happy]
This release has bug fixes for crashes that happened on heavy network
usage. The default for the aggressive-nsec option has changed, it is now
enabled.
The ratelimit logic had to be reworked for the crash fixes. As a result,
there are new options to control the behaviour of ratelimiting.
The ratelimit-backoff and ip-ratelimit-backoff options can be used to
control how severe the backoff is when the ratelimit is exceeded.
The rpz-signal-nxdomain-ra option can be used to unset the RA flag, for
NXDOMAIN answers from RPZ. That is used by some clients to detect that (Only the first 15 lines of the commit message are shown above ) |
1.14.0 25 Jan 2022 13:12:42 |
Li-Wen Hsu (lwhsu) Author: Jaap Akkerhuis |
dns/unbound: Fix the aaaa-filter-iterator.patch
PR: 260553
Reported by: tech-lists@zyxst.net |
1.14.0 14 Dec 2021 21:06:00 |
Cy Schubert (cy) Author: Jaap Akkerhuis |
dns/unbound: Update to 1.14.0
Changelog:
This release contains bug fixes and a full set of RPZ triggers and
actions that are supported. This works with RPZ zones, configured with
`rpz:`.
It is possible to selectively enable use of TCP for stub zones and
forward zones, without having enable it server wide, by enabling it
with the `stub-tcp-upstream: yes` and `forward-tcp-upstream: yes` options.
The added contrib/Dockerfile.tests from ziollek can be used to setup
a Docker environment to run tests in. The documentation is in the
doc/README.tests file. (Only the first 15 lines of the commit message are shown above ) |
1.13.2 16 Aug 2021 23:18:01 |
Renato Botelho (garga) Author: Jaap Akkerhuis |
dns/unbound: Update to 1.13.2
Added a new option DEP-RSA1024 to enable --with-deprecate-rsa-1024
Changelog:
- Merge PR #317: ZONEMD Zone Verification, with RFC 8976 support.
ZONEMD records are checked for zones loaded as auth-zone,
with DNSSEC if available. There is an added option
zonemd-permissive-mode that makes it log but not fail wrong zones.
With zonemd-reject-absence for an auth-zone the presence of a
zonemd can be mandated for specific zones.
- Fix: Resolve interface names on control-interface too.
- Merge #470 from edevil: Allow configuration of persistent TCP
connections. (Only the first 15 lines of the commit message are shown above ) |
1.13.1 06 Apr 2021 14:31:13 |
Mathieu Arnold (mat) |
all: Remove all other $FreeBSD keywords. |
1.13.1 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
1.13.1 09 Feb 2021 19:49:01 |
nc |
dns/unbound: Update to 1.13.1
Changes: https://nlnetlabs.nl/news/2021/Feb/09/unbound-1.13.1-released/
PR: 253376
Submitted by: Jaap Akkerhuis <jaap AT NLnetLabs DOT nl> (maintainer) |
1.13.0_1 17 Dec 2020 09:38:40 |
brnrd |
dns/unbound: SIGSEGV fix
PR: 251821
Submitted by: delphij
Approved by: Jaap Akkerhuis (maintainer)
Obtained from: https://github.com/NLnetLabs/unbound/issues/376
MFH: 2020Q4 |
1.13.0 12 Dec 2020 16:54:41 |
brnrd |
dns/unbound: Security update to 1.13.0
* Sort options and port_docs while here
PR: 251563
Submitted by: Jaap Akkerhuis <jaap nlnetlabs nl> (maintainer)
Approved by: maintainer (implicit)
MFH: 2020Q4
Security: 388ebb5b-3c95-11eb-929d-d4c9ef517024 |
1.12.0 12 Oct 2020 15:33:46 |
garga |
dns/unbound: Update to 1.12.0
PR: 250199
Submitted by: maintainer
Sponsored by: Rubicon Communications, LLC (Netgate) |
1.11.0 21 Aug 2020 14:17:24 |
lwhsu |
dns/unbound: Update to 1.11.0
PR: 248808
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.10.1 10 Jul 2020 09:37:24 |
danfe |
Unbreak the build with FILTER_AAAA option.
PR: 246648 |
1.10.1 17 Jun 2020 18:17:45 |
sunpoet |
Move devel/swig30 to devel/swig and update to 4.0.1
- Do not silence installation message
- Update dependent ports:
- Fix build with swig 4.0.1
- Update *_DEPENDS
- Remove BINARY_ALIAS
Changes: http://www.swig.org/news.php
PR: 246613
Exp-run by: antoine |
1.10.1 19 May 2020 19:02:47 |
delphij |
dns/unbound: update to 1.10.1.
PR: 246569
Submitted by: Jaap Akkerhuis (maintainer)
MFH: 2020Q2
Security: CVE-2020-12662, CVE-2020-12663 |
1.10.0 22 Feb 2020 13:59:27 |
pi |
dns/unbound: update 1.9.6 -> 1.10.0
PR: 244244
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Relnotes: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=244244#c0 |
1.9.6 16 Dec 2019 09:44:06 |
joneum |
Update to 1.9.6
PR: 242603
Sponsored by: Netzkommune GmbH |
1.9.5 23 Nov 2019 12:54:16 |
joneum |
Update to 1.9.5
Changelog:
https://nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-ipsec-module
PR: 242075
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
MFH: 2019Q4
Sponsored by: Netzkommune GmbH |
1.9.4 03 Oct 2019 19:28:48 |
sunpoet |
Update to 1.9.4
Changes: https://github.com/NLnetLabs/unbound/blob/master/doc/Changelog
PR: 241033
Reported by: C <cm@appliedprivacy.net>
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Security: 108a4be3-e612-11e9-9963-5f1753e0aca0
MFH: 2019Q4 |
1.9.3 02 Sep 2019 16:31:02 |
swills |
dns/unbound: update to 1.9.3
Whil here, improve rc script
PR: 240163
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.9.2_1 13 Aug 2019 16:01:59 |
mat |
Convert to UCL & cleanup pkg-message (categories d) |
1.9.2_1 02 Aug 2019 13:30:40 |
jbeich |
devel/libevent2: update to 2.1.11
Changes: https://github.com/libevent/libevent/releases/tag/release-2.1.11-stable
ABI: https://abi-laboratory.pro/tracker/timeline/libevent/
PR: 239599
Reported by: GitHub (watch releases)
Approved by: zeising (maintainer)
MFH: 2019Q3 (maybe security, partially restores 2.1.8 ABI)
Differential Revision: https://reviews.freebsd.org/D21133 |
1.9.2 19 Jun 2019 04:56:30 |
joneum |
Update to 1.9.2
PR: 238651
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Sponsored by: Netzkommune GmbH |
1.9.1 18 Mar 2019 11:35:50 |
swills |
dns/unbound: update to 1.9.1
PR: 236575
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.9.0_1 11 Feb 2019 13:58:08 |
garga |
dns/unbound: Import patch to fix hostname verification with OpenSSL 1.0.2
PR: 235571
Approved by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Obtained from: https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=4206#c5
https://github.com/pfsense/FreeBSD-ports/commit/af2c493a0dfa99e2afc6e3f9236aad10021d6b39
Sponsored by: Rubicon Communications, LLC (Netgate) |
1.9.0 05 Feb 2019 14:27:03 |
sunpoet |
Update to 1.9.0
Changes: https://www.nlnetlabs.nl/svn/unbound/tags/release-1.9.0/doc/Changelog
PR: 235522
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.8.3 26 Dec 2018 22:20:23 |
swills |
dns/unbound: Update to 1.8.3
PR: 233933
Submitted by: jaap@NLnetLabs.nl |
1.8.2_1 10 Dec 2018 16:20:21 |
swills |
dns/unbound: fix DNSTAP build failure
PR: 233891
Submitted by: jaap@NLnetLabs.nl (maintainer)
Reported by: O. Hartmann <ohartmann@walstatt.org> |
1.8.2 09 Dec 2018 01:06:25 |
swills |
dns/unbound: Update to 1.8.2
PR: 233796
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.8.1 08 Oct 2018 17:29:32 |
swills |
dns/unbound upgrade to 1.8.1
PR: 232070
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.8.0 01 Oct 2018 23:33:41 |
swills |
dns/unbound: remove unnecessary LIBEVENT_USES
PR: 231488
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.8.0 20 Sep 2018 14:42:34 |
swills |
dns/unbound: Fix configure in some cases
Fix configure by adding missing pkgconfig to uses
PR: 231488
Submitted by: leres (solution, via email), mfechner (patch)
Reported by: leres, mfechner
Approved by: jaap@NLnetLabs.nl (maintainer) |
1.8.0 18 Sep 2018 18:28:43 |
swills |
dns/unbound: Fix OPTIONS_DEFINE reference
Missed in previous commit
PR: 231283
Submitted by: jaap@NLnetLabs.nl (maintainer)
Pointyhat to: swills |
1.8.0 18 Sep 2018 18:24:05 |
swills |
dns/unbound: update to 1.8.0
Bump PORTREVISION on consumers due to library major version change
PR: 231283
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.7.3 21 Jun 2018 21:12:11 |
sunpoet |
Update to 1.7.3
Changes: https://www.nlnetlabs.nl/svn/unbound/tags/release-1.7.3/doc/Changelog
PR: 229202
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.7.2 14 Jun 2018 23:22:21 |
swills |
dns/unbound: upgrade to 1.7.2
PR: 228889
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.7.1_1 22 May 2018 16:42:54 |
brnrd |
dns/unbound: Bump portrevision
- Follow-up of r470572
PR: 228390
Reported by: adamw
MFH: 2018Q2 |
1.7.1 21 May 2018 19:28:28 |
brnrd |
dns/unbound: Fix errors when unbound_conf is set
PR: 228390
Approved by: maintainer <jaap NLnetLabs nl>
MFH: 2018Q2 |
1.7.1 10 May 2018 14:50:19 |
miwi |
- Update to 2.5.9
- Update WWW
PR: 227949
Submitted by: maintainer
Sponsored by: iXsystems Inc. |
1.7.0 21 Mar 2018 17:00:24 |
pi |
dns/unbound: upgrade 1.6.8 -> 1.7.0
Features
- auth-zone provides a way to configure RFC7706 from unbound.conf,
eg. with auth-zone: name: "." for-downstream: no for-upstream: yes
fallback-enabled: yes and masters or a zonefile with data.
- Aggressive use of NSEC implementation. Use cached NSEC records to
generate NXDOMAIN, NODATA and positive wildcard answers.
- Accept tls-upstream in unbound.conf, the ssl-upstream keyword is
also recognized and means the same. Also for tls-port,
tls-service-key, tls-service-pem, stub-tls-upstream and
forward-tls-upstream.
- [dnscrypt] introduce dnscrypt-provider-cert-rotated option,
from Manu Bretelle.
This option allows handling multiple cert/key pairs while only (Only the first 15 lines of the commit message are shown above ) |
1.6.8_2 27 Feb 2018 13:03:48 |
mat |
Switch some MASTER_SITES from http/ftp to https.
Also some cleanup of dead entries.
PR: 226203
Submitted by: Sam H
Sponsored by: Absolight |
1.6.8_2 19 Feb 2018 11:10:43 |
antoine |
Reduce dependency on the python2 metaport
PR: 225752
Submitted by: Yasuhiro KIMURA |
1.6.8_1 31 Jan 2018 00:28:30 |
adamw |
Bump PORTREVISION after r459983 |
1.6.8 26 Jan 2018 10:16:16 |
brnrd |
dns/unbound: Fix rc-script with config in flags
- Adds new option unbound_config
PR: 225360
Submitted by: jaap@NLnetLabs.nl
Approved by: jaap@NLnetLabs.nl (maintainer) |
1.6.8 19 Jan 2018 16:27:07 |
dbaio |
dns/unbound: Update to 1.6.8, Fixes security vulnerability
PR: 225313
Submitted by: jaap@NLnetLabs.nl (maintainer)
MFH: 2018Q1
Security: 8d3bae09-fd28-11e7-95f2-005056925db4 |
1.6.7_1 26 Oct 2017 18:42:11 |
tijl |
After r452629 also bump ports that optionally depend on libsodium.
PR: 223192 |
1.6.7 12 Oct 2017 14:44:18 |
dbaio |
dns/unbound: Update to 1.6.7
Changes: http://www.unbound.net/pipermail/unbound-users/2017-October/004972.html
PR: 222941
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.6.6 22 Sep 2017 00:51:01 |
dbaio |
dns/unbound: Update to 1.6.6
Changes: http://www.unbound.net/pipermail/unbound-users/2017-September/004936.html
PR: 222503
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.6.5 21 Aug 2017 21:45:28 |
swills |
dns/unbound: Upgrade to 1.6.5
PR: 221692
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.6.4_1 23 Jul 2017 14:16:09 |
sunpoet |
Fix typo
Approved by: portmgr (blanket) |
1.6.4 23 Jul 2017 14:03:52 |
eugen |
Base system contains unbound without libevent support enabled.
Enable libevent by default for the port dns/unbound for performance reasons.
PR: 220733
Submitted by: Dmitry Luhtionov
Approved by: jaap (maintainer), az (mentor) |
1.6.4 12 Jul 2017 22:44:54 |
dbaio |
dns/unbound: Update to 1.6.4
Changes: http://www.unbound.net/pipermail/unbound-users/2017-June/004818.html
PR: 220673
Submitted by: jaap@NLnetLabs.nl (maintainer)
Approved by: garga (mentor, implicit) |
1.6.3 13 Jun 2017 20:37:06 |
adamw |
Update unbound to 1.6.3.
This release fixes a spurious assertion failure when unbound receives a
malformed packet with 0x20 enabled.
Bug Fixes
- Fix #1280: Unbound fails assert when response from authoritative
contains malformed qname. When 0x20 caps-for-id is enabled, when
assertions are not enabled the malformed qname is handled correctly.
PR: 219958
Submitted by: maintainer (jaap NLnetLabs nl) |
1.6.2 04 May 2017 01:49:21 |
ler |
Correct typo in DNSCRYPT option description
PR: 219052
Submitted by: greenreaper@hotmail.com
Reportee by:
Approved by: adamw (mentor, implicit) |
1.6.2 29 Apr 2017 20:59:34 |
pi |
dns/unbound: update 1.6.1 -> 1.6.2
PR: 218872
Changes: http://www.unbound.net/pipermail/unbound-users/2017-April/004762.html
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.6.1 08 Mar 2017 01:48:33 |
wen |
- Update to 1.6.1
PR: 217614
Submitted by: jaap@NLnetLabs.nl(maintainer) |
1.6.0_3 03 Mar 2017 04:12:21 |
miwi |
- Chase ldns shlip bump
PR: 217495 |
1.6.0_2 20 Feb 2017 02:57:04 |
jbeich |
devel/libevent2: drop historical suffix after r362796
PR: 216777
Approved by: mm (maintainer) |
1.6.0_1 04 Feb 2017 07:56:59 |
jbeich |
devel/libevent2: update to 2.1.8 and cleanup
- DEFAULT_VERSIONS += ssl=openssl-devel is now supported
- devel/py-event and devel/p5-Event-Lib are marked BROKEN
Changes: https://github.com/libevent/libevent/raw/release-2.1.8-stable/whatsnew-2.1.txt
Changes: https://github.com/libevent/libevent/raw/release-2.1.8-stable/ChangeLog
PR: 216527
Exp-run by: antoine
Approved by: mm (maintainer) |
1.6.0 11 Jan 2017 10:08:38 |
amdmi3 |
- Remove always-true/false conditions after FreeBSD 9, 10.1, 10.2 EOL
Approved by: portmgr blanket |
1.6.0 17 Dec 2016 13:20:19 |
sunpoet |
- Update to 1.6.0
- Do not silence installation message
- While I'm here:
- Move LIB_DEPENDS upwards
- Use = instead of += for CONFIGURE_ARGS and USES
- Convert to options helper
- Use TEST_TARGET
Changes: https://unbound.nlnetlabs.nl/pipermail/unbound-users/2016-December/004587.html
PR: 215322
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) |
1.5.10 10 Nov 2016 01:21:43 |
linimon |
Mark as broken on aarch64: fails to link with sbrk.
While here, pet portlint and remove stale ia64 lines.
Approved by: portmgr (tier-2 blanket) |
1.5.10 02 Oct 2016 10:30:40 |
pawel |
Update to version 1.5.10
In this release there is a fix for long downtime after connectivity
loss, which was a longstanding unsolved issue. Features for tcp, TCP
Fast Open and timeout pressure to close connections when the tcp
connections are getting full. Option to use ipv6 /64 for extra entropy.
Features
- Create a pkg-config file for libunbound in contrib.
- TCP Fast open patch from Sara Dickinson.
- Finegrained localzone control with define-tag, access-control-tag,
access-control-tag-action, access-control-tag-data, local-zone-tag, and
local-zone-override. And added types always_transparent, always_refuse,
always_nxdomain with that.
- If more than half of tcp connections are in use, a shorter timeout (Only the first 15 lines of the commit message are shown above ) |
1.5.9_1 24 Aug 2016 15:11:35 |
mat |
Do not auto-enable unbound munin plugins when installing unbound.
PR: 211999
Submitted by: maintainer
Reported by: wollman
Sponsored by: Absolight |
1.5.9 18 Jun 2016 21:53:58 |
rm |
dns/unbound: update to 1.5.9
PR: 210257
Submitted by: jaap@NLnetLabs.nl (maintainer) |
1.5.8 01 Apr 2016 14:00:57 |
mat |
Remove ${PORTSDIR}/ from dependencies, categories d, e, f, and g.
With hat: portmgr
Sponsored by: Absolight |
1.5.8 15 Mar 2016 06:19:52 |
ohauer |
- Update unbound to version 1.5.8
- add OPTION for DNSTAP logging support
- rename OPTION s/MUNIN/MUNIN_PLUGIN/ so it is consistent with nsd
- use OPTIONS_SUB
- use ${opt}_target
- use @sample macro for unbound.conf
- sort pkg-plist
Features
- ip-transparent option for FreeBSD with IP_BINDANY socket option.
- insecure-lan-zones: yesno config option, patch from Dag-Erling Smorgrav.
- RR Type CSYNC support RFC 7477, in debug printout and config input.
- RR Type OPENPGPKEY support (draft-ietf-dane-openpgpkey-07).
- [bugzilla: 731 ] tcp-mss, outgoing-tcp-mss options for unbound.conf, patch (Only the first 15 lines of the commit message are shown above ) |
1.5.7 11 Feb 2016 14:40:13 |
az |
assign port to the new maintainer (jaap@NLnetLabs.nl)
Submitted by: sem@FreeBSD.org (maintainer) via private email |
1.5.7 04 Feb 2016 15:58:30 |
erwin |
- Update unbound to 1.5.7
- Bump PORTREVISIOn on dependent ports
Some Upgrade Notes:
This release fixes a validation failure for nodata with wildcards and
emptynonterminals. Fixes OpenSSL Library compability. Fixes correct
response for malformed EDNS queries. For crypto in libunbound there is
libnettle support.
Qname minimisation is implemented. Use qname-minimisation: yes to
enable it. This version sends the full query name when an error is
found for intermediate names. It should therefore not fail for names
on nonconformant servers. It combines well with
harden-below-nxdomain: yes because those nxdomains are probed by the (Only the first 15 lines of the commit message are shown above ) |
1.5.5 11 Oct 2015 12:58:35 |
sem |
- Update to 1.5.5 |
1.5.4_1 19 Aug 2015 15:49:43 |
sem |
- Fix LibreSSL issue (from upstream)
- Add autoreconf to USES
- Satisfy portlint -AC
- Add regress-test target
- Back FILTER_AAAA option
PR: 202407
Submitted by: brnrd |
1.5.4 17 Aug 2015 19:31:01 |
sem |
- Update to 1.5.4
- Disable FILTER_AAAA option. The patch is obsolated.
PR: 202385
Submitted by: edwin |
1.5.3_2 02 Aug 2015 15:03:20 |
tijl |
By default libtool replaces -export-symbols <file> with -retain-symbols-file
<file> on ELF systems, but this doesn't really do what -export-symbols is
meant to do. On GNU ELF systems it converts <file> to a simple version
script first and then uses -version-script instead of -retain-symbols-file.
Let USES=libtool patch libtool scripts to do this on all systems with GNU
ld(1).
Bump PORTREVISION on all ports where the build log contains -export-symbols.
audio/calf: This port builds a module that now exports only one function,
but it also builds a number of executables that link to this module and
expect to see other functions. Because it's already a bit dodgy to link to
a module (libtool warns about this) let the module continue to export only
one function and instead build an ordinary library from the same source that
the executables can link to. Fix a number of other issues in the same (Only the first 15 lines of the commit message are shown above ) |
1.5.3_1 13 May 2015 04:55:04 |
amdmi3 |
- Add CPE info
- Fix LICENSE
- Fix WWW:
Approved by: portmgr blanket |
1.5.3_1 03 May 2015 14:21:39 |
bapt |
Use @dir mechanisms to ensure etc/unbound belongs to the unbound user |
1.5.3_1 16 Mar 2015 15:36:58 |
sem |
- Forgotten option description
Submitted by: darksoul@darkbsd.org |