summaryrefslogtreecommitdiffstats
path: root/contrib/bind9/FAQ.xml
Commit message (Collapse)AuthorAgeFilesLines
* Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.dougb2012-04-051-1/+1
|
* Upgrade to version 9.8.0-P4dougb2011-07-161-1/+1
|\ | | | | | | | | This version has many new features, see /usr/share/doc/bind9/README for details.
* | Upgrade to 9.6-ESV-R4-P1, which address the following issues:dougb2011-05-281-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 1. Very large RRSIG RRsets included in a negative cache can trigger an assertion failure that will crash named (BIND 9 DNS) due to an off-by-one error in a buffer size check. This bug affects all resolving name servers, whether DNSSEC validation is enabled or not, on all BIND versions prior to today. There is a possibility of malicious exploitation of this bug by remote users. 2. Named could fail to validate zones listed in a DLV that validated insecure without using DLV and had DS records in the parent zone. Add a patch provided by ru@ and confirmed by ISC to fix a crash at shutdown time when a SIG(0) key is being used.
* | Upgrade to version 9.6.2. This version includes all previously releaseddougb2010-03-031-2/+33
| | | | | | | | | | | | | | | | | | | | | | | | security patches to the 9.6.1 version, as well as many other bug fixes. This version also incorporates a different fix for the problem we had patched in contrib/bind9/bin/dig/dighost.c, so that file is now back to being the same as the vendor version. Due to the fact that the DNSSEC algorithm that will be used to sign the root zone is only included in this version and in 9.7.x those who wish to do validation MUST upgrade to one of these prior to July 2010.
* | Upgrade to BIND 9.6.1-P3.dougb2010-01-251-13/+18
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This version address the following vulnerabilities: BIND 9 Cache Update from Additional Section https://www.isc.org/advisories/CVE-2009-4022v6 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022 A nameserver with DNSSEC validation enabled may incorrectly add unauthenticated records to its cache that are received during the resolution of a recursive client query BIND 9 DNSSEC validation code could cause bogus NXDOMAIN responses https://www.isc.org/advisories/CVE-2010-0097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097 There was an error in the DNSSEC NSEC/NSEC3 validation code that could cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records proven by NSEC or NSEC3 to exist) to be cached as if they had validated correctly These issues only affect systems with DNSSEC validation enabled.
* | Update BIND to version 9.6.1rc1. This version has better performance anddougb2009-05-311-4/+4
|\ \ | |/ | | | | | | | | | | | | | | | | | | | | | | lots of new features compared to 9.4.x, including: Full NSEC3 support Automatic zone re-signing New update-policy methods tcp-self and 6to4-self DHCID support. More detailed statistics counters including those supported in BIND 8. Faster ACL processing. Efficient LRU cache-cleaning mechanism. NSID support.
* | Merge from vendor/bind9/dist as of the 9.4.3 importdougb2008-12-231-12/+241
|\ \ | |/
| * Flatten bind9 vendor work areapeter2008-07-121-1347/+0
|/
* Vendor import of BIND 9.4.2dougb2007-12-021-508/+498
|
* Vendor import of BIND 9.4.1dougb2007-06-021-16/+97
|
* Vendor import of BIND 9.3.4dougb2007-01-291-2/+81
|
* Vendor import of BIND 9.3.3dougb2006-12-101-4/+194
|
* Vendor import of BIND 9.3.2dougb2005-12-291-0/+1007
OpenPOWER on IntegriCloud