summaryrefslogtreecommitdiffstats
path: root/contrib/bind9/configure.in
Commit message (Collapse)AuthorAgeFilesLines
* Vendor import of BIND 9.4.2dougb2007-12-021-2/+27
|
* Vendor import of BIND 9.4.1dougb2007-06-021-19/+334
|
* Vendor import of BIND 9.3.3dougb2006-12-101-62/+134
|
* Update to version 9.3.2-P2, which addresses the vulnerabilitydougb2006-11-041-34/+46
| | | | | | | | | | | | | | | | | | | | | | announced by ISC dated 31 October (delivered via e-mail to the bind-announce@isc.org list on 2 November): Description: Because of OpenSSL's recently announced vulnerabilities (CAN-2006-4339, CVE-2006-2937 and CVE-2006-2940) which affect named, we are announcing this workaround and releasing patches. A proof of concept attack on OpenSSL has been demonstrated for CAN-2006-4339. OpenSSL is required to use DNSSEC with BIND. Fix for version 9.3.2-P1 and lower: Upgrade to BIND 9.3.2-P2, then generate new RSASHA1 and RSAMD5 keys for all old keys using the old default exponent and perform a key rollover to these new keys. These versions also change the default RSA exponent to be 65537 which is not vulnerable to the attacks described in CAN-2006-4339.
* Vendor import of BIND 9.3.2dougb2005-12-291-234/+128
|
* Vendor import of BIND 9.3.1dougb2005-03-171-15/+63
|
* Vender import of BIND 9.3.0rc4.trhodes2004-09-191-0/+2180
OpenPOWER on IntegriCloud