# # spec file for package bind # # Copyright (c) 2014 SUSE LINUX Products GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed # upon. The license for this file, and modifications and additions to the # file, is the same license as for the pristine package itself (unless the # license for the pristine package is not an Open Source License, in which # case the license is the MIT License). An "Open Source License" is a # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. # Please submit bugfixes or comments via http://bugs.opensuse.org/ # Name: bind %define pkg_name bind %define pkg_vers 9.10.1-P1 %define rpm_vers 9.10.1P1 %define idn_vers 1.0 Summary: Domain Name System (DNS) Server (named) License: ISC Group: Productivity/Networking/DNS/Servers Version: %rpm_vers Release: 170.1 Source: ftp://ftp.isc.org/isc/bind9/%{pkg_vers}/bind-%{pkg_vers}.tar.gz Source3: ftp://ftp.isc.org/isc/bind9/%{pkg_vers}/bind-%{pkg_vers}.tar.gz.asc # from http://www.isc.org/about/openpgp/ ... changes yearly apparently. Source4: %name.keyring Source1: vendor-files.tar.bz2 Source2: baselibs.conf Source9: ftp://ftp.internic.net/domain/named.root Source40: http://www.venaas.no/ldap/bind-sdb/dnszone-schema.txt Patch: configure.in.diff Patch1: Makefile.in.diff Patch4: perl-path.diff Patch51: pie_compile.diff Patch52: named-bootconf.diff Patch53: bind-sdb-ldap.patch Patch100: configure.in.diff2 Patch101: runidn.diff #BuildRequires: krb5-devel #BuildRequires: libcap #BuildRequires: libcap-devel #BuildRequires: libmysqlclient-devel #BuildRequires: libtool #BuildRequires: libxml2-devel #BuildRequires: openldap2-devel #BuildRequires: openssl #BuildRequires: openssl-devel #BuildRequires: python-base #BuildRequires: update-desktop-files Provides: bind8 Provides: bind9 Provides: dns_daemon Obsoletes: bind8 < %version Obsoletes: bind9 < %version Requires: %{name}-chrootenv Requires: %{name}-utils #PreReq: %fillup_prereq %insserv_prereq bind-utils /bin/grep /bin/sed /bin/mkdir /usr/bin/tee /bin/chmod /bin/chown /bin/mv /bin/cat /usr/bin/dirname /usr/bin/diff /usr/bin/old Requires(pre): /usr/sbin/groupadd /usr/sbin/useradd /usr/sbin/usermod Url: http://isc.org/sw/bind/ Source60: dlz-schema.txt #%if %ul_version >= 1 #%define VENDOR UL #%else #%if "%{_vendor}" == "suse" #%define VENDOR SUSE #%else #%define VENDOR %_vendor #%endif #%endif # Defines for user and group add %define NAMED_UID 44 %define NAMED_UID_NAME named %define NAMED_GID 44 %define NAMED_GID_NAME named %define NAMED_COMMENT Name server daemon %define NAMED_HOMEDIR /var/lib/named %define NAMED_SHELL /bin/false %define GROUPADD_NAMED /usr/sbin/groupadd -g %{NAMED_GID} -o -r %{NAMED_GID_NAME} 2> /dev/null || : %define USERADD_NAMED /usr/sbin/useradd -r -o -g %{NAMED_GID_NAME} -u %{NAMED_UID} -s %{NAMED_SHELL} -c "%{NAMED_COMMENT}" -d %{NAMED_HOMEDIR} %{NAMED_UID_NAME} 2> /dev/null || : %define USERMOD_NAMED /usr/sbin/usermod -s %{NAMED_SHELL} -d %{NAMED_HOMEDIR} %{NAMED_UID_NAME} 2>/dev/null || : BuildRoot: %{_tmppath}/%{name}-%{version}-build %if ! %{defined _rundir} %define _rundir %{_localstatedir}/run %endif BuildArch: i486 %description Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols and provides an openly redistributable reference implementation of the major components of the Domain Name System. This package includes the components to operate a DNS server. %package -n idnkit Summary: Toolkit for internationalized domain names Group: Productivity/Networking/DNS/Utilities Version: %idn_vers Release: 170.1 # Added on 2014-10-01 Provides: bind-utils:%_bindir/idnconv Provides: bind-utils:%_bindir/runidn %description -n idnkit idnkit is a toolkit for handling internationalized domain names. It consists of the following components. * library for handling internationalized domain names (libidnkit) * codeset conversion utility (idnconv) * a command which adds IDN feature dynamically to Unix applications (runidn) %package -n idnkit-devel Summary: Development files for idnkit Group: Development/Libraries/C and C++ Version: %idn_vers Release: 170.1 Provides: bind-devel:%_includedir/bind/idn Requires: libidnkit1 = %idn_vers Requires: libidnkitlite1 = %idn_vers Requires: libidnkitres1 = %idn_vers %description -n idnkit-devel idnkit is a toolkit for handling internationalized domain names. This subpackage contains the header files needed for building programs with it. %package -n libbind9-140 Summary: BIND9 shared library used by BIND Group: System/Libraries Version: %rpm_vers Release: 170.1 %description -n libbind9-140 This library contains a few utility functions used by the BIND server and utilities. %package -n libdns146 Summary: DNS library used by BIND Group: System/Libraries Version: %rpm_vers Release: 170.1 %description -n libdns146 This subpackage contains the "DNS client" module. This is a higher level API that provides an interface to name resolution, single DNS transaction with a particular server, and dynamic update. Regarding name resolution, it supports advanced features such as DNSSEC validation and caching. This module supports both synchronous and asynchronous mode. It also contains the Advanced Database (ADB) and Simple Database (SDB) APIs. ADB allows user-written routines to replace BIND’s internal database function for both nominated and all zones. SDB allows a user-written driver to supply zone data either from alternate data sources (for instance, a relational database) or using specialized algorithms (for instance, for load-balancing). [Book links for SDB: "Pro DNS and BIND 10", R. Aitchison, Apress] %package -n libidnkit1 Summary: BIND Internationalized Domain Names library Group: System/Libraries Version: %idn_vers Release: 170.1 %description -n libidnkit1 The libidnkit library support various manipulations of internationalized domain names. libidnkit internally uses iconv function to provide encoding conversion from UTF-8 to the local encoding (such as ISO-8859-1, usually determined by the current locale), and vise versa. %package -n libidnkitlite1 Summary: BIND Internationalized Domain Names lightweight library Group: System/Libraries Version: %idn_vers Release: 170.1 %description -n libidnkitlite1 The libidnkitlite library support various manipulations of internationalized domain names. libidnkitlite is lightweight version of libidnkit. It assumes local encoding is UTF-8 so that it never uses iconv. %package -n libidnkitres1 Summary: Resolver function library with IDN support Group: System/Libraries Version: %idn_vers Release: 170.1 %description -n libidnkitres1 libidnkitres is a LD_PRELOAD-able library which provides a modified version of resolver functions (gethostbyname, getaddrinfo, etc.) which implement features for handling internationalized domain names. %package -n libirs141 Summary: The "IRS" (Information Retrieval System) library Group: System/Libraries Version: %rpm_vers Release: 170.1 %description -n libirs141 libirs provides an interface to parse the traditional resolv.conf file and an "advanced" configuration file related to the DNS library for configuration parameters that would be beyond the capability of the resolv.conf file. Specifically, it is intended to provide DNSSEC related configuration parameters. By default, the path to this configuration file is /etc/dns.conf. %package -n libirs-devel Summary: Development files for IRS Group: Development/Libraries/C and C++ Version: %rpm_vers Release: 170.1 Requires: libirs141 = %rpm_vers %description -n libirs-devel libirs provides an interface to parse the traditional resolv.conf file and an "advanced" configuration file related to the DNS library for configuration parameters that would be beyond the capability of the resolv.conf file. This subpackage contains the header files needed for building programs with it. %package -n libisc142 Summary: ISC shared library used by BIND Group: System/Libraries Version: %rpm_vers Release: 170.1 # Added on 2014-10-01. Does not really matter where it is put, we just need to # flush the old name from the rpmdb. The libs will be automatically pulled in # by way of rpm symbol requirements already. Obsoletes: bind-libs = %version-%release Provides: bind-libs < %version-%release %description -n libisc142 This library contains miscellaneous utility function used by the BIND server and utilities. It includes functions for assertion handling, balanced binary (AVL) trees, bit masks comparison, event based programs, heap-based priority queues, memory handling, and program logging. %package -n libisccc140 Summary: Command Channel Library used by BIND Group: System/Libraries Version: %rpm_vers Release: 170.1 %description -n libisccc140 This library is used for communicating with BIND servers' administrative command channel (port 953 by default). %package -n libisccfg140 Summary: Exported ISC configuration shared library Group: System/Libraries Version: %rpm_vers Release: 170.1 %description -n libisccfg140 This BIND library contains the configuration file parser %package -n liblwres141 Summary: Lightweight Resolver API library Group: System/Libraries Version: %rpm_vers Release: 170.1 %description -n liblwres141 The BIND 9 lightweight resolver library is a name service independent stub resolver library. It provides hostname-to-address and address-to-hostname lookup services to applications by transmitting lookup requests to a resolver daemon, lwresd, running on the local host. The resover daemon performs the lookup using the DNS or possibly other name service protocols, and returns the results to the application through the library. The library and resolver daemon communicate using a UDP-based protocol. %package chrootenv Summary: Chroot environment for BIND named and lwresd Group: Productivity/Networking/DNS/Servers Version: %rpm_vers Release: 170.1 Requires(pre): /usr/sbin/groupadd /usr/sbin/useradd %description chrootenv This package contains all directories and files which are common to the chroot environment of BIND named and lwresd. Most is part of the structure below /var/lib/named. %package devel Summary: Development Libraries and Header Files of BIND Group: Development/Libraries/C and C++ Version: %rpm_vers Release: 170.1 Requires: libbind9-140 = %version Requires: libdns146 = %version Requires: libirs141 = %version Requires: libisc142 = %version Requires: libisccc140 = %version Requires: libisccfg140 = %version Requires: liblwres141 = %version Provides: bind8-devel Provides: bind9-devel Obsoletes: bind8-devel < %version Obsoletes: bind9-devel < %version %description devel This package contains the header files, libraries, and documentation for building programs using the libraries of the Berkeley Internet Name Domain (BIND) Domain Name System implementation of the Domain Name System (DNS) protocols. %package doc Summary: BIND documentation Group: Documentation/Other Version: %rpm_vers Release: 170.1 %if 0%{?suse_version} >= 1120 BuildArch: noarch %endif %description doc Documentation of the Berkeley Internet Name Domain (BIND) Domain Name System implementation of the Domain Name System (DNS) protocols. This includes also the BIND Administrator Reference Manual (ARM). %package lwresd Summary: Lightweight Resolver Daemon Group: Productivity/Networking/DNS/Utilities Version: %rpm_vers Release: 170.1 Requires: %{name}-chrootenv Provides: dns_daemon Requires(pre): /usr/sbin/groupadd /usr/sbin/useradd %if %suse_version > 1131 PreReq: sysvinit(network) sysvinit(syslog) %endif %description lwresd Bind-lwresd provides resolution services to local clients using a combination of the lightweight resolver library liblwres and the resolver daemon process lwresd running on the local host. These communicate using a simple UDP-based protocol, the "lightweight resolver protocol" that is distinct from and simpler than the full DNS protocol. %package utils Summary: Utilities to query and test DNS Group: Productivity/Networking/DNS/Utilities Version: %rpm_vers Release: 170.1 Provides: bind9-utils Provides: bindutil Provides: dns_utils Obsoletes: bind9-utils < %version Obsoletes: bindutil < %version %description utils This package includes the utilities host, dig, and nslookup used to test and query the Domain Name System (DNS). The Berkeley Internet Name Domain (BIND) DNS server is found in the package named bind. %prep %setup -q -n %{pkg_name}-%{pkg_vers} #%setup -n %{pkg_name}-%{version} -T -D -a1 -a50 %setup -q -n %{pkg_name}-%{pkg_vers} -T -D -a1 %patch -p1 %patch1 -p1 %patch4 -p0 #%patch50 %if 0%{?suse_version} >= 1000 %patch51 %endif %patch52 #%patch53 %if 0%{?suse_version} <= 1010 %patch100 -p1 %endif %patch101 -p1 # modify settings of some files regarding to OS version and vendor #function replaceStrings() #{ # file="$1" # sed -e "s@__NSD__@/lib@g" \ # -e "s@__BIND_PACKAGE_NAME__@%{pkg_name}@g" \ # -e "s@__VENDOR__@%{VENDOR}@g" \ # -e "s@___lib__@%{_lib}@g" \ # -i "${file}" #} #pushd vendor-files #for file in docu/README tools/createNamedConfInclude config/{README,named.conf} init/{named,lwresd} sysconfig/{named-common,named-named,syslog-named}; do # replaceStrings ${file} #done #popd #cp contrib/sdb/ldap/ldapdb.c bin/named/ #cp contrib/sdb/ldap/ldapdb.h bin/named/include/ # --------------------------------------------------------------------------- %build %{?suse_update_config:%{suse_update_config -f}} # gssapi/gssapi_krb5.h isn't found if aclocal.m4 gets modified this way #cat /usr/share/aclocal/libtool.m4 >> aclocal.m4 %{__libtoolize} -f %{__aclocal} %{__autoconf} #pushd lib/bind #%{?suse_update_config:%{suse_update_config -f}} #cat /usr/share/aclocal/libtool.m4 >> aclocal.m4 #%{__libtoolize} -f #%{__aclocal} #%{__autoconf} #popd #pushd contrib/idn/idnkit-1.0-src #%{?suse_update_config:%{suse_update_config -f}} #cat /usr/share/aclocal/libtool.m4 >> aclocal.m4 #%{__libtoolize} -f #%{__aclocal} #%{__autoconf} #popd set -- * mkdir build mv "$@" build mkdir obj # make bind rm -rf obj/bind cp -r build obj/bind pushd obj/bind export CFLAGS="$RPM_OPT_FLAGS -DNO_VERSION_DATE -fno-strict-aliasing $(getconf LFS_CFLAGS)" LDFLAGS="-L%{_libdir}" #export CFLAGS="$RPM_OPT_FLAGS -fno-strict-aliasing -DLDAP_DEPRECATED" LDFLAGS="-L%{_libdir}" #export CFLAGS="$RPM_OPT_FLAGS -fno-strict-aliasing -fpie" LDFLAGS="-L%{_libdir} -pie" CONFIGURE_OPTIONS="\ --prefix=%{_prefix} \ --bindir=%{_bindir} \ --sbindir=%{_sbindir} \ --sysconfdir=%{_sysconfdir}/bind \ --localstatedir=%{_var} \ --libdir=%{_libdir} \ --includedir=%{_includedir}/bind \ --mandir=%{_mandir} \ --infodir=%{_infodir} \ --disable-static \ --with-openssl \ --enable-threads \ --with-libtool \ --enable-runidn \ --with-libxml2 \ --without-gssapi \ --build=i486-pc-linux-gnu \ --host=i486-pc-linux-gnu \ --enable-rrl " cp -f -p config.guess config.sub contrib/idn/idnkit-1.0-src/ ./configure ${CONFIGURE_OPTIONS} # disable rpath sed -i ' s|^hardcode_libdir_flag_spec=.*|hardcode_libdir_flag_spec=""|g s|^runpath_var=LD_RUN_PATH|runpath_var=DIE_RPATH_DIE|g ' libtool pushd contrib/idn/idnkit-1.0-src ./configure ${CONFIGURE_OPTIONS} # disable rpath sed -i ' s|^hardcode_libdir_flag_spec=.*|hardcode_libdir_flag_spec=""|g s|^runpath_var=LD_RUN_PATH|runpath_var=DIE_RPATH_DIE|g ' libtool %{__make} %{?_smp_mflags} popd %{__make} %{?_smp_mflags} popd # make utils dig, host, nslookup rm -rf obj/utils cp -r build obj/utils pushd obj/utils #echo 'libxml2.a' #read dummy export CFLAGS="$RPM_OPT_FLAGS -DNO_VERSION_DATE -fno-strict-aliasing $(getconf LFS_CFLAGS)" LDFLAGS="-L%{_libdir}" #export CFLAGS="$RPM_OPT_FLAGS -fno-strict-aliasing -DLDAP_DEPRECATED" LDFLAGS="-L%{_libdir}" #export CFLAGS="$RPM_OPT_FLAGS -fno-strict-aliasing -fpie" LDFLAGS="-L%{_libdir} -pie" CONFIGURE_OPTIONS="\ --prefix=%{_prefix} \ --bindir=%{_bindir} \ --sbindir=%{_sbindir} \ --sysconfdir=%{_sysconfdir}/bind \ --localstatedir=%{_var} \ --libdir=%{_libdir} \ --includedir=%{_includedir}/bind \ --mandir=%{_mandir} \ --infodir=%{_infodir} \ --disable-shared \ --with-openssl \ --enable-threads \ --with-libtool \ --enable-run-idn \ --without-libxml2 \ --without-gssapi \ --build=i486-pc-linux-gnu \ --host=i486-pc-linux-gnu \ --enable-rrl " cp -f -p config.guess config.sub contrib/idn/idnkit-1.0-src/ ./configure ${CONFIGURE_OPTIONS} # disable rpath sed -i ' s|^hardcode_libdir_flag_spec=.*|hardcode_libdir_flag_spec=""|g s|^runpath_var=LD_RUN_PATH|runpath_var=DIE_RPATH_DIE|g ' libtool pushd contrib/idn/idnkit-1.0-src ./configure ${CONFIGURE_OPTIONS} # disable rpath sed -i ' s|^hardcode_libdir_flag_spec=.*|hardcode_libdir_flag_spec=""|g s|^runpath_var=LD_RUN_PATH|runpath_var=DIE_RPATH_DIE|g ' libtool %{__make} %{?_smp_mflags} popd make -C lib/isc && make -C lib/dns && make -C lib/isccc && make -C lib/isccfg && make -C lib/lwres && make -C lib/bind9 && make -C bin/dig popd # running BIND system tests # FIXME: enable make test if every test checks for a free port first; fixed port # 5300 might lead to test failures if port is already in use. #pushd bin/tests/system/ #./ifconfig.sh up #%{__make} test #./ifconfig.sh down #popd # replace __NSD__ in some files by a sub directory to set the full path to # named's root directory # --------------------------------------------------------------------------- #echo 'libxml2.so' #read dummy %install %{GROUPADD_NAMED} %{USERADD_NAMED} mkdir -p \ ${RPM_BUILD_ROOT}/%{_sysconfdir}/init.d \ ${RPM_BUILD_ROOT}/%{_sysconfdir}/named.d \ ${RPM_BUILD_ROOT}/%{_sysconfdir}/openldap/schema \ ${RPM_BUILD_ROOT}/%{_sysconfdir}/slp.reg.d \ ${RPM_BUILD_ROOT}/usr/{bin,%{_lib},sbin,include} \ ${RPM_BUILD_ROOT}/%{_datadir}/bind \ ${RPM_BUILD_ROOT}/%{_datadir}/susehelp/meta/Administration/System \ ${RPM_BUILD_ROOT}/%{_defaultdocdir}/bind \ ${RPM_BUILD_ROOT}/var/lib/named/{etc/named.d,dev,dyn,log,master,slave,var/{lib,run/{lwresd,named}}} \ ${RPM_BUILD_ROOT}%{_mandir}/{man1,man3,man5,man8} \ ${RPM_BUILD_ROOT}/var/adm/fillup-templates \ ${RPM_BUILD_ROOT}/%{_rundir} \ ${RPM_BUILD_ROOT}/%{_sysconfdir}/sysconfig/SuSEfirewall2.d/services pushd obj/bind %{__make} DESTDIR=${RPM_BUILD_ROOT} install pushd contrib/idn/idnkit-1.0-src %{__make} DESTDIR=${RPM_BUILD_ROOT} install popd # remove utils dig, host, nslookup # build static %{__make} DESTDIR=${RPM_BUILD_ROOT} install rm -f ${RPM_BUILD_ROOT}/%{_bindir}/dig rm -f ${RPM_BUILD_ROOT}/%{_bindir}/nslookup rm -f ${RPM_BUILD_ROOT}/%{_bindir}/host # remove useless .la files rm -f ${RPM_BUILD_ROOT}/%{_lib}/libidnkit.la rm -f ${RPM_BUILD_ROOT}/%{_lib}/libidnkitlite.la rm -f ${RPM_BUILD_ROOT}/%{_libdir}/lib*.{la,a} mv vendor-files/config/named.conf ${RPM_BUILD_ROOT}/%{_sysconfdir} mv vendor-files/config/bind.reg ${RPM_BUILD_ROOT}/%{_sysconfdir}/slp.reg.d mv vendor-files/config/rndc-access.conf ${RPM_BUILD_ROOT}/%{_sysconfdir}/named.d for file in named.conf.include rndc.key; do touch ${RPM_BUILD_ROOT}/%{_sysconfdir}/${file} done for file in lwresd named; do install -m 0754 vendor-files/init/${file} ${RPM_BUILD_ROOT}/etc/init.d/${file} ln -sf /etc/init.d/${file} ${RPM_BUILD_ROOT}/usr/sbin/rc${file} done install -m 0644 ${RPM_SOURCE_DIR}/named.root ${RPM_BUILD_ROOT}/var/lib/named/root.hint mv vendor-files/config/{127.0.0,localhost}.zone ${RPM_BUILD_ROOT}/var/lib/named install -m 0754 vendor-files/tools/createNamedConfInclude ${RPM_BUILD_ROOT}/%{_datadir}/bind install -m 0755 vendor-files/tools/bind.genDDNSkey ${RPM_BUILD_ROOT}/%{_bindir}/genDDNSkey cp -a vendor-files/docu/BIND.desktop ${RPM_BUILD_ROOT}/%{_datadir}/susehelp/meta/Administration/System cp -p ${RPM_SOURCE_DIR}/dnszone-schema.txt ${RPM_BUILD_ROOT}/%{_sysconfdir}/openldap/schema/dnszone.schema cp -p "%{S:60}" "${RPM_BUILD_ROOT}/%{_sysconfdir}/openldap/schema/dlz.schema" install -m 0754 vendor-files/tools/ldapdump ${RPM_BUILD_ROOT}/%{_datadir}/bind find ${RPM_BUILD_ROOT}/%{_libdir} -type f -name '*.so*' -print0 | xargs -0 chmod 0755 touch ${RPM_BUILD_ROOT}/var/lib/named/etc/{localtime,named.conf.include,named.d/rndc.access.conf} touch ${RPM_BUILD_ROOT}/var/lib/named/dev/log ln -s ../.. ${RPM_BUILD_ROOT}/var/lib/named/var/lib/named ln -s ../log ${RPM_BUILD_ROOT}/var/lib/named/var %if "%_rundir" == "/run" ln -s ../var/lib/named/var/run/lwresd ${RPM_BUILD_ROOT}/run ln -s ../var/lib/named/var/run/named ${RPM_BUILD_ROOT}/run %else ln -s ../lib/named/var/run/lwresd ${RPM_BUILD_ROOT}/var/run ln -s ../lib/named/var/run/named ${RPM_BUILD_ROOT}/var/run %endif for file in named-common named-named syslog-named; do install -m 0644 vendor-files/sysconfig/${file} ${RPM_BUILD_ROOT}/var/adm/fillup-templates/sysconfig.${file} done install -m 644 vendor-files/sysconfig/SuSEFirewall.named %{buildroot}/%{_sysconfdir}/sysconfig/SuSEfirewall2.d/services/bind # Cleanup doc rm -f doc/misc/Makefile* # Remove samples rm -f ${RPM_BUILD_ROOT}/etc/bind/*.sample find doc/arm -type f ! -name '*.html' -print0 | xargs -0 rm -f # Create doc as we want it in bind and not bind-doc cp -a vendor-files/docu/README ${RPM_BUILD_ROOT}/%{_defaultdocdir}/bind/README.%{VENDOR} cp -a vendor-files/docu/dnszonehowto.html contrib/sdb/ldap/ mkdir -p vendor-files/config/ISC-examples cp -a bin/tests/*.conf* vendor-files/config/ISC-examples for file in CHANGES COPYRIGHT README FAQ version contrib doc/{arm,misc} vendor-files/config contrib/sdb/ldap/INSTALL.ldap; do basename=$( basename ${file}) cp -a ${file} ${RPM_BUILD_ROOT}/%{_defaultdocdir}/bind/${basename} echo "%doc %{_defaultdocdir}/bind/${basename}" >>filelist-bind-doc done cp filelist-bind-doc ../../. pushd ${RPM_BUILD_ROOT}%{_defaultdocdir}/bind/contrib/idn/idnkit-1.0-src %{__make} distclean rm -rf include lib man map patch tools win wsock Makefile.in acconfig.h aclocal.m4 config.* configure* install-sh ltconfig make.wnt mkinstalldirs popd # --------------------------------------------------------------------------- popd pushd obj/utils %{__make} -C bin/dig DESTDIR=${RPM_BUILD_ROOT} install popd %pre # Are we updating from a package named bind9? if test -d usr/share/doc/packages/bind9 && sbin/chkconfig -c named; then NAMED_ACTIVE_FILE="var/adm/named.was.active" test -f ${NAMED_ACTIVE_FILE} && old ${NAMED_ACTIVE_FILE} ACTIVE_DIR=$( dirname ${NAMED_ACTIVE_FILE}) test -d ${ACTIVE_DIR} || mkdir -p ${ACTIVE_DIR} touch ${NAMED_ACTIVE_FILE} fi %{GROUPADD_NAMED} %{USERADD_NAMED} # Might be an update. %{USERMOD_NAMED} # var/run/named is now a sym link pointing to the chroot jail test -L var/run/named || rm -rf var/run/named test -f etc/sysconfig/named && \ . etc/sysconfig/named # Store NAMED_RUN_CHROOTED setting to a temp file. TEMP_SYSCONFIG_FILE="var/adm/named-chroot" TEMP_DIR=$( dirname ${TEMP_SYSCONFIG_FILE}) test -d ${TEMP_DIR} || \ mkdir -p ${TEMP_DIR} test -e ${TEMP_SYSCONFIG_FILE} && \ old ${TEMP_SYSCONFIG_FILE} echo "NAMED_RUN_CHROOTED=\"${NAMED_RUN_CHROOTED}\"" >${TEMP_SYSCONFIG_FILE} %service_add_pre named %preun %stop_on_removal named %service_del_preun named %post %{fillup_and_insserv -nf named} %{fillup_only -nsa named named} if [ ! -f etc/rndc.key ]; then usr/sbin/rndc-confgen -a -b 512 -r dev/urandom chmod 0640 etc/rndc.key chown root:named etc/rndc.key fi TEMP_SYSCONFIG_FILE="var/adm/named-chroot" # Are we in update mode? if [ ${FIRST_ARG:-0} -gt 1 ]; then # Is named.conf an old, /var/named configuration? if [ -f etc/named.conf ] && grep -qi '^[[:space:]]*directory[[:space:]]*"/var/named"[[:space:]]*;' etc/named.conf; then test -d var/log || \ mkdir -p var/log CONVLOG="/var/log/named-move-to-var-lib" # move zone files to new location echo "Moving zone files to new location /var/lib/named" | tee ${CONVLOG} IFS=" " for dir in var/named var/named/slave; do for source in $( find ${dir} -maxdepth 1 ); do case "${source#var/named/}" in localhost.zone|127.0.0.zone|root.hint|slave|var/named) continue ;; esac sourcedir=$( echo "${source%/*}") destdir=$( echo "${sourcedir#var/named}") if [ -e "var/lib/named/${destdir}/${source##*/}" ]; then echo "Warning: /var/lib/named${destdir}/${source##*/} already exists; skipped." | tee -a ${CONVLOG} else echo "${source#var/named/}" | tee -a ${CONVLOG} mv "${source}" "var/lib/named/${destdir}" fi done done # updating named.conf echo -n "Backup old /etc/named.conf to " | tee -a ${CONVLOG} oldconfig=$( old etc/named.conf) 2>/dev/null oldconfig=${oldconfig##*/} echo -n "/etc/${oldconfig}. Conversion " | tee -a ${CONVLOG} sed -e "s@\"/var/named\"@\"/var/lib/named\"@" "etc/${oldconfig}" > etc/named.conf 2>/dev/null conv_rc=$? if [ ${conv_rc} -eq 0 ]; then echo "succeded." | tee -a ${CONVLOG} chmod --reference="etc/${oldconfig}" etc/named.conf chown --reference="etc/${oldconfig}" etc/named.conf else echo "failed." | tee -a ${CONVLOG} fi if [ ${conv_rc} -eq 0 ]; then cat << EOF >>${CONVLOG} Result: named.conf conversion succeded. For details check the following diff of the the old and new configuration. Ergebnis: Die named.conf-Konvertierung war erfolgreich. Details finden Sie in der nachfolgenden Differenz der alten und neuen Konfiguration. EOF diff -u etc/${oldconfig} etc/named.conf >>${CONVLOG} else cat << EOF >>${CONVLOG} Result: Conversion failed. You must check your /etc/named.conf Ergebnis: Die Konvertierung ist fehlgeschlagen. Sie müssen Ihre /etc/named.conf überprüfen. EOF fi else rm -f var/lib/update-messages/bind.1 fi # End of 'Is named.conf an old, /var/named configuration?'. # Add include files to NAMED_CONF_INCLUDE_FILES if we have already a include # file (SL Standard Server 8) and NAMED_RUN_CHROOTED from the # TEMP_SYSCONFIG_FILE is empty. if [ -f ${TEMP_SYSCONFIG_FILE} ]; then . ${TEMP_SYSCONFIG_FILE} fi if [ -s etc/named.conf.include -a -z "${NAMED_RUN_CHROOTED}" ]; then test -f etc/sysconfig/named && . etc/sysconfig/named if [ "${NAMED_INITIALIZE_SCRIPTS}" = "createNamedConfInclude" -a \ -z "${NAMED_CONF_INCLUDE_FILES}" ]; then # Get the included files from an existing meta include file. INCLUDE_LINES=$( grep -e '^[[:space:]]*include' etc/named.conf.include | cut -f 2 -d '"') if [ "${INCLUDE_LINES}" -a -z "${NAMED_CONF_INCLUDE_FILES}" ]; then for file in ${INCLUDE_LINES}; do # don't add a file a second time echo "${INCLUDE_FILES}" | grep -qe "\<${file#/etc/named.d/}\>" && continue # don't add the meta include file as the init script copy it anyway # to the chroot jail test "${file}" = "/etc/named.conf.include" && continue test "${INCLUDE_FILES}" && INCLUDE_FILES="${INCLUDE_FILES} " # strip off any leading /etc/named.d/ as the init script takes care # of relative file names INCLUDE_FILES="${INCLUDE_FILES}${file#/etc/named.d/}" done TMPFILE=$( mktemp /var/tmp/named.sysconfig.XXXXXX) if [ $? -ne 0 ]; then echo "Can't create temp file. Please add your included files from /etc/named.conf to" echo "NAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named manually." return fi chmod --reference=etc/sysconfig/named ${TMPFILE} if sed "s+^NAMED_CONF_INCLUDE_FILES.*$+NAMED_CONF_INCLUDE_FILES=\"${INCLUDE_FILES}\"+" etc/sysconfig/named > "${TMPFILE}"; then mv "${TMPFILE}" etc/sysconfig/named else echo "Can't set NAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named to \"${INCLUDE_FILES}\"." fi fi fi else rm -f touch var/lib/update-messages/bind.3 fi # End of 'Add include files to NAMED_CONF_INCLUDE_FILES' fi # End of 'Are we in update mode?' # Remove TEMP_SYSCONFIG_FILE in any case. rm -f ${TEMP_SYSCONFIG_FILE} NAMED_ACTIVE_FILE="var/adm/named.was.active" if [ -f ${NAMED_ACTIVE_FILE} ]; then sbin/insserv named test ! -s ${NAMED_ACTIVE_FILE} && rm -f ${NAMED_ACTIVE_FILE} fi %service_add_post named %postun %restart_on_update named %insserv_cleanup %service_del_postun named %post -n libbind9-140 -p /sbin/ldconfig %postun -n libbind9-140 -p /sbin/ldconfig %post -n libdns146 -p /sbin/ldconfig %postun -n libdns146 -p /sbin/ldconfig %post -n libidnkit1 -p /sbin/ldconfig %postun -n libidnkit1 -p /sbin/ldconfig %post -n libidnkitlite1 -p /sbin/ldconfig %postun -n libidnkitlite1 -p /sbin/ldconfig %post -n libidnkitres1 -p /sbin/ldconfig %postun -n libidnkitres1 -p /sbin/ldconfig %post -n libirs141 -p /sbin/ldconfig %postun -n libirs141 -p /sbin/ldconfig %post -n libisc142 -p /sbin/ldconfig %postun -n libisc142 -p /sbin/ldconfig %post -n libisccc140 -p /sbin/ldconfig %postun -n libisccc140 -p /sbin/ldconfig %post -n libisccfg140 -p /sbin/ldconfig %postun -n libisccfg140 -p /sbin/ldconfig %post -n liblwres141 -p /sbin/ldconfig %postun -n liblwres141 -p /sbin/ldconfig %pre chrootenv %{GROUPADD_NAMED} %{USERADD_NAMED} %post chrootenv %{fillup_only -nsa named common} %{fillup_only -nsa syslog named} %pre lwresd %{GROUPADD_NAMED} %{USERADD_NAMED} %service_add_pre lwresd %post lwresd # Create a key if usr/sbin/rndc-confgen is installed. if [ -x usr/sbin/rndc-confgen -a ! -f etc/rndc.key ]; then usr/sbin/rndc-confgen -a -b 512 -r dev/urandom chmod 0640 etc/rndc.key chown root:named etc/rndc.key fi # delete an emtpy lwresd.conf file if [ ! -s etc/lwresd.conf ]; then rm -f etc/lwresd.conf fi if [ $1 -le 1 ]; then %{fillup_and_insserv -fy lwresd} fi; %service_add_post lwresd %preun lwresd %stop_on_removal lwresd %service_del_preun lwresd %postun lwresd %restart_on_update lwresd %insserv_cleanup %service_del_postun lwresd %post utils /sbin/ldconfig # Create a key if lwresd is installed. if [ -x usr/sbin/lwresd -a ! -f etc/rndc.key ]; then usr/sbin/rndc-confgen -a -b 512 -r dev/urandom chmod 0640 etc/rndc.key chown root:named etc/rndc.key fi # --------------------------------------------------------------------------- %files %defattr(-,root,root) %attr(0644,root,named) %config(noreplace) /%{_sysconfdir}/named.conf %dir %{_sysconfdir}/slp.reg.d %attr(0644,root,root) /%{_sysconfdir}/slp.reg.d/bind.reg %attr(0644,root,named) %ghost /%{_sysconfdir}/named.conf.include %attr(0640,root,named) %ghost %config(noreplace) /%{_sysconfdir}/rndc.key %config /%{_sysconfdir}/init.d/named %{_sysconfdir}/sysconfig/SuSEfirewall2.d/services/bind %{_bindir}/bind9-config %{_sbindir}/rcnamed %{_sbindir}/named %{_sbindir}/named-checkconf %{_sbindir}/named-checkzone %{_sbindir}/named-compilezone %{_sbindir}/named-rrchecker %{_mandir}/man1/bind9-config.1.gz %{_mandir}/man1/named-rrchecker.1.gz %{_mandir}/man5/named.conf.5.gz %{_mandir}/man8/named-checkconf.8.gz %{_mandir}/man8/named-checkzone.8.gz %{_mandir}/man8/named.8.gz %{_mandir}/man8/named-compilezone.8.gz %dir %{_datadir}/bind %{_datadir}/bind/createNamedConfInclude %{_datadir}/bind/ldapdump %ghost %{_rundir}/named %{_var}/adm/fillup-templates/sysconfig.named-named %dir %{_var}/lib/named/master %attr(-,named,named) %dir %{_var}/lib/named/dyn %attr(-,named,named) %dir %{_var}/lib/named/slave %config %{_var}/lib/named/root.hint %config %{_var}/lib/named/127.0.0.zone %config %{_var}/lib/named/localhost.zone %ghost %{_var}/lib/named/etc/localtime %attr(0644,root,named) %ghost %{_var}/lib/named/etc/named.conf.include %attr(-,named,named) %dir %{_var}/lib/named/var/run/named %{_bindir}/delv %{_bindir}/nsupdate %{_bindir}/genDDNSkey %{_sbindir}/arpaname %{_sbindir}/ddns-confgen %if 0%{?suse_version} > 1110 %{_sbindir}/dnssec-checkds %{_sbindir}/dnssec-coverage %endif %{_sbindir}/dnssec-dsfromkey %{_sbindir}/dnssec-importkey %{_sbindir}/dnssec-keyfromlabel %{_sbindir}/dnssec-keygen %{_sbindir}/dnssec-revoke %{_sbindir}/dnssec-settime %{_sbindir}/dnssec-signzone %{_sbindir}/dnssec-verify %{_sbindir}/genrandom %{_sbindir}/isc-hmac-fixup %{_sbindir}/named-journalprint %{_sbindir}/nsec3hash %{_sbindir}/rndc %{_sbindir}/rndc-confgen %{_sbindir}/tsig-keygen %files -n idnkit %defattr(-,root,root) %config(noreplace) %{_sysconfdir}/bind/idn.conf %config(noreplace) %{_sysconfdir}/bind/idnalias.conf %{_bindir}/idnconv %{_bindir}/runidn %{_mandir}/man1/idnconv.1.gz %{_mandir}/man1/runidn.1.gz %{_mandir}/man5/idn.conf.5.gz %{_mandir}/man5/idnalias.conf.5.gz %{_mandir}/man5/idnrc.5.gz %{_datadir}/idnkit/ %files -n idnkit-devel %defattr(-,root,root) %dir %_includedir/bind/ %_includedir/bind/idn/ %_libdir/libidn*.so %_mandir/man3/libidn*.3* %files -n libbind9-140 %defattr(-,root,root) %_libdir/libbind9.so.140* %files -n libdns146 %defattr(-,root,root) %_libdir/libdns.so.146* %files -n libidnkit1 %defattr(-,root,root) %_libdir/libidnkit.so.1* %files -n libidnkitlite1 %defattr(-,root,root) %_libdir/libidnkitlite.so.1* %files -n libidnkitres1 %defattr(-,root,root) %_libdir/libidnkitres.so.1* %files -n libirs141 %defattr(-,root,root) %_libdir/libirs.so.141* %files -n libirs-devel %defattr(-,root,root) %_libdir/libirs.so %files -n libisc142 %defattr(-,root,root) %_libdir/libisc.so.142* %files -n libisccc140 %defattr(-,root,root) %_libdir/libisccc.so.140* %files -n libisccfg140 %defattr(-,root,root) %_libdir/libisccfg.so.140* %files -n liblwres141 %defattr(-,root,root) %_libdir/liblwres.so.141* %files chrootenv %defattr(-,root,root) %dir %{_var}/lib/named %dir %{_var}/lib/named/etc %dir %{_var}/lib/named/etc/named.d %dir %{_var}/lib/named/dev %dir %{_var}/lib/named/var %dir %{_var}/lib/named/var/lib %dir %{_var}/lib/named/var/run %attr(-,named,named) %dir %{_var}/lib/named/log %ghost %{_var}/lib/named/etc/named.d/rndc.access.conf %ghost %{_var}/lib/named/dev/log %attr(0666, root, root) %dev(c, 1, 3) %{_var}/lib/named/dev/null %attr(0666, root, root) %dev(c, 1, 8) %{_var}/lib/named/dev/random %{_var}/lib/named/var/lib/named %{_var}/lib/named/var/log %{_var}/adm/fillup-templates/sysconfig.named-common %{_var}/adm/fillup-templates/sysconfig.syslog-named %files devel %defattr(-,root,root) %{_bindir}/isc-config.sh %{_libdir}/libbind9.so %{_libdir}/libdns.so %{_libdir}/libisc*.so %{_libdir}/liblwres.so %{_includedir}/bind %exclude %{_includedir}/bind/idn %{_mandir}/man3/lwres*.3* %files doc -f filelist-bind-doc %defattr(-,root,root) %dir %doc %{_defaultdocdir}/bind %doc %{_datadir}/susehelp %files lwresd %defattr(-,root,root) %ghost %attr(0644,root,named) %config(noreplace) /%{_sysconfdir}/lwresd.conf %config /etc/init.d/lwresd %{_sbindir}/rclwresd %{_sbindir}/lwresd %{_mandir}/man8/lwresd.8.gz %ghost %{_rundir}/lwresd %attr(-,named,named) %dir %{_var}/lib/named/var/run/lwresd %files utils %defattr(-,root,root) %dir /etc/named.d %config(noreplace) /etc/named.d/rndc-access.conf %config(noreplace) /etc/bind/bind.keys %dir %{_sysconfdir}/openldap %dir %{_sysconfdir}/openldap/schema %attr(0444,root,root) %config %{_sysconfdir}/openldap/schema/dnszone.schema %attr(0444,root,root) %config %{_sysconfdir}/openldap/schema/dlz.schema #%{_bindir}/delv %{_bindir}/dig %{_bindir}/host %{_bindir}/nslookup #%{_bindir}/nsupdate #%{_bindir}/genDDNSkey #%{_sbindir}/arpaname #%{_sbindir}/ddns-confgen #%if 0%{?suse_version} > 1110 #%{_sbindir}/dnssec-checkds #%{_sbindir}/dnssec-coverage #%endif #%{_sbindir}/dnssec-dsfromkey #%{_sbindir}/dnssec-importkey #%{_sbindir}/dnssec-keyfromlabel #%{_sbindir}/dnssec-keygen #%{_sbindir}/dnssec-revoke #%{_sbindir}/dnssec-settime #%{_sbindir}/dnssec-signzone #%{_sbindir}/dnssec-verify #%{_sbindir}/genrandom #%{_sbindir}/isc-hmac-fixup #%{_sbindir}/named-journalprint #%{_sbindir}/nsec3hash #%{_sbindir}/rndc #%{_sbindir}/rndc-confgen #%{_sbindir}/tsig-keygen %dir %doc %{_defaultdocdir}/bind %{_defaultdocdir}/bind/README.%{VENDOR} %{_mandir}/man1/arpaname.1.gz %{_mandir}/man1/delv.1.gz %{_mandir}/man1/dig.1.gz %{_mandir}/man1/host.1.gz %{_mandir}/man1/isc-config.sh.1.gz %{_mandir}/man1/nslookup.1.gz %{_mandir}/man1/nsupdate.1.gz %{_mandir}/man5/rndc.conf.5.gz %{_mandir}/man8/ddns-confgen.8.gz %if 0%{?suse_version} > 1110 %{_mandir}/man8/dnssec-checkds.8.gz %{_mandir}/man8/dnssec-coverage.8.gz %endif %{_mandir}/man8/dnssec-dsfromkey.8.gz %{_mandir}/man8/dnssec-importkey.8.gz %{_mandir}/man8/dnssec-keyfromlabel.8.gz %{_mandir}/man8/dnssec-keygen.8.gz %{_mandir}/man8/dnssec-revoke.8.gz %{_mandir}/man8/dnssec-settime.8.gz %{_mandir}/man8/dnssec-signzone.8.gz %{_mandir}/man8/dnssec-verify.8.gz %{_mandir}/man8/genrandom.8.gz %{_mandir}/man8/isc-hmac-fixup.8.gz %{_mandir}/man8/named-journalprint.8.gz %{_mandir}/man8/nsec3hash.8.gz %{_mandir}/man8/rndc.8.gz %{_mandir}/man8/rndc-confgen.8.gz %{_mandir}/man8/tsig-keygen.8.gz %changelog * Thu Dec 11 2014 jengelh@inai.de - Corrections to baselibs.conf * Tue Dec 9 2014 lmuelle@suse.com - Update to version 9.10.1-P1 - A flaw in delegation handling could be exploited to put named into an infinite loop. This has been addressed by placing limits on the number of levels of recursion named will allow (default 7), and the number of iterative queries that it will send (default 50) before terminating a recursive query (CVE-2014-8500); (bnc#908994). The recursion depth limit is configured via the "max-recursion-depth" option, and the query limit via the "max-recursion-queries" option. [RT #37580] - When geoip-directory was reconfigured during named run-time, the previously loaded GeoIP data could remain, potentially causing wrong ACLs to be used or wrong results to be served based on geolocation (CVE-2014-8680). [RT #37720]; (bnc#908995). - Lookups in GeoIP databases that were not loaded could cause an assertion failure (CVE-2014-8680). [RT #37679]; (bnc#908995). - The caching of GeoIP lookups did not always handle address families correctly, potentially resulting in an assertion failure (CVE-2014-8680). [RT #37672]; (bnc#908995). * Sun Dec 7 2014 jengelh@inai.de - Convert some hard PreReq to leaner Requires(pre). - Typographical and orthographic fixes to description texts. * Fri Dec 5 2014 Led - Fix bashisms in the createNamedConfInclude script. - Post scripts: remove '-e' option of 'echo' that may be unsupported in some POSIX-compliant shells. * Fri Dec 5 2014 lmuelle@suse.com - Add openssl engines to the lwresd chroot. - Add /etc/lwresd.conf with attribute ghost to the list of files. - Add /run/lwresd to the list of files of the lwresd package. - Shift /run/named from the chroot sub to the main bind package. - Drop /proc from the chroot as multi CPU systems work fine even without it. * Thu Dec 4 2014 lmuelle@suse.com - Add a versioned dependency when obsoleting packages. * Thu Dec 4 2014 lmuelle@suse.com - Remove superfluous obsoletes *-64bit in the ifarch ppc64 case; (bnc#437293). * Wed Dec 3 2014 lmuelle@suse.com - Fix gssapi_krb configure time header detection. * Sun Nov 30 2014 lmuelle@suse.com - Update root zone (dated Nov 5, 2014). * Sat Nov 29 2014 lmuelle@suse.com - Update to version 9.10.1 - This release addresses the security flaws described in CVE-2014-3214 and CVE-2014-3859. - Update to version 9.10.0 - DNS Response-rate limiting (DNS RRL), which blunts the impact of reflection and amplification attacks, is always compiled in and no longer requires a compile-time option to enable it. - An experimental "Source Identity Token" (SIT) EDNS option is now available. - A new zone file format, "map", stores zone data in a format that can be mapped directly into memory, allowing significantly faster zone loading. - "delv" (domain entity lookup and validation) is a new tool with dig-like semantics for looking up DNS data and performing internal DNSSEC validation. - Improved EDNS(0) processing for better resolver performance and reliability over slow or lossy connections. - Substantial improvement in response-policy zone (RPZ) performance. Up to 32 response-policy zones can be configured with minimal performance loss. - To improve recursive resolver performance, cache records which are still being requested by clients can now be automatically refreshed from the authoritative server before they expire, reducing or eliminating the time window in which no answer is available in the cache. - New "rpz-client-ip" triggers and drop policies allowing response policies based on the IP address of the client. - ACLs can now be specified based on geographic location using the MaxMind GeoIP databases. Use "configure --with-geoip" to enable. - Zone data can now be shared between views, allowing multiple views to serve the same zones authoritatively without storing multiple copies in memory. - New XML schema (version 3) for the statistics channel includes many new statistics and uses a flattened XML tree for faster parsing. The older schema is now deprecated. - A new stylesheet, based on the Google Charts API, displays XML statistics in charts and graphs on javascript-enabled browsers. - The statistics channel can now provide data in JSON format as well as XML. - New stats counters track TCP and UDP queries received per zone, and EDNS options received in total. - The internal and export versions of the BIND libraries (libisc, libdns, etc) have been unified so that external library clients can use the same libraries as BIND itself. - A new compile-time option, "configure --enable-native-pkcs11", allows BIND 9 cryptography functions to use the PKCS#11 API natively, so that BIND can drive a cryptographic hardware service module (HSM) directly instead of using a modified OpenSSL as an intermediary. - The new "max-zone-ttl" option enforces maximum TTLs for zones. This can simplify the process of rolling DNSSEC keys by guaranteeing that cached signatures will have expired within the specified amount of time. - "dig +subnet" sends an EDNS CLIENT-SUBNET option when querying. - "dig +expire" sends an EDNS EXPIRE option when querying. - New "dnssec-coverage" tool to check DNSSEC key coverage for a zone and report if a lapse in signing coverage has been inadvertently scheduled. - Signing algorithm flexibility and other improvements for the "rndc" control channel. - "named-checkzone" and "named-compilezone" can now read journal files, allowing them to process dynamic zones. - Multiple DLZ databases can now be configured. Individual zones can be configured to be served from a specific DLZ database. DLZ databases now serve zones of type "master" and "redirect". - "rndc zonestatus" reports information about a specified zone. - "named" now listens on IPv6 as well as IPv4 interfaces by default. - "named" now preserves the capitalization of names when responding to queries. - new "dnssec-importkey" command allows the use of offline DNSSEC keys with automatic DNSKEY management. - New "named-rrchecker" tool to verify the syntactic correctness of individual resource records. - When re-signing a zone, the new "dnssec-signzone -Q" option drops signatures from keys that are still published but are no longer active. - "named-checkconf -px" will print the contents of configuration files with the shared secrets obscured, making it easier to share configuration (e.g. when submitting a bug report) without revealing private information. - "rndc scan" causes named to re-scan network interfaces for changes in local addresses. - On operating systems with support for routing sockets, network interfaces are re-scanned automatically whenever they change. - "tsig-keygen" is now available as an alternate command name to use for "ddns-confgen". - Update to version 9.9.6 New Features - Support for CAA record types, as described in RFC 6844 "DNS Certification Authority Authorization (CAA) Resource Record", was added. [RT#36625] [RT #36737] - Disallow "request-ixfr" from being specified in zone statements where it is not valid (it is only valid for slave and redirect zones) [RT #36608] - Support for CDS and CDNSKEY resource record types was added. For details see the proposed Informational Internet-Draft "Automating DNSSEC Delegation Trust Maintenance" at http://tools.ietf.org/html/draft-ietf-dnsop-delegation-trust-maintainance-14. [RT #36333] - Added version printing options to various BIND utilities. [RT #26057] [RT #10686] - Added a "no-case-compress" ACL, which causes named to use case-insensitive compression (disabling change #3645) for specified clients. (This is useful when dealing with broken client implementations that use case-sensitive name comparisons, rejecting responses that fail to match the capitalization of the query that was sent.) [RT #35300] Feature Changes - Adds RPZ SOA to the additional section of responses to clearly indicate the use of RPZ in a manner that is intended to avoid causing issues for downstream resolvers and forwarders [RT #36507] - rndc now gives distinct error messages when an unqualified zone name matches multiple views vs. matching no views [RT #36691] - Improves the accuracy of dig's reported round trip times. [RT #36611] - When an SPF record exists in a zone but no equivalent TXT record does, a warning will be issued. The warning for the reverse condition is no longer issued. See the check-spf option in the documentation for details. [RT #36210] - "named" will now log explicitly when using rndc.key to configure command channel. [RT #35316] - The default setting for the -U option (setting the number of UDP listeners per interface) has been adjusted to improve performance. [RT #35417] - Aging of smoothed round-trip time measurements is now limited to no more than once per second, to improve accuracy in selecting the best name server. [RT #32909] - DNSSEC keys that have been marked active but have no publication date are no longer presumed to be publishable. [RT #35063] Bug Fixes - The Makefile in bin/python was changed to work around a bmake bug in FreeBSD 10 and NetBSD 6. [RT #36993] (**) - Corrected bugs in the handling of wildcard records by the DNSSEC validator: invalid wildcard expansions could be treated as valid if signed, and valid wildcard expansions in NSEC3 opt-out ranges had the AD bit set incorrectly in responses. [RT #37093] [RT #37072] - When resigning, dnssec-signzone was removing all signatures from delegation nodes. It now retains DS and (if applicable) NSEC signatures. [RT #36946] - The AD flag was being set inappopriately on RPZ responses. [RT #36833] - Updates the URI record type to current draft standard, draft-faltstrom-uri-08, and allows the value field to be zero length [RT #36642] [RT #36737] - RRSIG sets that were not loaded in a single transaction at start up were not being correctly added to re-signing heaps. [RT #36302] - Setting '-t aaaa' in .digrc had unintended side-effects. [RT #36452] - A race condition could cause a crash in isc_event_free during shutdown. [RT #36720] - Addresses a race condition issue in dispatch. [RT #36731] - acl elements could be miscounted, causing a crash while loading a config [RT #36675] - Corrects a deadlock between view.c and adb.c. [RT #36341] - liblwres wasn't properly handling link-local addresses in nameserver clauses in resolv.conf. [RT #36039] - Buffers in isc_print_vsnprintf were not properly initialized leading to potential overflows when printing out quad values. [RT #36505] - Don't call qsort() with a null pointer, and disable the GCC 4.9 "delete null pointer check" optimizer option. This fixes problems when using GNU GCC 4.9.0 where its compiler code optimizations may cause crashes in BIND. For more information, see the operational advisory at https://kb.isc.org/article/AA-01167/. [RT #35968] - Fixed a bug that could cause repeated resigning of records in dynamically signed zones. [RT #35273] - Fixed a bug that could cause an assertion failure after forwarding was disabled. [RT #35979] - Fixed a bug that caused SERVFAILs when using RPZ on a system configured as a forwarder. [RT #36060] - Worked around a limitation in Solaris's /dev/poll implementation that could cause named to fail to start when configured to use more sockets than the system could accomodate. [RT #35878] - Remove merged rpz2+rl-9.9.5.patch and obsoleted rpz2+rl-9.9.5.patch - Removed pid-path.diff patch as /run/{named,lwresd}/ are used by default. - Update baselibs.conf (added libirs and library interface version updates). * Fri Nov 14 2014 dimstar@opensuse.org - No longer perform gpg validation; osc source_validator does it implicit: + Drop gpg-offline BuildRequires. + No longer execute gpg_verify. * Wed Oct 1 2014 jengelh@inai.de - Implement shlib packaging guidelines and give an improved description on the library components - Put idnkit components in separate packages - Add runidn.diff to resolve runidn not working at all * Mon Sep 8 2014 werner@suse.de - Require systemd-rpm-macros at build * Mon Sep 8 2014 werner@suse.de - Use the systemd service macros to make sure init scripts are registered properly (bnc#894627) * Wed Sep 3 2014 max@suse.com - Version 9.9.5P1 also fixes a problem with zone transfers on multicore machines (bnc#882511). * Thu Jul 31 2014 lmuelle@suse.com - Package dnssec-checkds and dnssec-coverage binaries and man pages only on post-11.1 systems. * Thu Jul 31 2014 lmuelle@suse.com - Update to version 9.9.5P1 Various bugfixes and some feature fixes. (see CHANGES files) Security and maintenance issues: - [bug] Don't call qsort with a null pointer. [RT #35968] - [bug] Disable GCC 4.9 "delete null pointer check". [RT #35968] - [port] linux: libcap support: declare curval at start of block. [RT #35387] - Update to version 9.9.5 - [bug] Address double dns_zone_detach when switching to using automatic empty zones from regular zones. [RT #35177] - [port] Use built-in versions of strptime() and timegm() on all platforms to avoid portability issues. [RT #35183] - [bug] Address a portentry locking issue in dispatch.c. [RT #35128] - [bug] irs_resconf_load now returns ISC_R_FILENOTFOUND on a missing resolv.conf file and initializes the structure as if it had been configured with nameserver ::1 nameserver 127.0.0.1 [RT #35194] - [contrib] queryperf: Fixed a possible integer overflow when printing results. [RT #35182] - [protocol] Accept integer timestamps in RRSIG records. [RT #35185] - [func] named-checkconf can now obscure shared secrets when printing by specifying '-x'. [RT #34465] - [bug] Improvements to statistics channel XSL stylesheet: the stylesheet can now be cached by the browser; section headers are omitted from the stats display when there is no data in those sections to be displayed; counters are now right-justified for easier readability. (Only available with configure --enable-newstats.) [RT #35117] - [cleanup] Replaced all uses of memcpy() with memmove(). [RT #35120] - [bug] Handle "." as a search list element when IDN support is enabled. [RT #35133] - [bug] dig failed to handle AXFR style IXFR responses which span multiple messages. [RT #35137] - [bug] Address a possible race in dispatch.c. [RT #35107] - [bug] Warn when a key-directory is configured for a zone, but does not exist or is not a directory. [RT #35108] - [security] memcpy was incorrectly called with overlapping ranges resulting in malformed names being generated on some platforms. This could cause INSIST failures when serving NSEC3 signed zones (CVE-2014-0591). [RT #35120] - [bug] Two calls to dns_db_getoriginnode were fatal if there was no data at the node. [RT #35080] - [bug] Iterative responses could be missed when the source port for an upstream query was the same as the listener port (53). [RT #34925] - [bug] Fixed a bug causing an insecure delegation from one static-stub zone to another to fail with a broken trust chain. [RT #35081] - [bug] loadnode could return a freed node on out of memory. [RT #35106] - [bug] Address null pointer dereference in zone_xfrdone. [RT #35042] - [func] "dnssec-signzone -Q" drops signatures from keys that are still published but no longer active. [RT #34990] - [bug] "rndc refresh" didn't work correctly with slave zones usingi inline-signing. [RT #35105] - [cleanup] Add a more detailed "not found" message to rndc commands which specify a zone name. [RT #35059] - [bug] Correct the behavior of rndc retransfer to allow inline-signing slave zones to retain NSEC3 parameters instead of reverting to NSEC. [RT #34745] - [port] Update the Windows build system to support feature selection and WIN64 builds. This is a work in progress. [RT #34160] - [bug] dig could fail to clean up TCP sockets still waiting on connect(). [RT #35074] - [port] Update config.guess and config.sub. [RT #35060] - [bug] 'nsupdate' leaked memory if 'realm' was used multiple times. [RT #35073] - [bug] "named-checkconf -z" now checks zones of type hint and redirect as well as master. [RT #35046] - [misc] Provide a place for third parties to add version information for their extensions in the version file by setting the EXTENSIONS variable. - [bug] RPZ zeroed ttls if the query type was '*'. [RT #35026] - [func] Local address can now be specified when using dns_client API. [RT #34811] - [bug] Don't allow dnssec-importkey overwrite a existing non-imported private key. - [bug] Address read after free in server side of lwres_getrrsetbyname. [RT #29075] - [bug] Fix cast in lex.c which could see 0xff treated as eof. [RT #34993] - [bug] Failure to release lock on error in receive_secure_db. [RT #34944] - [bug] Updated OpenSSL PKCS#11 patches to fix active list locking and other bugs. [RT #34855] - [bug] Address bugs in dns_rdata_fromstruct and dns_rdata_tostruct for WKS and ISDN types. [RT #34910] - [bug] 'host' could die if a UDP query timed out. [RT #34870] - [bug] Address lock order reversal deadlock with inline zones. [RT #34856] - [cleanup] Changed the name of "isc-config.sh" to "bind9-config". [RT #23825] - [port] linux: Address platform specific compilation issue when libcap-devel is installed. [RT #34838] - [port] Some readline clones don't accept NULL pointers when calling add_history. [RT #34842] - [cleanup] Simplify TCP message processing when requesting a zone transfer. [RT #34825] - [bug] Address race condition with manual notify requests. [RT #34806] - [func] Create delegations for all "children" of empty zones except "forward first". [RT #34826] - [tuning] Adjust when a master server is deemed unreachable. [RT #27075] - [tuning] Use separate rate limiting queues for refresh and notify requests. [RT #30589] - [cleanup] Include a comment in .nzf files, giving the name of the associated view. [RT #34765] - [bug] Address a race condition when shutting down a zone. [RT #34750] - [bug] Journal filename string could be set incorrectly, causing garbage in log messages. [RT #34738] - [protocol] Use case sensitive compression when responding to queries. [RT #34737] - [protocol] Check that EDNS subnet client options are well formed. [RT #34718] - [func] Allow externally generated DNSKEY to be imported into the DNSKEY management framework. A new tool dnssec-importkey is used to do this. [RT #34698] - [bug] Handle changes to sig-validity-interval settings better. [RT #34625] - [bug] ndots was not being checked when searching. Only continue searching on NXDOMAIN responses. Add the ability to specify ndots to nslookup. [RT #34711] - [bug] Treat type 65533 (KEYDATA) as opaque except when used in a key zone. [RT #34238] - Updated to current rpz patch from·http://ss.vix.su/~vjs/rrlrpz.html - rpz2-9.9.4.patch + rpz2+rl-9.9.5.patch * Sun Jun 1 2014 chris@computersalat.de - add stuff for DNSSEC validation to named.conf * dnssec-enable, dnssec-validation * Sun May 25 2014 crrodriguez@opensuse.org - Build with LFS_CFLAGS in 32 bit systems. * Thu May 8 2014 ro@suse.de - use %%_rundir macro * Fri Mar 28 2014 lchiquitto@suse.de - Remove obsolete patch "workaround-compile-problem.diff" * Fri Jan 24 2014 max@suse.com - Add the sdb-ldap backend module (fate#313216). - Details can be found here: * http://bind9-ldap.bayour.com/ * http://bind9-ldap.bayour.com/dnszonehowto.html * Tue Jan 21 2014 max@suse.com - Update to version 9.9.4P2 * Fixes named crash when handling malformed NSEC3-signed zones (CVE-2014-0591, bnc#858639) * Obsoletes workaround-compile-problem.diff - Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now supported upstream (--enable-rrl). * Mon Dec 9 2013 max@suse.com - Fix generation of /etc/named.conf.include (bnc#828678, bnc#848777, bnc#814978). * Wed Aug 7 2013 max@suse.com - Systemd doesn't set $TERM, and hence breaks tput (bnc#823175). * Tue Aug 6 2013 max@suse.com - Improve pie_compile.diff (bnc#828874). - dnssec-checkds and dnssec-coverage need python-base. - disable rpath in libtool. * Mon Aug 5 2013 max@suse.com - Update to 9.9.3P2 fixes CVE-2013-4854, bnc#831899. * Incorrect bounds checking on private type 'keydata' can lead to a remotely triggerable REQUIRE failure. * Wed Jul 24 2013 max@suse.com - Remove non-working apparmor profiles (bnc#740327). * Wed Jul 17 2013 mls@suse.de - the README file is not a directory, drop the dir attribute * Mon Jun 24 2013 meissner@suse.com - Updated to 9.9.3-P1 Various bugfixes and some feature fixes. (see CHANGES files) Security and maintenance issues: - [security] Caching data from an incompletely signed zone could trigger an assertion failure in resolver.c [RT #33690] - [security] Support NAPTR regular expression validation on all platforms without using libregex, which can be vulnerable to memory exhaustion attack (CVE-2013-2266). [RT #32688] - [security] RPZ rules to generate A records (but not AAAA records) could trigger an assertion failure when used in conjunction with DNS64 (CVE-2012-5689). [RT #32141] - [bug] Fixed several Coverity warnings. Note: This change includes a fix for a bug that was subsequently determined to be an exploitable security vulnerability, CVE-2012-5688: named could die on specific queries with dns64 enabled. [RT #30996] - [maint] Added AAAA for D.ROOT-SERVERS.NET. - [maint] D.ROOT-SERVERS.NET is now 199.7.91.13. - Updated to current rate limiting + rpz patch from http://ss.vix.su/~vjs/rrlrpz.html - moved dnssec-* helpers to bind-utils package. bnc#813911 * Wed May 8 2013 schwab@suse.de - Use updated config.guess/sub in the embedded idnkit sources * Wed Mar 27 2013 meissner@suse.com - Updated to 9.9.2-P2 (bnc#811876) Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266 * Security Fixes Removed the check for regex.h in configure in order to disable regex syntax checking, as it exposes BIND to a critical flaw in libregex on some platforms. [RT #32688] - added gpg key source verification * Thu Dec 6 2012 meissner@suse.com - Updated to 9.9.2-P1 (bnc#792926) https://kb.isc.org/article/AA-00828 * Security Fixes Prevents named from aborting with a require assertion failure on servers with DNS64 enabled. These crashes might occur as a result of specific queries that are received. (Note that this fix is a subset of a series of updates that will be included in full in BIND 9.8.5 and 9.9.3 as change #3388, RT #30996). [CVE-2012-5688] [RT #30792] A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; it will not be built or installed on systems that do not have a python interpreter.) [RT #28099] Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] Adds configuration option "max-rsa-exponent-size ;" that can be used to specify the maximum rsa exponent size that will be accepted when validating [RT #29228] Feature Changes Improves OpenSSL error logging [RT #29932] nslookup now returns a nonzero exit code when it is unable to get an answer. [RT #29492] Bug Fixes Uses binary mode to open raw files on Windows. [RT #30944] When using DNSSEC inline signing with "rndc signing -nsec3param", a salt value of "-" can now be used to indicate 'no salt'. [RT #30099] Prevents race conditions (address use after free) that could be encountered when named is shutting down and releasing structures used to manage recursive clients. [RT #30241] Static-stub zones now accept "forward" and "fowarders" options (often needed for subdomains of the zone referenced to override global forwarding options). These options are already available with traditional stub zones and their omission from zones of type "static-stub" was an inadvertent oversight. [RT #30482] Limits the TTL of signed RRsets in cache when their RRSIGs are approaching expiry. This prevents the persistence in cache of invalid RRSIGs in order to assist recovery from a situation where zone re-signing doesn't occur in a timely manner. With this change, named will attempt to obtain new RRSIGs from the authoritative server once the original ones have expired, and even if the TTL of the old records would in other circumstances cause them to be kept in cache for longer. [RT #26429] Corrects the syntax of isc_atomic_xadd() and isc_atomic_cmpxchg() which are employed on Itanium systems to speed up lock management by making use of atomic operations. Without the syntax correction it is possible that concurrent access to the same structures could accidentally occur with unpredictable results. [RT #25181] Improves OpenSSL error logging [RT #29932] The configure script now supports and detects libxml2-2.8.x correctly [RT #30440] The host command should no longer assert on some architectures and builds while handling the time values used with the -w (wait forever) option. [RT #18723] Invalid zero settings for max-retry-time, min-retry-time, max-refresh-time, min-refresh-time will now be detected during parsing of named.conf and an error emitted instead of triggering an assertion failure on startup. [RT #27730] Removes spurious newlines from log messages in zone.c [RT #30675] When built with readline support (i.e. on a system with readline installed) nsupdate no longer terminates unexpectedly in interactive mode. [RT #29550] All named tasks that perform task-exclusive operations now share the same single task. Prior to this change, there was the possibility of a race condition between rndc operations and other functions such as re-sizing the adb hash table. If the race condition was encountered, named would in most cases terminate unexpectedly with an assert. [RT #29872] Ensures that servers are expired from the ADB cache when the timeout limit is reached so that their learned attributes can be refreshed. Prior to this change, servers that were frequently queried might never have their entries removed and reinitialized. This is of particular importance to DNSSEC-validating recursive servers that might erroneously set "no-edns" for an authoritative server following a period of intermittent connectivity. [RT #29856] Adds additional resilience to a previous security change (3218) by preventing RRSIG data from being added to cache when a pseudo-record matching the covering type and proving non-existence exists at a higher trust level. The earlier change prevented this inconsistent data from being retrieved from cache in response to client queries - with this additional change, the RRSIG records are no longer inserted into cache at all. [RT #26809] dnssec-settime will now issue a warning when the writing of a new private key file would cause a change in the permissions of the existing file. [RT #27724] Fixes the defect introduced by change #3314 that was causing failures when saving stub zones to disk (resulting in excessive CPU usage in some cases). [RT #29952] Address race condition in units tests: asyncload_zone and asyncload_zt. [RT #26100] It is now possible to using multiple control keys again - this functionality was inadvertently broken by change #3924 (RT #28265) which addressed a memory leak. [RT #29694] Named now holds a zone table reference while performing an asynchronous load of a zone. This removes a race condition that could cause named to crash when zones are added using rndc addzone or by manually editing named's configuration file followed by rndc reconfig/reload. [RT #28326] Setting resolver-query-timeout too low could cause named problems recovering after a loss of connectivity. [RT #29623] Reduces the potential build-up of stale RRsets in cache on a busy recursive nameserver by re-using cached DS and RRSIG rrsets when possible [RT #29446] Corrects a failure to authenticate non-existence of resource records in some circumstances when RPZ has been configured. Also: adds an optional "recursive-only yes|no" to the response-policy statement adds an optional "max-policy-ttl" to the response-policy statement to limit the false data that "recursive-only no" can introduce into resolvers' caches introduces a predefined encoding of PASSTHRU policy by adding "rpz-passthru" to be used as the target of CNAME policy records (the old encoding is still accepted.) adds a RPZ performance test to bin/tests/system/rpz when queryperf is available. [RT #26172] Upper-case/lower-case handling of RRSIG signer-names is now handled consistently: RRSIG records are generated with the signer-name in lower case. They are accepted with any case, but if they fail to validate, we try again in lower case. [RT #27451] * Sun Nov 18 2012 meissner@suse.com - added a ratelimiting (draft RFC) patch from Paul Vixie. see http://www.redbarn.org/dns/ratelimits suggested by Stefan Schaefer * Wed Nov 14 2012 meissner@suse.com - updated to 9.9.2 https://kb.isc.org/article/AA-00798 Security: * A deliberately constructed combination of records could cause named to hang while populating the additional section of a response. [CVE-2012-5166] [RT #31090] * Prevents a named assert (crash) when queried for a record whose RDATA exceeds 65535 bytes. [CVE-2012-4244] [RT #30416] * Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [CVE-2012-3817] [RT #30025] * A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [CVE-2012-1667] [RT #29644] * ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [CVE-2012-3868] [RT #29539 & #30233] New Features * Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] * Introduces a new tool "dnssec-checkds" command that checks a zone to determine which DS records should be published in the parent zone, or which DLV records should be published in a DLV zone, and queries the DNS to ensure that it exists. (Note: This tool depends on python; it will not be built or installed on systems that do not have a python interpreter.) [RT #28099] * Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] * Adds configuration option "max-rsa-exponent-size ;" that can be used to specify the maximum rsa exponent size that will be accepted when validating [RT #29228] Feature Changes * Improves OpenSSL error logging [RT #29932] * nslookup now returns a nonzero exit code when it is unable to get an answer. [RT #29492] Lots of bugfixes. - unfuzzed patches: perl-path.diff pie_compile.diff workaround-compile-problem.diff * Fri Oct 19 2012 meissner@suse.com - Specially crafted DNS data can cause a lockup in named. CVE-2012-5166, bnc#784602. - 9.9.1-P4 * Sat Sep 15 2012 meissner@suse.com - Named could die on specially crafted record. [RT #30416] (bnc#780157) CVE-2012-4244 - 9.9.1-P3 - updated dnszone-schema.txt from upstream. * Thu Jul 26 2012 ug@suse.de - Prevents a named assert (crash) when validating caused by using "Bad cache" data before it has been initialized. [RT #30025] (bnc#772945) - ISC_QUEUE handling for recursive clients was updated to address a race condition that could cause a memory leak. This rarely occurred with UDP clients, but could be a significant problem for a server handling a steady rate of TCP queries. [RT #29539 & #30233] - Under heavy incoming TCP query loads named could experience a memory leak which could lead to significant reductions in query response or cause the server to be terminated on systems with "out of memory" killers. [RT #29539] (bnc#772946) - A condition has been corrected where improper handling of zero-length RDATA could cause undesirable behavior, including termination of the named process. [RT #29644] - 9.9.1-P2 * Thu Jul 12 2012 cfarrell@suse.com - license update: ISC ISC is generally seen as the correct license for bind * Tue Jun 5 2012 ug@suse.de - updated dnszone-schema.txt * Mon Jun 4 2012 ug@suse.de - VUL-0: bind remote DoS via zero length rdata field CVE-2012-1667 bnc#765315 - 9.9.1-P1 * Tue May 22 2012 ug@suse.de - this version has no new features but only bugfixes - Addresses a race condition that can cause named to to crash when the masters list for a zone is updated via rndc reload/reconfig - Fixes a race condition in zone.c that can cause named to crash during the processing of rndc delzone - Prevents a named segfault from resolver.c due to procedure fctx_finddone() not being thread-safe - SDB now handles unexpected errors from back-end database drivers gracefully instead of exiting on an assert. - Prevents named crashes as a result of dereferencing a NULL pointer in zmgr_start_xfrin_ifquota if the zone was being removed while there were zone transfers still pending - Corrects a parser bug that could cause named to crash while reading a malformed zone file - many more smaller fixes - version 9.9.1 * Thu May 10 2012 ug@suse.de - added patch to fix an assertion failure * Fri May 4 2012 ug@suse.de - many dnssec fixes and features (too many to list them here, check the changelog) - improved startup time - improved scalability - Added support for Uniform Resource Identifier (URI) resource records - Local copies of slave zones are now saved in raw format by default to improve startup performance BIND 9.9 changes the default storage format for slave zone files from text to raw. Because named's behavior when a slave server cannot read or parse a zone file is to move the offending file out of the way and retransfer the zone, slave servers that are updated from a pre-9.9.0 version of BIND and which have existing copies of slave zone data may wind up with extraneous copies of zone data stored, as the existing text-format zone file copies will be moved aside to filenames of the format db-###### and journal files to the format jn-###### (where # represents a hexadecimal digit.) - many many bugfixes. Please read changelog for details - fixed handling of TXT records in ldapdump (bnc#743758) - 9.9.0 * Mon Feb 13 2012 coolo@suse.com - patch license to follow spdx.org standard * Wed Dec 21 2011 lars@samba.org - Ensure to create the required dir or sym link in /var/run; (bnc#738156). * Mon Dec 5 2011 ug@suse.de - root nameserver updated (root.hint file) * Mon Dec 5 2011 ug@suse.de - added managed-keys-directory to named.conf * Tue Nov 22 2011 ug@suse.de - fixed apparmor profile for lib and lib64 in chroot (bnc#716745) * Thu Nov 17 2011 fteodori@suse.de - Cache lookup could return RRSIG data associated with nonexistent records, leading to an assertion failure. CVE-2011-4313; (bnc#730995). * Wed Oct 26 2011 ug@suse.de - on a 64bit system a chrooted bind failed to start if 32bit libs were installed (bnc#716745) * Fri Sep 30 2011 coolo@suse.com - add libtool as buildrequire to make the spec file more reliable * Sat Sep 17 2011 jengelh@medozas.de - Remove redundant tags/sections from specfile - Use %%_smp_mflags for parallel build * Fri Sep 16 2011 ug@suse.de - very first restart can create broken chroot (bnc#718441) * Mon Sep 5 2011 ug@suse.de * fixed SSL in chroot environment (bnc#715881) * Mon Sep 5 2011 ug@suse.de * Added a new include file with function typedefs for the DLZ "dlopen" driver. [RT #23629] * Added a tool able to generate malformed packets to allow testing of how named handles them. [RT #24096] * The root key is now provided in the file bind.keys allowing DNSSEC validation to be switched on at start up by adding "dnssec-validation auto;" to named.conf. If the root key provided has expired, named will log the expiration and validation will not work. More information and the most current copy of bind.keys can be found at http://www.isc.org/bind-keys. *Please note this feature was actually added in 9.8.0 but was not included in the 9.8.0 release notes. [RT #21727] * If named is configured with a response policy zone (RPZ) and a query of type RRSIG is received for a name configured for RRset replacement in that RPZ, it will trigger an INSIST and crash the server. RRSIG. [RT #24280] * named, set up to be a caching resolver, is vulnerable to a user querying a domain with very large resource record sets (RRSets) when trying to negatively cache the response. Due to an off-by-one error, caching the response could cause named to crash. [RT #24650] [CVE-2011-1910] * Using Response Policy Zone (RPZ) to query a wildcard CNAME label with QUERY type SIG/RRSIG, it can cause named to crash. Fix is query type independant. [RT #24715] * Using Response Policy Zone (RPZ) with DNAME records and querying the subdomain of that label can cause named to crash. Now logs that DNAME is not supported. [RT #24766] * Change #2912 populated the message section in replies to UPDATE requests, which some Windows clients wanted. This exposed a latent bug that allowed the response message to crash named. With this fix, change 2912 has been reduced to copy only the zone section to the reply. A more complete fix for the latent bug will be released later. [RT #24777] * many bugfixes (see CHANGELOG) * 9.8.1 * Wed Aug 31 2011 rhafer@suse.de - Fixed the ldapdump tool to also respect the "uri" setting in /etc/openldap/ldap.conf (bnc#710430) * Tue Jul 5 2011 ug@suse.de * Using Response Policy Zone (RPZ) with DNAME records and querying the subdomain of that label can cause named to crash. Now logs that DNAME is not supported. [RT #24766] * If named is configured to be both authoritative and resursive and receives a recursive query for a CNAME in a zone that it is authoritative for, if that CNAME also points to a zone the server is authoritative for, the recursive part of name will not follow the CNAME change and the response will not be a complete CNAME chain. [RT #24455] * Using Response Policy Zone (RPZ) to query a wildcard CNAME label with QUERY type SIG/RRSIG, it can cause named to crash. Fix is query type independant. [RT #24715] [CVE-2011-1907] * Change #2912 (see CHANGES) exposed a latent bug in the DNS message processing code that could allow certain UPDATE requests to crash named. This was fixed by disambiguating internal database representation vs DNS wire format data. [RT #24777] [CVE-2011-2464] * 9.8.0-P4 * Tue Jun 7 2011 ug@suse.de - A large RRSET from a remote authoritative server that results in the recursive resolver trying to negatively cache the response can hit an off by one code error in named, resulting in named crashing. [RT #24650] [CVE-2011-1910] - Zones that have a DS record in the parent zone but are also listed in a DLV and won't validate without DLV could fail to validate. [RT [#24631]] * Mon May 23 2011 crrodriguez@opensuse.org - Build with -DNO_VERSION_DATE to avoid timestamps in binaries. * Thu May 19 2011 meissner@suse.de - buildreq update-desktop-files for newer rpms * Thu May 5 2011 ug@suse.de - The ADB hash table stores informations about which authoritative servers to query about particular domains - BIND now supports a new zone type, static-stub - BIND now supports Response Policy Zones - BIND 9.8.0 now has DNS64 support - Dynamically Loadable Zones (DLZ) now support dynamic updates. - Added a "dlopen" DLZ driver, allowing the creation of external DLZ drivers that can be loaded as shared objects at runtime rather than having to be linked with named - named now retains GSS-TSIG keys across restarts - There is a new update-policy match type "external". - bugfixes - version to 9.8.0 * Thu Feb 24 2011 ug@suse.de - fixed security issue VUL-0: bind: IXFR or DDNS update combined with high query rate DoS vulnerability (CVE-2011-0414 bnc#674431) - version to 9.7.3 * Wed Jan 5 2011 meissner@suse.de - ifdef the sysvinit specific prereqs for openSUSE 11.4 and later * Thu Dec 9 2010 mvyskocil@suse.cz - fix bnc#656509 - direct mount of /proc in chroot * Tue Dec 7 2010 coolo@novell.com - prereq init scripts syslog and network * Thu Dec 2 2010 ug@suse.de - fixed VUL-0: bind: Key algorithm rollover bug bnc#657102, CVE-2010-3614 - fixed VUL-0: bind: allow-query processed incorrectly bnc#657120, CVE-2010-3615 - fixed VUL-0: bind: cache incorrectly allows a ncache entry and a rrsig for the same type bnc#657129, CVE-2010-3613 * Tue Nov 23 2010 ug@suse.de - fixed return code of "rcnamed status" - added gssapi support * Tue Oct 12 2010 ug@suse.de - Zones may be dynamically added and removed with the "rndc addzone" and "rndc delzone" commands. These dynamically added zones are written to a per-view configuration file. Do not rely on the configuration file name nor contents as this will change in a future release. This is an experimental feature at this time. - Added new "filter-aaaa-on-v4" access control list to select which IPv4 clients have AAAA record filtering applied. - A new command "rndc secroots" was added to dump a combined summary of the currently managed keys combined with statically configured trust anchors. - Added support to load new keys into managed zones without signing immediately with "rndc loadkeys". Added support to link keys with "dnssec-keygen -S" and "dnssec-settime -S". - Documentation improvements - ORCHID prefixes were removed from the automatic empty zone list. - Improved handling of GSSAPI security contexts. Specifically, better memory management of cached contexts, limited lifetime of a context to 1 hour, and added a "realm" command to nsupdate to allow selection of a non-default realm name. - The contributed tool "ztk" was updated to version 1.0. - version 9.7.1 to 9.7.2-P2 * Mon Jul 26 2010 ug@suse.de - chrooted bind failed to start (bnc#625019) * Mon Jun 21 2010 ug@suse.de - genrandom: add support for the generation of multiple files. - Update empty-zones list to match draft-ietf-dnsop-default-local-zones-13. - Incrementally write the master file after performing a AXFR. - Add AAAA address for L.ROOT-SERVERS.NET. - around 50 bugs fixed (see CHANGELOG for details) - version 9.7.1 * Thu May 20 2010 ug@suse.de - Handle broken DNSSEC trust chains better. [RT #15619] - Named could return SERVFAIL for negative responses from unsigned zones. [RT #21131 - version 9.7.0-P2 * Sat May 1 2010 aj@suse.de - Handle /var/run on tmpfs. - do not use run_ldconfig. * Wed Feb 24 2010 jengelh@medozas.de - Enable DLZ-LDAP (supersedes sdb_ldap) and add a patch * Wed Feb 17 2010 ug@suse.de - Fully automatic signing of zones by "named". - Simplified configuration of DNSSEC Lookaside Validation (DLV). - Simplified configuration of Dynamic DNS, using the "ddns-confgen" command line tool or the "local" update-policy option. (As a side effect, this also makes it easier to configure automatic zone re-signing.) - New named option "attach-cache" that allows multiple views to share a single cache. - DNS rebinding attack prevention. - New default values for dnssec-keygen parameters. - Support for RFC 5011 automated trust anchor maintenance - Smart signing: simplified tools for zone signing and key maintenance. - The "statistics-channels" option is now available on Windows. - A new DNSSEC-aware libdns API for use by non-BIND9 applications - On some platforms, named and other binaries can now print out a stack backtrace on assertion failure, to aid in debugging. - A "tools only" installation mode on Windows, which only installs dig, host, nslookup and nsupdate. - Improved PKCS#11 support, including Keyper support and explicit OpenSSL engine selection. - version 9.7.0 * Wed Jan 20 2010 ug@suse.de - [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] - [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] - [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712] - version 9.6.1-P3 * Mon Jan 4 2010 ug@suse.de - removed the syntax check for include files (bnc#567593) * Tue Dec 15 2009 jengelh@medozas.de - add baselibs.conf as a source - enable parallel building - add baselibs for SPARC - package documentation as noarch * Wed Nov 25 2009 ug@suse.de - Security fix When validating, track whether pending data was from the additional section or not and only return it if validates as secure. [RT #20438] CVE-2009-4022 bnc#558260 - update from P1 to P2 * Fri Nov 20 2009 ug@suse.de - added localhost for ipv6 to default config (bnc#539529) * Wed Nov 18 2009 ug@suse.de - fixed apparmor profile (bnc#544181) * Tue Nov 3 2009 coolo@novell.com - updated patches to apply with fuzz=0 * Wed Sep 30 2009 ug@suse.de - using start_daemon instead of startproc (bnc#539532) * Mon Aug 10 2009 ug@suse.de - version update to 9.6.1-P1 (security fix CVE-2009-0696) bnc#526185 * Tue Jun 30 2009 ug@suse.de - enabled MySQL DLZ (Dynamically Loadable Zones) * Tue Jun 16 2009 ug@suse.de - around 50 bugfixes against 9.6.0p1 See changelog for details - version 9.6.1 * Thu Apr 9 2009 ug@suse.de - not all include files were copied into chroot (bnc#466800) * Tue Mar 3 2009 ug@suse.de - /etc/named.conf does not include /etc/named.d/forwarders.conf by default (bnc#480334) * Wed Feb 18 2009 ug@suse.de - mount /proc into chroot environment to support multi CPU systems (bnc#470828) * Wed Jan 28 2009 ug@suse.de - key names with spaces are allowed by genDDNSkey now (bnc#459739) - a missing /etc/named.conf.include could lead to an error while "restart" (bnc#455888) - version update to 9.6.0-P1 - Full NSEC3 support - Automatic zone re-signing - New update-policy methods tcp-self and 6to4-self - The BIND 8 resolver library, libbind, has been removed from the BIND 9 distribution * Wed Dec 10 2008 olh@suse.de - use Obsoletes: -XXbit only for ppc64 to help solver during distupgrade (bnc#437293) * Wed Nov 26 2008 ug@suse.de - fix for removed /etc/named.d directory (bnc#448995) * Tue Nov 11 2008 ro@suse.de - SLE-11 uses PPC64 instead of PPC, adapt baselibs.conf * Thu Oct 30 2008 olh@suse.de - obsolete old -XXbit packages (bnc#437293) * Wed Oct 1 2008 ug@suse.de - should start/stop fixed (bnc#430901) * Fri Sep 5 2008 mrueckert@suse.de - delete the static libraries aswell - added missiong requires to the baselibs.conf * Mon Sep 1 2008 sschober@suse.de - Create and copy /etc/named.conf.include to change root jail. Fix by Frank Hollmann. * Mon Aug 18 2008 ug@suse.de - "should-stop" in lwresd init script fixed * Wed Aug 13 2008 sschober@suse.de - Copy complete /etc/named.d to change root jail (bnc#408145). * Tue Aug 12 2008 ug@suse.de - performance improvement over the P1 releases, namely + significantly remedying the port allocation issues + allowing TCP queries and zone transfers while issuing as many outstanding UDP queries as possible + additional security of port randomization at the same level as P1 - also includes fixes for several bugs in the 9.5.0 base code - 9.5.0-P2 * Sun Jul 27 2008 aj@suse.de - Remove .la files, they only introduce more problems and require libxml2.la installation. * Wed Jul 16 2008 ug@suse.de - BIND 9.5 offers many new features, including many behind-the-scenes improvements. For the most part, the non-visible features help ISC's customers who have run into the upper-end of what BIND 9.4 could handle. See CHANGES for details - Statistics Counters / server - Cache cleaning enhancements - GSS TSIG - DHCID Resource Record (RR) - Handling EDNS timeouts - version 9.5.0 * Mon Jun 9 2008 ug@suse.de - VUL-0: spoofing made easier due to non-random UDP source port VU#800113 (bnc#396963) * Tue May 6 2008 ug@suse.de - capset support fixed (bnc#386653) * Thu Apr 10 2008 ro@suse.de - added baselibs.conf file to build xxbit packages for multilib support * Tue Feb 26 2008 ug@suse.de - root.hint file updated (#361094) * Thu Dec 6 2007 ug@suse.de - version 9.4.2 (more than 50 bugs fixed. See changelog. for details) - root.hint file updated * Thu Jul 26 2007 mt@suse.de - Bug #294403: updated to security release 9.4.1-P1 fixing: CVE-2007-2926: cryptographically weak query ids [RT #16915]. CVE-2007-2925: allow-query-cache/allow-recursion default acls not set [RT #16987], [RT #16960]. * Sat May 26 2007 ro@suse.de - added ldconfig to postinstall script for bind-libs * Tue May 15 2007 ug@suse.de - added apparmor profile * Wed May 2 2007 ug@suse.de - version 9.4.1 - query_addsoa() was being called with a non zone db. [RT #16834] * Fri Mar 30 2007 ug@suse.de - libidnkitres.la moved to bind-libs for runidn * Thu Mar 29 2007 rguenther@suse.de - Package .la files in -devel subpackage. - Do not package useless .la files. - Make -devel package depend on -libs package, not -utils package. * Mon Mar 5 2007 ug@suse.de - SuSEFirewall service file added (#246920) fate #300687 * Tue Feb 27 2007 ug@suse.de - version 9.3.4 to 9.4.0 - too many changes to list them all here. Please see the CHANGELOG for details - LDAP backend dropped * Thu Jan 25 2007 ug@suse.de - Bug #238634 - [security] Serialise validation of type ANY responses. [RT #16555] - [security] It was possible to dereference a freed fetch context. [RT #16584] - version 9.3.3 to 9.3.4 * Fri Jan 19 2007 ug@suse.de - version 9.3.2 to 9.3.3 - lots of bugfixes (see changelog for details) * Tue Jan 2 2007 ug@suse.de - load of bind during boot fails if ip-up starts modify_resolvconf at the same time (#221948) * Fri Nov 10 2006 ug@suse.de - security fix (#218303) workarounds OpenSSL's recently discovered RSA signature verification issue (CVE-2006-4339) by using the exponent 65537 (0x10001) instead of the widely used 3. * Tue Oct 17 2006 poeml@suse.de - there is no SuSEconfig.syslog script anymore, thus remove the YaST hint from the sysconfig template * Mon Oct 16 2006 ug@suse.de - typo in sysconfig file fixed (#212337) * Fri Sep 1 2006 ug@suse.de - security fix Bug #201424 VUL-0: bind: two denial-of-service attacks VU#697164 BIND INSIST failure due to excessive recursive queries VU#915404 BIND assertion failure during SIG query processing * Tue Aug 15 2006 ug@suse.de - update messages removed * Fri Aug 4 2006 ug@suse.de - moved the la files to bind-utils (#182448) * Thu Jul 6 2006 ug@suse.de - fix for the nsupdate man page (#92730) thanx to Werner * Wed May 17 2006 ug@suse.de - fix for ldapdump script (#175587) * Mon Mar 13 2006 ug@suse.de - typos fixed (#157611) * Wed Feb 8 2006 ug@suse.de - fixed #148527 a broken symlink in the chroot jail is in the way * Thu Jan 26 2006 mls@suse.de - converted neededforbuild to BuildRequires * Wed Jan 25 2006 ug@suse.de - fixed #145169 (follow symlinks during chroot jail creation) * Sat Jan 14 2006 schwab@suse.de - Don't remove sources. * Mon Jan 2 2006 ug@suse.de - version update from 9.3.1 to 9.3.2 * Mon Nov 21 2005 ug@suse.de - fixed an insecure tmp file bug in the named-bootconf.sh contrib script * Sun Sep 25 2005 ro@suse.de - added LDAP_DEPRECATED to CFLAGS * Fri Jul 22 2005 lmuelle@suse.de - Copy the right default file if /etc/sysconfig/named is missing while calling the lwresd init script; [#97187]. * Fri Jun 17 2005 ug@suse.de - compilation with -fpie and -pie now which makes it harder to use exploits with fixed memory addresses. * Wed Apr 13 2005 mls@suse.de - fix SLP registration * Fri Mar 25 2005 schwab@suse.de - Fix leak in lwres library [#74529]. * Fri Mar 11 2005 ug@suse.de - version update from 9.3.0 to 9.3.1 - fixed bug #72153 lwresd doesn't notice if name server is unreachable and times out * Fri Mar 11 2005 ug@suse.de - rndc dropped from the lwresd init script it conflicts with a running bind * Mon Mar 7 2005 ug@suse.de - lwresd init script "status" changed. rndc is not used anymore * Wed Feb 16 2005 ug@suse.de - lwresd name string changed (just beautify) * Fri Feb 4 2005 ug@suse.de - changed the "insserv" behaviour on updates - fixed empty lwresd.conf file in chroot env. * Thu Feb 3 2005 ug@suse.de - empty lwresd.conf file fix (Bug #49081) - lwresd is on by default now during boot * Fri Jan 21 2005 ug@suse.de - sdb-ldap activated (ldapdb.c version from 16.01.2005) - fixed security problem bug #49927 - remote denial-of-service An incorrect assumption in the validator (authvalidated) can result in a REQUIRE (internal consistancy) test failing and named exiting. * Tue Nov 30 2004 ug@suse.de - fixed #48659 "rclwresd status" answered with OKAY even if only bind was running "rcnamed status" answered with OKAY even if only lwresd was running * Fri Nov 19 2004 ug@suse.de - SLP support via /etc/slp.reg.d/bind.reg file added * Thu Nov 4 2004 ug@suse.de - version update to 9.3.0 - ldapdump script bug fixed (#44452) - dnssec-makekeyset and dnssec-signkey activated in Makefile of bin/dnssec/ * Wed Oct 13 2004 lmuelle@suse.de - Add condrestart to the named init script and use same code as in skeleton to restart. - Enhance check if named or lwresd are still running if the init script is called with stop. * Mon Sep 27 2004 lmuelle@suse.de - Update to version 9.2.4. - Use defines for named user and group settings. - Add PreReq groupadd and useradd to the chrootenv and lwresd package, [#46050]. - Ensure to remove temp sysconfig file in %%post. - Remove warning from createNamedConfInclude script if a file is already included in /etc/named.conf as we take care of such include statements in the named init script anyway. - Remove NAMED_CONF_INCLUDE_FILES fillup from include statements of /etc/named.conf in the %%post of the bind package by the same reason. * Sat Sep 18 2004 lmuelle@suse.de - Add all filenames from include statements of named.conf to NAMED_CONF_INCLUDE_FILES in the named init script, [#40610]. * Thu Sep 16 2004 lmuelle@suse.de - Add $remote_fs to Required-Start and Required-Stop of lwresd init script. - Add Provides: dns_daemon to the lwresd package. - Remove $time from Should-Start and Should-Stop, [#45433]. * Wed Sep 15 2004 lmuelle@suse.de - Remove conflicts from bind and bind-lwrewsd package, [#45335]. - Use rndc in lwresd init script if rndc is available. * Thu Sep 9 2004 lmuelle@suse.de - Create /etc/rndc.key if bind-lwresd is installed and we install bind-utils or if bind-utils is installed and we install bind-lwresd. - Use 0644 instead of 0640 for the named.conf file. - Split bind-doc from bind-utils. - Use one sysconfig file for lwresd and named. - Split common named and lwresd sysconfig settings from them unique to named. - Rename lwres to bind-lwresd and lwres-devel to bind-libs. - Ensure to create user and group 'named' in the %%pre of bind-lwresd and bind-chrootenv. * Tue Sep 7 2004 lmuelle@suse.de - Remove %%run_ldconfig from %%post of the bind package. - Move vendor files to an own tar ball. - Create new sub packages lwres, lwres-devel, and bind-chrootenv, [#44711]. - Use new update message mechanism, [#44344]. * Sun Jun 20 2004 lmuelle@suse.de - Quote definition of NOM_PATH_FILE in configure.in. * Mon May 31 2004 lmuelle@suse.de - Add BIND.desktop file for SuSEhelp. * Wed May 19 2004 lmuelle@suse.de - Add -d, directroy option to genDDNSkey [#40786]. - Update ldapdump to version 1.1. This Version has better keyfile checks and throws an error message if a keyfile can't be found, instead of just barfing perl errors. * Wed May 12 2004 lmuelle@suse.de - Update ldapdump; don't use .zone suffix for zone files. * Wed Apr 28 2004 lmuelle@suse.de - Add /etc/openldap/schema/dnszone.schema to the bind-utils package. - Add /usr/share/bind/ldapdump to the bind package. - Add idnkit programs and libraries. - Add idn patches for dig, host, and nslookup. - Ensure to call functions initializeNamed, checkAndCopyConfigFiles, and namedCheckConf in the named init script only one time. Let namedCheckConf check the configuration inside the chroot. - Check all configuration files in named init script while called with probe. - Add NAMED_INITIALIZE_SCRIPTS to sysconfig.named. This allows to call arbitrary scripts before named is started, restarted, or reloaded. Therewith it's also possible to disable createNamedConfInclude entirely. - createNamedConfInclude always overwrite .SuSEconfig file [#33768]. - Rename SuSEconfig.named to createNamedConfInclude and move it to /usr/share/bind. * Sat Mar 13 2004 schwab@suse.de - Fix path to docs in sample named.conf. * Tue Feb 24 2004 poeml@suse.de - add genDDNSkey to bind-utils (formerly in dhcp-server package) - allow --keyfile and --keyname to be used with genDDNSkey, and allow using /dev/urandom to avoid blocking - in the init script, use rndc (if possible) in order to shut down, so named will flush pending changes to dynamical zones - when restarting named, make sure it is stopped before trying to start it again [#34937] - update root zone (dated Jan 29, 2004) * Thu Feb 12 2004 kukuk@suse.de - Fix group of named.conf.include in filelist - Build with -fno-strict-aliasing * Wed Oct 15 2003 lmuelle@suse.de - update to version 9.2.3; includes the new zone type "delegation-only" to foil Verisign's sitefinder games - move root.hint to an extra source file, named.root - use /etc/named.d and /var/lib/named/master directory in the example configuration from the sample-config directory - supress superfluous warning in SuSEconfig.named if /etc/named.conf.include is empty - create /etc/rndc.key in the init script if it's missing - call namedCheckConf after checkAndCopyConfigFiles to allow us to start named after checkAndCopyConfigFiles fixed a problem - call SuSEconfig -module named not direct in the init script - add norootforbuild to the spec file - set owner of /etc/named.d and /etc/named.d/rndc-access.conf to root: - add additional x while testing strings in the init script - always include /etc/rndc.key in rndc-access.conf - remove absolet stdtime.diff - remove ip6rev.diff, as one part is included upstream and the other isn't possible any longer * Wed Oct 8 2003 schwab@suse.de - Fix typo in last change. * Mon Sep 29 2003 kukuk@suse.de - Create named.conf.include if it does not exist [Bug #31683] - Don't add rndc-access.conf at update [Bug #31696] * Fri Sep 19 2003 kukuk@suse.de - Fix all useradd calls * Mon Sep 15 2003 kukuk@suse.de - Fix Requires and Provides [Bug #30717] * Fri Aug 29 2003 kukuk@suse.de - Call useradd with -r for system accounts [Bug #29611] * Thu Aug 28 2003 lmuelle@suse.de - call sbin/SuSEconfig --module named and not directly the script in the %%post section - check if rndc is accessible in the init script * Tue Aug 26 2003 lmuelle@suse.de - add Config: syslog-ng to sysconfig.syslog-named * Fri Aug 22 2003 lmuelle@suse.de - add NAMED_ARGS to sysconfig.named - use -r /dev/urandom while calling rndc-confgen in the post section * Thu Aug 21 2003 lmuelle@suse.de - rename package from bind9 to bind - add stop_on_removal and restart_on_update macros to preun and postun section fix bug #29048 - add default /etc/named.d/rndc-access.conf - add SuSEconfig.named - add all included files to NAMED_CONF_INCLUDE_FILES of /etc/sysconfig/named while update if NAMED_CONF_INCLUDE_FILES is empty - add additional sysconfig meta data - remove -u from the copy in prepare_chroot() of the init script due to the rist of a wrong system time - unify init scripts; add one space at the end to all echos - document new features in the README.{SuSE,UnitedLinux} - fix bug #28585 * Mon May 26 2003 lmuelle@suse.de - add -u to copy in prepare_chroot() of the init script, #25687 - fix output format in init script * Fri Apr 11 2003 mludvig@suse.cz - Make nibble queries instead of bitstring ones for IPv6 addresses. - Differentiate between 6bone (3ffe::/16, .ip6.int) and other addresses (!3ffe::/16, ip6.arpa). * Wed Mar 12 2003 lmuelle@suse.de - fix try-restart part of init skript - set PATH to "/sbin:/usr/sbin:/bin:/usr/bin", #21295 * Mon Mar 10 2003 lmuelle@suse.de - remove %%ghost from /var/lib/named/var/log * Mon Mar 10 2003 lmuelle@suse.de - add null logging for lame-servers to logging example in named.conf - fix file section - change /var/run/named to a sym link pointing to /var/lib/named/var/run/named, [#24768] * Wed Mar 5 2003 lmuelle@suse.de - remove empty.zone due to possibility of CIDR addressing - remove rndc.conf; rndc also uses rndc.key, fix bug #17751 - create rndc.key with 512bit sized key in %%post - remove %%pre of utils package - create additional sub directories log, dyn and master in /var/lib/named - add a non active logging example to named.conf * Tue Mar 4 2003 lmuelle@suse.de - update to version 9.2.2; maintenance/ bugfix release * Sat Mar 1 2003 ro@suse.de - also create named user/group in utils preinstall * Thu Feb 27 2003 ro@suse.de - create named user/group in preinstall and install * Thu Feb 27 2003 lmuelle@suse.de - set /etc/named.conf to root:named and 0640 - add an example to additional info mail for dynamic updates - add more information to the README - add sysconfig file for chroot jail; default is yes - add chroot features to init script for start and reload * Mon Feb 24 2003 lmuelle@suse.de - add separate binaries to PreReq - add --localstatedir=/var to configure call - add and autocreate /etc/rndc.{conf,key} - move rndc binaries and man pages to utils package - fix %%post in case of update - set ownership of /var/lib/named to root: - add a README - fix init script to return correspondig message to checkproc return code - remove umlauts from %%post mail - add additional info mail about ownership of /var/lib/named if journal files are used * Mon Feb 17 2003 lmuelle@suse.de - update bind9 to version 9.2.1 - move /var/named to /var/lib/named - remove obsolete patches (bison, ltconfig_ppc64, manpages, security) * Wed Nov 13 2002 ro@suse.de - fix build with current bison (end all rules with ";") * Sat Sep 7 2002 kukuk@suse.de - Fix running bind9 as user named [Bug #18417] * Mon Aug 19 2002 ro@suse.de - added prereqs (#17807) * Mon Aug 19 2002 okir@suse.de - Added patch to make named run as non-root user - added "-u named" option to init script invocation of named * Sun Jul 28 2002 kukuk@suse.de - Remove yacc from neededforbuild * Sat Jul 27 2002 adrian@suse.de - add %%run_ldconfig * Mon Jul 22 2002 kukuk@suse.de - Move .so symlinks to devel package - Move liblwres shared library to utils package - make lib64 clean * Wed Jul 10 2002 olh@suse.de - hack ltconfig for ppc64 to build shared libs * Wed Jul 10 2002 draht@suse.de - move /usr/bin/nsupdate to bindutil (#16944) * Mon Jun 3 2002 okir@suse.de - Applied security fix for remote DoS (CERT VU#739123) * Fri Dec 14 2001 ro@suse.de - removed START_NAMED * Wed Sep 5 2001 pthomas@suse.de - Fix incorrect .so references in lwres manpages. * Sun Aug 12 2001 kukuk@suse.de - Fix path to perl interpreter * Wed Jul 4 2001 bodammer@suse.de - Update to bind-9.1.3 (release) - Config-files moved away from bind-9.1.3.dif * Mon Jul 2 2001 bodammer@suse.de - update to bind-9.1.3rc3 - "Implicit declaration of function time" in context.c fixed * Mon Jun 25 2001 bodammer@suse.de - update to bind-9.1.3rc2 * Tue May 29 2001 bodammer@suse.de - update to bind-9.1.3rc1 * Thu May 10 2001 bodammer@suse.de - initscript fix: don't start bind in runlevel 2 [bug #7956] * Tue May 8 2001 mfabian@suse.de - bzip2 sources * Tue May 8 2001 bodammer@suse.de - install a new named.conf with comments * Mon May 7 2001 bodammer@suse.de - update to bind-9.1.2 (release) * Tue Apr 24 2001 bodammer@suse.de - little modification to named.conf * Thu Mar 29 2001 bodammer@suse.de - update to bind-9.1.1 (release) * Tue Mar 27 2001 bodammer@suse.de - update to bind-9.1.1rc7 * Fri Mar 23 2001 bodammer@suse.de - update to bind-9.1.1rc6 * Thu Mar 15 2001 bodammer@suse.de - update to bind-9.1.1rc5 - new initscript more LSB conform * Mon Mar 12 2001 bodammer@suse.de - update to bind-9.1.1rc4 * Tue Feb 27 2001 bodammer@suse.de - initscript fix: now checks for a running named * Tue Feb 27 2001 bodammer@suse.de - update to bind-9.1.1rc3 * Thu Feb 15 2001 sf@suse.de - added suse_update_config * Wed Feb 14 2001 bodammer@suse.de - update to bind-9.1.1rc2 * Mon Feb 12 2001 bodammer@suse.de - subpackages bind9-util and bind9-devel created * Thu Feb 8 2001 bodammer@suse.de - update to bind-9.1.1rc1 - missing headerfile included in stdtime.c * Thu Jan 18 2001 bodammer@suse.de - update to bind-9.1.0 * Tue Nov 28 2000 bodammer@suse.de - Fix location of rcscript * Thu Nov 23 2000 ro@suse.de - added insserv calls * Thu Nov 23 2000 bodammer@suse.de - rcscript update * Mon Nov 13 2000 bodammer@suse.de - update to bind-9.0.1 * Fri Oct 6 2000 kukuk@suse.de - change group tag * Mon Sep 18 2000 bodammer@suse.de - update to bind-9.0.0 ( first release version ) * Wed Aug 30 2000 bodammer@suse.de - update to bind-9.0.0rc5 * Wed Aug 16 2000 bodammer@suse.de - update to bind-9.0.0rc3 * Thu Aug 10 2000 bodammer@suse.de - update to bind-9.0.0rc2 - nslookup renamed to nslookup9 * Thu Jul 13 2000 bodammer@suse.de - update to bind-9.0.0rc1 (release candidate) * Mon Jul 3 2000 bodammer@suse.de - update to bind-9.0.0b5 - host renamed to host9 * Fri Jun 16 2000 bodammer@suse.de - update to bind-9.0.0b4 * Thu May 25 2000 bodammer@suse.de - dig renamed to dig9 to avoid conflicts with dig from bindutil - libtool-fix added - option -f added to suse_update_config-macro * Wed May 24 2000 bodammer@suse.de - update to bind-9.0.0b3 - configure option added to build shared libraries * Mon May 15 2000 schwab@suse.de - Update config files. - Fix 64-bit bug. * Fri May 12 2000 bodammer@suse.de - update to bind9-snap-20000510 * Tue May 2 2000 bodammer@suse.de - update to bind9-snap-20000427a * Wed Apr 19 2000 bodammer@suse.de - update to bind9-snap-20000414 * Tue Mar 28 2000 bodammer@suse.de - update to bind-9.0.0b2 * Mon Feb 7 2000 bodammer@suse.de - first public beta version bind-9.0.0b1