summaryrefslogtreecommitdiffstats
path: root/usr.sbin/bind/lib/dns (follow)
Commit message (Collapse)AuthorAgeFilesLines
* init a variable to address https://kb.isc.org/article/AA-01272jsg2016-08-181-0/+1
| | | | | | | Most of bind got removed and this function is not called by any of the remaining parts. ok deraadt@ a long time ago.
* port NSEC3 and TLSA parsing code into dig(1) from ISC BIND 9.10.1-P1pelikan2015-02-0710-0/+1371
| | | | ok henning
* Return failure not success in openssldh_computesecret() whenjsg2014-10-131-1/+1
| | | | | | DH_compute_key() fails and returns -1. ok guenther@
* add other root servers from named.root that were missed in previous updatessthen2013-01-081-0/+2
|
* new IPv4 address for D.ROOT-SERVERS.NETjakob2013-01-081-1/+1
|
* Add a fix for CVE-2012-1667, backported from ISC BIND. ok millert@sthen2012-06-062-5/+10
| | | | | | | | | http://www.isc.org/software/bind/advisories/cve-2012-1667 Distinguish rdata removed by BIND due to duplication, from zero-length rdata received from a server. Otherwise a server supplying zero-length rdata sections can trigger crashes or possible memory disclosure to the client. Primarily affects recursive servers.
* Apply the patches from BIND upstream to mitigate cve-2011-4313 (crashessthen2011-11-171-2/+5
| | | | | | with INSIST(! dns_rdataset_isassociated(sigrdataset))). ok jakob@
* fix an |= that should have been !=jsg2011-09-211-1/+1
| | | | | this could cause a log message to trigger when it shouldn't have reported to isc (RT #24053) and now included in current bind releases
* fix CVE-2009-0025: incorrect check of DSA DNSSEC signature verificationdjm2009-01-141-1/+1
| | | | "please commit" miod@
* #if 0 a function which we have we do not use, and where the call to it is in #if 0 as wellderaadt2008-11-101-0/+2
|
* Update to BIND 9.4.2-P2 and adapt our dynamic select changes. OK deraadt@millert2008-08-046-23/+56
|
* retry port allocation on all errors, not just EADDRINUSE; ok jakob@djm2008-07-101-1/+1
|
* let the kernel choose the random port. code from djm@. ok markus@.jakob2008-07-091-0/+21
|
* reintroduce our own shuffle ID generator. ok djm@ millert@jakob2008-07-091-1/+4
|
* merge and resolve conflicts introduced by 9.4.2-P1jakob2008-07-094-497/+283
|
* replacement algorithm. initialize a 64K-short buffer using Durstenfeldderaadt2008-02-291-4/+4
| | | | | | | | | | | | shuffle. Upon allocation, swap-permute the new value to a random slot in the 0..32K-1 th entry of the buffer as we move forward, ensuring randomness but also satisfying the non-repeating property we need. Inspired by Dillon's implementation for ip id. We believe this is easier to read though, initializes with less bias and wins speed tests. Thanks a lot to mcbride and djm for doing a bunch of statistical and speed analysis, and comments from nordin ok jakob djm mcbride
* add IPv6 root serversjakob2008-02-071-4/+8
|
* more str fixes; from chl@jakob2007-12-131-3/+6
|
* str fixes; from chl@jakob2007-12-132-4/+4
|
* resolve conflictsjakob2007-12-0975-3619/+9354
|
* ISC BIND release 9.4.2jakob2007-12-09192-2775/+11372
|
* update IP address of L.ROOT-SERVERS.NET; fix PR#5629jakob2007-11-141-1/+1
|
* avoid potentially bad snprintf construct; ok henning millert ottopvalchev2007-06-011-2/+4
|
* More comment typos from Diego Casati. Including winners like funtion, allmost,krw2007-05-261-1/+1
| | | | oustside, seqencer, toghether, nessissary, etc.
* remove some bogus *p tests from charles longeautedu2007-03-201-1/+1
| | | | ok deraadt millert
* resolve conflicts with 9.3.4; SECURITY UPDATEjakob2007-01-253-12/+71
|
* ISC BIND release 9.3.4jakob2007-01-251-1/+11
|
* resolve conflicts and regen configure scriptjakob2007-01-1026-983/+878
|
* ISC BIND release 9.3.3jakob2007-01-1025-139/+723
|
* security update to BIND 9.3.2-P1. ok miod@ and deraadt@jakob2006-09-051-21/+28
|
* Tyop fix: simultaniousmk2006-07-181-2/+2
|
* resolve conflictsjakob2006-04-0517-578/+795
|
* ISC BIND release 9.3.2jakob2006-04-058-25/+55
|
* The patch addresses a problem with high-load resolvers whichbrad2005-08-211-2/+4
| | | | | | | | | hit memory barriers. Without this patch, running the resolving name server out of memory would lead to "unpredictable results." From glebius FreeBSD ok deraadt@ millert@ cloder@ krw@
* fix more cases of snprintf() returning -1. ok cloder@ niallo@moritz2005-04-192-8/+9
|
* Be more careful with snprintf return value handling. Some of these arecloder2005-04-164-12/+19
| | | | | from Han Boetes (thanks), some with modifications by me. OK from and corrections from niallo@
* restore lost sprintf -> snprintf conversiondavid2005-04-111-1/+3
| | | | ok krw@ deraadt@ jakob@
* resolve conflictsjakob2005-03-2235-5741/+331
|
* ISC BIND release 9.3.1. ok deraadt@jakob2005-03-2223-20/+5532
|
* fix CERT VU#938617 (vulnerable to denial of service in validator code)jakob2005-01-261-1/+3
|
* adjust rtt estimates, fixes IPv6 problem.jakob2004-11-041-2/+9
|
* Add missing {} on if statement; ISC#1744mcbride2004-10-141-1/+2
| | | | ok jakob@
* fix som s/sprintf/snprintf/ lost in transitionjakob2004-09-295-16/+16
|
* resolve conflictsjakob2004-09-2871-5731/+8405
|
* remove unused filesjakob2004-09-284-573/+0
|
* ISC BIND version 9.3.0. ok deraadt@jakob2004-09-28189-2713/+9419
|
* update to BIND v9.2.3. ok todd@jakob2003-11-1861-477/+1175
|
* remove win32 filesjakob2003-11-169-3361/+0
|
* snprintfify; noted by david krausejakob2003-10-201-3/+3
|
* add support for SSHFP resource recordsjakob2003-10-192-0/+270
|