| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | init a variable to address https://kb.isc.org/article/AA-01272 | 2016-08-18 | 1 | -0/+1 | |
| | | | | | | | | Most of bind got removed and this function is not called by any of the remaining parts. ok deraadt@ a long time ago. | ||||
| * | reduce confusion about -p option. parse it, but only permit port 53, and | 2016-06-05 | 1 | -3/+4 | |
| | | | | | | | make it an error otherwise instead of a warning that may be overlooked. reported by Peter van Dijk ok deraadt | ||||
| * | Change last non-/gnu/ fcntl(x, F_GETFL, 0) strays to fcntl(x, F_GETFL). | 2016-04-16 | 3 | -3/+3 | |
| | | | | | | | No functional change. ok millert@ | ||||
| * | exit() after perror() for pledge failure. Perhaps this got introduced | 2015-11-11 | 3 | -6/+18 | |
| | | | | | | as a test idiom, either when pledge was young or during the transition to strings.... dunno | ||||
| * | pledge bind(1), dig(1), and nslookup(1). This modifies the underlying | 2015-10-25 | 7 | -26/+35 | |
| | | | | | | | | ISC library to use socket(2) with the SOCK_DNS flag. As a result, the port commands are disabled (such practice is rare in the wild these days, and pretty incompatible with the DNS vs regular socket concept in pledge..) ok bluhm phessler reyk, etc | ||||
| * | strcat -> strlcat. last time i checked, this was the last remaining | 2015-09-28 | 1 | -1/+3 | |
| | | | | | | strcat in non-toolchain base, and inside #if not reached during compile. ok beck krw brynet | ||||
| * | kill strcpy dead | 2015-09-11 | 1 | -1/+2 | |
| | | | | | ok deraadt@ | ||||
| * | Initialize nameservers ports along with nameservers addresses. | 2015-03-17 | 1 | -1/+3 | |
| | | | | | | | | | | | Missing initialization, as hinted by lwres_conf_clear(). Not present in recent bind versions (the code has changed since). This fixes an erratic behaviour when no (valid) nameserver is configured in resolv.conf (dig / nslookup send requests to 127.0.0.1:48830). Problem reported by Pawel S. Veselov who also provided an alternative diff. ok crickets@ | ||||
| * | port NSEC3 and TLSA parsing code into dig(1) from ISC BIND 9.10.1-P1 | 2015-02-07 | 16 | -5/+1987 | |
| | | | | | ok henning | ||||
| * | oops, left an old line... | 2014-11-22 | 1 | -1/+0 | |
| | | |||||
| * | /dev/random has created the same effect as /dev/arandom (and /dev/urandom) | 2014-11-22 | 1 | -7/+1 | |
| | | | | | | for quite some time. Mop up the last few, by using /dev/random where we actually want it, or not even mentioning arandom where it is irrelevant. | ||||
| * | Return failure not success in openssldh_computesecret() when | 2014-10-13 | 1 | -1/+1 | |
| | | | | | | | DH_compute_key() fails and returns -1. ok guenther@ | ||||
| * | Garbage collecting some further bits that are not necessary | 2014-09-15 | 9 | -9976/+0 | |
| | | | | | | | | within the BIND directory and for Makefile.in removing some files that no longer exist for the distclean target. ok sthen@ | ||||
| * | Start removing unused documentation and the server and related binaries source | 2014-08-25 | 213 | -101009/+0 | |
| | | | | | code. | ||||
| * | Strip the BIND code down to just building and installing dig, host and nslookup. | 2014-08-22 | 5 | -64/+16 | |
| | | |||||
| * | lynx will go to ports. there are too many reasons for it to go there, | 2014-07-16 | 1 | -21/+2 | |
| | | | | | and not enough for it to stay. lengthy discussions. | ||||
| * | Misc time_t tweaks. %ld / (long)tv_sec -> %lld / (long long)tv_sec. | 2013-09-12 | 1 | -2/+2 | |
| | | | | | Eliminate unneeded casts. suggestions from & ok millert@ guenther@ | ||||
| * | There is no need to call arc4random_addrandom() and feed it some | 2013-09-02 | 1 | -2/+0 | |
| | | | | | stupid seed that bind has decided on.. | ||||
| * | add other root servers from named.root that were missed in previous updates | 2013-01-08 | 1 | -0/+2 | |
| | | |||||
| * | new IPv4 address for D.ROOT-SERVERS.NET | 2013-01-08 | 1 | -1/+1 | |
| | | |||||
| * | Add a fix for CVE-2012-1667, backported from ISC BIND. ok millert@ | 2012-06-06 | 2 | -5/+10 | |
| | | | | | | | | | | http://www.isc.org/software/bind/advisories/cve-2012-1667 Distinguish rdata removed by BIND due to duplication, from zero-length rdata received from a server. Otherwise a server supplying zero-length rdata sections can trigger crashes or possible memory disclosure to the client. Primarily affects recursive servers. | ||||
| * | Apply the patches from BIND upstream to mitigate cve-2011-4313 (crashes | 2011-11-17 | 2 | -13/+13 | |
| | | | | | | | with INSIST(! dns_rdataset_isassociated(sigrdataset))). ok jakob@ | ||||
| * | fix an |= that should have been != | 2011-09-21 | 1 | -1/+1 | |
| | | | | | | this could cause a log message to trigger when it shouldn't have reported to isc (RT #24053) and now included in current bind releases | ||||
| * | fix some memset sizeofs, found by jsg. ok deraadt krw | 2011-07-05 | 1 | -7/+7 | |
| | | |||||
| * | correct memsets of key contexts which were shorter than they needed to be | 2011-07-05 | 1 | -11/+5 | |
| | | | | | | | due to sizeof pointer instead of sizeof of type with tedu; some quibbles spotted by miod, ok tedu miod jsg jakob -- please push this upstream | ||||
| * | Add missing #includes instead of assuming that some system header pulls in | 2010-12-31 | 1 | -0/+1 | |
| | | | | | | | the needed bits ok deraadt@, millert@ | ||||
| * | Initialise the port in nslookup.c correctly. It was initialised | 2010-05-02 | 1 | -2/+7 | |
| | | | | | | | to zero in interactive mode, should be 53. Second half of patch submission by Nathan Rickerby (pr 6322). ok krw | ||||
| * | Fix breakage of dig's -p option introduced when support for | 2010-04-24 | 1 | -4/+17 | |
| | | | | | | | | parsing the [host]:port syntax in resolv.conf was added. Patch by Nathan Rickerby <rickerby () gmail ! com>. Prodded by jmc, OK djm krw | ||||
| * | Add line breaks to the source to render an .RS display that got skipped; | 2010-02-20 | 1 | -1/+6 | |
| | | | | | | | found by and unbreaking the build with mandoc(1). I will also send this patch upstream. ok jmc@ | ||||
| * | parse "nameserver [host]:port" syntax in /etc/resolv.conf | 2009-08-16 | 6 | -17/+63 | |
| | | | | | ok deraadt@ | ||||
| * | apply patch for https://www.isc.org/node/474 since jakob does not | 2009-07-29 | 1 | -1/+5 | |
| | | | | | appear to be around. | ||||
| * | seperation -> separation; from Amarendra Godbole | 2009-07-27 | 1 | -2/+2 | |
| | | |||||
| * | fix CVE-2009-0025: incorrect check of DSA DNSSEC signature verification | 2009-01-14 | 1 | -1/+1 | |
| | | | | | "please commit" miod@ | ||||
| * | #if 0 a function which we have we do not use, and where the call to it is in #if 0 as well | 2008-11-10 | 1 | -0/+2 | |
| | | |||||
| * | Update to BIND 9.4.2-P2 and adapt our dynamic select changes. OK deraadt@ | 2008-08-04 | 32 | -244/+653 | |
| | | |||||
| * | Don't print a warning when the random device cannot be opened if | 2008-08-03 | 1 | -10/+10 | |
| | | | | | we have a pre-chroot random device. OK deraadt@ kettenis@ | ||||
| * | This log message is an excruiciating pain in the ass when it repeats 4000 times a second on a machine you need debug log on, and is actually used as a cacheing nameserver. remove just this one line of debug log to save people's sanity | 2008-08-01 | 1 | -2/+1 | |
| | | | | | ok djm@ | ||||
| * | Dynamically allocate fd_sets so we are not limited to FD_SETSIZE | 2008-07-16 | 3 | -53/+141 | |
| | | | | | connections. With help from djm@. OK djm@ | ||||
| * | retry port allocation on all errors, not just EADDRINUSE; ok jakob@ | 2008-07-10 | 1 | -1/+1 | |
| | | |||||
| * | let the kernel choose the random port. code from djm@. ok markus@. | 2008-07-09 | 1 | -0/+21 | |
| | | |||||
| * | reintroduce our own shuffle ID generator. ok djm@ millert@ | 2008-07-09 | 1 | -1/+4 | |
| | | |||||
| * | merge and resolve conflicts introduced by 9.4.2-P1 | 2008-07-09 | 10 | -523/+341 | |
| | | |||||
| * | remove an unused variable that is a leftover from the old alg. | 2008-07-09 | 1 | -2/+1 | |
| | | | | | ok deraadt@ | ||||
| * | simplify math for arc4random_uniform() suggested by | 2008-06-09 | 1 | -2/+2 | |
| | | | | | | | Jinmei_Tatuya AT isc.org via jakob@ empirically verified for entire domain of upper_bound | ||||
| * | fix math screwup that reintroduced a bias for upper_bounds in range | 2008-06-04 | 1 | -1/+1 | |
| | | | | | | | | (2^30,2^31). Nothing in the tree yet requests random numbers bounded by this range. report jakob!deraadt; ok deraadt@ | ||||
| * | msg_controllen has to be CMSG_SPACE so that the kernel can account for | 2008-03-24 | 2 | -30/+18 | |
| | | | | | | | | each cmsg_len (ie. msg_controllen = sum of CMSG_ALIGN(cmsg_len). This works now that kernel fd passing has been fixed to accept a bit of sloppiness because of this ABI repair. lots of discussion with kettenis | ||||
| * | CMSG_LEN and CMSG_SPACE are not neccessarily the same size. So if you | 2008-03-19 | 1 | -15/+27 | |
| | | | | | | | are going to allocate/free a block of memory for the message contents, you have to calculate and track the sizes seperately. This change is just like all the other CMSG changes... | ||||
| * | Repair the simple cases for msg_controllen where it should just be | 2008-03-15 | 1 | -3/+3 | |
| | | | | | | CMSG_SIZE(sizeof(int)), not sizeof(buffer) which may be larger because of alignment; ok kettenis hshoexer | ||||
| * | Because the shuffle code initialisation is a specific case of shuffling | 2008-03-15 | 1 | -8/+4 | |
| | | | | | | | | | | a set of incrementing integers (and not an arbitrary set of values) it is possible to populate the array as we shuffle it in a single forward pass. Clever optimisation from didickman AT gmail.com; ok deraadt@ mcbride@ (same change as netinet/ip_id.c) | ||||
| * | Correct CMSG_SPACE and CMSG_LEN usage everywhere in the tree. Due to | 2008-03-13 | 1 | -7/+13 | |
| | | | | | an extensive discussion with otto, kettenis, millert, and hshoexer | ||||
