<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in named.conf.j2</title>
    <link>http://nxr.netbsd.org/rss/src/external/mpl/bind/dist/bin/tests/system/staticstub/ns1/named.conf.j2</link>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2005</copyright>
    <generator>Java</generator>
    
<item>
    <title>branches:  1.1.1;<br/>Initial revision</title>
    <description>/src/external/mpl/bind/dist/bin/tests/system/staticstub/ns1/named.conf.j2 - 1.1</description>
    <pubDate>Thu Jan 29 18:19:42 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.20.18 (previous was 9.20.11)<br/><br/><br/>BIND 9.20.18#<br/><br/>Security Fixes#<br/><br/>    [CVE-2025-13878] Fix incorrect length checks for BRID and HHIT<br/>    records. d4c0d61701<br/><br/>    Malformed BRID and HHIT records could trigger an assertion<br/>    failure. This has been fixed.<br/><br/>    ISC would like to thank Vlatko Kosturjak from Marlink Cyber<br/>    for bringing this vulnerability to our attention. [GL #5616]<br/><br/>Feature Changes#<br/><br/>    Support compilation with cmocka 2.0.0+ bb9234c6ce<br/><br/>    The assert_in_range() function was deprecated in favor of<br/>    assert_int_in_range() and assert_uint_in_range(). Add compatibility<br/>    shims for cmocka&lt;2.0.0 and use the new functions. [GL #5699]<br/>    [GL !11437]<br/><br/>    Add more information to the rndc recursing output about fetches.<br/>    9766feb4df<br/><br/>    This adds more information about the active fetches for debugging<br/>    and diagnostic purposes. [GL !11358]<br/><br/>Bug Fixes#<br/><br/>    Make key rollovers more robust. 7a70d05b5d<br/><br/>    A manual rollover when the zone is in an invalid DNSSEC state<br/>    causes predecessor keys to be removed too quickly. Additional<br/>    safeguards to prevent this have been added. DNSSEC records will<br/>    not be removed from the zone until the underlying state machine<br/>    has moved back into a valid DNSSEC state. [GL #5458] [GL !11329]<br/><br/>    Fix a catalog zones issue when a member zone could fail to<br/>    load. 95cbc2c327<br/><br/>    A catalog zone's member zone could fail to load in some rare<br/>    cases, when the internally generated zone configuration string<br/>    was exceeding 512 bytes. That condition only was not enough<br/>    for the issue to arise, but it was a necessary condition. This<br/>    could happen, for example, if the catalog zone's default primary<br/>    servers list contained a large number of items. This has been<br/>    fixed. [GL #5658] [GL !11349]<br/><br/>    Allow glue in delegations with QTYPE=ANY. 441158ac18<br/><br/>    When a query for type ANY triggered a delegation response, all<br/>    additional data was omitted from the response, including<br/>    mandatory glue. This has been corrected. [GL #5659] [GL !11283]<br/><br/>    Adding NSEC3 opt-out records could leave invalid records in<br/>    chain. 1b90296e1f<br/><br/>    When creating an NSEC3 opt-out chain, a node in the chain could<br/>    be removed too soon, causing the previous NSEC3 being unable<br/>    to be found, resulting in invalid NSEC3 records to be left in<br/>    the zone. This has been fixed. [GL #5671] [GL !11340]<br/><br/>    Fix slow speed of NSEC3 optout large delegation zone signing.<br/>    88f915b77b<br/><br/>    BIND 9.20 takes much more time signing a large delegation zone<br/>    with NSEC3 optout compared to version 9.18. This has been<br/>    restored. [GL #5672] [GL !11362]<br/><br/>    Reconfigure NSEC3 opt-out zone to NSEC causes zone to be invalid.<br/>    1d0e19c612<br/><br/>    A zone that is signed with NSEC3, opt-out enabled, and then<br/>    reconfigured to use NSEC, causes the zone to be published with<br/>    missing NSEC records. This has been fixed. [GL #5679] [GL<br/>    !11401]<br/><br/>    Fix a possible catalog zone issue during reconfiguration.<br/>    911b45b2b3<br/><br/>    The named process could terminate unexpectedly during<br/>    reconfiguration when a catalog zone update was taking place at<br/>    the same time. This has been fixed. [GL !11386]<br/><br/>    Fix the charts in the statistics channel. 7c7b01dd65<br/><br/>    The charts in the statistics channel could sometimes fail to<br/>    render in the browser, and were completely disabled for<br/>    Mozilla-based browsers for historical reasons. This has been<br/>    fixed. [GL !11364]<br/><br/>BIND 9.20.17#<br/><br/>New Features#<br/><br/>    Add spatch to detect implicit bool/int/result cast. 02be363d1f<br/><br/>    Detection of implicit cast from a boolean into an int, or an<br/>    isc_result_t into a boolean (either in an assignement or return<br/>    position).<br/><br/>    If such pattern is found, a warning comment is added into the<br/>    code (and the CI will fails) so the error can be spotted and<br/>    manually fixed. [GL !11237]<br/><br/>Feature Changes#<br/><br/>    Use atomics for CMM_{LOAD,STORE}_SHARED with ThreadSanitizer.<br/>    94fa721705<br/><br/>    Upstream has removed the atomics implementation of CMM_LOAD_SHARED<br/>    and CMM_STORE_SHARED as these can be used also with non-stdatomics<br/>    types. As we only use the CMM api with stdatomics types, we<br/>    can restore the previous behaviour to prevent ThreadSanitizer<br/>    warnings. [GL #5660] [GL !11290]<br/><br/>    Provide more information when the memory allocation fails.<br/>    6749725610<br/><br/>    Provide more information about the failure when the memory<br/>    allocation fails. [GL !11304]<br/><br/>    Reduce the number of outgoing queries. 457b470e96<br/><br/>    Reduces the number of outgoing queries when resolving the<br/>    nameservers for delegation points. This helps the DNS resolver<br/>    with cold cache resolve client queries with complex delegation<br/>    chains and redirections. [GL !11258]<br/><br/>Bug Fixes#<br/><br/>    Fix the spurious timeouts while resolving names. d96cf874fb<br/><br/>    Sometimes the loops in the resolving (e.g. to resolve or validate<br/>    ns1.example.com we need to resolve ns1.example.com) were not<br/>    properly detected leading to spurious 10 seconds delay. This<br/>    has been fixed and such loops are properly detected. [GL #3033],<br/>    #5578 [GL !11298]<br/><br/>    Fix bug where zone switches from NSEC3 to NSEC after retransfer.<br/>    3b40ffbf83<br/><br/>    When a zone is re-transferred, but the zone journal on an<br/>    inline-signing secondary is out of sync, the zone could fall<br/>    back to using NSEC records instead of NSEC3. This has been<br/>    fixed. [GL #5527] [GL !11274]<br/><br/>    Attach socket before async streamdns_resume_processing. bb9451c73f<br/><br/>    Call to streamdns_resume_processing is asynchronous but the<br/>    socket passed as argument is not attached when scheduling the<br/>    call.<br/><br/>    While there is no reproducible way (so far) to make the socket<br/>    reference number down to 0 before streamdns_resume_processing<br/>    is called, attach the socket before scheduling the call. This<br/>    guard against an hypothetic case where, for some reasons, the<br/>    socket refcount would reach 0, and be freed from memory when<br/>    streamdns_resume_processing is called. [GL #5620] [GL !11260]<br/><br/>    AMTRELAY type 0 presentation format handling was wrong. adf104a063<br/><br/>    RFC 8777 specifies a placeholder value of "." for the gateway<br/>    field when the gateway type is 0 (no gateway). This was not<br/>    being checked for nor emitted when displaying the record. This<br/>    has been corrected.<br/><br/>    Instances of this record will need the placeholder period added<br/>    to them when upgrading. [GL #5639] [GL !11255]<br/><br/>    Fix parsing bug in remote-servers with key or tls. d9400c5967<br/><br/>    The remote-servers clause enable the following pattern using<br/>    a named server-list:<br/><br/>    remote-servers a { 1.2.3.4; ... }; remote-servers b { a key<br/>    foo; };<br/><br/>    However, such configuration was wrongly rejected, with an<br/>    "unexpected token 'foo'" error. Such configuration is now<br/>    accepted. [GL #5646] [GL !11300]<br/><br/>    Fix TLS contexts cache object usage bug in the resolver.<br/>    13adf94006<br/><br/>    named could terminate unexpectedly when reconfiguring or<br/>    reloading, and if client-side TLS transport was in use (for<br/>    example, when forwarding queries to a DoT server). This has<br/>    been fixed. [GL #5653] [GL !11299]<br/><br/>    Fix unitiailized pointer check on getipandkeylist. 5ed0cf091b<br/><br/>    Function named_config_getipandkeylist could, in case of error<br/>    in the early code attempting to get the port or tls-port, make<br/>    a pointer check on a non-initialized value. This is now fixed.<br/>    [GL !11306]<br/><br/>    Standardize CHECK and RETERR macros. ef714e91ac<br/><br/>    previously, there were over 40 separate definitions of CHECK<br/>    macros, of which most used "goto cleanup", and the rest "goto<br/>    failure" or "goto out". there were another 10 definitions of<br/>    RETERR, of which most were identical to CHECK, but some simply<br/>    returned a result code instead of jumping to a cleanup label.<br/><br/>    this has now been standardized throughout the code base: RETERR<br/>    is for returning an error code in the case of an error, and<br/>    CHECK is for jumping to a cleanup tag, which is now always<br/>    called "cleanup". both macros are defined in isc/util.h. [GL<br/>    !11069]<br/><br/>    Adding NSEC3 opt-out records could leave invalid records in<br/>    chain. 1d83a8ad46<br/><br/>    When creating an NSEC3 opt-out chain, a node in the chain could<br/>    be removed too soon, causing the previous NSEC3 being unable<br/>    to be found, resulting in invalid NSEC3 records to be left in<br/>    the zone. This has been fixed.<br/><br/>    Closes [#5671](#5671)<br/><br/>BIND 9.20.16#<br/><br/>Feature Changes#<br/><br/>    Fix assertion failure from arc4random_uniform with invalid<br/>    limit. 1040282de7e<br/><br/>    When the arc4random_uniform() is called on NetBSD with upper_bound<br/>    that makes no sense statistically (0 or 1), the call crashes<br/>    the calling program. Fix this by returning 0 when upper bound<br/>    is &lt; 2 as does Linux, FreeBSD and NetBSD. (Hint: System CSPRNG<br/>    should never crash.) [GL #5596] [GL !11151]<br/><br/>Bug Fixes#<br/><br/>    Fix dnssec-keygen key collision checking for KEY rrtype keys.<br/>    ac8b23b80bf<br/><br/>    The dnssec-keygen utility program failed to detect possible<br/>    Key ID collisions with the existing keys generated using the<br/>    non-default -T KEY option (e.g. for SIG(0)). This has been<br/>    fixed. [GL #5506] [GL !11128]<br/><br/>    Fix shutdown INSIST in dns_dispatchmgr_getblackhole. f0aaaef166c<br/><br/>    Previously, named could trigger an assertion in<br/>    dns_dispatchmgr_getblackhole while shutting down. This has been<br/>    fixed. [GL #5525] [GL !11162]<br/><br/>    Dnssec-verify now uses exit code 1 when failing due to illegal<br/>    options. 6ead0aa4a2b<br/><br/>    Previously, dnssec-verify exited with code 0 if the options<br/>    could not be parsed. This has been fixed. [GL #5574] [GL !11129]<br/><br/>    Prevent assertion failures of dig when server is specified<br/>    before the -b option. deada63e2b2<br/><br/>    Previously, dig could exit with an assertion failure when the<br/>    server was specified before the dig -b option. This has been<br/>    fixed. [GL #5609] [GL !11204]<br/><br/>    Skip unsupported algorithms when looking for signing key.<br/>    c346fe88a1b<br/><br/>    A mix of supported and unsupported DNSSEC algorithms in the<br/>    same zone could have caused validation failures. Ignore the<br/>    DNSSEC keys with unsupported algorithm when looking for the<br/>    signing keys. [GL #5622] [GL !11210]<br/><br/>    Fix configuration bugs involving global defaults. a85d6fb581c<br/><br/>    The configuration code for the max-cache-size, dnssec-validation,<br/>    and response-padding options were unnecessarily complicated,<br/>    and in the case of max-cache-size, buggy. These have been fixed.<br/>    The optionmaps variable in configure_view() is no longer needed<br/>    and has been removed. [GL !11172]<br/><br/>    Skip buffer allocations if not logging. 4f601175bd0<br/><br/>    Currently, during IXFR we allocate a 2KB buffer for IXFR change<br/>    logging regardless of the log level. This commit introduces an<br/>    early check on the log level in dns_diff_print to avoid this.<br/><br/>    Results in a speedup from 28% in the test case from issue #5442.<br/>    [GL !11192]<br/><br/>BIND 9.20.15#<br/><br/>Security Fixes#<br/><br/>    [CVE-2025-8677] DNSSEC validation fails if matching but invalid<br/>    DNSKEY is found. 0d676bf9f23<br/><br/>    Previously, if a matching but cryptographically invalid key<br/>    was encountered during DNSSEC validation, the key was skipped<br/>    and not counted towards validation failures. named now treats<br/>    such DNSSEC keys as hard failures and the DNSSEC validation<br/>    fails immediately, instead of continuing with the next DNSKEYs<br/>    in the RRset.<br/><br/>    ISC would like to thank Zuyao Xu and Xiang Li from the All-in-One<br/>    Security and Privacy Laboratory at Nankai University for bringing<br/>    this vulnerability to our attention. [GL #5343]<br/><br/>    [CVE-2025-40778] Address various spoofing attacks. 23de94fd236<br/><br/>    Previously, several issues could be exploited to poison a DNS<br/>    cache with spoofed records for zones which were not DNSSEC-signed<br/>    or if the resolver was configured to not do DNSSEC validation.<br/>    These issues were assigned CVE-2025-40778 and have now been<br/>    fixed.<br/><br/>    As an additional layer of protection, named no longer accepts<br/>    DNAME records or extraneous NS records in the AUTHORITY section<br/>    unless these are received via spoofing-resistant transport<br/>    (TCP, UDP with DNS cookies, TSIG, or SIG(0)).<br/><br/>    ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu,<br/>    and Haixin Duan from Tsinghua University for bringing this<br/>    vulnerability to our attention. [GL #5414]<br/><br/>    [CVE-2025-40780] Cache-poisoning due to weak pseudo-random<br/>    number generator. 34af35c2df8<br/><br/>    It was discovered during research for an upcoming academic<br/>    paper that a xoshiro128** internal state can be recovered by<br/>    an external 3rd party, allowing the prediction of UDP ports<br/>    and DNS IDs in outgoing queries. This could lead to an attacker<br/>    spoofing the DNS answers with great efficiency and poisoning<br/>    the DNS cache.<br/><br/>    The internal random generator has been changed to a cryptographically<br/>    secure pseudo-random generator.<br/><br/>    ISC would like to thank Prof. Amit Klein and Omer Ben Simhon<br/>    from Hebrew University of Jerusalem for bringing this vulnerability<br/>    to our attention. [GL #5484]<br/><br/>New Features#<br/><br/>    Add dnssec-policy keys configuration check to named-checkconf.<br/>    1f5a0405f72<br/><br/>    A new option -k is added to named-checkconf that allows checking<br/>    the dnssec-policy keys configuration against the configured<br/>    key stores. If the found key files are not in sync with the<br/>    given dnssec-policy, the check will fail.<br/><br/>    This is useful to run before migrating to dnssec-policy. [GL<br/>    #5486] [GL !11011]<br/><br/>Feature Changes#<br/><br/>    Minor refactor of dst code. c6acbaa020b<br/><br/>    Convert the defines to enums. Initialize the tags more explicitly<br/>    and less ugly. [GL !11038]<br/><br/>Bug Fixes#<br/><br/>    Use signer name when disabling DNSSEC algorithms. 986816baa74<br/><br/>    disable-algorithms could cause DNSSEC validation failures when<br/>    the parent zone was signed with the algorithms that were being<br/>    disabled for the child zone. This has been fixed; disable-algorithms<br/>    now works on a whole-of-zone basis.<br/><br/>    If the zone's name is at or below the disable-algorithms name<br/>    the algorithm is disabled for that zone, using deepest match<br/>    when there are multiple disable-algorithms clauses. [GL #5165]<br/>    [GL !11014]<br/><br/>    Rndc sign during ZSK rollover will now replace signatures.<br/>    d2f551140cd<br/><br/>    When performing a ZSK rollover, if the new DNSKEY is omnipresent,<br/>    the rndc sign command now signs the zone completely with the<br/>    successor key, replacing all zone signatures from the predecessor<br/>    key with new ones. [GL #5483] [GL !11017]<br/><br/>    Missing DNSSEC information when CD bit is set in query.<br/>    968a6be41fb<br/><br/>    The RRSIGs for glue records were not being cached correctly<br/>    for CD=1 queries. This has been fixed. [GL #5502] [GL !10956]<br/><br/>    Preserve cache when reload fails and reload the server again.<br/>    975aeda10b4<br/><br/>    Fixes an issue where failing to reconfigure/reload the server<br/>    would prevent to preserved the views caches on the subsequent<br/>    server reconfiguration/reload. [GL #5523] [GL !10988]<br/><br/>    Check plugin config before registering. e2260b80702<br/><br/>    In named_config_parsefile(), when checking the validity of<br/>    named.conf, the checking of plugin correctness was deliberately<br/>    postponed until the plugin is loaded and registered. However,<br/>    the checking was never actually done: the plugin_register()<br/>    implementation was called, but plugin_check() was not.<br/><br/>    ns_plugin_register() (used by named) now calls the check function<br/>    before the register function, and aborts if either one fails.<br/>    ns_plugin_check() (used by named-checkconf) calls only the<br/>    check function. [GL !11032]<br/><br/>BIND 9.20.14#<br/><br/>Note<br/><br/>The BIND 9.20.14 release was withdrawn after the discovery of a<br/>regression in a security fix in it during pre-release testing.<br/>BIND 9.20.13# New Features#<br/><br/>    Add manual mode configuration option to dnsec-policy. 1e435b107f<br/><br/>    Add a new option manual-mode to dnssec-policy. The intended<br/>    use is that if it is enabled, it will not automatically move<br/>    to the next state transition, but instead the transition is<br/>    logged. Only after manual confirmation with rndc dnssec -step<br/>    the transition is made. [GL #4606] [GL !10880]<br/><br/>    Add a new 'servfail-until-ready' configuration option for RPZ.<br/>    925af17d21<br/><br/>    By default, when named is started it may start answering to<br/>    queries before the response policy zones are completely loaded<br/>    and processed. This new feature gives an option to the users<br/>    to tell named that incoming requests should result in SERVFAIL<br/>    answer until all the response policy zones are processed and<br/>    ready. Note that if one or more response policy zones fail to<br/>    load, named starts responding to queries according to those<br/>    zones that did load.<br/><br/>    Note, that enabling this option has no effect when a DNS Response<br/>    Policy Service (DNSRPS) interface is used. [GL #5222] [GL<br/>    !10889]<br/><br/>    Support for parsing HHIT and BRID records has been added.<br/>    1f051af24d<br/><br/>    [GL #5444] [GL !10932]<br/><br/>Removed Features#<br/><br/>    Deprecate the "tkey-gssapi-credential" statement. b239a70cac<br/><br/>    The tkey-gssapi-keytab statement allows GSS-TSIG to be set up<br/>    in a simpler and more reliable way than using the<br/>    tkey-gssapi-credential statement and setting environment<br/>    variables (e.g. KRB5_KTNAME). Therefore, the tkey-gssapi-credential<br/>    statement has been deprecated; tkey-gssapi-keytab should be<br/>    used instead.<br/><br/>    For configurations currently using a combination of both<br/>    tkey-gssapi-keytab and tkey-gssapi-credential, the latter should<br/>    be dropped and the keytab pointed to by tkey-gssapi-keytab<br/>    should now only contain the credential previously specified by<br/>    tkey-gssapi-credential. [GL #4204] [GL !10924]<br/><br/>    Obsolete the "tkey-domain" statement. 9352ae65d7<br/><br/>    Mark the tkey-domain statement as obsolete, since it has not<br/>    had any effect on server behavior since support for TKEY Mode<br/>    2 (Diffie-Hellman) was removed (in BIND 9.20.0). [GL #4204]<br/>    [GL !10926]<br/><br/>Feature Changes#<br/><br/>    Update clang-format style with options added in newer versions.<br/>    0c2c477c31<br/><br/>    Add and apply InsertBraces statement to add missing curly braces<br/>    around one-line statements and use ControlStatementsExceptControlMacros<br/>    for SpaceBeforeParens to remove space between foreach macro<br/>    and the brace, e.g. FOREACH (x) { becomes FOREACH(x) {. [GL<br/>    !10864]<br/><br/>Bug Fixes#<br/><br/>    Ensure file descriptors 0-2 are in use. 35dee6eb90<br/><br/>    libuv expect file descriptors &lt;= STDERR_FILENO are in use.<br/>    otherwise, it may abort when closing a file descriptor it<br/>    opened. [GL #5226] [GL !10908]<br/><br/>    Prevent spurious SERVFAILs for certain 0-TTL resource records.<br/>    6b266b222c<br/><br/>    Under certain circumstances, BIND 9 can return SERVFAIL when<br/>    updating existing entries in the cache with new NS, A, AAAA,<br/>    or DS records with 0-TTL. [GL #5294] [GL !10898]<br/><br/>    Use DNS_RDATACOMMON_INIT to hide branch differences. a64df9729b<br/><br/>    Initialization of the common members of rdata type structures<br/>    varies across branches. Standardize it by using the<br/>    DNS_RDATACOMMON_INIT macro for all types, so that new types<br/>    are more likely to use it, and hence backport more cleanly.<br/>    [GL #5467] [GL !10834]<br/><br/>    RPZ canonical warning displays zone entry incorrectly. d833676515<br/><br/>    When an IPv6 rpz prefix entry is entered incorrectly the log<br/>    message was just displaying the prefix rather than the full<br/>    entry. This has been corrected. [GL #5491] [GL !10930]<br/><br/>    Fix a catalog zone issue when having an unset 'default-primaries'<br/>    configuration clause. 293e75af28<br/><br/>    A catalog zone with an unset default-primaries clause could<br/>    cause an unexpected termination of the named process after two<br/>    reloading or reconfiguration commands. This has been fixed.<br/>    [GL #5494] [GL !10905]<br/><br/>    Add and use __attribute__((nonnull)) in dnssec-signzone.c.<br/>    a8eed36d3e<br/><br/>    Clang 20 was spuriously warning about the possibility of passing<br/>    a NULL file pointer to fprintf(), which uses the 'nonnull'<br/>    attribute. To silence the warning, the functions calling<br/>    fprintf() have been marked with the same attribute to assure<br/>    that NULL can't be passed to them in the first place.<br/><br/>    Close #5487 [GL !10913]<br/><br/>    RPZ 'servfail-until-ready': skip updating SERVFAIL cache.<br/>    af2fb26325<br/><br/>    In order to not pollute the SERVFAIL cache with the configured<br/>    SERVFAIL answers while RPZ is loading, set the NS_CLIENTATTR_NOSETFC<br/>    attribute for the client. [GL !10940]<br/><br/>BIND 9.20.12#<br/><br/>New Features#<br/><br/>    Support for parsing the DSYNC record has been added. f440fe712d<br/><br/>    [GL #5440] [GL !10820]<br/><br/>Feature Changes#<br/><br/>    Adaptive memory allocation strategy for qp-tries. 9a046cbed5<br/><br/>    qp-tries allocate their nodes (twigs) in chunks to reduce<br/>    allocator pressure and improve memory locality. The choice of<br/>    chunk size presents a tradeoff: larger chunks benefit qp-tries<br/>    with many values (as seen in large zones and resolvers) but<br/>    waste memory in smaller use cases.<br/><br/>    Previously, our fixed chunk size of 2^10 twigs meant that even<br/>    an empty qp-trie would consume 12KB of memory, while reducing<br/>    this size would negatively impact resolver performance.<br/><br/>    This MR implements an adaptive chunking strategy that tracks<br/>    the size of the most recently allocated chunk and doubles the<br/>    chunk size for each new allocation until reaching a predefined<br/>    maximum.<br/><br/>    This approach effectively balances memory efficiency for small<br/>    tries while maintaining the performance benefits of larger<br/>    chunk sizes for bigger data structures. [GL #5445] [GL !10804]<br/><br/>    Add deprecation warnings for RSASHA1, RSASHA1-NSEC3SHA1 and DS<br/>    digest type 1. 5aefaa4b97<br/><br/>    RSASHA1 and RSASHA1-NSEC-SHA1 DNSKEY algorithms have been<br/>    deprecated by the IETF and should no longer be used for DNSSEC.<br/>    DS digest type 1 (SHA1) has also been deprecated. Validators<br/>    are now expected to treat these algorithms and digest as unknown,<br/>    resulting in some zones being treated as insecure when they<br/>    were previously treated as secure. Warnings have been added to<br/>    named and tools when these algorithms and this digest are being<br/>    used for signing.<br/><br/>    Zones signed with RSASHA1 or RSASHA1-NSEC-SHA1 should be migrated<br/>    to a different DNSKEY algorithm.<br/><br/>    Zones with DS or CDS records with digest type 1 (SHA1) should<br/>    be updated to use a different digest type (e.g. SHA256) and<br/>    the digest type 1 records should be removed.<br/><br/>    Related to #5358 [GL !10738]<br/><br/>Bug Fixes#<br/><br/>    Stale RRsets in a CNAME chain were not always refreshed.<br/>    ed37c7825e<br/><br/>    With serve-stale enabled, a CNAME chain that contains a stale<br/>    RRset, the refresh query doesn't always properly refresh the<br/>    stale RRsets. This has been fixed. [GL #5243] [GL !10767]<br/><br/>    Add RPZ extended DNS error for zones with a CNAME override<br/>    policy configured. 39ad2016c1<br/><br/>    When the zone is configured with a CNAME override policy, or<br/>    the response policy zone contains a wildcard CNAME, the extended<br/>    DNS error code was not added. This has been fixed. [GL #5342]<br/>    [GL !10819]<br/><br/>    Fix a possible crash when adding a zone while recursing.<br/>    7a3ec8dd94<br/><br/>    A query for a zone that was not yet loaded may yield an unexpected<br/>    result such as a CNAME or DNAME, triggering an assertion failure.<br/>    This has been fixed. [GL #5357] [GL !10718]<br/><br/>    Fix dig issues. 8c50819aa8<br/><br/>    When used with the +keepopen option with a TCP connection,<br/>    iscman:dig could terminate unexpectedly in rare situations.<br/>    Additionally, iscman:dig could hang and fail to shutdown properly<br/>    when interrupted during a query. These have been fixed. [GL<br/>    #5381] [GL !10727]<br/><br/>    Log dropped or slipped responses in the query-errors category.<br/>    47470b586d<br/><br/>    Responses which were dropped or slipped because of RRL (Response<br/>    Rate Limiting) were logged in the rate-limit category instead<br/>    of the query-errors category, as documented in ARM. This has<br/>    been fixed. [GL #5388] [GL !10725]<br/><br/>    Separate out adbname type flags. fc689c6525<br/><br/>    There are three adbname flags that are used to identify different<br/>    types of adbname lookups when hashing rather than using multiple<br/>    hash tables. Separate these to their own structure element as<br/>    these need to be able to be read without locking the adbname<br/>    structure. [GL #5404] [GL !10695]<br/><br/>    Synth-from-dnssec was not working in some scenarios. bc54f059e0<br/><br/>    Aggressive use of DNSSEC-Validated cache with NSEC was not<br/>    working in scenarios when no parent NSEC was not in cache. This<br/>    has been fixed. [GL #5422] [GL !10754]<br/><br/>    Clean enough memory when adding new ADB names/entries under<br/>    memory pressure. b7e7923daa<br/><br/>    The ADB memory cleaning is opportunistic even when we are under<br/>    memory pressure (in the overmem condition). Split the opportunistic<br/>    LRU cleaning and overmem cleaning and make the overmem cleaning<br/>    always cleanup double of the newly allocated adbname/adbentry<br/>    to ensure we never allocate more memory than the assigned limit.<br/>    [GL !10707]<br/><br/>    Prevent spurious validation failures. 3b98c7cc9d<br/><br/>    Under rare circumstances, validation could fail if multiple<br/>    clients simultaneously iterated the same set of signatures.<br/><br/>    References #3014 [GL !10815]<br/><br/>    Rename variable called 'free' to prevent the clash with free()<br/>    7f25d92c5d<br/><br/>    [GL !10757]</title>
    <description>/src/external/mpl/bind/dist/bin/tests/system/staticstub/ns1/named.conf.j2 - 1.1.1.1</description>
    <pubDate>Thu Jan 29 18:19:42 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>
</channel></rss>

