<?xml version="1.0"?>
<?xml-stylesheet type="text/xsl" href="/rss.xsl.xml"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
    <title>Changes in dyndb.c</title>
    <link>http://nxr.netbsd.org/rss/src/external/mpl/bind/dist/lib/dns/dyndb.c</link>
    <description></description>
    <language>en</language>
    <copyright>Copyright 2005</copyright>
    <generator>Java</generator>
    
<item>
    <title>Merge changes between bind-9.20.11 and 9.20.18</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.13</description>
    <pubDate>Thu Jan 29 18:37:49 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge conflicts between 9.18.30 and 9.20.4</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.12</description>
    <pubDate>Sun Jan 26 16:25:22 UTC 2025</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.11.2;<br/>merge conflicts between 9.16.42 and 9.18.24</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.11</description>
    <pubDate>Wed Feb 21 22:52:06 UTC 2024</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.10.2;<br/>Merge conflicts between 9.16.20 and 9.16.33</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.10</description>
    <pubDate>Fri Sep 23 00:15:29 UTC 2022</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge changes between bind 9.16.15 and 9.16.20 and restore dns client APIs<br/>needed by dhcpd.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.9</description>
    <pubDate>Thu Aug 19 11:50:17 UTC 2021</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>bind: remove unnecessary CONSTCOND comments<br/><br/>Since lint1/tree.c 1.202 from 2021-01-31, lint no longer needs the<br/>/*CONSTCOND*/ for do-while-0 "loops".<br/><br/>No functional change.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.8</description>
    <pubDate>Mon Apr 05 11:27:02 UTC 2021</pubDate>
    <dc:creator>rillig</dc:creator>
</item>

<item>
    <title>merge conflicts, adjust build.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.7</description>
    <pubDate>Fri Feb 19 16:42:16 UTC 2021</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge conflicts, bump libraries, adjust the build.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.6</description>
    <pubDate>Mon Aug 03 17:23:41 UTC 2020</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Merge conflicts</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.5</description>
    <pubDate>Sun May 24 19:46:22 UTC 2020</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.4.2;  1.4.4;<br/>merge conflicts</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.4</description>
    <pubDate>Sun Feb 24 20:01:30 UTC 2019</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>merge conflicts, bump major, fix build.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.3</description>
    <pubDate>Wed Jan 09 16:55:11 UTC 2019</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.2.2;<br/>merge conflicts, add build glue.</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.2</description>
    <pubDate>Sun Aug 12 13:02:35 UTC 2018</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>branches:  1.1.1;<br/>Initial revision</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1</description>
    <pubDate>Sun Aug 12 00:08:14 UTC 2018</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.20.18 (previous was 9.20.11)<br/><br/><br/>BIND 9.20.18#<br/><br/>Security Fixes#<br/><br/>    [CVE-2025-13878] Fix incorrect length checks for BRID and HHIT<br/>    records. d4c0d61701<br/><br/>    Malformed BRID and HHIT records could trigger an assertion<br/>    failure. This has been fixed.<br/><br/>    ISC would like to thank Vlatko Kosturjak from Marlink Cyber<br/>    for bringing this vulnerability to our attention. [GL #5616]<br/><br/>Feature Changes#<br/><br/>    Support compilation with cmocka 2.0.0+ bb9234c6ce<br/><br/>    The assert_in_range() function was deprecated in favor of<br/>    assert_int_in_range() and assert_uint_in_range(). Add compatibility<br/>    shims for cmocka&lt;2.0.0 and use the new functions. [GL #5699]<br/>    [GL !11437]<br/><br/>    Add more information to the rndc recursing output about fetches.<br/>    9766feb4df<br/><br/>    This adds more information about the active fetches for debugging<br/>    and diagnostic purposes. [GL !11358]<br/><br/>Bug Fixes#<br/><br/>    Make key rollovers more robust. 7a70d05b5d<br/><br/>    A manual rollover when the zone is in an invalid DNSSEC state<br/>    causes predecessor keys to be removed too quickly. Additional<br/>    safeguards to prevent this have been added. DNSSEC records will<br/>    not be removed from the zone until the underlying state machine<br/>    has moved back into a valid DNSSEC state. [GL #5458] [GL !11329]<br/><br/>    Fix a catalog zones issue when a member zone could fail to<br/>    load. 95cbc2c327<br/><br/>    A catalog zone's member zone could fail to load in some rare<br/>    cases, when the internally generated zone configuration string<br/>    was exceeding 512 bytes. That condition only was not enough<br/>    for the issue to arise, but it was a necessary condition. This<br/>    could happen, for example, if the catalog zone's default primary<br/>    servers list contained a large number of items. This has been<br/>    fixed. [GL #5658] [GL !11349]<br/><br/>    Allow glue in delegations with QTYPE=ANY. 441158ac18<br/><br/>    When a query for type ANY triggered a delegation response, all<br/>    additional data was omitted from the response, including<br/>    mandatory glue. This has been corrected. [GL #5659] [GL !11283]<br/><br/>    Adding NSEC3 opt-out records could leave invalid records in<br/>    chain. 1b90296e1f<br/><br/>    When creating an NSEC3 opt-out chain, a node in the chain could<br/>    be removed too soon, causing the previous NSEC3 being unable<br/>    to be found, resulting in invalid NSEC3 records to be left in<br/>    the zone. This has been fixed. [GL #5671] [GL !11340]<br/><br/>    Fix slow speed of NSEC3 optout large delegation zone signing.<br/>    88f915b77b<br/><br/>    BIND 9.20 takes much more time signing a large delegation zone<br/>    with NSEC3 optout compared to version 9.18. This has been<br/>    restored. [GL #5672] [GL !11362]<br/><br/>    Reconfigure NSEC3 opt-out zone to NSEC causes zone to be invalid.<br/>    1d0e19c612<br/><br/>    A zone that is signed with NSEC3, opt-out enabled, and then<br/>    reconfigured to use NSEC, causes the zone to be published with<br/>    missing NSEC records. This has been fixed. [GL #5679] [GL<br/>    !11401]<br/><br/>    Fix a possible catalog zone issue during reconfiguration.<br/>    911b45b2b3<br/><br/>    The named process could terminate unexpectedly during<br/>    reconfiguration when a catalog zone update was taking place at<br/>    the same time. This has been fixed. [GL !11386]<br/><br/>    Fix the charts in the statistics channel. 7c7b01dd65<br/><br/>    The charts in the statistics channel could sometimes fail to<br/>    render in the browser, and were completely disabled for<br/>    Mozilla-based browsers for historical reasons. This has been<br/>    fixed. [GL !11364]<br/><br/>BIND 9.20.17#<br/><br/>New Features#<br/><br/>    Add spatch to detect implicit bool/int/result cast. 02be363d1f<br/><br/>    Detection of implicit cast from a boolean into an int, or an<br/>    isc_result_t into a boolean (either in an assignement or return<br/>    position).<br/><br/>    If such pattern is found, a warning comment is added into the<br/>    code (and the CI will fails) so the error can be spotted and<br/>    manually fixed. [GL !11237]<br/><br/>Feature Changes#<br/><br/>    Use atomics for CMM_{LOAD,STORE}_SHARED with ThreadSanitizer.<br/>    94fa721705<br/><br/>    Upstream has removed the atomics implementation of CMM_LOAD_SHARED<br/>    and CMM_STORE_SHARED as these can be used also with non-stdatomics<br/>    types. As we only use the CMM api with stdatomics types, we<br/>    can restore the previous behaviour to prevent ThreadSanitizer<br/>    warnings. [GL #5660] [GL !11290]<br/><br/>    Provide more information when the memory allocation fails.<br/>    6749725610<br/><br/>    Provide more information about the failure when the memory<br/>    allocation fails. [GL !11304]<br/><br/>    Reduce the number of outgoing queries. 457b470e96<br/><br/>    Reduces the number of outgoing queries when resolving the<br/>    nameservers for delegation points. This helps the DNS resolver<br/>    with cold cache resolve client queries with complex delegation<br/>    chains and redirections. [GL !11258]<br/><br/>Bug Fixes#<br/><br/>    Fix the spurious timeouts while resolving names. d96cf874fb<br/><br/>    Sometimes the loops in the resolving (e.g. to resolve or validate<br/>    ns1.example.com we need to resolve ns1.example.com) were not<br/>    properly detected leading to spurious 10 seconds delay. This<br/>    has been fixed and such loops are properly detected. [GL #3033],<br/>    #5578 [GL !11298]<br/><br/>    Fix bug where zone switches from NSEC3 to NSEC after retransfer.<br/>    3b40ffbf83<br/><br/>    When a zone is re-transferred, but the zone journal on an<br/>    inline-signing secondary is out of sync, the zone could fall<br/>    back to using NSEC records instead of NSEC3. This has been<br/>    fixed. [GL #5527] [GL !11274]<br/><br/>    Attach socket before async streamdns_resume_processing. bb9451c73f<br/><br/>    Call to streamdns_resume_processing is asynchronous but the<br/>    socket passed as argument is not attached when scheduling the<br/>    call.<br/><br/>    While there is no reproducible way (so far) to make the socket<br/>    reference number down to 0 before streamdns_resume_processing<br/>    is called, attach the socket before scheduling the call. This<br/>    guard against an hypothetic case where, for some reasons, the<br/>    socket refcount would reach 0, and be freed from memory when<br/>    streamdns_resume_processing is called. [GL #5620] [GL !11260]<br/><br/>    AMTRELAY type 0 presentation format handling was wrong. adf104a063<br/><br/>    RFC 8777 specifies a placeholder value of "." for the gateway<br/>    field when the gateway type is 0 (no gateway). This was not<br/>    being checked for nor emitted when displaying the record. This<br/>    has been corrected.<br/><br/>    Instances of this record will need the placeholder period added<br/>    to them when upgrading. [GL #5639] [GL !11255]<br/><br/>    Fix parsing bug in remote-servers with key or tls. d9400c5967<br/><br/>    The remote-servers clause enable the following pattern using<br/>    a named server-list:<br/><br/>    remote-servers a { 1.2.3.4; ... }; remote-servers b { a key<br/>    foo; };<br/><br/>    However, such configuration was wrongly rejected, with an<br/>    "unexpected token 'foo'" error. Such configuration is now<br/>    accepted. [GL #5646] [GL !11300]<br/><br/>    Fix TLS contexts cache object usage bug in the resolver.<br/>    13adf94006<br/><br/>    named could terminate unexpectedly when reconfiguring or<br/>    reloading, and if client-side TLS transport was in use (for<br/>    example, when forwarding queries to a DoT server). This has<br/>    been fixed. [GL #5653] [GL !11299]<br/><br/>    Fix unitiailized pointer check on getipandkeylist. 5ed0cf091b<br/><br/>    Function named_config_getipandkeylist could, in case of error<br/>    in the early code attempting to get the port or tls-port, make<br/>    a pointer check on a non-initialized value. This is now fixed.<br/>    [GL !11306]<br/><br/>    Standardize CHECK and RETERR macros. ef714e91ac<br/><br/>    previously, there were over 40 separate definitions of CHECK<br/>    macros, of which most used "goto cleanup", and the rest "goto<br/>    failure" or "goto out". there were another 10 definitions of<br/>    RETERR, of which most were identical to CHECK, but some simply<br/>    returned a result code instead of jumping to a cleanup label.<br/><br/>    this has now been standardized throughout the code base: RETERR<br/>    is for returning an error code in the case of an error, and<br/>    CHECK is for jumping to a cleanup tag, which is now always<br/>    called "cleanup". both macros are defined in isc/util.h. [GL<br/>    !11069]<br/><br/>    Adding NSEC3 opt-out records could leave invalid records in<br/>    chain. 1d83a8ad46<br/><br/>    When creating an NSEC3 opt-out chain, a node in the chain could<br/>    be removed too soon, causing the previous NSEC3 being unable<br/>    to be found, resulting in invalid NSEC3 records to be left in<br/>    the zone. This has been fixed.<br/><br/>    Closes [#5671](#5671)<br/><br/>BIND 9.20.16#<br/><br/>Feature Changes#<br/><br/>    Fix assertion failure from arc4random_uniform with invalid<br/>    limit. 1040282de7e<br/><br/>    When the arc4random_uniform() is called on NetBSD with upper_bound<br/>    that makes no sense statistically (0 or 1), the call crashes<br/>    the calling program. Fix this by returning 0 when upper bound<br/>    is &lt; 2 as does Linux, FreeBSD and NetBSD. (Hint: System CSPRNG<br/>    should never crash.) [GL #5596] [GL !11151]<br/><br/>Bug Fixes#<br/><br/>    Fix dnssec-keygen key collision checking for KEY rrtype keys.<br/>    ac8b23b80bf<br/><br/>    The dnssec-keygen utility program failed to detect possible<br/>    Key ID collisions with the existing keys generated using the<br/>    non-default -T KEY option (e.g. for SIG(0)). This has been<br/>    fixed. [GL #5506] [GL !11128]<br/><br/>    Fix shutdown INSIST in dns_dispatchmgr_getblackhole. f0aaaef166c<br/><br/>    Previously, named could trigger an assertion in<br/>    dns_dispatchmgr_getblackhole while shutting down. This has been<br/>    fixed. [GL #5525] [GL !11162]<br/><br/>    Dnssec-verify now uses exit code 1 when failing due to illegal<br/>    options. 6ead0aa4a2b<br/><br/>    Previously, dnssec-verify exited with code 0 if the options<br/>    could not be parsed. This has been fixed. [GL #5574] [GL !11129]<br/><br/>    Prevent assertion failures of dig when server is specified<br/>    before the -b option. deada63e2b2<br/><br/>    Previously, dig could exit with an assertion failure when the<br/>    server was specified before the dig -b option. This has been<br/>    fixed. [GL #5609] [GL !11204]<br/><br/>    Skip unsupported algorithms when looking for signing key.<br/>    c346fe88a1b<br/><br/>    A mix of supported and unsupported DNSSEC algorithms in the<br/>    same zone could have caused validation failures. Ignore the<br/>    DNSSEC keys with unsupported algorithm when looking for the<br/>    signing keys. [GL #5622] [GL !11210]<br/><br/>    Fix configuration bugs involving global defaults. a85d6fb581c<br/><br/>    The configuration code for the max-cache-size, dnssec-validation,<br/>    and response-padding options were unnecessarily complicated,<br/>    and in the case of max-cache-size, buggy. These have been fixed.<br/>    The optionmaps variable in configure_view() is no longer needed<br/>    and has been removed. [GL !11172]<br/><br/>    Skip buffer allocations if not logging. 4f601175bd0<br/><br/>    Currently, during IXFR we allocate a 2KB buffer for IXFR change<br/>    logging regardless of the log level. This commit introduces an<br/>    early check on the log level in dns_diff_print to avoid this.<br/><br/>    Results in a speedup from 28% in the test case from issue #5442.<br/>    [GL !11192]<br/><br/>BIND 9.20.15#<br/><br/>Security Fixes#<br/><br/>    [CVE-2025-8677] DNSSEC validation fails if matching but invalid<br/>    DNSKEY is found. 0d676bf9f23<br/><br/>    Previously, if a matching but cryptographically invalid key<br/>    was encountered during DNSSEC validation, the key was skipped<br/>    and not counted towards validation failures. named now treats<br/>    such DNSSEC keys as hard failures and the DNSSEC validation<br/>    fails immediately, instead of continuing with the next DNSKEYs<br/>    in the RRset.<br/><br/>    ISC would like to thank Zuyao Xu and Xiang Li from the All-in-One<br/>    Security and Privacy Laboratory at Nankai University for bringing<br/>    this vulnerability to our attention. [GL #5343]<br/><br/>    [CVE-2025-40778] Address various spoofing attacks. 23de94fd236<br/><br/>    Previously, several issues could be exploited to poison a DNS<br/>    cache with spoofed records for zones which were not DNSSEC-signed<br/>    or if the resolver was configured to not do DNSSEC validation.<br/>    These issues were assigned CVE-2025-40778 and have now been<br/>    fixed.<br/><br/>    As an additional layer of protection, named no longer accepts<br/>    DNAME records or extraneous NS records in the AUTHORITY section<br/>    unless these are received via spoofing-resistant transport<br/>    (TCP, UDP with DNS cookies, TSIG, or SIG(0)).<br/><br/>    ISC would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu,<br/>    and Haixin Duan from Tsinghua University for bringing this<br/>    vulnerability to our attention. [GL #5414]<br/><br/>    [CVE-2025-40780] Cache-poisoning due to weak pseudo-random<br/>    number generator. 34af35c2df8<br/><br/>    It was discovered during research for an upcoming academic<br/>    paper that a xoshiro128** internal state can be recovered by<br/>    an external 3rd party, allowing the prediction of UDP ports<br/>    and DNS IDs in outgoing queries. This could lead to an attacker<br/>    spoofing the DNS answers with great efficiency and poisoning<br/>    the DNS cache.<br/><br/>    The internal random generator has been changed to a cryptographically<br/>    secure pseudo-random generator.<br/><br/>    ISC would like to thank Prof. Amit Klein and Omer Ben Simhon<br/>    from Hebrew University of Jerusalem for bringing this vulnerability<br/>    to our attention. [GL #5484]<br/><br/>New Features#<br/><br/>    Add dnssec-policy keys configuration check to named-checkconf.<br/>    1f5a0405f72<br/><br/>    A new option -k is added to named-checkconf that allows checking<br/>    the dnssec-policy keys configuration against the configured<br/>    key stores. If the found key files are not in sync with the<br/>    given dnssec-policy, the check will fail.<br/><br/>    This is useful to run before migrating to dnssec-policy. [GL<br/>    #5486] [GL !11011]<br/><br/>Feature Changes#<br/><br/>    Minor refactor of dst code. c6acbaa020b<br/><br/>    Convert the defines to enums. Initialize the tags more explicitly<br/>    and less ugly. [GL !11038]<br/><br/>Bug Fixes#<br/><br/>    Use signer name when disabling DNSSEC algorithms. 986816baa74<br/><br/>    disable-algorithms could cause DNSSEC validation failures when<br/>    the parent zone was signed with the algorithms that were being<br/>    disabled for the child zone. This has been fixed; disable-algorithms<br/>    now works on a whole-of-zone basis.<br/><br/>    If the zone's name is at or below the disable-algorithms name<br/>    the algorithm is disabled for that zone, using deepest match<br/>    when there are multiple disable-algorithms clauses. [GL #5165]<br/>    [GL !11014]<br/><br/>    Rndc sign during ZSK rollover will now replace signatures.<br/>    d2f551140cd<br/><br/>    When performing a ZSK rollover, if the new DNSKEY is omnipresent,<br/>    the rndc sign command now signs the zone completely with the<br/>    successor key, replacing all zone signatures from the predecessor<br/>    key with new ones. [GL #5483] [GL !11017]<br/><br/>    Missing DNSSEC information when CD bit is set in query.<br/>    968a6be41fb<br/><br/>    The RRSIGs for glue records were not being cached correctly<br/>    for CD=1 queries. This has been fixed. [GL #5502] [GL !10956]<br/><br/>    Preserve cache when reload fails and reload the server again.<br/>    975aeda10b4<br/><br/>    Fixes an issue where failing to reconfigure/reload the server<br/>    would prevent to preserved the views caches on the subsequent<br/>    server reconfiguration/reload. [GL #5523] [GL !10988]<br/><br/>    Check plugin config before registering. e2260b80702<br/><br/>    In named_config_parsefile(), when checking the validity of<br/>    named.conf, the checking of plugin correctness was deliberately<br/>    postponed until the plugin is loaded and registered. However,<br/>    the checking was never actually done: the plugin_register()<br/>    implementation was called, but plugin_check() was not.<br/><br/>    ns_plugin_register() (used by named) now calls the check function<br/>    before the register function, and aborts if either one fails.<br/>    ns_plugin_check() (used by named-checkconf) calls only the<br/>    check function. [GL !11032]<br/><br/>BIND 9.20.14#<br/><br/>Note<br/><br/>The BIND 9.20.14 release was withdrawn after the discovery of a<br/>regression in a security fix in it during pre-release testing.<br/>BIND 9.20.13# New Features#<br/><br/>    Add manual mode configuration option to dnsec-policy. 1e435b107f<br/><br/>    Add a new option manual-mode to dnssec-policy. The intended<br/>    use is that if it is enabled, it will not automatically move<br/>    to the next state transition, but instead the transition is<br/>    logged. Only after manual confirmation with rndc dnssec -step<br/>    the transition is made. [GL #4606] [GL !10880]<br/><br/>    Add a new 'servfail-until-ready' configuration option for RPZ.<br/>    925af17d21<br/><br/>    By default, when named is started it may start answering to<br/>    queries before the response policy zones are completely loaded<br/>    and processed. This new feature gives an option to the users<br/>    to tell named that incoming requests should result in SERVFAIL<br/>    answer until all the response policy zones are processed and<br/>    ready. Note that if one or more response policy zones fail to<br/>    load, named starts responding to queries according to those<br/>    zones that did load.<br/><br/>    Note, that enabling this option has no effect when a DNS Response<br/>    Policy Service (DNSRPS) interface is used. [GL #5222] [GL<br/>    !10889]<br/><br/>    Support for parsing HHIT and BRID records has been added.<br/>    1f051af24d<br/><br/>    [GL #5444] [GL !10932]<br/><br/>Removed Features#<br/><br/>    Deprecate the "tkey-gssapi-credential" statement. b239a70cac<br/><br/>    The tkey-gssapi-keytab statement allows GSS-TSIG to be set up<br/>    in a simpler and more reliable way than using the<br/>    tkey-gssapi-credential statement and setting environment<br/>    variables (e.g. KRB5_KTNAME). Therefore, the tkey-gssapi-credential<br/>    statement has been deprecated; tkey-gssapi-keytab should be<br/>    used instead.<br/><br/>    For configurations currently using a combination of both<br/>    tkey-gssapi-keytab and tkey-gssapi-credential, the latter should<br/>    be dropped and the keytab pointed to by tkey-gssapi-keytab<br/>    should now only contain the credential previously specified by<br/>    tkey-gssapi-credential. [GL #4204] [GL !10924]<br/><br/>    Obsolete the "tkey-domain" statement. 9352ae65d7<br/><br/>    Mark the tkey-domain statement as obsolete, since it has not<br/>    had any effect on server behavior since support for TKEY Mode<br/>    2 (Diffie-Hellman) was removed (in BIND 9.20.0). [GL #4204]<br/>    [GL !10926]<br/><br/>Feature Changes#<br/><br/>    Update clang-format style with options added in newer versions.<br/>    0c2c477c31<br/><br/>    Add and apply InsertBraces statement to add missing curly braces<br/>    around one-line statements and use ControlStatementsExceptControlMacros<br/>    for SpaceBeforeParens to remove space between foreach macro<br/>    and the brace, e.g. FOREACH (x) { becomes FOREACH(x) {. [GL<br/>    !10864]<br/><br/>Bug Fixes#<br/><br/>    Ensure file descriptors 0-2 are in use. 35dee6eb90<br/><br/>    libuv expect file descriptors &lt;= STDERR_FILENO are in use.<br/>    otherwise, it may abort when closing a file descriptor it<br/>    opened. [GL #5226] [GL !10908]<br/><br/>    Prevent spurious SERVFAILs for certain 0-TTL resource records.<br/>    6b266b222c<br/><br/>    Under certain circumstances, BIND 9 can return SERVFAIL when<br/>    updating existing entries in the cache with new NS, A, AAAA,<br/>    or DS records with 0-TTL. [GL #5294] [GL !10898]<br/><br/>    Use DNS_RDATACOMMON_INIT to hide branch differences. a64df9729b<br/><br/>    Initialization of the common members of rdata type structures<br/>    varies across branches. Standardize it by using the<br/>    DNS_RDATACOMMON_INIT macro for all types, so that new types<br/>    are more likely to use it, and hence backport more cleanly.<br/>    [GL #5467] [GL !10834]<br/><br/>    RPZ canonical warning displays zone entry incorrectly. d833676515<br/><br/>    When an IPv6 rpz prefix entry is entered incorrectly the log<br/>    message was just displaying the prefix rather than the full<br/>    entry. This has been corrected. [GL #5491] [GL !10930]<br/><br/>    Fix a catalog zone issue when having an unset 'default-primaries'<br/>    configuration clause. 293e75af28<br/><br/>    A catalog zone with an unset default-primaries clause could<br/>    cause an unexpected termination of the named process after two<br/>    reloading or reconfiguration commands. This has been fixed.<br/>    [GL #5494] [GL !10905]<br/><br/>    Add and use __attribute__((nonnull)) in dnssec-signzone.c.<br/>    a8eed36d3e<br/><br/>    Clang 20 was spuriously warning about the possibility of passing<br/>    a NULL file pointer to fprintf(), which uses the 'nonnull'<br/>    attribute. To silence the warning, the functions calling<br/>    fprintf() have been marked with the same attribute to assure<br/>    that NULL can't be passed to them in the first place.<br/><br/>    Close #5487 [GL !10913]<br/><br/>    RPZ 'servfail-until-ready': skip updating SERVFAIL cache.<br/>    af2fb26325<br/><br/>    In order to not pollute the SERVFAIL cache with the configured<br/>    SERVFAIL answers while RPZ is loading, set the NS_CLIENTATTR_NOSETFC<br/>    attribute for the client. [GL !10940]<br/><br/>BIND 9.20.12#<br/><br/>New Features#<br/><br/>    Support for parsing the DSYNC record has been added. f440fe712d<br/><br/>    [GL #5440] [GL !10820]<br/><br/>Feature Changes#<br/><br/>    Adaptive memory allocation strategy for qp-tries. 9a046cbed5<br/><br/>    qp-tries allocate their nodes (twigs) in chunks to reduce<br/>    allocator pressure and improve memory locality. The choice of<br/>    chunk size presents a tradeoff: larger chunks benefit qp-tries<br/>    with many values (as seen in large zones and resolvers) but<br/>    waste memory in smaller use cases.<br/><br/>    Previously, our fixed chunk size of 2^10 twigs meant that even<br/>    an empty qp-trie would consume 12KB of memory, while reducing<br/>    this size would negatively impact resolver performance.<br/><br/>    This MR implements an adaptive chunking strategy that tracks<br/>    the size of the most recently allocated chunk and doubles the<br/>    chunk size for each new allocation until reaching a predefined<br/>    maximum.<br/><br/>    This approach effectively balances memory efficiency for small<br/>    tries while maintaining the performance benefits of larger<br/>    chunk sizes for bigger data structures. [GL #5445] [GL !10804]<br/><br/>    Add deprecation warnings for RSASHA1, RSASHA1-NSEC3SHA1 and DS<br/>    digest type 1. 5aefaa4b97<br/><br/>    RSASHA1 and RSASHA1-NSEC-SHA1 DNSKEY algorithms have been<br/>    deprecated by the IETF and should no longer be used for DNSSEC.<br/>    DS digest type 1 (SHA1) has also been deprecated. Validators<br/>    are now expected to treat these algorithms and digest as unknown,<br/>    resulting in some zones being treated as insecure when they<br/>    were previously treated as secure. Warnings have been added to<br/>    named and tools when these algorithms and this digest are being<br/>    used for signing.<br/><br/>    Zones signed with RSASHA1 or RSASHA1-NSEC-SHA1 should be migrated<br/>    to a different DNSKEY algorithm.<br/><br/>    Zones with DS or CDS records with digest type 1 (SHA1) should<br/>    be updated to use a different digest type (e.g. SHA256) and<br/>    the digest type 1 records should be removed.<br/><br/>    Related to #5358 [GL !10738]<br/><br/>Bug Fixes#<br/><br/>    Stale RRsets in a CNAME chain were not always refreshed.<br/>    ed37c7825e<br/><br/>    With serve-stale enabled, a CNAME chain that contains a stale<br/>    RRset, the refresh query doesn't always properly refresh the<br/>    stale RRsets. This has been fixed. [GL #5243] [GL !10767]<br/><br/>    Add RPZ extended DNS error for zones with a CNAME override<br/>    policy configured. 39ad2016c1<br/><br/>    When the zone is configured with a CNAME override policy, or<br/>    the response policy zone contains a wildcard CNAME, the extended<br/>    DNS error code was not added. This has been fixed. [GL #5342]<br/>    [GL !10819]<br/><br/>    Fix a possible crash when adding a zone while recursing.<br/>    7a3ec8dd94<br/><br/>    A query for a zone that was not yet loaded may yield an unexpected<br/>    result such as a CNAME or DNAME, triggering an assertion failure.<br/>    This has been fixed. [GL #5357] [GL !10718]<br/><br/>    Fix dig issues. 8c50819aa8<br/><br/>    When used with the +keepopen option with a TCP connection,<br/>    iscman:dig could terminate unexpectedly in rare situations.<br/>    Additionally, iscman:dig could hang and fail to shutdown properly<br/>    when interrupted during a query. These have been fixed. [GL<br/>    #5381] [GL !10727]<br/><br/>    Log dropped or slipped responses in the query-errors category.<br/>    47470b586d<br/><br/>    Responses which were dropped or slipped because of RRL (Response<br/>    Rate Limiting) were logged in the rate-limit category instead<br/>    of the query-errors category, as documented in ARM. This has<br/>    been fixed. [GL #5388] [GL !10725]<br/><br/>    Separate out adbname type flags. fc689c6525<br/><br/>    There are three adbname flags that are used to identify different<br/>    types of adbname lookups when hashing rather than using multiple<br/>    hash tables. Separate these to their own structure element as<br/>    these need to be able to be read without locking the adbname<br/>    structure. [GL #5404] [GL !10695]<br/><br/>    Synth-from-dnssec was not working in some scenarios. bc54f059e0<br/><br/>    Aggressive use of DNSSEC-Validated cache with NSEC was not<br/>    working in scenarios when no parent NSEC was not in cache. This<br/>    has been fixed. [GL #5422] [GL !10754]<br/><br/>    Clean enough memory when adding new ADB names/entries under<br/>    memory pressure. b7e7923daa<br/><br/>    The ADB memory cleaning is opportunistic even when we are under<br/>    memory pressure (in the overmem condition). Split the opportunistic<br/>    LRU cleaning and overmem cleaning and make the overmem cleaning<br/>    always cleanup double of the newly allocated adbname/adbentry<br/>    to ensure we never allocate more memory than the assigned limit.<br/>    [GL !10707]<br/><br/>    Prevent spurious validation failures. 3b98c7cc9d<br/><br/>    Under rare circumstances, validation could fail if multiple<br/>    clients simultaneously iterated the same set of signatures.<br/><br/>    References #3014 [GL !10815]<br/><br/>    Rename variable called 'free' to prevent the clash with free()<br/>    7f25d92c5d<br/><br/>    [GL !10757]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1.1.11</description>
    <pubDate>Thu Jan 29 18:19:52 UTC 2026</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.20.4. Previous was 9.18.30. The changes are too voluminous to<br/>list here and can be found in:<br/>https://downloads.isc.org/isc/bind9/cur/9.20/doc/arm/html/changelog.html</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1.1.10</description>
    <pubDate>Sun Jan 26 16:12:33 UTC 2025</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.18.24 (previous was 9.16.42)<br/><br/>	--- 9.18.24 released ---<br/><br/>6343.	[bug]		Fix case insensitive setting for isc_ht hashtable.<br/>			[GL #4568]<br/><br/>	--- 9.18.23 released ---<br/><br/>6322.	[security]	Specific DNS answers could cause a denial-of-service<br/>			condition due to DNS validation taking a long time.<br/>			(CVE-2023-50387) [GL #4424]<br/><br/>6321.	[security]	Change 6315 inadvertently introduced regressions that<br/>			could cause named to crash. [GL #4234]<br/><br/>6320.	[bug]		Under some circumstances, the DoT code in client<br/>			mode could process more than one message at a time when<br/>			that was not expected. That has been fixed. [GL #4487]<br/><br/>	--- 9.18.22 released ---<br/><br/>6319.	[func]		Limit isc_task_send() overhead for RBTDB tree pruning.<br/>			[GL #4383]<br/><br/>6317.	[security]	Restore DNS64 state when handling a serve-stale timeout.<br/>			(CVE-2023-5679) [GL #4334]<br/><br/>6316.	[security]	Specific queries could trigger an assertion check with<br/>			nxdomain-redirect enabled. (CVE-2023-5517) [GL #4281]<br/><br/>6315.	[security]	Speed up parsing of DNS messages with many different<br/>			names. (CVE-2023-4408) [GL #4234]<br/><br/>6314.	[bug]		Address race conditions in dns_tsigkey_find().<br/>			[GL #4182]<br/><br/>6312.	[bug]		Conversion from NSEC3 signed to NSEC signed could<br/>			temporarily put the zone into a state where it was<br/>			treated as unsigned until the NSEC chain was built.<br/>			Additionally conversion from one set of NSEC3 parameters<br/>			to another could also temporarily put the zone into a<br/>			state where it was treated as unsigned until the new<br/>			NSEC3 chain was built. [GL #1794] [GL #4495]<br/><br/>6310.	[bug]		Memory leak in zone.c:sign_zone. When named signed a<br/>			zone it could leak dst_keys due to a misplaced<br/>			'continue'. [GL #4488]<br/><br/>6306.	[func]		Log more details about the cause of "not exact" errors.<br/>			[GL #4500]<br/><br/>6304.	[bug]		The wrong time was being used to determine what RRSIGs<br/>			where to be generated when dnssec-policy was in use.<br/>			[GL #4494]<br/><br/>6302.	[func]		The "trust-anchor-telemetry" statement is no longer<br/>			marked as experimental. This silences a relevant log<br/>			message that was emitted even when the feature was<br/>			explicitly disabled. [GL #4497]<br/><br/>6300.	[bug]		Fix statistics export to use full 64 bit signed numbers<br/>			instead of truncating values to unsigned 32 bits.<br/>			[GL #4467]<br/><br/>6299.	[port]		NetBSD has added 'hmac' to libc which collides with our<br/>			use of 'hmac'. [GL #4478]<br/><br/>	--- 9.18.21 released ---<br/><br/>6297.	[bug]		Improve LRU cleaning behaviour. [GL #4448]<br/><br/>6296.	[func]		The "resolver-nonbackoff-tries" and<br/>			"resolver-retry-interval" options are deprecated;<br/>			a warning will be logged if they are used. [GL #4405]<br/><br/>6294.	[bug]		BIND might sometimes crash after startup or<br/>			re-configuration when one 'tls' entry is used multiple<br/>			times to connect to remote servers due to initialisation<br/>			attempts from contexts of multiple threads. That has<br/>			been fixed. [GL #4464]<br/><br/>6290.	[bug]		Dig +yaml will now report "no servers could be reached"<br/>			also for UDP setup failure when no other servers or<br/>			tries are left. [GL #1229]<br/><br/>6287.	[bug]		Recognize escapes when reading the public key from file.<br/>			[GL !8502]<br/><br/>6286.	[bug]		Dig +yaml will now report "no servers could be reached"<br/>			on TCP connection failure as well as for UDP timeouts.<br/>			[GL #4396]<br/><br/>6282.	[func]		Deprecate AES-based DNS cookies. [GL #4421]<br/><br/>	--- 9.18.20 released ---<br/><br/>6280.	[bug]		Fix missing newlines in the output of "rndc nta -dump".<br/>			[GL !8454]<br/><br/>6277.	[bug]		Take into account local authoritative zones when<br/>			falling back to serve-stale. [GL #4355]<br/><br/>6275.	[bug]		Fix assertion failure when using lock-file configuration<br/>			option together -X argument to named. [GL #4386]<br/><br/>6274.	[bug]		The 'lock-file' file was being removed when it<br/>			shouldn't have been making it ineffective if named was<br/>			started 3 or more times. [GL #4387]<br/><br/>6271.	[bug]		Fix a shutdown race in dns__catz_update_cb(). [GL #4381]<br/><br/>6269.	[maint]		B.ROOT-SERVERS.NET addresses are now 170.247.170.2 and<br/>			2801:1b8:10::b. [GL #4101]<br/><br/>6267.	[func]		The timeouts for resending zone refresh queries over UDP<br/>			were lowered to enable named to more quickly determine<br/>			that a primary is down. [GL #4260]<br/><br/>6265.	[bug]		Don't schedule resign operations on the raw version<br/>			of an inline-signing zone. [GL #4350]<br/><br/>6261.	[bug]		Fix a possible assertion failure on an error path in<br/>			resolver.c:fctx_query(), when using an uninitialized<br/>			link. [GL #4331]<br/><br/>6254.	[cleanup]	Add semantic patch to do an explicit cast from char<br/>			to unsigned char in ctype.h class of functions.<br/>			[GL #4327]<br/><br/>6252.	[test]		Python system tests have to be executed by invoking<br/>			pytest directly. Executing them with the legacy test<br/>			runner is no longer supported. [GL #4250]<br/><br/>6250.	[bug]		The wrong covered value was being set by<br/>			dns_ncache_current for RRSIG records in the returned<br/>			rdataset structure. This resulted in TYPE0 being<br/>			reported as the covered value of the RRSIG when dumping<br/>			the cache contents. [GL #4314]<br/><br/>	--- 9.18.19 released ---<br/><br/>6246.	[security]	Fix use-after-free error in TLS DNS code when sending<br/>			data. (CVE-2023-4236) [GL #4242]<br/><br/>6245.	[security]	Limit the amount of recursion that can be performed<br/>			by isccc_cc_fromwire. (CVE-2023-3341) [GL #4152]<br/><br/>6244.	[bug]		Adjust log levels on malformed messages to NOTICE when<br/>			transferring in a zone. [GL #4290]<br/><br/>6241.	[bug]		Take into account the possibility of partial TLS writes<br/>			in TLS DNS code. That helps to prevent DNS messages<br/>			corruption on long DNS over TLS streams. [GL #4255]<br/><br/>6240.	[bug]		Use dedicated per-worker thread jemalloc memory<br/>			arenas for send buffers allocation to reduce memory<br/>			consumption and avoid lock contention. [GL #4038]<br/><br/>6239.	[func]		Deprecate the 'dnssec-must-be-secure' option.<br/>			[GL #3700]<br/><br/>6237.	[bug]		Address memory leaks due to not clearing OpenSSL error<br/>			stack. [GL #4159]<br/><br/>6235.	[doc]		Clarify BIND 9 time formats. [GL #4266]<br/><br/>6234.	[bug]		Restore stale-refresh-time value after flushing the<br/>			cache. [GL #4278]<br/><br/>6232.	[bug]		Following the introduction of krb5-subdomain-self-rhs<br/>			and ms-subdomain-self-rhs update rules, removal of<br/>			nonexistent PTR and SRV records via UPDATE could fail.<br/>			[GL #4280]<br/><br/>6231.	[func]		Make nsupdate honor -v for SOA requests if the server<br/>			is specified. [GL #1181]<br/><br/>6230.	[bug]		Prevent an unnecessary query restart if a synthesized<br/>			CNAME target points to the CNAME owner. [GL #3835]<br/><br/>6227.	[bug]		Check the statistics-channel HTTP Content-length<br/>			to prevent negative or overflowing values from<br/>			causing a crash. [GL #4125]<br/><br/>6224.	[bug]		Check the If-Modified-Since value length to prevent<br/>			out-of-bounds write. [GL #4124]<br/><br/>	--- 9.18.18 released ---<br/><br/>6220.	[func]		Deprecate the 'dialup' and 'heartbeat-interval'<br/>			options. [GL #3700]<br/><br/>6219.	[bug]		Ignore 'max-zone-ttl' on 'dnssec-policy insecure'.<br/>			[GL #4032]<br/><br/>6215.	[protocol]	Return REFUSED to GSS-API TKEY requests if GSS-API<br/>			support is not configured. [GL #4225]<br/><br/>6213.	[bug]		Mark a primary server as temporarily unreachable if the<br/>			TCP connection attempt times out. [GL #4215]<br/><br/>6212.	[bug]		Don't process detach and close netmgr events when<br/>			the netmgr has been paused. [GL #4200]<br/><br/>	--- 9.18.17 released ---<br/><br/>6206.	[bug]		Add shutdown checks in dns_catz_dbupdate_callback() to<br/>			avoid a race with dns_catz_shutdown_catzs(). [GL #4171]<br/><br/>6205.	[bug]		Restore support to read legacy HMAC-MD5 K file pairs.<br/>			[GL #4154]<br/><br/>6204.	[bug]		Use NS records for relaxed QNAME-minimization mode.<br/>			This reduces the number of queries named makes when<br/>			resolving, as it allows the non-existence of NS RRsets<br/>			at non-referral nodes to be cached in addition to the<br/>			referrals that are normally cached. [GL #3325]<br/><br/>6200.	[bug]		Fix nslookup erroneously reporting a timeout when the<br/>			input is delayed. [GL #4044]<br/><br/>6199.	[bug]		Improve HTTP Connection: header protocol conformance<br/>			in the statistics channel. [GL #4126]<br/><br/>6198.	[func]		Remove the holes in the isc_result_t enum to compact<br/>			the isc_result tables. [GL #4149]<br/><br/>6197.	[bug]		Fix a data race between the dns_zone and dns_catz<br/>			modules when registering/unregistering a database<br/>			update notification callback for a catalog zone.<br/>			[GL #4132]<br/><br/>6196.	[cleanup]	Report "permission denied" instead of "unexpected error"<br/>			when trying to update a zone file on a read-only file<br/>			system. Thanks to Midnight Veil. [GL #4134]<br/><br/>6193.	[bug]		Fix a catz db update notification callback registration<br/>			logic error, which could crash named when receiving an<br/>			AXFR update for a catalog zone while the previous update<br/>			process of the catalog zone was already running.<br/>			[GL #4136]<br/><br/>6166.	[func]		Retry without DNS COOKIE on FORMERR if it appears that<br/>			the FORMERR was due to the presence of a DNS COOKIE<br/>			option. [GL #4049]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1.1.9</description>
    <pubDate>Wed Feb 21 21:54:51 UTC 2024</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import 9.16.33; last imported was 9.16.20<br/><br/>	--- 9.16.33 released ---<br/><br/>5962.	[security]	Fix memory leak in EdDSA verify processing.<br/>			(CVE-2022-38178) [GL #3487]<br/><br/>5961.	[security]	Fix memory leak in ECDSA verify processing.<br/>			(CVE-2022-38177) [GL #3487]<br/><br/>5960.	[security]	Fix serve-stale crash that could happen when<br/>			stale-answer-client-timeout was set to 0 and there was<br/>			a stale CNAME in the cache for an incoming query.<br/>			(CVE-2022-3080) [GL #3517]<br/><br/>5957.	[security]	Prevent excessive resource use while processing large<br/>			delegations. (CVE-2022-2795) [GL #3394]<br/><br/>5956.	[func]		Make RRL code treat all QNAMEs that are subject to<br/>			wildcard processing within a given zone as the same<br/>			name. [GL #3459]<br/><br/>5955.	[port]		The libxml2 library has deprecated the usage of<br/>			xmlInitThreads() and xmlCleanupThreads() functions. Use<br/>			xmlInitParser() and xmlCleanupParser() instead.<br/>			[GL #3518]<br/><br/>5954.	[func]		Fallback to IDNA2003 processing in dig when IDNA2008<br/>			conversion fails. [GL #3485]<br/><br/>5953.	[bug]		Fix a crash on shutdown in delete_trace_entry(). Add<br/>			mctx attach/detach pair to make sure that the memory<br/>			context used by a memory pool is not destroyed before<br/>			the memory pool itself. [GL #3515]<br/><br/>5952.	[bug]		Use quotes around address strings in YAML output.<br/>			[GL #3511]<br/><br/>5951.	[bug]		In some cases, the dnstap query_message field was<br/>			erroneously set when logging response messages.<br/>			[GL #3501]<br/><br/>5948.	[bug]		Fix nsec3.c:dns_nsec3_activex() function, add a missing<br/>			dns_db_detachnode() call. [GL #3500]<br/><br/>5945.	[bug]		If parsing /etc/bind.key failed, delv could assert<br/>			when trying to parse the built in trust anchors as<br/>			the parser hadn't been reset. [GL !6468]<br/><br/>5942.	[bug]		Fix tkey.c:buildquery() function's error handling by<br/>			adding the missing cleanup code. [GL #3492]<br/><br/>5941.	[func]		Zones with dnssec-policy now require dynamic DNS or<br/>			inline-siging to be configured explicitly. [GL #3381]<br/><br/>5936.	[bug]		Don't enable serve-stale for lookups that error because<br/>			it is a duplicate query or a query that would be<br/>			dropped. [GL #2982]<br/><br/>	--- 9.16.32 released ---<br/><br/>5934.	[func]		Improve fetches-per-zone fetch limit logging to log<br/>			the final allowed and spilled values of the fetch<br/>			counters before the counter object gets destroyed.<br/>			[GL #3461]<br/><br/>5933.	[port]		Automatically disable RSASHA1 and NSEC3RSASHA1 in<br/>			named on Fedorda 33, Oracle Linux 9 and RHEL9 when<br/>			they are disabled by the security policy. [GL #3469]<br/><br/>5932.	[bug]		Fix rndc dumpdb -expired and always include expired<br/>			RRsets, not just for RBTDB_VIRTUAL time window.<br/>			[GL #3462]<br/><br/>5929.	[bug]		The "max-zone-ttl" option in "dnssec-policy" was<br/>			not fully effective; it was used for timing key<br/>			rollovers but did not actually place an upper limit<br/>			on TTLs when loading a zone. This has been<br/>			corrected, and the documentation has been clarified<br/>			to indicate that the old "max-zone-ttl" zone option<br/>			is now ignored when "dnssec-policy" is in use.<br/>			[GL #2918]<br/><br/>5924.	[func]		When it's necessary to use AXFR to respond to an<br/>			IXFR request, a message explaining the reason<br/>			is now logged at level info. [GL #2683]<br/><br/>5923.	[bug]		Fix inheritance for dnssec-policy when checking for<br/>			inline-signing. [GL #3438]<br/><br/>5922.	[bug]		Forwarding of UPDATE message could fail with the<br/>			introduction of netmgr. This has been fixed. [GL #3389]<br/><br/>	--- 9.16.31 released ---<br/><br/>5917.	[bug]		Update ifconfig.sh script as is miscomputed interface<br/>			identifiers when destroying interfaces. [GL #3061]<br/><br/>5915.	[bug]		Detect missing closing brace (}) and computational<br/>			overflows in $GENERATE directives. [GL #3429]<br/><br/>5913.	[bug]		Fix a race between resolver query timeout and<br/>			validation in resolver.c:validated(). Remove<br/>			resolver.c:maybe_destroy() as it is no loger needed.<br/>			[GL #3398]<br/><br/>5909.	[bug]		The server-side destination port was missing from dnstap<br/>			captures of client traffic. [GL #3309]<br/><br/>5905.	[bug]		When the TCP connection would be closed/reset between<br/>			the connect/accept and the read, the uv_read_start()<br/>			return value would be unexpected and cause an assertion<br/>			failure. [GL #3400]<br/><br/>5903.	[bug]		When named checks that the OPCODE in a response matches<br/>			that of the request, if there is a mismatch named logs<br/>			an error.  Some of those error messages incorrectly<br/>			used RCODE instead of OPCODE to lookup the nemonic.<br/>			This has been corrected. [GL !6420]<br/><br/>	--- 9.16.30 released ---<br/><br/>5899.	[func]		Don't try to process DNSSEC-related and ZONEMD records<br/>			in catz. [GL #3380]<br/><br/>5890.	[bug]		When the fetches-per-server quota was adjusted<br/>			because of an authoritative server timing out more<br/>			or less frequently, it was incorrectly set to 1<br/>			rather than the intended value.  This has been<br/>			fixed. [GL #3327]<br/><br/>5888.	[bug]		Only write key files if the dnssec-policy keymgr has<br/>			changed the metadata. [GL #3302]<br/><br/>5823.	[func]		Replace hazard pointers based lock-free list with<br/>			locked-list based queue that's simpler and has no or<br/>			little performance impact. [GL #3180]<br/><br/>	--- 9.16.29 released ---<br/><br/>5885.	[bug]		RPZ NSIP and NSDNAME rule processing didn't handle stub<br/>			and static-stub zones at or above the query name.  This<br/>			has now been addressed. [GL #3232]<br/><br/>5881.	[bug]		dig +nssearch could hang in rare cases when recv_done()<br/>			callback was being called earlier than send_done().<br/>			[GL #3278]<br/><br/>5880.	[func]		Add new named command-line option -C to print built-in<br/>			defaults. [GL #1326]<br/><br/>5879.	[contrib]	dlz: Add FALLTHROUGH and UNREACHABLE macros. [GL #3306]<br/><br/>5874.	[bug]		keymgr didn't work with python 3.11. [GL !6157]<br/><br/>5866.	[bug]		Work around a jemalloc quirk which could trigger an<br/>			out-of-memory condition in named over time. [GL #3287]<br/><br/>5863.	[bug]		If there was a pending negative cache DS entry,<br/>			validations depending upon it could fail. [GL #3279]<br/><br/>5858.	[bug]		Don't remove CDS/CDNSKEY DELETE records on zone sign<br/>			when using 'auto-dnssec maintain;'. [GL #2931]<br/><br/>	--- 9.16.28 released ---<br/><br/>5856.	[bug]		The "starting maxtime timer" message related to outgoing<br/>			zone transfers was incorrectly logged at the ERROR level<br/>			instead of DEBUG(1). [GL #3208]<br/><br/>5852.	[func]		Add new "reuseport" option to enable/disable load<br/>			balancing of sockets. [GL #3249]<br/><br/>5843.	[bug]		When an UPDATE targets a zone that is not configured,<br/>			the requested zone name is now logged in the "not<br/>			authoritative" error message, so that it is easier to<br/>			track down problematic update clients. [GL #3209]<br/><br/>5836.	[bug]		Quote the dns64 prefix in error messages that complain<br/>			about problems with it, to avoid confusion with the<br/>			following dns64 ACLs. [GL #3210]<br/><br/>5834.	[cleanup]	C99 variable-length arrays are difficult to use safely,<br/>			so avoid them except in test code. [GL #3201]<br/><br/>5828.	[bug]		Replace single TCP write timer with per-TCP write<br/>			timers. [GL #3200]<br/><br/>5824.	[bug]		Invalid dnssec-policy definitions were being accepted<br/>			where the defined keys did not cover both KSK and ZSK<br/>			roles for a given algorithm.  This is now checked for<br/>			and the dnssec-policy is rejected if both roles are<br/>			not present for all algorithms in use. [GL #3142]<br/><br/>	--- 9.16.27 released ---<br/><br/>5818.	[security]	A synchronous call to closehandle_cb() caused<br/>			isc__nm_process_sock_buffer() to be called recursively,<br/>			which in turn left TCP connections hanging in the<br/>			CLOSE_WAIT state blocking indefinitely when<br/>			out-of-order processing was disabled. (CVE-2022-0396)<br/>			[GL #3112]<br/><br/>5817.	[security]	The rules for acceptance of records into the cache<br/>			have been tightened to prevent the possibility of<br/>			poisoning if forwarders send records outside<br/>			the configured bailiwick. (CVE-2021-25220) [GL #2950]<br/><br/>5816.	[bug]		Make BIND compile with LibreSSL 3.5.0, as it was using<br/>			not very accurate pre-processor checks for using shims.<br/>			[GL #3172]<br/><br/>5815.	[bug]		If an oversized key name of a specific length was used<br/>			in the text form of an HTTP or SVBC record, an INSIST<br/>			could be triggered when parsing it. [GL #3175]<br/><br/>5814.	[bug]		The RecursClients statistics counter could underflow<br/>			in certain resolution scenarios. [GL #3147]<br/><br/>5811.	[bug]		Reimplement the maximum and idle timeouts for outgoing<br/>			zone transfers. [GL #1897]<br/><br/>5807.	[bug]		Add a TCP "write" timer, and time out writing<br/>			connections after the "tcp-idle-timeout" period<br/>			has elapsed. [GL #3132]<br/><br/>5804.	[func]		Add a debug log message when starting and ending<br/>			the task exclusive mode. [GL #3137]<br/><br/>	--- 9.16.26 released ---<br/><br/>5801.	[bug]		Log "quota reached" message when hard quota<br/>			is reached when accepting a connection. [GL #3125]<br/><br/>5800.	[func]		Add ECS support to the DLZ interface. [GL #3082]<br/><br/>5797.	[bug]		A failed view configuration during a named<br/>			reconfiguration procedure could cause inconsistencies<br/>			in BIND internal structures, causing a crash or other<br/>			unexpected errors. [GL #3060]<br/><br/>5795.	[bug]		rndc could crash when interrupted by a signal<br/>			before receiving a response. [GL #3080]<br/><br/>5793.	[bug]		Correctly detect and enable UDP recvmmsg support<br/>			in all versions of libuv that support it. [GL #3095]<br/><br/>	--- 9.16.25 released ---<br/><br/>5789.	[bug]		Allow replacing expired zone signatures with<br/>			signatures created by the KSK. [GL #3049]<br/><br/>5788.	[bug]		An assertion could occur if a catalog zone event was<br/>			scheduled while the task manager was being shut<br/>			down. [GL #3074]<br/><br/>5787.	[doc]		Update 'auto-dnssec' documentation, it may only be<br/>			activated at zone level. [GL #3023]<br/><br/>5786.	[bug]		Defer detaching from zone-&gt;raw in zone_shutdown() if<br/>			the zone is in the process of being dumped to disk, to<br/>			ensure that the unsigned serial number information is<br/>			always written in the raw-format header of the signed<br/>			version on an inline-signed zone. [GL #3071]<br/><br/>5785.	[bug]		named could leak memory when two dnssec-policy clauses<br/>			had the same name. named failed to log this error.<br/>			[GL #3085]<br/><br/>5776.	[bug]		Add a missing isc_condition_destroy() for nmsocket<br/>			condition variable and add missing isc_mutex_destroy()<br/>			for nmworker lock. [GL #3051]<br/><br/>5676.	[func]		Memory use in named was excessive. This has been<br/>			addressed by:<br/>			- Replacing locked memory pools with normal memory<br/>			  allocations.<br/>			- Reducing the number of retained free items in<br/>			  unlocked memory pools.<br/>			- Disabling the internal allocator by default.<br/>			  "named -M internal" turns it back on.<br/>			[GL #2398]<br/><br/>	--- 9.16.24 released ---<br/><br/>5773.	[func]		Change the message when accepting TCP connection has<br/>			failed to say "Accepting TCP connection failed" and<br/>			change the log level for ISC_R_NOTCONNECTED, ISC_R_QUOTA<br/>			and ISC_R_SOFTQUOTA results codes from ERROR to INFO.<br/>			[GL #2700]<br/><br/>5768.	[bug]		dnssec-dsfromkey failed to omit revoked keys. [GL #853]<br/><br/>5764.	[bug]		dns_sdlz_putrr failed to process some valid resource<br/>			records. [GL #3021]<br/><br/>5762.	[bug]		Fix a "named" crash related to removing and restoring a<br/>			`catalog-zone` entry in the configuration file and<br/>			running `rndc reconfig`. [GL #1608]<br/><br/>5758.	[bug]		mdig now honors the operating system's preferred<br/>			ephemeral port range. [GL #2374]<br/><br/>5757.	[test]		Replace sed in nsupdate system test with awk to<br/>			construct the nsupdate command.  The sed expression<br/>			was not reliably changing the ttl. [GL #3003]<br/><br/>	--- 9.16.23 released ---<br/><br/>5752.	[bug]		Fix an assertion failure caused by missing member zones<br/>			during a reload of a catalog zone. [GL #2308]<br/><br/>5750.	[bug]		Fix a bug when comparing two RSA keys. There was a typo<br/>			which caused the "p" prime factors to not being<br/>			compared. [GL #2972]<br/><br/>5737.	[bug]		Address Coverity warning in lib/dns/dnssec.c.<br/>			[GL #2935]<br/><br/>	--- 9.16.22 released ---<br/><br/>5736.	[security]	The "lame-ttl" option is now forcibly set to 0. This<br/>			effectively disables the lame server cache, as it could<br/>			previously be abused by an attacker to significantly<br/>			degrade resolver performance. (CVE-2021-25219)<br/>			[GL #2899]<br/><br/>5724.	[bug]		Address a potential deadlock when checking zone content<br/>			consistency. [GL #2908]<br/><br/>5723.	[bug]		Change 5709 broke backward compatibility for the<br/>			"check-names master ..." and "check-names slave ..."<br/>			options. This has been fixed. [GL #2911]<br/><br/>5720.	[contrib]	Old-style DLZ drivers that had to be enabled at<br/>			build-time have been marked as deprecated. [GL #2814]<br/><br/>5719.	[func]		The "map" zone file format has been marked as<br/>			deprecated. [GL #2882]<br/><br/>5717.	[func]		The "cache-file" option, which was documented as "for<br/>			testing purposes only" and not to be used, has been<br/>			removed. [GL #2903]<br/><br/>5716.	[bug]		Multiple library names were mistakenly passed to the<br/>			krb5-config utility when ./configure was invoked with<br/>			the --with-gssapi=[/path/to/]krb5-config option. This<br/>			has been fixed by invoking krb5-config separately for<br/>			each required library. [GL #2866]<br/><br/>5715.	[func]		Add a check for ports specified in "*-source(-v6)"<br/>			options clashing with a global listening port. Such a<br/>			configuration was already unsupported, but it failed<br/>			silently; it is now treated as an error. [GL #2888]<br/><br/>5714.	[bug]		Remove the "adjust interface" mechanism which was<br/>			responsible for setting up listeners on interfaces when<br/>			the "*-source(-v6)" address and port were the same as<br/>			the "listen-on(-v6)" address and port. Such a<br/>			configuration is no longer supported; under certain<br/>			timing conditions, that mechanism could prevent named<br/>			from listening on some TCP ports. This has been fixed.<br/>			[GL #2852]<br/><br/>5712.	[doc]		Add deprecation notice about removing native PKCS#11<br/>			support in the next major BIND 9 release. [GL #2691]<br/><br/>	--- 9.16.21 released ---<br/><br/>5711.	[bug]		"map" files exceeding 2GB in size failed to load due to<br/>			a size comparison that incorrectly treated the file size<br/>			as a signed integer. [GL #2878]<br/><br/>5710.	[port]		win32: incorrect parentheses resulted in the wrong<br/>			sizeof() tests being used to pick the appropriate<br/>			Windows atomic operations for the object's size.<br/>			[GL #2891]<br/><br/>5709.	[cleanup]	Enum values throughout the code have been updated<br/>			to use the terms "primary" and "secondary" instead of<br/>			"master" and "slave", respectively. [GL #1944]<br/><br/>5708.	[bug]		The thread-local isc_tid_v variable was not properly<br/>			initialized when running BIND 9 as a Windows Service,<br/>			leading to a crash on startup. [GL #2837]<br/><br/>5705.	[bug]		Change #5686 altered the internal memory structure of<br/>			zone databases, but neglected to update the MAPAPI value<br/>			for zone files in "map" format. This caused named to<br/>			attempt to load incompatible map files, triggering an<br/>			assertion failure on startup. The MAPAPI value has now<br/>			been updated, so named rejects outdated files when<br/>			encountering them. [GL #2872]<br/><br/>5704.	[bug]		Change #5317 caused the EDNS TCP Keepalive option to be<br/>			ignored inadvertently in client requests. It has now<br/>			been fixed and this option is handled properly again.<br/>			[GL #1927]<br/><br/>5701.	[bug]		named-checkconf failed to detect syntactically invalid<br/>			values of the "key" and "tls" parameters used to define<br/>			members of remote server lists. [GL #2461]<br/><br/>5700.	[bug]		When a member zone was removed from a catalog zone,<br/>			journal files for the former were not deleted.<br/>			[GL #2842]<br/><br/>5699.	[func]		Data structures holding DNSSEC signing statistics are<br/>			now grown and shrunk as necessary upon key rollover<br/>			events. [GL #1721]<br/><br/>5698.	[bug]		When a DNSSEC-signed zone which only has a single<br/>			signing key available is migrated to use KASP, that key<br/>			is now treated as a Combined Signing Key (CSK).<br/>			[GL #2857]<br/><br/>5696.	[protocol]	Support for HTTPS and SVCB record types has been added.<br/>			(This does not include ADDITIONAL section processing for<br/>			these record types, only basic support for RR type<br/>			parsing and printing.) [GL #1132]<br/><br/>5694.	[bug]		Stale data in the cache could cause named to send<br/>			non-minimized queries despite QNAME minimization being<br/>			enabled. [GL #2665]<br/><br/>5691.	[bug]		When a dynamic zone was made available in another view<br/>			using the "in-view" statement, running "rndc freeze"<br/>			always reported an "already frozen" error even though<br/>			the zone was successfully frozen. [GL #2844]<br/><br/>5690.	[func]		dnssec-signzone now honors Predecessor and Successor<br/>			metadata found in private key files: if a signature for<br/>			an RRset generated by the inactive predecessor exists<br/>			and does not need to be replaced, no additional<br/>			signature is now created for that RRset using the<br/>			successor key. This enables dnssec-signzone to gradually<br/>			replace RRSIGs during a ZSK rollover. [GL #1551]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1.1.8</description>
    <pubDate>Fri Sep 23 00:09:17 UTC 2022</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>Import bind-9.16.20<br/><br/>	--- 9.16.20 released ---<br/><br/>5689.	[security]	An assertion failure occurred when named attempted to<br/>			send a UDP packet that exceeded the MTU size, if<br/>			Response Rate Limiting (RRL) was enabled.<br/>			(CVE-2021-25218) [GL #2856]<br/><br/>5688.	[bug]		Zones using KASP and inline-signed zones failed to apply<br/>			changes from the unsigned zone to the signed zone under<br/>			certain circumstances. This has been fixed. [GL #2735]<br/><br/>5687.	[bug]		"rndc reload &lt;zonename&gt;" could trigger a redundant<br/>			reload for an inline-signed zone whose zone file was not<br/>			modified since the last "rndc reload". This has been<br/>			fixed. [GL #2855]<br/><br/>5686.	[func]		The number of internal data structures allocated for<br/>			each zone was reduced. [GL #2829]<br/><br/>5685.	[bug]		named failed to check the opcode of responses when<br/>			performing zone refreshes, stub zone updates, and UPDATE<br/>			forwarding. This has been fixed. [GL #2762]<br/><br/>5682.	[bug]		Some changes to "zone-statistics" settings were not<br/>			properly processed by "rndc reconfig". This has been<br/>			fixed. [GL #2820]<br/><br/>5681.	[func]		Relax the checks in the dns_zone_cdscheck() function to<br/>			allow CDS and CDNSKEY records in the zone that do not<br/>			match an existing DNSKEY record, as long as the<br/>			algorithm matches. This allows a clean rollover from one<br/>			provider to another in a multi-signer DNSSEC<br/>			configuration. [GL #2710]<br/><br/>5679.	[func]		Thread affinity is no longer set. [GL #2822]<br/><br/>5678.	[bug]		The "check DS" code failed to release all resources upon<br/>			named shutdown when a refresh was in progress. This has<br/>			been fixed. [GL #2811]<br/><br/>5672.	[bug]		Authentication of rndc messages could fail if a<br/>			"controls" statement was configured with multiple key<br/>			algorithms for the same listener. This has been fixed.<br/>			[GL #2756]<br/><br/>	--- 9.16.19 released ---<br/><br/>5671.	[bug]		A race condition could occur where two threads were<br/>			competing for the same set of key file locks, leading to<br/>			a deadlock. This has been fixed. [GL #2786]<br/><br/>5670.	[bug]		create_keydata() created an invalid placeholder keydata<br/>			record upon a refresh failure, which prevented the<br/>			database of managed keys from subsequently being read<br/>			back. This has been fixed. [GL #2686]<br/><br/>5669.	[func]		KASP support was extended with the "check DS" feature.<br/>			Zones with "dnssec-policy" and "parental-agents"<br/>			configured now check for DS presence and can perform<br/>			automatic KSK rollovers. [GL #1126]<br/><br/>5668.	[bug]		Rescheduling a setnsec3param() task when a zone failed<br/>			to load on startup caused a hang on shutdown. This has<br/>			been fixed. [GL #2791]<br/><br/>5667.	[bug]		The configuration-checking code failed to account for<br/>			the inheritance rules of the "dnssec-policy" option.<br/>			This has been fixed. [GL #2780]<br/><br/>5666.	[doc]		The safe "edns-udp-size" value was tweaked to match the<br/>			probing value from BIND 9.16 for better compatibility.<br/>			[GL #2183]<br/><br/>5665.	[bug]		If nsupdate sends an SOA request and receives a REFUSED<br/>			response, it now fails over to the next available<br/>			server. [GL #2758]<br/><br/>5664.	[func]		For UDP messages larger than the path MTU, named now<br/>			sends an empty response with the TC (TrunCated) bit set.<br/>			In addition, setting the DF (Don't Fragment) flag on<br/>			outgoing UDP sockets was re-enabled. [GL #2790]<br/><br/>5662.	[bug]		Views with recursion disabled are now configured with a<br/>			default cache size of 2 MB unless "max-cache-size" is<br/>			explicitly set. This prevents cache RBT hash tables from<br/>			being needlessly preallocated for such views. [GL #2777]<br/><br/>5661.	[bug]		Change 5644 inadvertently introduced a deadlock: when<br/>			locking the key file mutex for each zone structure in a<br/>			different view, the "in-view" logic was not considered.<br/>			This has been fixed. [GL #2783]<br/><br/>5658.	[bug]		Increasing "max-cache-size" for a running named instance<br/>			(using "rndc reconfig") did not cause the hash tables<br/>			used by cache databases to be grown accordingly. This<br/>			has been fixed. [GL #2770]<br/><br/>5655.	[bug]		Signed, insecure delegation responses prepared by named<br/>			either lacked the necessary NSEC records or contained<br/>			duplicate NSEC records when both wildcard expansion and<br/>			CNAME chaining were required to prepare the response.<br/>			This has been fixed. [GL #2759]<br/><br/>5653.	[bug]		A bug that caused the NSEC3 salt to be changed on every<br/>			restart for zones using KASP has been fixed. [GL #2725]<br/><br/>	--- 9.16.18 released ---<br/><br/>5660.	[bug]		The configuration-checking code failed to account for<br/>			the inheritance rules of the "key-directory" option.<br/>			[GL #2778]<br/><br/>5659.	[bug]		When preparing DNS responses, named could replace the<br/>			letters 'W' (uppercase) and 'w' (lowercase) with '\000'.<br/>			This has been fixed. [GL #2779]<br/><br/>	--- 9.16.17 released ---<br/><br/>5652.	[bug]		A copy-and-paste error in change 5584 caused the<br/>			IP_DONTFRAG socket option to be enabled instead of<br/>			disabled. This has been fixed. [GL #2746]<br/><br/>5651.	[func]		Refactor zone dumping to be processed asynchronously via<br/>			the uv_work_t thread pool API. [GL #2732]<br/><br/>5650.	[bug]		Prevent a crash that could occur if serve-stale was<br/>			enabled and a prefetch was triggered during a query<br/>			restart. [GL #2733]<br/><br/>5649.	[bug]		If a query was answered with stale data on a server with<br/>			DNS64 enabled, an assertion could occur if a non-stale<br/>			answer arrived afterward. [GL #2731]<br/><br/>5648.	[bug]		The calculation of the estimated IXFR transaction size<br/>			in dns_journal_iter_init() was invalid. [GL #2685]<br/><br/>5644.	[bug]		Fix a race condition in reading and writing key files<br/>			for zones using KASP and configured in multiple views.<br/>			[GL #1875]<br/><br/>5643.	[cleanup]	"make install" no longer creates an empty<br/>			${localstatedir}/run directory. [GL #2709]<br/><br/>5642.	[bug]		Zones which are configured in multiple views with<br/>			different values set for "dnssec-policy" and with<br/>			identical values set for "key-directory" are now<br/>			detected and treated as a configuration error.<br/>			[GL #2463]<br/><br/>5641.	[bug]		Address a potential memory leak in<br/>			dst_key_fromnamedfile(). [GL #2689]<br/><br/>5639.	[bug]		Check that the first and last SOA record of an AXFR are<br/>			consistent. [GL #2528]<br/><br/>5638.	[bug]		Improvements related to network manager/task manager<br/>			integration:<br/>			- isc_managers_create() and isc_managers_destroy()<br/>			  functions were added to handle setup and teardown of<br/>			  netmgr, taskmgr, timermgr, and socketmgr, since these<br/>			  require a precise order of operations now.<br/>			- Event queue processing is now quantized to prevent<br/>			  infinite looping.<br/>			- The netmgr can now be paused from within a netmgr<br/>			  thread.<br/>			- Deadlocks due to a conflict between netmgr's<br/>			  pause/resume and listen/stoplistening operations were<br/>			  fixed.<br/>			[GL #2654]<br/><br/>5633.	[doc]		The "inline-signing" option was incorrectly described as<br/>			being inherited from the "options"/"view" levels and was<br/>			incorrectly accepted at those levels without effect.<br/>			This has been fixed. [GL #2536]<br/><br/>5624.	[func]		Task manager events are now processed inside network<br/>			manager loops. The task manager no longer needs its own<br/>			set of worker threads, which improves resolver<br/>			performance. [GL #2638]<br/><br/>	--- 9.16.16 released ---<br/><br/>5637.	[func]		Change the default value of the "max-ixfr-ratio" option<br/>			to "unlimited". [GL #2671]<br/><br/>5636.	[bug]		named and named-checkconf did not report an error when<br/>			multiple zones with the "dnssec-policy" option set were<br/>			using the same zone file. This has been fixed.<br/>			[GL #2603]<br/><br/>5635.	[bug]		Journal compaction could fail when a journal with<br/>			invalid transaction headers was not detected at startup.<br/>			This has been fixed. [GL #2670]<br/><br/>5634.	[bug]		If "dnssec-policy" was active and a private key file was<br/>			temporarily offline during a rekey event, named could<br/>			incorrectly introduce replacement keys and break a<br/>			signed zone. This has been fixed. [GL #2596]<br/><br/>5633.	[doc]		The "inline-signing" option was incorrectly described as<br/>			being inherited from the "options"/"view" levels and was<br/>			incorrectly accepted at those levels without effect.<br/>			This has been fixed. [GL #2536]<br/><br/>5632.	[func]		Add a new built-in KASP, "insecure", which is used to<br/>			transition a zone from a signed to an unsigned state.<br/>			The existing built-in KASP "none" should no longer be<br/>			used to unsign a zone. [GL #2645]<br/><br/>5631.	[protocol]	Update the implementation of the ZONEMD RR type to match<br/>			RFC 8976. [GL #2658]<br/><br/>5630.	[func]		Treat DNSSEC responses containing NSEC3 records with<br/>			iteration counts greater than 150 as insecure.<br/>			[GL #2445]<br/><br/>5629.	[func]		Reduce the maximum supported number of NSEC3 iterations<br/>			that can be configured for a zone to 150. [GL #2642]<br/><br/>5627.	[bug]		RRSIG(SOA) RRsets placed anywhere other than at the zone<br/>			apex were triggering infinite resigning loops. This has<br/>			been fixed. [GL #2650]<br/><br/>5626.	[bug]		When generating zone signing keys, KASP now also checks<br/>			for key ID conflicts among newly created keys, rather<br/>			than just between new and existing ones. [GL #2628]<br/><br/>5625.	[bug]		A deadlock could occur when multiple "rndc addzone",<br/>			"rndc delzone", and/or "rndc modzone" commands were<br/>			invoked simultaneously for different zones. This has<br/>			been fixed. [GL #2626]<br/><br/>5622.	[cleanup]	The lib/samples/ directory has been removed, as export<br/>			versions of libraries are no longer maintained.<br/>			[GL !4835]<br/><br/>5619.	[protocol]	Implement draft-vandijk-dnsop-nsec-ttl, updating the<br/>			protocol such that NSEC(3) TTL values are set to the<br/>			minimum of the SOA MINIMUM value or the SOA TTL.<br/>			[GL #2347]<br/><br/>5618.	[bug]		Change 5149 introduced some inconsistencies in the way<br/>			record TTLs were presented in cache dumps. These<br/>			inconsistencies have been eliminated. [GL #389]<br/>			[GL #2289]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1.1.7</description>
    <pubDate>Thu Aug 19 11:45:23 UTC 2021</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>--- 9.16.12 released ---<br/><br/>5578.	[protocol]	Make "check-names" accept A records below "_spf",<br/>			"_spf_rate", and "_spf_verify" labels in order to cater<br/>			for the "exists" SPF mechanism specified in RFC 7208<br/>			section 5.7 and appendix D.1. [GL #2377]<br/><br/>5577.	[bug]		Fix the "three is a crowd" key rollover bug in KASP by<br/>			correctly implementing Equation (2) of the "Flexible and<br/>			Robust Key Rollover" paper. [GL #2375]<br/><br/>5575.	[bug]		When migrating to KASP, BIND 9 considered keys with the<br/>			"Inactive" and/or "Delete" timing metadata to be<br/>			possible active keys. This has been fixed. [GL #2406]<br/><br/>5572.	[bug]		Address potential double free in generatexml().<br/>			[GL #2420]<br/><br/>5571.	[bug]		named failed to start when its configuration included a<br/>			zone with a non-builtin "allow-update" ACL attached.<br/>			[GL #2413]<br/><br/>5570.	[bug]		Improve performance of the DNSSEC verification code by<br/>			reducing the number of repeated calls to<br/>			dns_dnssec_keyfromrdata(). [GL #2073]<br/><br/>5569.	[bug]		Emit useful error message when "rndc retransfer" is<br/>			applied to a zone of inappropriate type. [GL #2342]<br/><br/>5568.	[bug]		Fixed a crash in "dnssec-keyfromlabel" when using ECDSA<br/>			keys. [GL #2178]<br/><br/>5567.	[bug]		Dig now reports unknown dash options while pre-parsing<br/>			the options. This prevents "-multi" instead of "+multi"<br/>			from reporting memory usage before ending option parsing<br/>			with "Invalid option: -lti". [GL #2403]<br/><br/>5566.	[func]		Add "stale-answer-client-timeout" option, which is the<br/>			amount of time a recursive resolver waits before<br/>			attempting to answer the query using stale data from<br/>			cache. [GL #2247]<br/><br/>5565.	[func]		The SONAMEs for BIND 9 libraries now include the current<br/>			BIND 9 version number, in an effort to tightly couple<br/>			internal libraries with a specific release. [GL #2387]<br/><br/>5562.	[security]	Fix off-by-one bug in ISC SPNEGO implementation.<br/>			(CVE-2020-8625) [GL #2354]<br/><br/>5561.	[bug]		KASP incorrectly set signature validity to the value of<br/>			the DNSKEY signature validity. This is now fixed.<br/>			[GL #2383]<br/><br/>5560.	[func]		The default value of "max-stale-ttl" has been changed<br/>			from 12 hours to 1 day and the default value of<br/>			"stale-answer-ttl" has been changed from 1 second to 30<br/>			seconds, following RFC 8767 recommendations. [GL #2248]<br/><br/>5456.	[func]		Added "primaries" as a synonym for "masters" in<br/>			named.conf, and "primary-only" as a synonym for<br/>			"master-only" in the parameters to "notify", to bring<br/>			terminology up-to-date with RFC 8499. [GL #1948]<br/><br/>5362.	[func]		Limit the size of IXFR responses so that AXFR will<br/>			be used instead if it would be smaller. This is<br/>			controlled by the "max-ixfr-ratio" option, which<br/>			is a percentage representing the ratio of IXFR size<br/>			to the size of the entire zone. This value cannot<br/>			exceed 100%, which is the default. [GL #1515]<br/><br/>	--- 9.16.11 released ---<br/><br/>5559.	[bug]		The --with-maxminddb=PATH form of the build-time option<br/>			enabling support for libmaxminddb was not working<br/>			correctly. This has been fixed. [GL #2366]<br/><br/>5557.	[bug]		Prevent RBTDB instances from being destroyed by multiple<br/>			threads at the same time. [GL #2317]<br/><br/>5556.	[bug]		Further tweak newline printing in dnssec-signzone and<br/>			dnssec-verify. [GL #2359]<br/><br/>5555.	[bug]		server-&gt;reload_status was not properly initialized.<br/>			[GL #2361]<br/><br/>5554.	[bug]		dnssec-signzone and dnssec-verify were missing newlines<br/>			between log messages. [GL #2359]<br/><br/>5553.	[bug]		When reconfiguring named, removing "auto-dnssec" did not<br/>			turn off DNSSEC maintenance. [GL #2341]<br/><br/>5552.	[func]		When switching to "dnssec-policy none;", named now<br/>			permits a safe transition to insecure mode and publishes<br/>			the CDS and CDNSKEY DELETE records, as described in RFC<br/>			8078. [GL #1750]<br/><br/>5551.	[bug]		named no longer attempts to assign threads to CPUs<br/>			outside the CPU affinity set. Thanks to Ole Bjørn<br/>			Hessen. [GL #2245]<br/><br/>5550.	[func]		dnssec-signzone and named now log a warning when falling<br/>			back to the "increment" SOA serial method. [GL #2058]<br/><br/>5545.	[func]		OS support for load-balanced sockets is no longer<br/>			required to receive incoming queries in multiple netmgr<br/>			threads. [GL #2137]<br/><br/>5543.	[bug]		Fix UDP performance issues caused by making netmgr<br/>			callbacks asynchronous-only. [GL #2320]<br/><br/>5542.	[bug]		Refactor netmgr. [GL #1920] [GL #2034] [GL #2061]<br/>			[GL #2194] [GL #2221] [GL #2266] [GL #2283] [GL #2318]<br/>			[GL #2321]<br/><br/>	--- 9.16.10 released ---<br/><br/>5544.	[func]		Restore the default value of "nocookie-udp-size" to 4096<br/>			bytes. [GL #2250]<br/><br/>5541.	[func]		Adjust the "max-recursion-queries" default from 75 to<br/>			100. [GL #2305]<br/><br/>5540.	[port]		Fix building with native PKCS#11 support for AEP Keyper.<br/>			[GL #2315]<br/><br/>5539.	[bug]		Tighten handling of missing DNS COOKIE responses over<br/>			UDP by falling back to TCP. [GL #2275]<br/><br/>5538.	[func]		Add NSEC3 support to KASP. A new option for<br/>			"dnssec-policy", "nsec3param", can be used to set the<br/>			desired NSEC3 parameters. NSEC3 salt collisions are<br/>			automatically prevented during resalting. Salt<br/>			generation is now logged with zone context. [GL #1620]<br/><br/>5534.	[bug]		The CNAME synthesized from a DNAME was incorrectly<br/>			followed when the QTYPE was CNAME or ANY. [GL #2280]<br/><br/>	--- 9.16.9 released ---<br/><br/>5533.	[func]		Add the "stale-refresh-time" option, a time window that<br/>			starts after a failed lookup, during which a stale RRset<br/>			is served directly from cache before a new attempt to<br/>			refresh it is made. [GL #2066]<br/><br/>5530.	[bug]		dnstap did not capture responses to forwarded UPDATE<br/>			requests. [GL #2252]<br/><br/>5527.	[bug]		A NULL pointer dereference occurred when creating an NTA<br/>			recheck query failed. [GL #2244]<br/><br/>5525.	[bug]		Change 5503 inadvertently broke cross-compilation by<br/>			replacing a call to AC_LINK_IFELSE() with a call to<br/>			AC_RUN_IFELSE() in configure.ac.  This has been fixed,<br/>			making cross-compilation possible again. [GL #2237]<br/><br/>5523.	[bug]		The initial lookup in a zone transitioning to/from a<br/>			signed state could fail if the DNSKEY RRset was not<br/>			found. [GL #2236]<br/><br/>5522.	[bug]		Fixed a race/NULL dereference in TCPDNS send. [GL #2227]<br/><br/>5520.	[bug]		Fixed a number of shutdown races, reference counting<br/>			errors, and spurious log messages that could occur<br/>			in the network manager. [GL #2221]<br/><br/>5518.	[bug]		Stub zones now work correctly with primary servers using<br/>			"minimal-responses yes". [GL #1736]<br/><br/>5517.	[bug]		Do not treat UV_EOF as a TCP4RecvErr or a TCP6RecvErr.<br/>			[GL #2208]<br/><br/>	--- 9.16.8 released ---<br/><br/>5516.	[func]		The default EDNS buffer size has been changed from 4096<br/>			to 1232 bytes. [GL #2183]<br/><br/>5515.	[func]		Add 'rndc dnssec -rollover' command to trigger a manual<br/>			rollover for a specific key. [GL #1749]<br/><br/>5514.	[bug]		Fix KASP expected key size for Ed25519 and Ed448.<br/>			[GL #2171]<br/><br/>5513.	[doc]		The ARM section describing the "rrset-order" statement<br/>			was rewritten to make it unambiguous and up-to-date with<br/>			the source code. [GL #2139]<br/><br/>5512.	[bug]		"rrset-order" rules using "order none" were causing<br/>			named to crash despite named-checkconf treating them as<br/>			valid. [GL #2139]<br/><br/>5511.	[bug]		'dig -u +yaml' failed to display timestamps to the<br/>			microsecond. [GL #2190]<br/><br/>5510.	[bug]		Implement the attach/detach semantics for dns_message_t<br/>			to fix a data race in accessing an already-destroyed<br/>			fctx-&gt;rmessage. [GL #2124]<br/><br/>5509.	[bug]		filter-aaaa: named crashed upon shutdown if it was in<br/>			the process of recursing for A RRsets. [GL #1040]<br/><br/>5508.	[func]		Added new parameter "-expired" for "rndc dumpdb" that<br/>			also prints expired RRsets (awaiting cleanup) to the<br/>			dump file. [GL #1870]<br/><br/>5507.	[bug]		Named could compute incorrect SIG(0) responses.<br/>			[GL #2109]<br/><br/>5506.	[bug]		Properly handle failed sysconf() calls, so we don't<br/>			report invalid memory size. [GL #2166]<br/><br/>5505.	[bug]		Updating contents of a mixed-case RPZ could cause some<br/>			rules to be ignored. [GL #2169]<br/><br/>5503.	[bug]		Cleaned up reference counting of network manager<br/>			handles, now using isc_nmhandle_attach() and _detach()<br/>			instead of _ref() and _unref(). [GL #2122]<br/><br/>	--- 9.16.7 released ---<br/><br/>5501.	[func]		Log CDS/CDNSKEY publication. [GL #1748]<br/><br/>5500.	[bug]		Fix (non-)publication of CDS and CDNSKEY records.<br/>			[GL #2103]<br/><br/>5499.	[func]		Add '-P ds' and '-D ds' arguments to dnssec-settime.<br/>			[GL #1748]<br/><br/>5497.	[bug]		'dig +bufsize=0' failed to disable EDNS. [GL #2054]<br/><br/>5496.	[bug]		Address a TSAN report by ensuring each rate limiter<br/>			object holds a reference to its task. [GL #2081]<br/><br/>5495.	[bug]		With query minimization enabled, named failed to<br/>			resolve ip6.arpa. names that had extra labels to the<br/>			left of the IPv6 part. [GL #1847]<br/><br/>5494.	[bug]		Silence the EPROTO syslog message on older systems.<br/>			[GL #1928]<br/><br/>5493.	[bug]		Fix off-by-one error when calculating new hash table<br/>			size. [GL #2104]<br/><br/>5492.	[bug]		Tighten LOC parsing to reject a period (".") and/or "m"<br/>			as a value. Fix handling of negative altitudes which are<br/>			not whole meters. [GL #2074]<br/><br/>5491.	[bug]		rbtversion-&gt;glue_table_size could be read without the<br/>			appropriate lock being held. [GL #2080]<br/><br/>5489.	[bug]		Named erroneously accepted certain invalid resource<br/>			records that were incorrectly processed after<br/>			subsequently being written to disk and loaded back, as<br/>			the wire format differed. Such records include: CERT,<br/>			IPSECKEY, NSEC3, NSEC3PARAM, NXT, SIG, TLSA, WKS, and<br/>			X25. [GL !3953]<br/><br/>5488.	[bug]		NTA code needed to have a weak reference on its<br/>			associated view to prevent the latter from being deleted<br/>			while NTA tests were being performed. [GL #2067]<br/><br/>5486.	[func]		Add 'rndc dnssec -checkds' command, which signals to<br/>			named that the DS record for a given zone or key has<br/>			been updated in the parent zone. [GL #1613]<br/><br/>	--- 9.16.6 released ---<br/><br/>5484.	[func]		Expire zero TTL records quickly rather than using them<br/>			for stale answers. [GL #1829]<br/><br/>5483.	[func]		A new configuration option "stale-cache-enable" has been<br/>			introduced to enable or disable keeping stale answers in<br/>			cache. [GL #1712]<br/><br/>5482.	[bug]		If the Duplicate Address Detection (DAD) mechanism had<br/>			not yet finished after adding a new IPv6 address to the<br/>			system, BIND 9 would fail to bind to IPv6 addresses in a<br/>			tentative state. [GL #2038]<br/><br/>5481.	[security]	"update-policy" rules of type "subdomain" were<br/>			incorrectly treated as "zonesub" rules, which allowed<br/>			keys used in "subdomain" rules to update names outside<br/>			of the specified subdomains. The problem was fixed by<br/>			making sure "subdomain" rules are again processed as<br/>			described in the ARM. (CVE-2020-8624) [GL #2055]<br/><br/>5480.	[security]	When BIND 9 was compiled with native PKCS#11 support, it<br/>			was possible to trigger an assertion failure in code<br/>			determining the number of bits in the PKCS#11 RSA public<br/>			key with a specially crafted packet. (CVE-2020-8623)<br/>			[GL #2037]<br/><br/>5479.	[security]	named could crash in certain query resolution scenarios<br/>			where QNAME minimization and forwarding were both<br/>			enabled. (CVE-2020-8621) [GL #1997]<br/><br/>5478.	[security]	It was possible to trigger an assertion failure by<br/>			sending a specially crafted large TCP DNS message.<br/>			(CVE-2020-8620) [GL #1996]<br/><br/>5477.	[bug]		The idle timeout for connected TCP sockets, which was<br/>			previously set to a high fixed value, is now derived<br/>			from the client query processing timeout configured for<br/>			a resolver. [GL #2024]<br/><br/>5476.	[security]	It was possible to trigger an assertion failure when<br/>			verifying the response to a TSIG-signed request.<br/>			(CVE-2020-8622) [GL #2028]<br/><br/>5475.	[bug]		Wildcard RPZ passthru rules could incorrectly be<br/>			overridden by other rules that were loaded from RPZ<br/>			zones which appeared later in the "response-policy"<br/>			statement. This has been fixed. [GL #1619]<br/><br/>5474.	[bug]		dns_rdata_hip_next() failed to return ISC_R_NOMORE<br/>			when it should have. [GL !3880]<br/><br/>5473.	[func]		The RBT hash table implementation has been changed<br/>			to use a faster hash function (HalfSipHash2-4) and<br/>			Fibonacci hashing for better distribution. Setting<br/>			"max-cache-size" now preallocates a fixed-size hash<br/>			table so that rehashing does not cause resolution<br/>			brownouts while the hash table is grown. [GL #1775]<br/><br/>5471.	[bug]		The introduction of KASP support inadvertently caused<br/>			the second field of "sig-validity-interval" to always be<br/>			calculated in hours, even in cases when it should have<br/>			been calculated in days. This has been fixed. (Thanks to<br/>			Tony Finch.) [GL !3735]<br/><br/>5469.	[port]		On illumos, a constant called SEC is already defined in<br/>			&lt;sys/time.h&gt;, which conflicts with an identically named<br/>			constant in libbind9. This conflict has been resolved.<br/>			[GL #1993]<br/><br/>5468.	[bug]		Addressed potential double unlock in process_fd().<br/>			[GL #2005]<br/><br/>5466.	[bug]		Addressed an error in recursive clients stats reporting.<br/>			[GL #1719]<br/><br/>5465.	[func]		Added fallback to built-in trust-anchors, managed-keys,<br/>			or trusted-keys if the bindkeys-file (bind.keys) cannot<br/>			be parsed. [GL #1235]<br/><br/>5464.	[bug]		Requesting more than 128 files to be saved when rolling<br/>			dnstap log files caused a buffer overflow. This has been<br/>			fixed. [GL #1989]<br/><br/>5462.	[bug]		Move LMDB locking from LMDB itself to named. [GL #1976]<br/><br/>5461.	[bug]		The STALE rdataset header attribute was updated while<br/>			the write lock was not being held, leading to incorrect<br/>			statistics. The header attributes are now converted to<br/>			use atomic operations. [GL #1475]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1.1.6</description>
    <pubDate>Fri Feb 19 16:37:12 UTC 2021</pubDate>
    <dc:creator>christos</dc:creator>
</item>

<item>
    <title>--- 9.16.5 released ---<br/><br/>5458.	[bug]		Prevent a theoretically possible NULL dereference caused<br/>			by a data race between zone_maintenance() and<br/>			dns_zone_setview_helper(). [GL #1627]<br/><br/>5455.	[bug]		named could crash when cleaning dead nodes in<br/>			lib/dns/rbtdb.c that were being reused. [GL #1968]<br/><br/>5454.	[bug]		Address a startup crash that occurred when the server<br/>			was under load and the root zone had not yet been<br/>			loaded. [GL #1862]<br/><br/>5453.	[bug]		named crashed on shutdown when a new rndc connection was<br/>			received during shutdown. [GL #1747]<br/><br/>5452.	[bug]		The "blackhole" ACL was accidentally disabled for client<br/>			queries. [GL #1936]<br/><br/>5451.	[func]		Add 'rndc dnssec -status' command. [GL #1612]<br/><br/>5449.	[bug]		Fix a socket shutdown race in netmgr udp. [GL #1938]<br/><br/>5448.	[bug]		Fix a race condition in isc__nm_tcpdns_send().<br/>			[GL #1937]<br/><br/>5447.	[bug]		IPv6 addresses ending in "::" could break YAML<br/>			parsing. A "0" is now appended to such addresses<br/>			in YAML output from dig, mdig, delv, and dnstap-read.<br/>			[GL #1952]<br/><br/>5446.	[bug]		The validator could fail to accept a properly signed<br/>			RRset if an unsupported algorithm appeared earlier in<br/>			the DNSKEY RRset than a supported algorithm. It could<br/>			also stop if it detected a malformed public key.<br/>			[GL #1689]<br/><br/>5444.	[bug]		'rndc dnstap -roll &lt;value&gt;' did not limit the number of<br/>			saved files to &lt;value&gt;. [GL !3728]<br/><br/>5443.	[bug]		The "primary" and "secondary" keywords, when used<br/>			as parameters for "check-names", were not<br/>			processed correctly and were being ignored. [GL #1949]<br/><br/>5441.	[bug]		${LMDB_CFLAGS} was missing from make/includes.in.<br/>			[GL #1955]<br/><br/>5440.	[test]		Properly handle missing kyua. [GL #1950]<br/><br/>5439.	[bug]		The DS RRset returned by dns_keynode_dsset() was used in<br/>			a non-thread-safe manner. [GL #1926]<br/><br/>	--- 9.16.4 released ---<br/><br/>5438.	[bug]		Fix a race in TCP accepting code. [GL #1930]<br/><br/>5437.	[bug]		Fix a data race in lib/dns/resolver.c:log_formerr().<br/>			[GL #1808]<br/><br/>5436.	[security]	It was possible to trigger an INSIST when determining<br/>			whether a record would fit into a TCP message buffer.<br/>			(CVE-2020-8618) [GL #1850]<br/><br/>5435.	[tests]		Add RFC 4592 responses examples to the wildcard system<br/>			test. [GL #1718]<br/><br/>5434.	[security]	It was possible to trigger an INSIST in<br/>			lib/dns/rbtdb.c:new_reference() with a particular zone<br/>			content and query patterns. (CVE-2020-8619) [GL #1111]<br/>			[GL #1718]<br/><br/>5431.	[func]		Reject DS records at the zone apex when loading<br/>			master files. Log but otherwise ignore attempts to<br/>			add DS records at the zone apex via UPDATE. [GL #1798]<br/><br/>5430.	[doc]		Update docs - with netmgr, a separate listening socket<br/>			is created for each IPv6 interface (just as with IPv4).<br/>			[GL #1782]<br/><br/>5428.	[bug]		Clean up GSSAPI resources in nsupdate only after taskmgr<br/>			has been destroyed. Thanks to Petr Menšík. [GL !3316]<br/><br/>5426.	[bug]		Don't abort() when setting SO_INCOMING_CPU on the socket<br/>			fails. [GL #1911]<br/><br/>5425.	[func]		The default value of "max-stale-ttl" has been changed<br/>			from 1 week to 12 hours. [GL #1877]<br/><br/>5424.	[bug]		With KASP, when creating a successor key, the "goal"<br/>			state of the current active key (predecessor) was not<br/>			changed and thus never removed from the zone. [GL #1846]<br/><br/>5423.	[bug]		Fix a bug in keymgr_key_has_successor(): it incorrectly<br/>			returned true if any other key in the keyring had a<br/>			successor. [GL #1845]<br/><br/>5422.	[bug]		When using dnssec-policy, print correct key timing<br/>			metadata. [GL #1843]<br/><br/>5421.	[bug]		Fix a race that could cause named to crash when looking<br/>			up the nodename of an RBT node if the tree was modified.<br/>			[GL #1857]<br/><br/>5420.	[bug]		Add missing isc_{mutex,conditional}_destroy() calls<br/>			that caused a memory leak on FreeBSD. [GL #1893]<br/><br/>5418.	[bug]		delv failed to parse deprecated trusted-keys-style<br/>			trust anchors. [GL #1860]<br/><br/>5416.	[bug]		Fix a lock order inversion in lib/isc/unix/socket.c.<br/>			[GL #1859]<br/><br/>5415.	[test]		Address race in dnssec system test that led to<br/>			test failures. [GL #1852]<br/><br/>5414.	[test]		Adjust time allowed for journal truncation to occur<br/>			in nsupdate system test to avoid test failure.<br/>			[GL #1855]<br/><br/>5413.	[test]		Address race in autosign system test that led to<br/>			test failures. [GL #1852]<br/><br/>5412.	[bug]		'provide-ixfr no;' failed to return up-to-date responses<br/>			when the serial was greater than or equal to the<br/>			current serial. [GL #1714]<br/><br/>5411.	[cleanup]	TCP accept code has been refactored to use a single<br/>			accept() and pass the accepted socket to child threads<br/>			for processing. [GL !3320]<br/><br/>5409.	[performance]	When looking up NSEC3 data in a zone database, skip the<br/>			check for empty non-terminal nodes; the NSEC3 tree does<br/>			not have any. [GL #1834]<br/><br/>5408.	[protocol]	Print Extended DNS Errors if present in OPT record.<br/>			[GL #1835]<br/><br/>5407.	[func]		Zone timers are now exported via statistics channel.<br/>			Thanks to Paul Frieden, Verizon Media. [GL #1232]<br/><br/>5405.	[bug]		'named-checkconf -p' could include spurious text in<br/>			server-addresses statements due to an uninitialized DSCP<br/>			value. [GL #1812]</title>
    <description>/src/external/mpl/bind/dist/lib/dns/dyndb.c - 1.1.1.5</description>
    <pubDate>Mon Aug 03 17:07:10 UTC 2020</pubDate>
    <dc:creator>christos</dc:creator>
</item>
</channel></rss>

