BIND 9.7.3 is now available.

2011-02-14 Thread Mark Andrews

Introduction

   BIND 9.7.3 is the current release of BIND 9.7.

   This document summarizes changes from BIND 9.7.1 to BIND 9.7.3. Please
   see the CHANGES file in the source code release for a complete list of
   all changes.

Download

   The latest development version of BIND 9 software can always be found
   on our web site at http://www.isc.org/downloads/development. There you
   will find additional information about each release, source code, and
   some pre-compiled versions for certain operating systems.

Support

   Product support information is available on
   http://www.isc.org/services/support for paid support options. Free
   support is provided by our user community via a mailing list.
   Information on all public email lists is available at
   https://lists.isc.org/mailman/listinfo.

New Features

9.7.2

 * Zones may be dynamically added and removed with the "rndc addzone"
   and "rndc delzone" commands. These dynamically added zones are
   written to a per-view configuration file. Do not rely on the
   configuration file name nor contents as this will change in a
   future release. This is an experimental feature at this time.
 * Added new "filter--on-v4" access control list to select which
   IPv4 clients have  record filtering applied.
 * A new command "rndc secroots" was added to dump a combined summary
   of the currently managed keys combined with statically configured
   trust anchors.
 * Added support to load new keys into managed zones without signing
   immediately with "rndc loadkeys". Added support to link keys with
   "dnssec-keygen -S" and "dnssec-settime -S".

Feature Changes

9.7.2

 * Documentation improvements
 * ORCHID prefixes were removed from the automatic empty zone list.
 * Improved handling of GSSAPI security contexts. Specifically, better
   memory management of cached contexts, limited lifetime of a context
   to 1 hour, and added a "realm" command to nsupdate to allow
   selection of a non-default realm name.
 * The contributed tool "zkt" was updated to version 1.0.

Security Fixes

9.7.2-P3

 * Adding a NO DATA signed negative response to cache failed to clear
   any matching RRSIG records already in cache. A subsequent lookup of
   the cached NO DATA entry could crash named (INSIST) when the
   unexpected RRSIG was also returned with the NO DATA cache entry.
   [RT #22288] [CVE-2010-3613] [VU#706148]
 * BIND, acting as a DNSSEC validator, was determining if the NS RRset
   is insecure based on a value that could mean either that the RRset
   is actually insecure or that there wasn't a matching key for the
   RRSIG in the DNSKEY RRset when resuming from validating the DNSKEY
   RRset. This can happen when in the middle of a DNSKEY algorithm
   rollover, when two different algorithms were used to sign a zone
   but only the new set of keys are in the zone DNSKEY RRset. [RT
   #22309] [CVE-2010-3614] [VU#837744]
 * When BIND is running as an authoritative server for a zone and
   receives a query for that zone data, it first checks for
   allow-query acls in the zone statement, then in that view, then in
   global options. If none of these exist, it defaults to allowing any
   query (allow-query {"any"};).
   With this bug, if the allow-query is not set in the zone statement,
   it failed to check in view or global options and fell back to the
   default of allowing any query. This means that queries that the
   zone owner did not wish to allow were incorrectly allowed. [RT
   #22418] [CVE-2010-3615] [VU#510208]

9.7.2-P2

 * A flaw where the wrong ACL was applied was fixed. This flaw allowed
   access to a cache via recursion even though the ACL disallowed it.

9.7.2-P1

 * If BIND, acting as a DNSSEC validating server, has two or more
   trust anchors configured in named.conf for the same zone (such as
   example.com) and the response for a record in that zone from the
   authoritative server includes a bad signature, the validating
   server will crash while trying to validate that query.

Bug Fixes

9.7.3

 * BIND now builds with threads disabled in versions of NetBSD earlier
   than 5.0 and with pthreads enabled by default in NetBSD versions
   5.0 and higher. Also removes support for unproven-pthreads,
   mit-pthreads and ptl2. [RT #19203]
 * Added a regression test for fix 2896/RT #21045 ("rndc sign" failed
   to properly update the zone when adding a DNSKEY for publication
   only). [RT #21324]
 * "nsupdate -l" now gives error message if "session.key" file is not
   found. [RT #21670]
 * HPUX now correctly defaults to using /dev/poll, which should
   increase performance. [RT #21919]
 * If named is running as a threaded application, after an "rndc stop"
   command has been issued, other inbound TC

Re: BIND 9.7.3 is now available.

2011-02-14 Thread Terry.
2011/2/15 Mark Andrews :
>
> 9.7.3
>
>     * BIND now builds with threads disabled in versions of NetBSD earlier
>       than 5.0 and with pthreads enabled by default in NetBSD versions
>       5.0 and higher. Also removes support for unproven-pthreads,
>       mit-pthreads and ptl2. [RT #19203]

Looks a great release.
BTW, does bind-9.7's threads work well on Linux X86 platform?

Regards.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.7.3 is now available.

2011-02-14 Thread Dennis Clarke

> 2011/2/15 Mark Andrews :
>>
>> 9.7.3
>>
>>     * BIND now builds with threads disabled in versions of NetBSD
>> earlier
>>       than 5.0 and with pthreads enabled by default in NetBSD versions
>>       5.0 and higher. Also removes support for unproven-pthreads,
>>       mit-pthreads and ptl2. [RT #19203]
>
> Looks a great release.
> BTW, does bind-9.7's threads work well on Linux X86 platform?
>

I would think a posix speec compliant implementation would work anywhere.
However, who knows, I'll give a quick build on Debian squeeze and see what
happens. Personally I'm not sure if there is a comprehensive test suite in
the iscbind packages. Is there ? How would one verify the functionality of
the new security features?


-- 
Dennis Clarke
dcla...@opensolaris.ca  <- Email related to the open source Solaris
dcla...@blastwave.org   <- Email related to open source for Solaris


___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.7.3 is now available.

2011-02-15 Thread Florian Weimer
* Dennis Clarke:

> I would think a posix speec compliant implementation would work anywhere.

BIND uses its own locking mechanisms, using machine code insertions.
For fringe some platforms, they do not seem to be correct.  i386 or
amd64 should be fine, though.

(Switching to GCC's synchronization primitives would probably be quite
easy, at least if you can figure out which ordering semantics are
expected.  The machine code insertions already depend on GCC, after
all.)

-- 
Florian Weimer
BFK edv-consulting GmbH   http://www.bfk.de/
Kriegsstraße 100  tel: +49-721-96201-1
D-76133 Karlsruhe fax: +49-721-96201-99
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users


Re: BIND 9.7.3 is now available.

2011-02-15 Thread Evan Hunt
> > BTW, does bind-9.7's threads work well on Linux X86 platform?

Yes they do, but note that threads are not enabled by default on Linux; you
have to configure BIND9 with the --enable-threads option.

(This requirement has probably outlived its usefulness and we should enable
them by default now.  We do on most other platforms.)

-- 
Evan Hunt -- e...@isc.org
Internet Systems Consortium, Inc.
___
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users