1
0
mirror of https://git.FreeBSD.org/ports.git synced 2024-12-01 01:17:02 +00:00
Commit Graph

1854 Commits

Author SHA1 Message Date
Doug Barton
5e23e2bb05 Add bind-tools:
The user space command line tools from the latest version of BIND:
	dig, host, and nslookup

WWW: https://www.isc.org/software/bind
2010-04-02 02:46:11 +00:00
Bernhard Froehlich
7eae482233 - Change to my FreeBSD email address
Approved by:	miwi (mentor), beat (co-mentor)
2010-04-01 12:45:37 +00:00
Dirk Meyer
de78af3ac5 - update to 1.4.1
Reviewed by:	exp8 run on pointyhat
Supported by:	miwi
2010-03-28 06:47:48 +00:00
Doug Barton
204523bd3c Cleanse more RC_SUBR and RC_SUBR_SUFFIX variables 2010-03-28 05:52:12 +00:00
Doug Barton
1d6b4b3f91 Begin the process of deprecating sysutils/rc_subr by
s#. %%RC_SUBR%%#. /etc/rc.subr#
2010-03-27 00:15:24 +00:00
Peter Pentchev
27109dac2c Update to c-ares 1.7.1 and redo the config patch to also support
IPv6 nameserver addresses.
2010-03-25 11:54:02 +00:00
Peter Pentchev
2b2456bcb8 Update to c-ares-1.7.0. In the process:
- actually pass the options-enabled arguments to the configure script!
- add the "hide symbols" configurable knob, though I've no idea why
  anybody would want to turn that off... except maybe for debugging
- install the "acountry", "adig", and "ahost" programs, since they do
  come in useful every now and then
- refresh the patches and add descriptions at the top
2010-03-22 10:56:04 +00:00
Mark Linimon
e163b1f34b Mark as broken on sparc64: fails to install.
Hat:		portmgr
2010-03-22 06:03:48 +00:00
Martin Wilke
b0c6169445 - Update to 1.8.0
PR:		144737
Submitted by:	ghostonthewire <ghostonthewire@gmail.com> (maintainer)
2010-03-20 19:12:44 +00:00
Martin Wilke
18ac089009 - Pass maintainership to Jaap Akkerhuis <jaap@nlnetlabs.nl>
PR:		144864
Submitted by:	Olafur Osvaldsson <osvaldsson@icelandic.net> (previous maintainer)
2010-03-20 18:02:23 +00:00
Martin Wilke
537c86d600 - Pass maintainership to Jaap Akkerhuis <jaap@nlnetlabs.nl>
PR:		144865
Submitted by:	Olafur Osvaldsson <osvaldsson@icelandic.net> (previous maintainer)
2010-03-20 18:00:32 +00:00
Martin Wilke
9ca6c279f1 - Mark BROKEN on HEAD: fails to build with new utmpx
Reported by:	pointyhat
2010-03-20 16:17:50 +00:00
Doug Barton
e0bc892a0e Update to the latest patchfix releases to deal with the problems
related to the handling of broken DNSSEC trust chains.

This fix is only necessary for those who have DNSSEC validation
enabled and configure trust anchors from third parties, either
manually, or through a system like DLV.
2010-03-17 05:35:03 +00:00
Anton Berezin
7cb5c6088a Update to 0.16.
Changes:	http://search.cpan.org/dist/Net-DNS-SEC/Changes
2010-03-13 08:25:54 +00:00
Alberto Villa
9ad1c46cf5 - Update to 3.2.
- Respect O3 cflags as requested by the author.

PR:		144535
Submitted by:	Sten Spans <sten@blinkenlights.nl> (maintainer)
Approved by:	tabthorpe (mentor)
2010-03-12 18:54:22 +00:00
Sergey Matveychuk
65f3f3ca62 - Update to 1.4.3 2010-03-12 12:54:34 +00:00
Wen Heping
0b7b7696ed - Update to 1.44 2010-03-10 12:08:48 +00:00
Doug Barton
3b7f26a8ca Upgrade to version 9.6.2. This version includes all previously released
security patches to the 9.6.1 version, as well as many other bug fixes.

Due to the fact that the DNSSEC algorithm that will be used to sign the
root zone is only included in this version and in 9.7.x those who wish
to do validation MUST upgrade to one of these prior to July 2010.

Feature safe:	yes
2010-03-02 04:06:10 +00:00
Gabor Kovesdan
4d10416a66 - Update to 1.2.8
Feature safe:	yes
2010-02-24 09:59:09 +00:00
Johan van Selst
532e84e129 Update my mail address to @FreeBSD.org
Feature safe:	yes
2010-02-23 18:03:45 +00:00
Doug Barton
064004f4ef Update to the release version of BIND 9.7.0, and remove the -devel
suffix as a result.

Feature safe:	yes
2010-02-17 06:13:15 +00:00
Li-Wen Hsu
063255fa5d - Update to 2.1.0
PR:		ports/143957
Submitted by:	Janos Mohacsi <janos.mohacsi AT bsd.hu> (maintainer)
2010-02-15 16:54:31 +00:00
Philip M. Gollucci
6e165bf799 - Fix permission issues
PR:             ports/143550
Submitted by:   Marko Njezic <mrmax063@maxempire.com>
Approved by:    Olafur Osvaldsson <osvaldsson@icelandic.net> (maintainer)
2010-02-11 19:37:10 +00:00
Pav Lucistnik
a639b8cc99 - Update to 1.0.0 release
PR:		ports/143712
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2010-02-11 10:33:58 +00:00
Philip M. Gollucci
b339872c92 - Reset more ports I don't use anymore 2010-02-10 21:47:48 +00:00
Philip M. Gollucci
178d590d92 - Fix installation permissions
- Submitter is now MAINTAINER

PR:             ports/143450
Submitted by:   Alexey V.Degtyarev <alexey@renatasystems.org>
2010-02-10 02:58:33 +00:00
Martin Wilke
6f2c20c1ab - Update to 1.6.4
PR:		143605
Submitted by:	Cristiano Rolim Pereira <cristianorolim@hotmail.com>
Approved by:	maintainer
2010-02-08 22:03:13 +00:00
Martin Wilke
9285f749d9 - Update to 1.4.03
PR:		143534
Submitted by:	Bernhard Froehlich <decke@bluelife.at> (maintainer)
2010-02-08 15:08:44 +00:00
Li-Wen Hsu
bd472979ca - Update to 9.0.0
PR:		ports/140937
Submitted by:	wen
2010-02-07 09:34:28 +00:00
Dirk Meyer
ca9c60461c - update to jpeg-8 2010-02-05 11:46:55 +00:00
Ion-Mihai Tetcu
fae8374e9f libasyncns is a C library for Linux/Unix for executing name service queries
asynchronously. It is an asynchronous wrapper around getaddrinfo(3),
getnameinfo(3), res_query(3) and res_search(3) from libc and libresolv.

In contrast to GNU's asynchronous name resolving API getaddrinfo_a(),
libasyncns does not make use of UNIX signals for reporting completion of name
queries. Instead, the API exports a standard UNIX file descriptor which may be
integerated cleanly into custom main loops.

In contrast to asynchronous DNS resolving libraries like libdenise, skadns,
adns, libasyncns is just an asynchronous wrapper around the libc's synchronous
getaddrinfo() API, which has the advantage of allowing name resolution using
techniques like Multicast DNS, LDAP or NIS using standard libc NSS (Name
Service Switch) modules. libasyncns is compatible with IPv6 if the underlying
libc is.

libasyncns is very tiny, consisting of just one header and one source file. It
has no dependencies besides libc.

WWW: http://0pointer.de/lennart/projects/libasyncns/
2010-02-04 08:25:54 +00:00
Wen Heping
c14f63bd39 - Update to 1.43 2010-02-04 00:33:47 +00:00
Sergey Matveychuk
28d4421e7e - OpenSSL has no sha256 functions on 6.x
Reported by:	Michael Meelis <m.meelis at easybow.com>
2010-02-02 15:34:31 +00:00
Doug Barton
c595c1f9f0 Upgrade to 9.4-ESV, the first of the "Extended Support Releases"
from ISC. It has numerous bug fixes compared to 9.4.3*, however
in the case of this version "extended" only applies till 2010/12/31
so serious BIND users are still encouraged to upgrade to 9.6.x.
2010-02-02 07:14:33 +00:00
Doug Barton
f89b15d117 Update to 9.7.0rc2 which has numerous bug fixes, especially
for DNSSEC.
2010-02-01 20:57:31 +00:00
Jun Kuriyama
935c866afb - Remove unneeded dependencies which is in perl-5.8.9 dist
(part 13).

Approved by:	portmgr (itetcu)
2010-01-28 04:53:50 +00:00
Jun Kuriyama
3f795ed795 - Remove unneeded dependencies which is in perl-5.8.9 dist
(part 12).

Approved by:	portmgr (itetcu)
2010-01-28 02:32:30 +00:00
Martin Wilke
a602da42eb * Fix for Bug #0000040 http://bugs.mydns-ng.com/view.php?id=40
child processes must not shutdown() their sockets
* Fixes and reports a problem occuring with jumping system time,
  as reported when running inside some virtual machine. Time jumps
  are reported to the log with loglevel NOTICE.
* Delegation now has precedence over wildcard matching
  Thanks to Fab for the fix
  Fixes bugs #0000038, #0000042

PR:		143223
Submitted by:	Hung-Yi Chen <gaod@hychen.org> (maintainer)
2010-01-27 13:03:31 +00:00
Philippe Audeoud
3fa59a7fd4 - Update to 1.16
- Removed useless patches

PR:		ports/143274
Submitted by:	Sofian Brabez <sbrabez gmail.com>
2010-01-27 08:44:43 +00:00
Doug Barton
6769638166 Blah ... forgot to re-add this patch for the slave port again. 2010-01-26 18:18:50 +00:00
Sergey Matveychuk
fd36702b5e - Forgot to set : ${unbound_enable:-"NO"}
- Allow user to set a pid file location with unbound_pidfile="..."

PR:		ports/142793 (based on)
Submitted by:	Keith Gaughan <k at stereochro.me>
2010-01-25 14:30:05 +00:00
Martin Wilke
ab9b313b00 - Update to 1.6.4
PR:		143060
Submitted by:	Konstantin Saurbier <konstantin@saurbier.net> (maintainer)
2010-01-25 08:53:29 +00:00
Doug Barton
9b77b5a942 Upgrade to BIND 9.4.3-P5, 9.5.2-P2, and 9.6.1-P3. These versions address
the following vulnerabilities:

BIND 9 Cache Update from Additional Section
https://www.isc.org/advisories/CVE-2009-4022v6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022
A nameserver with DNSSEC validation enabled may incorrectly add
unauthenticated records to its cache that are received during the
resolution of a recursive client query

BIND 9 DNSSEC validation code could cause bogus NXDOMAIN responses
https://www.isc.org/advisories/CVE-2010-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097
There was an error in the DNSSEC NSEC/NSEC3 validation code that could
cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records
proven by NSEC or NSEC3 to exist) to be cached as if they had validated
correctly

These issues only affect systems with DNSSEC validation enabled.
2010-01-25 00:25:08 +00:00
Matthias Andree
e05b66b4de Change MAINTAINER to my FreeBSD address.
Update to new upstream release 2.52. Changelog excerpt below the approval.

Approved by: miwi (mentor)

Upstream changelog excerpt (omitting Linux, Solaris and MacOS X specifics):
[...] Re-read the set of network interfaces when re-loading /etc/resolv.conf
  if --bind-interfaces is not set. This handles the case that loopback
  interfaces do not exist when dnsmasq is first started.

  Tweak the PXE code to support port 4011. This should reduce broadcasts and
  make things more reliable when other servers are around. It also improves
  inter-operability with certain clients.

  Make a pxe-service configuration with no filename or boot service type legal:
  this does a local boot. eg.  pxe-service=x86PC, "Local boot"

  Be more conservative in detecting "A for A" queries. Dnsmasq checks if the
  name in a type=A query looks like a dotted-quad IP address and answers the
  query itself if so, rather than forwarding it. Previously dnsmasq relied in
  the library function inet_addr() to convert addresses, and that will accept
  some things which are confusing in this context, like 1.2.3 or even just
  1234. Now we only do A for A processing for four decimal numbers delimited by
  dots.
[...]
  Increased the default limit on number of leases to 1000 (from 150). This is
  mainly a defence against DoS attacks, and for the average "one for two class
  C networks" installation, IP address exhaustion does that just as well.
  Making the limit greater than the number of IP addresses available in such an
  installation removes a surprise which otherwise can catch people out.

  Removed extraneous trailing space in the value of the DNSMASQ_TIME_REMAINING
  DNSMASQ_LEASE_LENGTH and DNSMASQ_LEASE_EXPIRES environment variables. Thanks
  to Gildas Le Nadan for spotting this.

  Provide the network-id tags for a DHCP transaction to the lease-change script
  in the environment variable DNSMASQ_TAGS. A good suggestion from Gildas Le
  Nadan.

  Add support for RFC3925 "Vendor-Identifying Vendor Options". The syntax looks
  like this:
  --dhcp-option=vi-encap:<enterprise number>, .........

  Add support to --dhcp-match to allow matching against RFC3925
  "Vendor-Identifying Vendor Classes". The syntax looks like this:
  --dhcp-match=tag,vi-encap<enterprise number>, <value>

  Add some application specific code to assist in implementing the Broadband
  forum TR069 CPE-WAN specification. The details are in contrib/CPE-WAN/README

  Increase the default DNS packet size limit to 4096, as recommended by RFC5625
  section 4.4.3. This can be reconfigured using --edns-packet-max if needed.
  Thanks to Francis Dupont for pointing this out.

  Rewrite query-ids even for DNSSEC signed packets, since this is allowed by
  RFC5625 section 4.5.
[...]
  Fix link error when including Dbus but excluding DHCP.
  Thanks to Oschtan for the bug report.

  Updated French translation. Thanks to Gildas Le Nadan.

  Updated Polish translation. Thanks to Jan Psota.

  Updated Spanish translation. Thanks to Chris Chatham.
2010-01-23 11:24:31 +00:00
Sergey A. Osokin
69a365881d Fix build on 6.4-STABLE by add pthread's compiler/linker flags.
Bump PORTREVISION.

Reported by:	pointyhat via erwin@
Approved by:	maintainer aka jaap at NLnetLabs dot nl
2010-01-18 20:02:27 +00:00
Martin Wilke
2104a91372 - Update to 1.4.02
- Pass maintainership to submitter

PR:		142723
Submitted by:	Bernhard Froehlich <decke@bluelife.at>
2010-01-18 07:58:26 +00:00
Sergey A. Osokin
01bb4b3b91 Fix build by change dependences.
Fix COMMENT.
Respect CC/CFLAGS.
Write install target.
Bump PORTREVISION.

Report by:	QAT@
Approved by:	Jaap Akkerhuis aka jaap at NLnetLabs dot nl (maintainer)
Pointy hat to:	nemoliu@
2010-01-13 14:20:09 +00:00
Tong LIU
fec356c200 Add autotrust 0.3.1, a a tool to automatically update DNSSEC trust
anchors.

PR:		ports/142523
Submitted by:	Jaap Akkerhuis <jaap at nlnetlabs.nl>
2010-01-13 06:33:07 +00:00
Sergey Matveychuk
7c55f9279a - A patch from SVN. It fixes a regression in IPv6 caching in
1.4.1 version.
2010-01-12 15:28:11 +00:00
Wen Heping
bc12913b52 - Update to 3.2.4
PR:		ports/142718
Submitted by:	Olafur Osvaldsson <osvaldsson@icelandic.net> (maintainer)
2010-01-12 00:41:23 +00:00