Unbound is designed as a set of modular components, so that also
DNSSEC (secure DNS) validation and stub-resolvers (that do not run as
a server, but are linked into an application) are easily possible.
Goals:
* A validating recursive DNS resolver.
* Code diversity in the DNS resolver monoculture.
* Drop-in replacement for BIND apart from config.
* DNSSEC support.
* Fully RFC compliant.
* High performance
o even with validation.
* Used as
o stub resolver.
o full caching name server.
o resolver library.
* Elegant design of validator, resolver, cache modules.
o provide the ability to pick and choose modules.
* Robust.
* In C, open source: The BSD license.
* Smallest as possible component that does the job.
* Stub-zones can be configured (local data or AS112 zones).
Non-goals:
* An authoritative name server.
* Too many Features.
WWW: http://unbound.net
- Remove USE_XLIB/USE_X_PREFIX/USE_XPM in favor of USE_XORG
- Remove X11BASE support in favor of LOCALBASE or PREFIX
- Use USE_LDCONFIG instead of INSTALLS_SHLIB
- Remove unneeded USE_GCC 3.4+
Thanks to all Helpers:
Dmitry Marakasov, Chess Griffin, beech@, dinoex, rafan, gahr,
ehaupt, nox, itetcu, flz, pav
PR: 116263
Tested on: pointyhat
Approved by: portmgr (pav)
Fix rt.cpan.org #30316 Security issue with Net::DNS Resolver.
Net/DNS/RR/A.pm in Net::DNS 0.60 build 654 allows remote attackers
to cause a denial of service (program "croak") via a crafted DNS
response (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-6341). Packet
parsing routines are now enclosed in eval blocks to trap exception
and avoid premature termination of user program.
Used ideas from:
PR: ports/120702
Submitted by: Felippe de Meirelles Motta <lippemail@gmail.com>
where the portname does not match the projects hostname.
PR: ports/121453 (related)
Submitted by: Edwin Groothuis <edwin@mavetju.org>
Reviewed by: pav@
took the IPv6 address even if you used the -4 option.
- Fix false lame server issues with domains which have the
higher domain in it (command.com for example).
responses.
It is designed to be used in conjunction with an existing recursive DNS resolver
in order to protect networks against DNS rebinding attacks.
interrogation success for a list of IP addresses against a list of DNSBL's.
The module is used to implement the reproting script dnsblstat.
WWW: http://search.cpan.org/dist/Net-DNSBL-Statistics/
PR: ports/119424
Submitted by: Jin-Shan Tseng <tjs at cdpa.nsysu.edu.tw>
Actually, the maintainer submits the rc script which uses 'name=noip2'.
After some discussion with him, I changed it to use noip in order to
match its port name, but forget to properly set $command.
Pointy hat to: rafan
Reported by: Andrea Venturoli <ml at netfence.it>
Approved by: maintainer (implicit)
PLIST_SUB, so deleting them will not change the package. Therefore
no PORTREVISION bump.
PR: ports/119458
Submitted by: Philippe Audeoud <jadawin@tuxaco.net>
directly frobbing packets or calling Net::DNS::RR->new_from_data()
(which you should not be doing anyway) then you should read the changelog
carefully and review/test your code before committing to this version.
2. Remove support for old Perl.