- Add patch from SVN to support DNSSEC records
- Update examples (config and table creation files)
- For the complete changelog see http://doc.powerdns.com/changelog.html
PR: ports/112055
Submitted by: maintainer (Ralf van der Enden)
Reviewed by: maintainer
contains a bugfix for recovering from permanently lost database connections
- Fix build on gcc 4.x
PR: ports/109273
Submitted by: Ralf van der Enden <tremere at cainites.net> (maintainer)
It uses POE::Component::Client::DNS to handle resolving when configured as
'forward_only' and Net::DNS::Resolver::Recurse wrapped by
POE::Component::Generic to perform recursion.
One may add handlers to massage and manipulate responses to particular queries
which is vaguely modelled after Net::DNS::Nameserver.
WWW: http://search.cpan.org/dist/POE-Component-Server-DNS/
PR: ports/109449
Submitted by: Jin-Shan Tseng <tjs at cdpa.nsysu.edu.tw>
Approved by: erwin (mentor, implicit)
descendant class that allows a virtual DNS to be emulated
instead of querying the real DNS. A set of static DNS
records may be supplied, or arbitrary code may be specified
as a means for retrieving DNS records, or even generating
them on the fly.
WWW: http://search.cpan.org/dist/Net-DNS-Resolver-Programmable/
- Koen Martens
gmc@sonologic.nl
PR: ports/108997
Submitted by: Koen Martens <gmc at sonologic.nl>
- Prepare Makefile for upcoming new stable release of OpenDBX library (which
bumps library number from .1 to .2).
- Add stupidity fix for config location to pdns.in (moved the config but
forgot to edit rc.d script).
- Also changed location of config directory in pdns.conf.
- Bump port-revision.
PR: ports/108685
Submitted by: Ralf van der Enden <tremere@cainites.net> (maintainer)
Obtained from: www.linuxnetworks.de [1]
was supposed to work is useless, because if we can't trust the distfile from
the remote machine, we can't trust the signature from the same machine either.
Our MD5 and SHA256 are good for checking both the sanity and the
trustiness of distfiles.
Approved by: portmgr (erwin), erwin (mentor)
following security issues. All users of BIND are encouraged to upgrade
to this version.
2126. [security] Serialise validation of type ANY responses. [RT #16555]
2124. [security] It was possible to dereference a freed fetch
context. [RT #16584]
2089. [security] Raise the minimum safe OpenSSL versions to
OpenSSL 0.9.7l and OpenSSL 0.9.8d. Versions
prior to these have known security flaws which
are (potentially) exploitable in named. [RT #16391]
2088. [security] Change the default RSA exponent from 3 to 65537.
[RT #16391]
2066. [security] Handle SIG queries gracefully. [RT #16300]
1941. [bug] ncache_adderesult() should set eresult even if no
rdataset is passed to it. [RT #15642]