head	1.11;
access;
symbols
	RELENG_8_4:1.11.0.2
	RELENG_9_1_0_RELEASE:1.8.2.2
	RELENG_9_1:1.8.2.2.0.2
	RELENG_9_1_BP:1.8.2.2
	RELENG_8_3_0_RELEASE:1.3.2.4
	RELENG_8_3:1.3.2.4.0.2
	RELENG_8_3_BP:1.3.2.4
	RELENG_9_0_0_RELEASE:1.8
	RELENG_9_0:1.8.0.4
	RELENG_9_0_BP:1.8
	RELENG_9:1.8.0.2
	RELENG_9_BP:1.8
	RELENG_7_4_0_RELEASE:1.1.1.7.2.3
	RELENG_8_2_0_RELEASE:1.3.2.2
	RELENG_7_4:1.1.1.7.2.3.0.2
	RELENG_7_4_BP:1.1.1.7.2.3
	RELENG_8_2:1.3.2.2.0.2
	RELENG_8_2_BP:1.3.2.2
	RELENG_8_1_0_RELEASE:1.3.2.1
	RELENG_8_1:1.3.2.1.0.2
	RELENG_8_1_BP:1.3.2.1
	RELENG_7_3_0_RELEASE:1.1.1.7.2.2.4.1
	RELENG_7_3:1.1.1.7.2.2.0.4
	RELENG_7_3_BP:1.1.1.7.2.2
	RELENG_8_0_0_RELEASE:1.3
	RELENG_8_0:1.3.0.4
	RELENG_8_0_BP:1.3
	RELENG_8:1.3.0.2
	RELENG_8_BP:1.3
	RELENG_7_2_0_RELEASE:1.1.1.7.2.2
	RELENG_7_2:1.1.1.7.2.2.0.2
	RELENG_7_2_BP:1.1.1.7.2.2
	RELENG_7_1_0_RELEASE:1.1.1.7.2.1
	RELENG_6_4_0_RELEASE:1.1.1.2.2.5
	RELENG_7_1:1.1.1.7.2.1.0.4
	RELENG_7_1_BP:1.1.1.7.2.1
	RELENG_6_4:1.1.1.2.2.5.0.2
	RELENG_6_4_BP:1.1.1.2.2.5
	RELENG_7_0_0_RELEASE:1.1.1.7.2.1
	RELENG_6_3_0_RELEASE:1.1.1.2.2.4
	RELENG_7_0:1.1.1.7.2.1.0.2
	RELENG_7_0_BP:1.1.1.7.2.1
	BIND_9_4_2:1.1.1.8
	RELENG_6_3:1.1.1.2.2.4.0.2
	RELENG_6_3_BP:1.1.1.2.2.4
	RELENG_7:1.1.1.7.0.2
	RELENG_7_BP:1.1.1.7
	BIND_9_4_1_P1:1.1.1.7
	BIND_9_4_1:1.1.1.6
	BIND_9_3_4:1.1.1.5
	RELENG_6_2_0_RELEASE:1.1.1.2.2.1.4.1
	BIND_9_3_3:1.1.1.4
	RELENG_6_2:1.1.1.2.2.1.0.4
	RELENG_6_2_BP:1.1.1.2.2.1
	RELENG_5_5_0_RELEASE:1.1.1.1.2.3
	RELENG_5_5:1.1.1.1.2.3.0.2
	RELENG_5_5_BP:1.1.1.1.2.3
	RELENG_6_1_0_RELEASE:1.1.1.2.2.1
	RELENG_6_1:1.1.1.2.2.1.0.2
	RELENG_6_1_BP:1.1.1.2.2.1
	BIND_9_3_2:1.1.1.3
	RELENG_6_0_0_RELEASE:1.1.1.2
	RELENG_6_0:1.1.1.2.0.4
	RELENG_6_0_BP:1.1.1.2
	RELENG_6:1.1.1.2.0.2
	RELENG_6_BP:1.1.1.2
	RELENG_5_4_0_RELEASE:1.1.1.1.2.2
	RELENG_5_4:1.1.1.1.2.2.0.2
	RELENG_5_4_BP:1.1.1.1.2.2
	BIND_9_3_1:1.1.1.2
	RELENG_5_3_0_RELEASE:1.1.1.1.2.1
	RELENG_5_3:1.1.1.1.2.1.0.2
	RELENG_5_3_BP:1.1.1.1.2.1
	RELENG_5:1.1.1.1.0.2
	BIND_9_3_0:1.1.1.1
	BIND_9_3_0_RC4:1.1.1.1
	ISC:1.1.1;
locks; strict;
comment	@# @;


1.11
date	2012.12.07.12.43.13;	author svnexp;	state Exp;
branches
	1.11.2.1;
next	1.10;

1.10
date	2012.05.28.19.47.56;	author dougb;	state Exp;
branches;
next	1.9;

1.9
date	2012.04.05.04.29.35;	author dougb;	state Exp;
branches;
next	1.8;

1.8
date	2011.09.03.07.13.45;	author dougb;	state Exp;
branches
	1.8.2.1;
next	1.7;

1.7
date	2011.07.16.11.12.09;	author dougb;	state Exp;
branches;
next	1.6;

1.6
date	2011.02.06.22.46.07;	author dougb;	state Exp;
branches;
next	1.5;

1.5
date	2010.10.31.04.45.53;	author dougb;	state Exp;
branches;
next	1.4;

1.4
date	2010.03.03.05.45.24;	author dougb;	state Exp;
branches;
next	1.3;

1.3
date	2009.05.31.05.42.58;	author dougb;	state Exp;
branches
	1.3.2.1;
next	1.2;

1.2
date	2008.12.23.22.47.56;	author dougb;	state Exp;
branches;
next	1.1;

1.1
date	2004.09.19.01.30.02;	author trhodes;	state Exp;
branches
	1.1.1.1;
next	;

1.11.2.1
date	2012.12.07.12.43.13;	author svnexp;	state dead;
branches;
next	1.11.2.2;

1.11.2.2
date	2013.03.28.13.00.18;	author svnexp;	state Exp;
branches;
next	;

1.8.2.1
date	2012.04.08.01.43.41;	author dougb;	state Exp;
branches;
next	1.8.2.2;

1.8.2.2
date	2012.06.01.03.46.28;	author dougb;	state Exp;
branches;
next	1.8.2.3;

1.8.2.3
date	2013.01.08.10.02.28;	author svnexp;	state Exp;
branches;
next	1.8.2.4;

1.8.2.4
date	2013.08.16.08.01.49;	author svnexp;	state Exp;
branches;
next	1.8.2.5;

1.8.2.5
date	2013.08.26.08.01.48;	author svnexp;	state Exp;
branches;
next	1.8.2.6;

1.8.2.6
date	2014.03.03.10.08.04;	author svnexp;	state Exp;
branches;
next	;

1.3.2.1
date	2010.03.29.06.31.58;	author dougb;	state Exp;
branches;
next	1.3.2.2;

1.3.2.2
date	2010.11.04.21.48.39;	author dougb;	state Exp;
branches;
next	1.3.2.3;

1.3.2.3
date	2011.02.05.19.13.34;	author dougb;	state Exp;
branches;
next	1.3.2.4;

1.3.2.4
date	2011.08.02.08.07.59;	author dougb;	state Exp;
branches;
next	1.3.2.5;

1.3.2.5
date	2012.04.05.04.31.17;	author dougb;	state Exp;
branches;
next	1.3.2.6;

1.3.2.6
date	2012.05.28.19.48.37;	author dougb;	state Exp;
branches;
next	1.3.2.7;

1.3.2.7
date	2013.01.04.14.22.19;	author svnexp;	state Exp;
branches;
next	1.3.2.8;

1.3.2.8
date	2013.02.11.12.33.24;	author svnexp;	state Exp;
branches;
next	1.3.2.9;

1.3.2.9
date	2014.03.03.10.23.38;	author svnexp;	state Exp;
branches;
next	;

1.1.1.1
date	2004.09.19.01.30.02;	author trhodes;	state Exp;
branches
	1.1.1.1.2.1;
next	1.1.1.2;

1.1.1.2
date	2005.03.17.08.02.12;	author dougb;	state Exp;
branches
	1.1.1.2.2.1;
next	1.1.1.3;

1.1.1.3
date	2005.12.29.04.21.47;	author dougb;	state Exp;
branches;
next	1.1.1.4;

1.1.1.4
date	2006.12.10.07.06.01;	author dougb;	state Exp;
branches;
next	1.1.1.5;

1.1.1.5
date	2007.01.29.18.31.19;	author dougb;	state Exp;
branches;
next	1.1.1.6;

1.1.1.6
date	2007.06.02.23.20.54;	author dougb;	state Exp;
branches;
next	1.1.1.7;

1.1.1.7
date	2007.07.25.08.11.45;	author dougb;	state Exp;
branches
	1.1.1.7.2.1;
next	1.1.1.8;

1.1.1.8
date	2007.12.02.19.09.41;	author dougb;	state Exp;
branches;
next	;

1.1.1.1.2.1
date	2004.09.26.03.09.30;	author des;	state Exp;
branches;
next	1.1.1.1.2.2;

1.1.1.1.2.2
date	2005.03.23.18.16.23;	author dougb;	state Exp;
branches;
next	1.1.1.1.2.3;

1.1.1.1.2.3
date	2006.01.14.10.41.57;	author dougb;	state Exp;
branches;
next	1.1.1.1.2.4;

1.1.1.1.2.4
date	2006.12.13.09.57.00;	author dougb;	state Exp;
branches;
next	1.1.1.1.2.5;

1.1.1.1.2.5
date	2007.02.07.00.46.33;	author dougb;	state Exp;
branches;
next	1.1.1.1.2.6;

1.1.1.1.2.6
date	2007.07.25.08.24.39;	author dougb;	state Exp;
branches;
next	;

1.1.1.2.2.1
date	2006.01.14.10.13.33;	author dougb;	state Exp;
branches
	1.1.1.2.2.1.4.1;
next	1.1.1.2.2.2;

1.1.1.2.2.2
date	2006.12.13.09.46.47;	author dougb;	state Exp;
branches;
next	1.1.1.2.2.3;

1.1.1.2.2.3
date	2007.02.07.00.42.07;	author dougb;	state Exp;
branches;
next	1.1.1.2.2.4;

1.1.1.2.2.4
date	2007.07.25.08.23.07;	author dougb;	state Exp;
branches;
next	1.1.1.2.2.5;

1.1.1.2.2.5
date	2008.06.03.05.38.10;	author dougb;	state Exp;
branches;
next	1.1.1.2.2.6;

1.1.1.2.2.6
date	2009.01.10.04.30.27;	author dougb;	state Exp;
branches;
next	;

1.1.1.2.2.1.4.1
date	2006.12.13.09.52.14;	author dougb;	state Exp;
branches;
next	;

1.1.1.7.2.1
date	2007.12.07.08.31.04;	author dougb;	state Exp;
branches;
next	1.1.1.7.2.2;

1.1.1.7.2.2
date	2009.01.10.03.00.21;	author dougb;	state Exp;
branches
	1.1.1.7.2.2.4.1;
next	1.1.1.7.2.3;

1.1.1.7.2.3
date	2010.02.16.05.14.51;	author dougb;	state Exp;
branches;
next	1.1.1.7.2.4;

1.1.1.7.2.4
date	2011.08.02.09.42.58;	author dougb;	state Exp;
branches;
next	;

1.1.1.7.2.2.4.1
date	2010.02.16.18.10.35;	author dougb;	state Exp;
branches;
next	;


desc
@@


1.11
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/243981
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@BIND 9

	BIND version 9 is a major rewrite of nearly all aspects of the
	underlying BIND architecture.  Some of the important features of
	BIND 9 are:

		- DNS Security
			DNSSEC (signed zones)
			TSIG (signed DNS requests)

		- IP version 6
			Answers DNS queries on IPv6 sockets
			IPv6 resource records (AAAA)
			Experimental IPv6 Resolver Library

		- DNS Protocol Enhancements
			IXFR, DDNS, Notify, EDNS0
			Improved standards conformance

		- Views
			One server process can provide multiple "views" of
			the DNS namespace, e.g. an "inside" view to certain
			clients, and an "outside" view to others.

		- Multiprocessor Support

		- Improved Portability Architecture


	BIND version 9 development has been underwritten by the following
	organizations:

		Sun Microsystems, Inc.
		Hewlett Packard
		Compaq Computer Corporation
		IBM
		Process Software Corporation
		Silicon Graphics, Inc.
		Network Associates, Inc.
		U.S. Defense Information Systems Agency
		USENIX Association
		Stichting NLnet - NLnet Foundation
		Nominum, Inc.

	For a summary of functional enhancements in previous
	releases, see the HISTORY file.

	For a detailed list of user-visible changes from
	previous releases, see the CHANGES file.

        For up-to-date release notes and errata, see
        http://www.isc.org/software/bind9/releasenotes

BIND 9.8.4

        BIND 9.8.4 includes several bug fixes and patches security
        flaws described in CVE-2012-1667, CVE-2012-3817 and CVE-2012-4244.

BIND 9.8.3

	BIND 9.8.3 is a maintenance release.

BIND 9.8.2

	BIND 9.8.2 includes a number of bug fixes and prevents a security
	problem described in CVE-2011-4313

BIND 9.8.1

        BIND 9.8.1 includes a number of bug fixes and enhancements from
	BIND 9.8 and earlier releases.  New features include:

	- The DLZ "dlopen" driver is now built by default.
	- Added a new include file with function typedefs
          for the DLZ "dlopen" driver.
	- Made "--with-gssapi" default.
	- More verbose error reporting from DLZ LDAP.

BIND 9.8.0

        BIND 9.8.0 includes a number of changes from BIND 9.7 and earlier
        releases.  New features include:

        - Built-in trust anchor for the root zone, which can be
          switched on via "dnssec-validation auto;"
        - Support for DNS64.
        - Support for response policy zones (RPZ).
        - Support for writable DLZ zones.
        - Improved ease of configuration of GSS/TSIG for
          interoperability with Active Directory
        - Support for GOST signing algorithm for DNSSEC.
        - Removed RTT Banding from server selection algorithm.
        - New "static-stub" zone type.
        - Allow configuration of resolver timeouts via
          "resolver-query-timeout" option.

BIND 9.7.0

	BIND 9.7.0 includes a number of changes from BIND 9.6 and earlier
	releases.  Most are intended to simplify DNSSEC configuration.

	New features include:

	- Fully automatic signing of zones by "named".
	- Simplified configuration of DNSSEC Lookaside Validation (DLV).
	- Simplified configuration of Dynamic DNS, using the "ddns-confgen"
	  command line tool or the "local" update-policy option.  (As a side
	  effect, this also makes it easier to configure automatic zone
	  re-signing.)
	- New named option "attach-cache" that allows multiple views to
	  share a single cache.
	- DNS rebinding attack prevention.
	- New default values for dnssec-keygen parameters.
	- Support for RFC 5011 automated trust anchor maintenance
	- Smart signing: simplified tools for zone signing and key
	  maintenance.
	- The "statistics-channels" option is now available on Windows.
	- A new DNSSEC-aware libdns API for use by non-BIND9 applications
	- On some platforms, named and other binaries can now print out
	  a stack backtrace on assertion failure, to aid in debugging.
	- A "tools only" installation mode on Windows, which only installs
	  dig, host, nslookup and nsupdate.
	- Improved PKCS#11 support, including Keyper support and explicit
	  OpenSSL engine selection.

	Known issues in this release:

	- In rare cases, DNSSEC validation can leak memory.  When this 
	  happens, it will cause an assertion failure when named exits,
	  but is otherwise harmless.  A fix exists, but was too late for
	  this release; it will be included in BIND 9.7.1.

	Compatibility notes:

	- If you had built BIND 9.6 with any of ALLOW_NSEC3PARAM_UPDATE,
	  ALLOW_SECURE_TO_INSECURE or ALLOW_INSECURE_TO_SECURE defined, then
	  you should ensure that all changes that are in progress have
	  completed prior to upgrading to BIND 9.7.  BIND 9.7 implements
	  those features in a way which is not backwards compatible.

	- Prior releases had a bug which caused HMAC-SHA* keys with long
	  secrets to be used incorrectly.  Fixing this bug means that older
	  versions of BIND 9 may fail to interoperate with this version
	  when using TSIG keys.  If this occurs, the new "isc-hmac-fixup"
	  tool will convert a key with a long secret into a form that works
	  correctly with all versions of BIND 9.  See the "isc-hmac-fixup"
	  man page for additional details.

	- Revoking a DNSSEC key with "dnssec-revoke" changes its key ID.
	  It is possible for the new key ID to collide with that of a
	  different key.  Newly generated keys will not have this problem,
	  as "dnssec-keygen" looks for potential collisions before
	  generating keys, but exercise caution if using key revokation
	  with keys that were generated by older versions of BIND 9.  See
	  the Administrator's Reference Manual, section 4.10 ("Dynamic
	  Trust Anchor Management") for more details.

	- A bug was fixed in which a key's scheduled inactivity date was
	  stored incorectly.  Users who participated in the 9.7.0 BETA test
	  and had DNSSEC keys with scheduled inactivity dates will need to
	  reset those keys' dates using "dnssec-settime -I".

Building

	BIND 9 currently requires a UNIX system with an ANSI C compiler,
	basic POSIX support, and a 64 bit integer type.

	We've had successful builds and tests on the following systems:

		COMPAQ Tru64 UNIX 5.1B
		Fedora Core 6
		FreeBSD 4.10, 5.2.1, 6.2
		HP-UX 11.11
		Mac OS X 10.5
		NetBSD 3.x, 4.0-beta, 5.0-beta
		OpenBSD 3.3 and up
		Solaris 8, 9, 9 (x86), 10
		Ubuntu 7.04, 7.10
		Windows XP/2003/2008

        NOTE:  As of BIND 9.5.1, 9.4.3, and 9.3.6, older versions of
        Windows, including Windows NT and Windows 2000, are no longer
        supported.

	We have recent reports from the user community that a supported
	version of BIND will build and run on the following systems:

		AIX 4.3, 5L
		CentOS 4, 4.5, 5
		Darwin 9.0.0d1/ARM
		Debian 4
		Fedora Core 5, 7
		FreeBSD 6.1
		HP-UX 11.23 PA
		MacOS X 10.4, 10.5
		Red Hat Enterprise Linux 4, 5
		SCO OpenServer 5.0.6
		Slackware 9, 10
		SuSE 9, 10

	To build, just

		./configure
		make

	Do not use a parallel "make".

	Several environment variables that can be set before running
	configure will affect compilation:

	    CC
		The C compiler to use.	configure tries to figure
		out the right one for supported systems.

	    CFLAGS
		C compiler flags.  Defaults to include -g and/or -O2
		as supported by the compiler.  

	    STD_CINCLUDES
		System header file directories.	 Can be used to specify
		where add-on thread or IPv6 support is, for example.
		Defaults to empty string.

	    STD_CDEFINES
		Any additional preprocessor symbols you want defined.
		Defaults to empty string.

		Possible settings:
		Change the default syslog facility of named/lwresd.
		  -DISC_FACILITY=LOG_LOCAL0	
		Enable DNSSEC signature chasing support in dig.
		  -DDIG_SIGCHASE=1 (sets -DDIG_SIGCHASE_TD=1 and
				    -DDIG_SIGCHASE_BU=1)
		Disable dropping queries from particular well known ports.
		  -DNS_CLIENT_DROPPORT=0
	        Sibling glue checking in named-checkzone is enabled by default.
		To disable the default check set.  -DCHECK_SIBLING=0
		named-checkzone checks out-of-zone addresses by default.
		To disable this default set.  -DCHECK_LOCAL=0
		To create the default pid files in ${localstatedir}/run rather
		than ${localstatedir}/run/{named,lwresd}/ set.
		  -DNS_RUN_PID_DIR=0
		Enable workaround for Solaris kernel bug about /dev/poll
		  -DISC_SOCKET_USE_POLLWATCH=1
		  The watch timeout is also configurable, e.g.,
		  -DISC_SOCKET_POLLWATCH_TIMEOUT=20

	    LDFLAGS
		Linker flags. Defaults to empty string.

	The following need to be set when cross compiling.

	    BUILD_CC
		The native C compiler.
	    BUILD_CFLAGS (optional)
	    BUILD_CPPFLAGS (optional)
		Possible Settings:
		-DNEED_OPTARG=1		(optarg is not declared in <unistd.h>)
	    BUILD_LDFLAGS (optional)
	    BUILD_LIBS (optional)

	To build shared libraries, specify "--with-libtool" on the
	configure command line.

	For the server to support DNSSEC, you need to build it
	with crypto support.  You must have OpenSSL 0.9.5a
	or newer installed and specify "--with-openssl" on the
	configure command line.  If OpenSSL is installed under
	a nonstandard prefix, you can tell configure where to
	look for it using "--with-openssl=/prefix".

	On some platforms it is necessary to explictly request large
	file support to handle files bigger than 2GB.  This can be
	done by "--enable-largefile" on the configure command line.

	On some platforms, BIND 9 can be built with multithreading
	support, allowing it to take advantage of multiple CPUs.
	You can specify whether to build a multithreaded BIND 9 
	by specifying "--enable-threads" or "--disable-threads"
	on the configure command line.  The default is operating
	system dependent.

        Support for the "fixed" rrset-order option can be enabled
        or disabled by specifying "--enable-fixed-rrset" or
        "--disable-fixed-rrset" on the configure command line.
        The default is "disabled", to reduce memory footprint.

	If your operating system has integrated support for IPv6, it
	will be used automatically.  If you have installed KAME IPv6
	separately, use "--with-kame[=PATH]" to specify its location.

	"make install" will install "named" and the various BIND 9 libraries.
	By default, installation is into /usr/local, but this can be changed
	with the "--prefix" option when running "configure".

	You may specify the option "--sysconfdir" to set the directory 
	where configuration files like "named.conf" go by default,
	and "--localstatedir" to set the default parent directory
	of "run/named.pid".   For backwards compatibility with BIND 8,
	--sysconfdir defaults to "/etc" and --localstatedir defaults to
	"/var" if no --prefix option is given.  If there is a --prefix
	option, sysconfdir defaults to "$prefix/etc" and localstatedir
	defaults to "$prefix/var".

	To see additional configure options, run "configure --help".
	Note that the help message does not reflect the BIND 8 
	compatibility defaults for sysconfdir and localstatedir.

	If you're planning on making changes to the BIND 9 source, you
	should also "make depend".  If you're using Emacs, you might find
	"make tags" helpful.

	If you need to re-run configure please run "make distclean" first.
	This will ensure that all the option changes take.

	Building with gcc is not supported, unless gcc is the vendor's usual
	compiler (e.g. the various BSD systems, Linux).
	
	Known compiler issues:
	* gcc-3.2.1 and gcc-3.1.1 is known to cause problems with solaris-x86.
	* gcc prior to gcc-3.2.3 ultrasparc generates incorrect code at -02.
	* gcc-3.3.5 powerpc generates incorrect code at -02.
	* Irix, MipsPRO 7.4.1m is known to cause problems.

	A limited test suite can be run with "make test".  Many of
	the tests require you to configure a set of virtual IP addresses
	on your system, and some require Perl; see bin/tests/system/README
	for details.

	SunOS 4 requires "printf" to be installed to make the shared
	libraries.  sh-utils-1.16 provides a "printf" which compiles
	on SunOS 4.


Documentation

	The BIND 9 Administrator Reference Manual is included with the
	source distribution in DocBook XML and HTML format, in the
	doc/arm directory.

	Some of the programs in the BIND 9 distribution have man pages
	in their directories.  In particular, the command line
	options of "named" are documented in /bin/named/named.8.
	There is now also a set of man pages for the lwres library.

	If you are upgrading from BIND 8, please read the migration
	notes in doc/misc/migration.  If you are upgrading from
	BIND 4, read doc/misc/migration-4to9.

	Frequently asked questions and their answers can be found in
	FAQ.

        Additional information on various subjects can be found
        in the other README files.


Change Log

	A detailed list of all changes to BIND 9 is included in the 
	file CHANGES, with the most recent changes listed first.
	Change notes include tags indicating the category of the
	change that was made; these categories are:

	   [func]	  New feature

	   [bug]	  General bug fix

	   [security]	  Fix for a significant security flaw

	   [experimental] Used for new features when the syntax
	   		  or other aspects of the design are still
			  in flux and may change

	   [port]	  Portability enhancement

	   [maint]	  Updates to built-in data such as root
			  server addresses and keys

	   [tuning]	  Changes to built-in configuration defaults
	   		  and constants to improve performanceo

	   [protocol]	  Updates to the DNS protocol such as new
			  RR types

           [test]         Changes to the automatic tests, not
                          affecting server functionality

           [cleanup]      Minor corrections and refactoring

	   [doc]	  Documentation

	In general, [func] and [experimental] tags will only appear
	in new-feature releases (i.e., those with version numbers
	ending in zero).  Some new functionality may be backported to
	older releases on a case-by-case basis.  All other change
	types may be applied to all currently-supported releases.


Bug Reports and Mailing Lists

	Bugs reports should be sent to

		bind9-bugs@@isc.org

	To join the BIND Users mailing list, send mail to

		bind-users-request@@isc.org

	archives of which can be found via

		http://www.isc.org/ops/lists/

	If you're planning on making changes to the BIND 9 source
	code, you might want to join the BIND Workers mailing list.
	Send mail to

		bind-workers-request@@isc.org


@


1.11.2.1
log
@file README was added on branch RELENG_8_4 on 2013-03-28 13:00:18 +0000
@
text
@d1 419
@


1.11.2.2
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/248810
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@a0 419
BIND 9

	BIND version 9 is a major rewrite of nearly all aspects of the
	underlying BIND architecture.  Some of the important features of
	BIND 9 are:

		- DNS Security
			DNSSEC (signed zones)
			TSIG (signed DNS requests)

		- IP version 6
			Answers DNS queries on IPv6 sockets
			IPv6 resource records (AAAA)
			Experimental IPv6 Resolver Library

		- DNS Protocol Enhancements
			IXFR, DDNS, Notify, EDNS0
			Improved standards conformance

		- Views
			One server process can provide multiple "views" of
			the DNS namespace, e.g. an "inside" view to certain
			clients, and an "outside" view to others.

		- Multiprocessor Support

		- Improved Portability Architecture


	BIND version 9 development has been underwritten by the following
	organizations:

		Sun Microsystems, Inc.
		Hewlett Packard
		Compaq Computer Corporation
		IBM
		Process Software Corporation
		Silicon Graphics, Inc.
		Network Associates, Inc.
		U.S. Defense Information Systems Agency
		USENIX Association
		Stichting NLnet - NLnet Foundation
		Nominum, Inc.

	For a summary of functional enhancements in previous
	releases, see the HISTORY file.

	For a detailed list of user-visible changes from
	previous releases, see the CHANGES file.

        For up-to-date release notes and errata, see
        http://www.isc.org/software/bind9/releasenotes

BIND 9.8.4

        BIND 9.8.4 includes several bug fixes and patches security
        flaws described in CVE-2012-1667, CVE-2012-3817 and CVE-2012-4244.

BIND 9.8.3

	BIND 9.8.3 is a maintenance release.

BIND 9.8.2

	BIND 9.8.2 includes a number of bug fixes and prevents a security
	problem described in CVE-2011-4313

BIND 9.8.1

        BIND 9.8.1 includes a number of bug fixes and enhancements from
	BIND 9.8 and earlier releases.  New features include:

	- The DLZ "dlopen" driver is now built by default.
	- Added a new include file with function typedefs
          for the DLZ "dlopen" driver.
	- Made "--with-gssapi" default.
	- More verbose error reporting from DLZ LDAP.

BIND 9.8.0

        BIND 9.8.0 includes a number of changes from BIND 9.7 and earlier
        releases.  New features include:

        - Built-in trust anchor for the root zone, which can be
          switched on via "dnssec-validation auto;"
        - Support for DNS64.
        - Support for response policy zones (RPZ).
        - Support for writable DLZ zones.
        - Improved ease of configuration of GSS/TSIG for
          interoperability with Active Directory
        - Support for GOST signing algorithm for DNSSEC.
        - Removed RTT Banding from server selection algorithm.
        - New "static-stub" zone type.
        - Allow configuration of resolver timeouts via
          "resolver-query-timeout" option.

BIND 9.7.0

	BIND 9.7.0 includes a number of changes from BIND 9.6 and earlier
	releases.  Most are intended to simplify DNSSEC configuration.

	New features include:

	- Fully automatic signing of zones by "named".
	- Simplified configuration of DNSSEC Lookaside Validation (DLV).
	- Simplified configuration of Dynamic DNS, using the "ddns-confgen"
	  command line tool or the "local" update-policy option.  (As a side
	  effect, this also makes it easier to configure automatic zone
	  re-signing.)
	- New named option "attach-cache" that allows multiple views to
	  share a single cache.
	- DNS rebinding attack prevention.
	- New default values for dnssec-keygen parameters.
	- Support for RFC 5011 automated trust anchor maintenance
	- Smart signing: simplified tools for zone signing and key
	  maintenance.
	- The "statistics-channels" option is now available on Windows.
	- A new DNSSEC-aware libdns API for use by non-BIND9 applications
	- On some platforms, named and other binaries can now print out
	  a stack backtrace on assertion failure, to aid in debugging.
	- A "tools only" installation mode on Windows, which only installs
	  dig, host, nslookup and nsupdate.
	- Improved PKCS#11 support, including Keyper support and explicit
	  OpenSSL engine selection.

	Known issues in this release:

	- In rare cases, DNSSEC validation can leak memory.  When this 
	  happens, it will cause an assertion failure when named exits,
	  but is otherwise harmless.  A fix exists, but was too late for
	  this release; it will be included in BIND 9.7.1.

	Compatibility notes:

	- If you had built BIND 9.6 with any of ALLOW_NSEC3PARAM_UPDATE,
	  ALLOW_SECURE_TO_INSECURE or ALLOW_INSECURE_TO_SECURE defined, then
	  you should ensure that all changes that are in progress have
	  completed prior to upgrading to BIND 9.7.  BIND 9.7 implements
	  those features in a way which is not backwards compatible.

	- Prior releases had a bug which caused HMAC-SHA* keys with long
	  secrets to be used incorrectly.  Fixing this bug means that older
	  versions of BIND 9 may fail to interoperate with this version
	  when using TSIG keys.  If this occurs, the new "isc-hmac-fixup"
	  tool will convert a key with a long secret into a form that works
	  correctly with all versions of BIND 9.  See the "isc-hmac-fixup"
	  man page for additional details.

	- Revoking a DNSSEC key with "dnssec-revoke" changes its key ID.
	  It is possible for the new key ID to collide with that of a
	  different key.  Newly generated keys will not have this problem,
	  as "dnssec-keygen" looks for potential collisions before
	  generating keys, but exercise caution if using key revokation
	  with keys that were generated by older versions of BIND 9.  See
	  the Administrator's Reference Manual, section 4.10 ("Dynamic
	  Trust Anchor Management") for more details.

	- A bug was fixed in which a key's scheduled inactivity date was
	  stored incorectly.  Users who participated in the 9.7.0 BETA test
	  and had DNSSEC keys with scheduled inactivity dates will need to
	  reset those keys' dates using "dnssec-settime -I".

Building

	BIND 9 currently requires a UNIX system with an ANSI C compiler,
	basic POSIX support, and a 64 bit integer type.

	We've had successful builds and tests on the following systems:

		COMPAQ Tru64 UNIX 5.1B
		Fedora Core 6
		FreeBSD 4.10, 5.2.1, 6.2
		HP-UX 11.11
		Mac OS X 10.5
		NetBSD 3.x, 4.0-beta, 5.0-beta
		OpenBSD 3.3 and up
		Solaris 8, 9, 9 (x86), 10
		Ubuntu 7.04, 7.10
		Windows XP/2003/2008

        NOTE:  As of BIND 9.5.1, 9.4.3, and 9.3.6, older versions of
        Windows, including Windows NT and Windows 2000, are no longer
        supported.

	We have recent reports from the user community that a supported
	version of BIND will build and run on the following systems:

		AIX 4.3, 5L
		CentOS 4, 4.5, 5
		Darwin 9.0.0d1/ARM
		Debian 4
		Fedora Core 5, 7
		FreeBSD 6.1
		HP-UX 11.23 PA
		MacOS X 10.4, 10.5
		Red Hat Enterprise Linux 4, 5
		SCO OpenServer 5.0.6
		Slackware 9, 10
		SuSE 9, 10

	To build, just

		./configure
		make

	Do not use a parallel "make".

	Several environment variables that can be set before running
	configure will affect compilation:

	    CC
		The C compiler to use.	configure tries to figure
		out the right one for supported systems.

	    CFLAGS
		C compiler flags.  Defaults to include -g and/or -O2
		as supported by the compiler.  

	    STD_CINCLUDES
		System header file directories.	 Can be used to specify
		where add-on thread or IPv6 support is, for example.
		Defaults to empty string.

	    STD_CDEFINES
		Any additional preprocessor symbols you want defined.
		Defaults to empty string.

		Possible settings:
		Change the default syslog facility of named/lwresd.
		  -DISC_FACILITY=LOG_LOCAL0	
		Enable DNSSEC signature chasing support in dig.
		  -DDIG_SIGCHASE=1 (sets -DDIG_SIGCHASE_TD=1 and
				    -DDIG_SIGCHASE_BU=1)
		Disable dropping queries from particular well known ports.
		  -DNS_CLIENT_DROPPORT=0
	        Sibling glue checking in named-checkzone is enabled by default.
		To disable the default check set.  -DCHECK_SIBLING=0
		named-checkzone checks out-of-zone addresses by default.
		To disable this default set.  -DCHECK_LOCAL=0
		To create the default pid files in ${localstatedir}/run rather
		than ${localstatedir}/run/{named,lwresd}/ set.
		  -DNS_RUN_PID_DIR=0
		Enable workaround for Solaris kernel bug about /dev/poll
		  -DISC_SOCKET_USE_POLLWATCH=1
		  The watch timeout is also configurable, e.g.,
		  -DISC_SOCKET_POLLWATCH_TIMEOUT=20

	    LDFLAGS
		Linker flags. Defaults to empty string.

	The following need to be set when cross compiling.

	    BUILD_CC
		The native C compiler.
	    BUILD_CFLAGS (optional)
	    BUILD_CPPFLAGS (optional)
		Possible Settings:
		-DNEED_OPTARG=1		(optarg is not declared in <unistd.h>)
	    BUILD_LDFLAGS (optional)
	    BUILD_LIBS (optional)

	To build shared libraries, specify "--with-libtool" on the
	configure command line.

	For the server to support DNSSEC, you need to build it
	with crypto support.  You must have OpenSSL 0.9.5a
	or newer installed and specify "--with-openssl" on the
	configure command line.  If OpenSSL is installed under
	a nonstandard prefix, you can tell configure where to
	look for it using "--with-openssl=/prefix".

	On some platforms it is necessary to explictly request large
	file support to handle files bigger than 2GB.  This can be
	done by "--enable-largefile" on the configure command line.

	On some platforms, BIND 9 can be built with multithreading
	support, allowing it to take advantage of multiple CPUs.
	You can specify whether to build a multithreaded BIND 9 
	by specifying "--enable-threads" or "--disable-threads"
	on the configure command line.  The default is operating
	system dependent.

        Support for the "fixed" rrset-order option can be enabled
        or disabled by specifying "--enable-fixed-rrset" or
        "--disable-fixed-rrset" on the configure command line.
        The default is "disabled", to reduce memory footprint.

	If your operating system has integrated support for IPv6, it
	will be used automatically.  If you have installed KAME IPv6
	separately, use "--with-kame[=PATH]" to specify its location.

	"make install" will install "named" and the various BIND 9 libraries.
	By default, installation is into /usr/local, but this can be changed
	with the "--prefix" option when running "configure".

	You may specify the option "--sysconfdir" to set the directory 
	where configuration files like "named.conf" go by default,
	and "--localstatedir" to set the default parent directory
	of "run/named.pid".   For backwards compatibility with BIND 8,
	--sysconfdir defaults to "/etc" and --localstatedir defaults to
	"/var" if no --prefix option is given.  If there is a --prefix
	option, sysconfdir defaults to "$prefix/etc" and localstatedir
	defaults to "$prefix/var".

	To see additional configure options, run "configure --help".
	Note that the help message does not reflect the BIND 8 
	compatibility defaults for sysconfdir and localstatedir.

	If you're planning on making changes to the BIND 9 source, you
	should also "make depend".  If you're using Emacs, you might find
	"make tags" helpful.

	If you need to re-run configure please run "make distclean" first.
	This will ensure that all the option changes take.

	Building with gcc is not supported, unless gcc is the vendor's usual
	compiler (e.g. the various BSD systems, Linux).
	
	Known compiler issues:
	* gcc-3.2.1 and gcc-3.1.1 is known to cause problems with solaris-x86.
	* gcc prior to gcc-3.2.3 ultrasparc generates incorrect code at -02.
	* gcc-3.3.5 powerpc generates incorrect code at -02.
	* Irix, MipsPRO 7.4.1m is known to cause problems.

	A limited test suite can be run with "make test".  Many of
	the tests require you to configure a set of virtual IP addresses
	on your system, and some require Perl; see bin/tests/system/README
	for details.

	SunOS 4 requires "printf" to be installed to make the shared
	libraries.  sh-utils-1.16 provides a "printf" which compiles
	on SunOS 4.


Documentation

	The BIND 9 Administrator Reference Manual is included with the
	source distribution in DocBook XML and HTML format, in the
	doc/arm directory.

	Some of the programs in the BIND 9 distribution have man pages
	in their directories.  In particular, the command line
	options of "named" are documented in /bin/named/named.8.
	There is now also a set of man pages for the lwres library.

	If you are upgrading from BIND 8, please read the migration
	notes in doc/misc/migration.  If you are upgrading from
	BIND 4, read doc/misc/migration-4to9.

	Frequently asked questions and their answers can be found in
	FAQ.

        Additional information on various subjects can be found
        in the other README files.


Change Log

	A detailed list of all changes to BIND 9 is included in the 
	file CHANGES, with the most recent changes listed first.
	Change notes include tags indicating the category of the
	change that was made; these categories are:

	   [func]	  New feature

	   [bug]	  General bug fix

	   [security]	  Fix for a significant security flaw

	   [experimental] Used for new features when the syntax
	   		  or other aspects of the design are still
			  in flux and may change

	   [port]	  Portability enhancement

	   [maint]	  Updates to built-in data such as root
			  server addresses and keys

	   [tuning]	  Changes to built-in configuration defaults
	   		  and constants to improve performanceo

	   [protocol]	  Updates to the DNS protocol such as new
			  RR types

           [test]         Changes to the automatic tests, not
                          affecting server functionality

           [cleanup]      Minor corrections and refactoring

	   [doc]	  Documentation

	In general, [func] and [experimental] tags will only appear
	in new-feature releases (i.e., those with version numbers
	ending in zero).  Some new functionality may be backported to
	older releases on a case-by-case basis.  All other change
	types may be applied to all currently-supported releases.


Bug Reports and Mailing Lists

	Bugs reports should be sent to

		bind9-bugs@@isc.org

	To join the BIND Users mailing list, send mail to

		bind-users-request@@isc.org

	archives of which can be found via

		http://www.isc.org/ops/lists/

	If you're planning on making changes to the BIND 9 source
	code, you might want to join the BIND Workers mailing list.
	Send mail to

		bind-workers-request@@isc.org


@


1.10
log
@SVN rev 236196 on 2012-05-28 19:47:56Z by dougb

Upgrade to BIND version 9.8.3, the latest from ISC.

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Other critical bug fixes are included.

All BIND users are encouraged to upgrade.
@
text
@d54 5
@


1.9
log
@SVN rev 233914 on 2012-04-05 04:29:35Z by dougb

Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.
@
text
@d54 4
@


1.8
log
@SVN rev 225361 on 2011-09-03 07:13:45Z by dougb

Upgrade to BIND version 9.8.1. Release notes at:

https://deepthought.isc.org/article/AA-00446/81/
or
/usr/src/contrib/bind9/

Approved by:	re (kib)
@
text
@d51 8
d325 1
d348 42
@


1.8.2.1
log
@SVN rev 234010 on 2012-04-08 01:43:41Z by dougb

MFC r233909:

Add Bv9ARM.pdf to the list of docs to install.

MFV/MFC r233914:

Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.
@
text
@a50 8
        For up-to-date release notes and errata, see
        http://www.isc.org/software/bind9/releasenotes

BIND 9.8.2

	BIND 9.8.2 includes a number of bug fixes and prevents a security
	problem described in CVE-2011-4313

a316 1

a338 42
Change Log

	A detailed list of all changes to BIND 9 is included in the 
	file CHANGES, with the most recent changes listed first.
	Change notes include tags indicating the category of the
	change that was made; these categories are:

	   [func]	  New feature

	   [bug]	  General bug fix

	   [security]	  Fix for a significant security flaw

	   [experimental] Used for new features when the syntax
	   		  or other aspects of the design are still
			  in flux and may change

	   [port]	  Portability enhancement

	   [maint]	  Updates to built-in data such as root
			  server addresses and keys

	   [tuning]	  Changes to built-in configuration defaults
	   		  and constants to improve performanceo

	   [protocol]	  Updates to the DNS protocol such as new
			  RR types

           [test]         Changes to the automatic tests, not
                          affecting server functionality

           [cleanup]      Minor corrections and refactoring

	   [doc]	  Documentation

	In general, [func] and [experimental] tags will only appear
	in new-feature releases (i.e., those with version numbers
	ending in zero).  Some new functionality may be backported to
	older releases on a case-by-case basis.  All other change
	types may be applied to all currently-supported releases.


@


1.8.2.2
log
@SVN rev 236374 on 2012-06-01 03:46:28Z by dougb

MFV r236171, MFC r236196:

Upgrade to BIND version 9.8.3, the latest from ISC.

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Other critical bug fixes are included.

All BIND users are encouraged to upgrade.
@
text
@a53 4
BIND 9.8.3

	BIND 9.8.3 is a maintenance release.

@


1.8.2.3
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/245163
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r245163 | erwin | 2013-01-08 09:05:09 +0000 (Tue, 08 Jan 2013) | 21 lines
## SVN ##
## SVN ## MFC r243981,243987:
## SVN ##
## SVN ##   Update to 9.8.4-P1.
## SVN ##
## SVN ##   New Features
## SVN ##
## SVN ##   *  Elliptic Curve Digital Signature Algorithm keys and signatures in
## SVN ##      DNSSEC are now supported per RFC 6605. [RT #21918]
## SVN ##
## SVN ##   Feature Changes
## SVN ##
## SVN ##   *  Improves OpenSSL error logging [RT #29932]
## SVN ##
## SVN ##   *  nslookup now returns a nonzero exit code when it is unable to get
## SVN ##      an answer.  [RT #29492]
## SVN ##
## SVN ##   Other critical bug fixes are included.
## SVN ##
## SVN ##   Approved by:  delphij (mentor)
## SVN ##   Sponsored by: DK Hostmaster A/S
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@a53 5
BIND 9.8.4

        BIND 9.8.4 includes several bug fixes and patches security
        flaws described in CVE-2012-1667, CVE-2012-3817 and CVE-2012-4244.

@


1.8.2.4
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/254402
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@a53 5
BIND 9.8.5

        BIND 9.8.5 includes several bug fixes and patches security
        flaws described in CVE-2012-5688, CVE-2012-5689 and CVE-2013-2266.

@


1.8.2.5
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/254897
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@d54 1
a54 1
BIND 9.9.3
d56 2
a57 2
	BIND 9.9.3 is a maintenance release and patches the security
	flaws described in CVE-2012-5688, CVE-2012-5689 and CVE-2013-2266.
d59 1
a59 1
BIND 9.9.2
d61 106
a166 51
	BIND 9.9.2 is a maintenance release and patches the security
	flaw described in CVE-2012-4244.

BIND 9.9.1

	BIND 9.9.1 is a maintenance release.

BIND 9.9.0

	BIND 9.9.0 includes a number of changes from BIND 9.8 and earlier
	releases.  New features include:

        - Inline signing, allowing automatic DNSSEC signing of
          master zones without modification of the zonefile, or 
          "bump in the wire" signing in slaves.
        - NXDOMAIN redirection.
        - New 'rndc flushtree' command clears all data under a given
          name from the DNS cache.
        - New 'rndc sync' command dumps pending changes in a dynamic
          zone to disk without a freeze/thaw cycle.
        - New 'rndc signing' command displays or clears signing status
          records in 'auto-dnssec' zones.
        - NSEC3 parameters for 'auto-dnssec' zones can now be set prior
          to signing, eliminating the need to initially sign with NSEC.
        - Startup time improvements on large authoritative servers.
        - Slave zones are now saved in raw format by default.
        - Several improvements to response policy zones (RPZ).
        - Improved hardware scalability by using multiple threads
          to listen for queries and using finer-grained client locking
        - The 'also-notify' option now takes the same syntax as
          'masters', so it can used named masterlists and TSIG keys.
        - 'dnssec-signzone -D' writes an output file containing only DNSSEC
          data, which can be included by the primary zone file.
        - 'dnssec-signzone -R' forces removal of signatures that are
          not expired but were created by a key which no longer exists.
        - 'dnssec-signzone -X' allows a separate expiration date to
          be specified for DNSKEY signatures from other signatures.
        - New '-L' option to dnssec-keygen, dnssec-settime, and
          dnssec-keyfromlabel sets the default TTL for the key.
        - dnssec-dsfromkey now supports reading from standard input,
          to make it easier to convert DNSKEY to DS.
        - RFC 1918 reverse zones have been added to the empty-zones
          table per RFC 6303.
        - Dynamic updates can now optionally set the zone's SOA serial
          number to the current UNIX time.
        - DLZ modules can now retrieve the source IP address of
          the querying client.
        - 'request-ixfr' option can now be set at the per-zone level.
        - 'dig +rrcomments' turns on comments about DNSKEY records,
          indicating their key ID, algorithm and function
        - Simplified nsupdate syntax and added readline support
d196 3
a198 3
		Debian 4, 5, 6
		Fedora Core 5, 7, 8
		FreeBSD 6, 7, 8
d200 2
a201 2
		MacOS X 10.5, 10.6, 10.7
		Red Hat Enterprise Linux 4, 5, 6
d222 1
a222 2
		as supported by the compiler.  Please include '-g'
		if you need to set CFLAGS.
a338 4
Known limitations

	Linux requires kernel build 2.6.39 or later to get the
	performance benefits from using multiple sockets.
@


1.8.2.6
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/262706
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@d51 2
a52 28
	For up-to-date release notes and errata, see
	http://www.isc.org/software/bind9/releasenotes

BIND 9.9.5

	BIND 9.9.5 is a maintenance release, and patches the security
	flaws described in CVE-2013-6320 and CVE-2014-0591.  It also
	includes the following functional enhancements:

	 - "named" now preserves the capitalization of names when
	   responding to queries.
	 - new "dnssec-importkey" command allows the use of offline
	   DNSSEC keys with automatic DNSKEY management.
	 - When re-signing a zone, the new "dnssec-signzone -Q" option
	   drops signatures from keys that are still published but are
	   no longer active.
	 - "named-checkconf -px" will print the contents of configuration
	   files with the shared secrets obscured, making it easier to
	   share configuration (e.g. when submitting a bug report)
	   without revealing private information.

BIND 9.9.4

	BIND 9.9.4 is a maintenance release, and patches the security
	flaws described in CVE-2013-3919 and CVE-2013-4854. It also
	introduces DNS Response Rate Limiting (DNS RRL) as a
	compile-time option. To use this feature, configure with
	the "--enable-rrl" option.
d73 39
a111 39
	- Inline signing, allowing automatic DNSSEC signing of
	  master zones without modification of the zonefile, or 
	  "bump in the wire" signing in slaves.
	- NXDOMAIN redirection.
	- New 'rndc flushtree' command clears all data under a given
	  name from the DNS cache.
	- New 'rndc sync' command dumps pending changes in a dynamic
	  zone to disk without a freeze/thaw cycle.
	- New 'rndc signing' command displays or clears signing status
	  records in 'auto-dnssec' zones.
	- NSEC3 parameters for 'auto-dnssec' zones can now be set prior
	  to signing, eliminating the need to initially sign with NSEC.
	- Startup time improvements on large authoritative servers.
	- Slave zones are now saved in raw format by default.
	- Several improvements to response policy zones (RPZ).
	- Improved hardware scalability by using multiple threads
	  to listen for queries and using finer-grained client locking
	- The 'also-notify' option now takes the same syntax as
	  'masters', so it can used named masterlists and TSIG keys.
	- 'dnssec-signzone -D' writes an output file containing only DNSSEC
	  data, which can be included by the primary zone file.
	- 'dnssec-signzone -R' forces removal of signatures that are
	  not expired but were created by a key which no longer exists.
	- 'dnssec-signzone -X' allows a separate expiration date to
	  be specified for DNSKEY signatures from other signatures.
	- New '-L' option to dnssec-keygen, dnssec-settime, and
	  dnssec-keyfromlabel sets the default TTL for the key.
	- dnssec-dsfromkey now supports reading from standard input,
	  to make it easier to convert DNSKEY to DS.
	- RFC 1918 reverse zones have been added to the empty-zones
	  table per RFC 6303.
	- Dynamic updates can now optionally set the zone's SOA serial
	  number to the current UNIX time.
	- DLZ modules can now retrieve the source IP address of
	  the querying client.
	- 'request-ixfr' option can now be set at the per-zone level.
	- 'dig +rrcomments' turns on comments about DNSKEY records,
	  indicating their key ID, algorithm and function
	- Simplified nsupdate syntax and added readline support
d131 3
a133 3
	NOTE:  As of BIND 9.5.1, 9.4.3, and 9.3.6, older versions of
	Windows, including Windows NT and Windows 2000, are no longer
	supported.
d234 4
a237 4
	Support for the "fixed" rrset-order option can be enabled
	or disabled by specifying "--enable-fixed-rrset" or
	"--disable-fixed-rrset" on the configure command line.
	The default is "disabled", to reduce memory footprint.
d308 2
a309 2
	Additional information on various subjects can be found
	in the other README files.
d340 2
a341 2
	   [test]         Changes to the automatic tests, not
			  affecting server functionality
d343 1
a343 1
	   [cleanup]      Minor corrections and refactoring
@


1.7
log
@SVN rev 224092 on 2011-07-16 11:12:09Z by dougb

Upgrade to version 9.8.0-P4

This version has many new features, see /usr/share/doc/bind9/README
for details.
@
text
@d51 11
@


1.6
log
@SVN rev 218384 on 2011-02-06 22:46:07Z by dougb

Update to BIND 9.6.3, the latest from ISC on the 9.6 branch.

All 9.6 users with DNSSEC validation enabled should upgrade to this
version, or the latest version in the 9.7 branch, prior to 2011-03-31
in order to avoid validation failures for names in .COM as described
here:

https://www.isc.org/announcement/bind-9-dnssec-validation-fails-new-ds-record

In addition the fixes for this and other bugs, there are also the
following:

  * Various fixes to kerberos support, including GSS-TSIG
  * Various fixes to avoid leaking memory, and to problems that could
    prevent a clean shutdown of named
@
text
@d45 2
a46 166
BIND 9.6.3

	BIND 9.6.3 is a maintenance release, fixing bugs in 9.6.2.

BIND 9.6.2

	BIND 9.6.2 is a maintenance release, fixing bugs in 9.6.1.
        It also introduces support for the SHA-2 DNSSEC algorithms,
        RSASHA256 and RSASHA512.

        Known issues in this release:

        - A validating resolver that has been incorrectly configured with
          an invalid trust anchor will be unable to resolve names covered
          by that trust anchor.  In all current versions of BIND 9, such a
          resolver will also generate significant unnecessary DNS traffic
          while trying to validate.  The latter problem will be addressed
          in future BIND 9 releases.  In the meantime, to avoid these
          problems, exercise caution when configuring "trusted-keys":
          make sure all keys are correct and current when you add them,
          and update your configuration in a timely manner when keys
          roll over.

BIND 9.6.1

	BIND 9.6.1 is a maintenance release, fixing bugs in 9.6.0.

BIND 9.6.0

        BIND 9.6.0 includes a number of changes from BIND 9.5 and earlier
        releases, including:

        Full NSEC3 support

        Automatic zone re-signing

	New update-policy methods tcp-self and 6to4-self

        The BIND 8 resolver library, libbind, has been removed from the
        BIND 9 distribution and is now available as a separate download.

	Change the default pid file location from /var/run to
	/var/run/{named,lwresd} for improved chroot/setuid support.

BIND 9.5.0

	BIND 9.5.0 has a number of new features over 9.4,
	including:

	GSS-TSIG support (RFC 3645).

	DHCID support.

	Experimental http server and statistics support for named via xml.

	More detailed statistics counters including those supported in BIND 8.

	Faster ACL processing.

	Use Doxygen to generate internal documentation.

        Efficient LRU cache-cleaning mechanism.

        NSID support.

BIND 9.4.0

	BIND 9.4.0 has a number of new features over 9.3,
	including:

	Implemented "additional section caching (or acache)", an
	internal cache framework for additional section content to
	improve response performance.  Several configuration options
	were provided to control the behavior.

	New notify type 'master-only'.  Enable notify for master
	zones only.

	Accept 'notify-source' style syntax for query-source.

	rndc now allows addresses to be set in the server clauses.

	New option "allow-query-cache".  This lets "allow-query"
	be used to specify the default zone access level rather
	than having to have every zone override the global value.
	"allow-query-cache" can be set at both the options and view
	levels.  If "allow-query-cache" is not set then "allow-recursion"
	is used if set, otherwise "allow-query" is used if set
	unless "recursion no;" is set in which case "none;" is used,
	otherwise the default (localhost; localnets;) is used.

	rndc: the source address can now be specified.

	ixfr-from-differences now takes master and slave in addition
	to yes and no at the options and view levels.

	Allow the journal's name to be changed via named.conf.

	'rndc notify zone [class [view]]' resend the NOTIFY messages
	for the specified zone.

	'dig +trace' now randomly selects the next servers to try.
	Report if there is a bad delegation.

	Improve check-names error messages.

	Make public the function to read a key file, dst_key_read_public().

	dig now returns the byte count for axfr/ixfr.
			
	allow-update is now settable at the options / view level.

	named-checkconf now checks the logging configuration.

	host now can turn on memory debugging flags with '-m'.

	Don't send notify messages to self.

	Perform sanity checks on NS records which refer to 'in zone' names.

	New zone option "notify-delay".  Specify a minimum delay
	between sets of NOTIFY messages.

	Extend adjusting TTL warning messages.

	Named and named-checkzone can now both check for non-terminal
	wildcard records.

	"rndc freeze/thaw" now freezes/thaws all zones.

	named-checkconf now check acls to verify that they only
	refer to existing acls.

	The server syntax has been extended to support a range of
	servers.

	Report differences between hints and real NS rrset and
	associated address records.

	Preserve the case of domain names in rdata during zone
	transfers.

	Restructured the data locking framework using architecture
	dependent atomic operations (when available), improving
	response performance on multi-processor machines significantly.
	x86, x86_64, alpha, powerpc, and mips are currently supported.

	UNIX domain controls are now supported.

	Add support for additional zone file formats for improving
	loading performance.  The masterfile-format option in
	named.conf can be used to specify a non-default format.  A
	separate command named-compilezone was provided to generate
	zone files in the new format.  Additionally, the -I and -O
	options for dnssec-signzone specify the input and output
	formats.

	dnssec-signzone can now randomize signature end times
	(dnssec-signzone -j jitter).

	Add support for CH A record.

	Add additional zone data constancy checks.  named-checkzone
	has extended checking of NS, MX and SRV record and the hosts
	they reference.  named has extended post zone load checks.
	New zone options: check-mx and integrity-check.
d48 2
d51 1
a51 1
	edns-udp-size can now be overridden on a per server basis.
d53 2
a54 191
	dig can now specify the EDNS version when making a query.

	Added framework for handling multiple EDNS versions.

	Additional memory debugging support to track size and mctx
	arguments.

	Detect duplicates of UDP queries we are recursing on and
	drop them.  New stats category "duplicates".

	"USE INTERNAL MALLOC" is now runtime selectable.

	The lame cache is now done on a <qname,qclass,qtype> basis
	as some servers only appear to be lame for certain query
	types.

	Limit the number of recursive clients that can be waiting
	for a single query (<qname,qtype,qclass>) to resolve.  New
	options clients-per-query and max-clients-per-query.

	dig: report the number of extra bytes still left in the
	packet after processing all the records.

	Support for IPSECKEY rdata type.

	Raise the UDP recieve buffer size to 32k if it is less than 32k.

	x86 and x86_64 now have seperate atomic locking implementations.

	named-checkconf now validates update-policy entries.

	Attempt to make the amount of work performed in a iteration
	self tuning.  The covers nodes clean from the cache per
	iteration, nodes written to disk when rewriting a master
	file and nodes destroyed per iteration when destroying a
	zone or a cache.

	ISC string copy API.

	Automatic empty zone creation for D.F.IP6.ARPA and friends.
	Note: RFC 1918 zones are not yet covered by this but are
	likely to be in a future release.

	New options: empty-server, empty-contact, empty-zones-enable
	and disable-empty-zone.

	dig now has a '-q queryname' and '+showsearch' options.

	host/nslookup now continue (default)/fail on SERVFAIL.

	dig now warns if 'RA' is not set in the answer when 'RD'
	was set in the query.  host/nslookup skip servers that fail
	to set 'RA' when 'RD' is set unless a server is explicitly
	set.

	Integrate contibuted DLZ code into named.

	Integrate contibuted IDN code from JPNIC.

	libbind: corresponds to that from BIND 8.4.7.

BIND 9.3.0

	BIND 9.3.0 has a number of new features over 9.2,
	including:

	DNSSEC is now DS based (RFC 3658).
	See also RFC 3845, doc/draft/draft-ietf-dnsext-dnssec-*.

	DNSSEC lookaside validation.

	check-names is now implemented.
	rrset-order in more complete.

	IPv4/IPv6 transition support, dual-stack-servers.

	IXFR deltas can now be generated when loading master files,
	ixfr-from-differences.

	It is now possible to specify the size of a journal, max-journal-size.

	It is now possible to define a named set of master servers to be
	used in masters clause, masters.

	The advertised EDNS UDP size can now be set, edns-udp-size.

	allow-v6-synthesis has been obsoleted.

	NOTE:
	* Zones containing MD and MF will now be rejected.
	* dig, nslookup name. now report "Not Implemented" as
	  NOTIMP rather than NOTIMPL.  This will have impact on scripts
	  that are looking for NOTIMPL.

	libbind: corresponds to that from BIND 8.4.5.

BIND 9.2.0

	BIND 9.2.0 has a number of new features over 9.1,
	including:

	  - The size of the cache can now be limited using the
            "max-cache-size" option.

	  - The server can now automatically convert RFC1886-style
	    recursive lookup requests into RFC2874-style lookups, 
	    when enabled using the new option "allow-v6-synthesis".
            This allows stub resolvers that support AAAA records
            but not A6 record chains or binary labels to perform
            lookups in domains that make use of these IPv6 DNS
            features.

	  - Performance has been improved.

	  - The man pages now use the more portable "man" macros
	    rather than the "mandoc" macros, and are installed
            by "make install".

          - The named.conf parser has been completely rewritten.
            It now supports "include" directives in more
            places such as inside "view" statements, and it no
            longer has any reserved words.

          - The "rndc status" command is now implemented.

	  - rndc can now be configured automatically.

	  - A BIND 8 compatible stub resolver library is now
	    included in lib/bind.

	  - OpenSSL has been removed from the distribution.  This
	    means that to use DNSSEC, OpenSSL must be installed and
	    the --with-openssl option must be supplied to configure.
	    This does not apply to the use of TSIG, which does not
	    require OpenSSL.

	  - The source distribution now builds on Windows.
	    See win32utils/readme1.txt and win32utils/win32-build.txt
	    for details.

	This distribution also includes a new lightweight stub
	resolver library and associated resolver daemon that fully
	support forward and reverse lookups of both IPv4 and IPv6
	addresses.  This library is considered experimental and
	is not a complete replacement for the BIND 8 resolver library.
	Applications that use the BIND 8 res_* functions to perform
	DNS lookups or dynamic updates still need to be linked against
	the BIND 8 libraries.  For DNS lookups, they can also use the
	new "getrrsetbyname()" API.

	BIND 9.2 is capable of acting as an authoritative server
	for DNSSEC secured zones.  This functionality is believed to
	be stable and complete except for lacking support for
	verifications involving wildcard records in secure zones.

	When acting as a caching server, BIND 9.2 can be configured
	to perform DNSSEC secure resolution on behalf of its clients.
	This part of the DNSSEC implementation is still considered
	experimental.  For detailed information about the state of the
	DNSSEC implementation, see the file doc/misc/dnssec.

	There are a few known bugs:

		On some systems, IPv6 and IPv4 sockets interact in
		unexpected ways.  For details, see doc/misc/ipv6.
		To reduce the impact of these problems, the server
		no longer listens for requests on IPv6 addresses
		by default.  If you need to accept DNS queries over
		IPv6, you must specify "listen-on-v6 { any; };"
		in the named.conf options statement.

		FreeBSD prior to 4.2 (and 4.2 if running as non-root)
		and OpenBSD prior to 2.8 log messages like
		"fcntl(8, F_SETFL, 4): Inappropriate ioctl for device".
		This is due to a bug in "/dev/random" and impacts the
		server's DNSSEC support.

		OS X 10.1.4 (Darwin 5.4), OS X 10.1.5 (Darwin 5.5) and
		OS X 10.2 (Darwin 6.0) reports errors like
		"fcntl(3, F_SETFL, 4): Operation not supported by device".
		This is due to a bug in "/dev/random" and impacts the
		server's DNSSEC support.

		--with-libtool does not work on AIX.

	A bug in some versions of the Microsoft DNS server can cause zone
        transfers from a BIND 9 server to a W2K server to fail.  For details,
	see the "Zone Transfers" section in doc/misc/migration.

	For a detailed list of user-visible changes from
	previous releases, see the CHANGES file.
d56 78
d147 1
a147 1
		NetBSD 3.x and 4.0-beta
d324 3
@


1.5
log
@SVN rev 214586 on 2010-10-31 04:45:53Z by dougb

Update to 9.6-ESV-R2, the latest from ISC.

This version contains bug fixes that are relevant to any
caching/resolving name server; as well as DNSSEC-related
fixes.
@
text
@d45 1
a45 1
BIND 9.6-ESV (Extended Support Version)
d47 1
a47 3
	BIND 9.6-ESV will be supported until March 31, 2013, at
	which time you will need to upgrade to the current release
	of BIND.
@


1.4
log
@SVN rev 204619 on 2010-03-03 05:45:24Z by dougb

Upgrade to version 9.6.2. This version includes all previously released
security patches to the 9.6.1 version, as well as many other bug fixes.

This version also incorporates a different fix for the problem we had
patched in contrib/bind9/bin/dig/dighost.c, so that file is now back
to being the same as the vendor version.

Due to the fact that the DNSSEC algorithm that will be used to sign the
root zone is only included in this version and in 9.7.x those who wish
to do validation MUST upgrade to one of these prior to July 2010.
@
text
@d45 6
@


1.3
log
@SVN rev 193149 on 2009-05-31 05:42:58Z by dougb

Update BIND to version 9.6.1rc1. This version has better performance and
lots of new features compared to 9.4.x, including:

	Full NSEC3 support
	Automatic zone re-signing
	New update-policy methods tcp-self and 6to4-self
	DHCID support.
	More detailed statistics counters including those supported in BIND 8.
	Faster ACL processing.
	Efficient LRU cache-cleaning mechanism.
	NSID support.
@
text
@d45 23
@


1.3.2.1
log
@SVN rev 205820 on 2010-03-29 06:31:58Z by dougb

Update to 9.6.2-P1, the latest patchfix release which deals with
the problems related to the handling of broken DNSSEC trust chains.

This fix is only relevant for those who have DNSSEC validation
enabled and configure trust anchors from third parties, either
manually, or through a system like DLV.
@
text
@a44 23
BIND 9.6.2

	BIND 9.6.2 is a maintenance release, fixing bugs in 9.6.1.
        It also introduces support for the SHA-2 DNSSEC algorithms,
        RSASHA256 and RSASHA512.

        Known issues in this release:

        - A validating resolver that has been incorrectly configured with
          an invalid trust anchor will be unable to resolve names covered
          by that trust anchor.  In all current versions of BIND 9, such a
          resolver will also generate significant unnecessary DNS traffic
          while trying to validate.  The latter problem will be addressed
          in future BIND 9 releases.  In the meantime, to avoid these
          problems, exercise caution when configuring "trusted-keys":
          make sure all keys are correct and current when you add them,
          and update your configuration in a timely manner when keys
          roll over.

BIND 9.6.1

	BIND 9.6.1 is a maintenance release, fixing bugs in 9.6.0.

@


1.3.2.2
log
@SVN rev 214811 on 2010-11-04 21:48:39Z by dougb

Update to 9.6-ESV-R2, the latest from ISC.

This version contains bug fixes that are relevant to any
caching/resolving name server; as well as DNSSEC-related
fixes.
@
text
@a44 6
BIND 9.6-ESV (Extended Support Version)

	BIND 9.6-ESV will be supported until March 31, 2013, at
	which time you will need to upgrade to the current release
	of BIND.

@


1.3.2.3
log
@SVN rev 218334 on 2011-02-05 19:13:34Z by dougb

Update to BIND 9.6.3, the latest from ISC on the 9.6 branch.

All 9.6 users with DNSSEC validation enabled should upgrade to this
version, or the latest version in the 9.7 branch, prior to 2011-03-31
in order to avoid validation failures for names in .COM as described
here:

https://www.isc.org/announcement/bind-9-dnssec-validation-fails-new-ds-record

In addition the fixes for this and other bugs, there are also the
following:

  * Various fixes to kerberos support, including GSS-TSIG
  * Various fixes to avoid leaking memory, and to problems that could
    prevent a clean shutdown of named
@
text
@d45 1
a45 1
BIND 9.6.3
d47 3
a49 1
	BIND 9.6.3 is a maintenance release, fixing bugs in 9.6.2.
@


1.3.2.4
log
@SVN rev 224596 on 2011-08-02 08:07:59Z by dougb

Update to version 9.6-ESV-R5 which contains various bug fixes
and improvements:

ftp://ftp.isc.org/isc/bind9/9.6-ESV-R5/RELEASE-NOTES-BIND-9.6-ESV.html
@
text
@d45 1
a45 1
BIND 9.6-ESV-R5 (Extended Support Version)
d47 1
a47 7
	BIND 9.4-ESV-R5 is a maintenance release, fixing bugs in BIND
	9.6-ESV-R4.

BIND 9.6.3/BIND 9.6-ESV-R4

	BIND 9.6.3/BIND 9.6-ESV-R4 is a maintenance release, fixing bugs
	in 9.6.2.
@


1.3.2.5
log
@SVN rev 233915 on 2012-04-05 04:31:17Z by dougb

Update to version 9.6-ESV-R6, the latest from ISC, which contains numerous
bug fixes.
@
text
@a44 11
	For a detailed list of user-visible changes from
	previous releases, see the CHANGES file.

        For up-to-date release notes and errata, see
        http://www.isc.org/software/bind9/releasenotes

BIND 9.6-ESV-R6 (Extended Support Version)

	BIND 9.6-ESV-R6 includes a number of bug fixes and prevents a
	security problem described in CVE-2011-4313

d410 3
@


1.3.2.6
log
@SVN rev 236197 on 2012-05-28 19:48:37Z by dougb

Upgrade to BIND version 9.6-ESV-R7, the latest from ISC.

Feature Change

*  BIND now recognizes the TLSA resource record type, created to
   support IETF DANE (DNS-based Authentication of Named Entities)

Bug Fix

*  The locking strategy around the handling of iterative queries
   has been tuned to reduce unnecessary contention in a multi-
   threaded environment.

Other critical bug fixes are included.

All BIND users are encouraged to upgrade.
@
text
@a50 5
BIND 9.6-ESV-R7 (Extended Support Version)

	BIND 9.4-ESV-R7 is a maintenance release, fixing bugs in BIND
	9.6-ESV-R6.

@


1.3.2.7
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/245039
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r245039 | erwin | 2013-01-04 13:36:31 +0000 (Fri, 04 Jan 2013) | 7 lines
## SVN ##
## SVN ## Update to 9.6-ESV-R8.
## SVN ##
## SVN ## All security fixes were previously merged.
## SVN ## Release notes: https://kb.isc.org/article/AA-00795
## SVN ##
## SVN ## Approved by:	delphij (mentor)
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@a50 5
BIND 9.6-ESV-R8 (Extended Support Version)

        BIND 9.6-ESV-R8 includes several bug fixes and patches security
        flaws described in CVE-2012-1667, CVE-2012-3817 and CVE-2012-4244.

d53 1
a53 1
	BIND 9.6-ESV-R7 is a maintenance release, fixing bugs in BIND
d63 1
a63 1
	BIND 9.6-ESV-R5 is a maintenance release, fixing bugs in BIND
@


1.3.2.8
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/246656
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@a44 3
	For a summary of functional enhancements in previous
	releases, see the HISTORY file.

d51 1
a51 1
BIND 9.8.4
d53 1
a53 1
        BIND 9.8.4 includes several bug fixes and patches security
d56 189
a244 1
BIND 9.8.3
d246 2
a247 1
	BIND 9.8.3 is a maintenance release.
d249 2
a250 1
BIND 9.8.2
d252 178
a429 2
	BIND 9.8.2 includes a number of bug fixes and prevents a security
	problem described in CVE-2011-4313
a430 94
BIND 9.8.1

        BIND 9.8.1 includes a number of bug fixes and enhancements from
	BIND 9.8 and earlier releases.  New features include:

	- The DLZ "dlopen" driver is now built by default.
	- Added a new include file with function typedefs
          for the DLZ "dlopen" driver.
	- Made "--with-gssapi" default.
	- More verbose error reporting from DLZ LDAP.

BIND 9.8.0

        BIND 9.8.0 includes a number of changes from BIND 9.7 and earlier
        releases.  New features include:

        - Built-in trust anchor for the root zone, which can be
          switched on via "dnssec-validation auto;"
        - Support for DNS64.
        - Support for response policy zones (RPZ).
        - Support for writable DLZ zones.
        - Improved ease of configuration of GSS/TSIG for
          interoperability with Active Directory
        - Support for GOST signing algorithm for DNSSEC.
        - Removed RTT Banding from server selection algorithm.
        - New "static-stub" zone type.
        - Allow configuration of resolver timeouts via
          "resolver-query-timeout" option.

BIND 9.7.0

	BIND 9.7.0 includes a number of changes from BIND 9.6 and earlier
	releases.  Most are intended to simplify DNSSEC configuration.

	New features include:

	- Fully automatic signing of zones by "named".
	- Simplified configuration of DNSSEC Lookaside Validation (DLV).
	- Simplified configuration of Dynamic DNS, using the "ddns-confgen"
	  command line tool or the "local" update-policy option.  (As a side
	  effect, this also makes it easier to configure automatic zone
	  re-signing.)
	- New named option "attach-cache" that allows multiple views to
	  share a single cache.
	- DNS rebinding attack prevention.
	- New default values for dnssec-keygen parameters.
	- Support for RFC 5011 automated trust anchor maintenance
	- Smart signing: simplified tools for zone signing and key
	  maintenance.
	- The "statistics-channels" option is now available on Windows.
	- A new DNSSEC-aware libdns API for use by non-BIND9 applications
	- On some platforms, named and other binaries can now print out
	  a stack backtrace on assertion failure, to aid in debugging.
	- A "tools only" installation mode on Windows, which only installs
	  dig, host, nslookup and nsupdate.
	- Improved PKCS#11 support, including Keyper support and explicit
	  OpenSSL engine selection.

	Known issues in this release:

	- In rare cases, DNSSEC validation can leak memory.  When this 
	  happens, it will cause an assertion failure when named exits,
	  but is otherwise harmless.  A fix exists, but was too late for
	  this release; it will be included in BIND 9.7.1.

	Compatibility notes:

	- If you had built BIND 9.6 with any of ALLOW_NSEC3PARAM_UPDATE,
	  ALLOW_SECURE_TO_INSECURE or ALLOW_INSECURE_TO_SECURE defined, then
	  you should ensure that all changes that are in progress have
	  completed prior to upgrading to BIND 9.7.  BIND 9.7 implements
	  those features in a way which is not backwards compatible.

	- Prior releases had a bug which caused HMAC-SHA* keys with long
	  secrets to be used incorrectly.  Fixing this bug means that older
	  versions of BIND 9 may fail to interoperate with this version
	  when using TSIG keys.  If this occurs, the new "isc-hmac-fixup"
	  tool will convert a key with a long secret into a form that works
	  correctly with all versions of BIND 9.  See the "isc-hmac-fixup"
	  man page for additional details.

	- Revoking a DNSSEC key with "dnssec-revoke" changes its key ID.
	  It is possible for the new key ID to collide with that of a
	  different key.  Newly generated keys will not have this problem,
	  as "dnssec-keygen" looks for potential collisions before
	  generating keys, but exercise caution if using key revokation
	  with keys that were generated by older versions of BIND 9.  See
	  the Administrator's Reference Manual, section 4.10 ("Dynamic
	  Trust Anchor Management") for more details.

	- A bug was fixed in which a key's scheduled inactivity date was
	  stored incorectly.  Users who participated in the 9.7.0 BETA test
	  and had DNSSEC keys with scheduled inactivity dates will need to
	  reset those keys' dates using "dnssec-settime -I".
d444 1
a444 1
		NetBSD 3.x, 4.0-beta, 5.0-beta
a602 1

a620 45
        Additional information on various subjects can be found
        in the other README files.


Change Log

	A detailed list of all changes to BIND 9 is included in the 
	file CHANGES, with the most recent changes listed first.
	Change notes include tags indicating the category of the
	change that was made; these categories are:

	   [func]	  New feature

	   [bug]	  General bug fix

	   [security]	  Fix for a significant security flaw

	   [experimental] Used for new features when the syntax
	   		  or other aspects of the design are still
			  in flux and may change

	   [port]	  Portability enhancement

	   [maint]	  Updates to built-in data such as root
			  server addresses and keys

	   [tuning]	  Changes to built-in configuration defaults
	   		  and constants to improve performanceo

	   [protocol]	  Updates to the DNS protocol such as new
			  RR types

           [test]         Changes to the automatic tests, not
                          affecting server functionality

           [cleanup]      Minor corrections and refactoring

	   [doc]	  Documentation

	In general, [func] and [experimental] tags will only appear
	in new-feature releases (i.e., those with version numbers
	ending in zero).  Some new functionality may be backported to
	older releases on a case-by-case basis.  All other change
	types may be applied to all currently-supported releases.

@


1.3.2.9
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/262707
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@d51 2
a52 25
	For up-to-date release notes and errata, see
	http://www.isc.org/software/bind9/releasenotes

BIND 9.8.7
 
	BIND 9.8.7 includes several bug fixes and patches the security
	flaws described in CVE-2013-6320 and CVE-2014-0591.  It also
	includes the following functional enhancements:

	 - "named" now preserves the capitalization of names when
	    responding to queries.
	 - "named-checkconf -px" will print the contents of configuration
	   files with the shared secrets obscured, making it easier to
	   share configuration (e.g. when submitting a bug report)
	   without revealing private information.

BIND 9.8.6

	BIND 9.8.6 includes several bug fixes and patches the security
	flaws described in CVE-2013-3919 and CVE-2013-4854.

BIND 9.8.5

	BIND 9.8.5 includes several bug fixes and patches security
	flaws described in CVE-2012-5688, CVE-2012-5689 and CVE-2013-2266.
d56 2
a57 2
	BIND 9.8.4 includes several bug fixes and patches security
	flaws described in CVE-2012-1667, CVE-2012-3817 and CVE-2012-4244.
d70 1
a70 1
	BIND 9.8.1 includes a number of bug fixes and enhancements from
d75 1
a75 1
	  for the DLZ "dlopen" driver.
d81 2
a82 2
	BIND 9.8.0 includes a number of changes from BIND 9.7 and earlier
	releases.  New features include:
d84 12
a95 12
	- Built-in trust anchor for the root zone, which can be
	  switched on via "dnssec-validation auto;"
	- Support for DNS64.
	- Support for response policy zones (RPZ).
	- Support for writable DLZ zones.
	- Improved ease of configuration of GSS/TSIG for
	  interoperability with Active Directory
	- Support for GOST signing algorithm for DNSSEC.
	- Removed RTT Banding from server selection algorithm.
	- New "static-stub" zone type.
	- Allow configuration of resolver timeouts via
	  "resolver-query-timeout" option.
d181 3
a183 3
	NOTE:  As of BIND 9.5.1, 9.4.3, and 9.3.6, older versions of
	Windows, including Windows NT and Windows 2000, are no longer
	supported.
d236 1
a236 1
		Sibling glue checking in named-checkzone is enabled by default.
d283 4
a286 4
	Support for the "fixed" rrset-order option can be enabled
	or disabled by specifying "--enable-fixed-rrset" or
	"--disable-fixed-rrset" on the configure command line.
	The default is "disabled", to reduce memory footprint.
d353 2
a354 2
	Additional information on various subjects can be found
	in the other README files.
d371 1
a371 1
			  or other aspects of the design are still
d380 1
a380 1
			  and constants to improve performanceo
d385 2
a386 2
	   [test]         Changes to the automatic tests, not
			  affecting server functionality
d388 1
a388 1
	   [cleanup]      Minor corrections and refactoring
@


1.2
log
@SVN rev 186462 on 2008-12-23 22:47:56Z by dougb

Merge from vendor/bind9/dist as of the 9.4.3 import
@
text
@d45 1
a45 1
BIND 9.4.3
d47 2
a48 1
	BIND 9.4.3 is a maintenance release, fixing bugs in 9.4.2.
d50 1
a50 1
BIND 9.4.2
d52 1
a52 2
	BIND 9.4.2 is a maintenance release, containing fixes for
	a number of bugs in 9.4.1.
d54 1
a54 2
	Warning: If you installed BIND 9.4.2rc1 then any applications
	linked against this release candidate will need to be rebuilt.
d56 2
a57 1
BIND 9.4.1
d59 23
a81 2
	BIND 9.4.1 is a security release, containing a fix for
	a security bugs in 9.4.0.
d88 1
a88 1
	Implemented "additional section caching" (or "acache"), an
d100 8
a107 7
	New option "allow-query-cache".  This lets allow-query be
	used to specify the default zone access level rather than
	having to have every zone override the global value.
	allow-query-cache can be set at both the options and view
	levels. If allow-query-cache is not set then allow-recursion
	is used if set, otherwise allow-query is used if set, otherwise
	the default (localhost; localnets;) is used.
d180 1
a180 1
	Add additional zone data consistancy checks.  named-checkzone
d185 1
d198 1
a198 1
	Memory management. "USE INTERNAL MALLOC" is now runtime selectable.
d213 1
a213 1
	Raise the UDP receive buffer size to 32k if it is less than 32k.
d215 1
a215 1
	x86 and x86_64 now have separate atomic locking implementations.
d243 1
a243 12
	Integrate contributed DLZ code into named.

	Integrate contributed IDN code from JPNIC.

	Validate pending NS RRsets, in the authority section, prior
	to returning them if it can be done without requiring DNSKEYs
	to be fetched.

	It is now possible to configure named to accept expired
	RRSIGs.  Default "dnssec-accept-expired no;".  Setting
	"dnssec-accept-expired yes;" leaves named vulnerable to
	replay attacks.
d245 1
a245 50
	Additional memory leakage checks.

	The maximum EDNS UDP response named will send can now be
	set in named.conf (max-udp-size).  This is independent of
	the advertised receive buffer (edns-udp-size).

	Named now falls back to advertising EDNS with a 512 byte
	receive buffer if the initial EDNS queries fail.

	Control the zeroing of the negative response TTL to a soa
	query.  Defaults "zero-no-soa-ttl yes;" and
	"zero-no-soa-ttl-cache no;".
			
	Separate out MX and SRV to CNAME checks.

	dig/nslookup/host: warn about missing "QR".

	TSIG HMACSHA1, HMACSHA224, HMACSHA256, HMACSHA384 and
	HMACSHA512 support.

	dnssec-signzone: output the SOA record as the first record
	in the signed zone.

	Two new update policies.  "selfsub" and "selfwild".

	dig, nslookup and host now advertise a 4096 byte EDNS UDP
	buffer size by default.

	Report when a zone is removed.

	DS/DLV SHA256 digest algorithm support.

	Implement "rrset-order fixed".

	Check the KSK flag when updating a secure dynamic zone.
	New zone option "update-check-ksk yes;".

	It is now possible to explicitly enable DNSSEC validation.
	default dnssec-validation no; to be changed to yes in 9.5.0.

	It is now possible to enable/disable DNSSEC validation
	from rndc.  This is useful for the mobile hosts where the
	current connection point breaks DNSSEC (firewall/proxy).

		rndc validation newstate [view]

	dnssec-signzone can now update the SOA record of the signed
	zone, either as an increment or as the system time().

	Statistics about acache now recorded and sent to log.
d389 1
d392 5
a396 3
		NetBSD 1.5
		Slackware Linux 8.1
		Solaris 8, 9, 9 (x86)
d403 2
a404 2
	Additionally, we have unverified reports of success building
	previous versions of BIND 9 from users of the following systems:
d406 12
a417 11
		AIX 5L
		SuSE Linux 7.0
		Slackware Linux 7.x, 8.0
	        Red Hat Linux 7.1
		Debian GNU/Linux 2.2 and 3.0
		Mandrake 8.1
		OpenBSD 2.6, 2.8, 2.9, 3.1, 3.6, 3.8
		UnixWare 7.1.1
		HP-UX 10.20
		BSD/OS 4.2
		Mac OS X 10.1, 10.3.8
d454 1
a454 3
		Disable support for "rrset-order fixed".
		  -DDNS_RDATASET_FIXED=0
		Sibling glue checking in named-checkzone is enabled by default.
d458 3
a489 3
	To build libbind (the BIND 8 resolver library), specify
	"--enable-libbind" on the configure command line.

d501 5
d586 5
a590 3
	code, you might want to join the BIND Forum as a Worker.
	This gives you access to the bind-workers@@isc.org mailing
	list and pre-release access to the code.
a591 1
		http://www.isc.org/sw/guild/bf/
@


1.1
log
@Initial revision
@
text
@d45 240
d361 1
a361 1
	  - The source distribution now builds on Windows NT/2000.
d410 2
a411 2
	A bug in the Windows 2000 DNS server can cause zone transfers
	from a BIND 9 server to a W2K server to fail.  For details,
d426 1
a426 1
		FreeBSD 4.10, 5.2.1
d431 5
a435 1
		Windows NT/2000/XP/2003
d446 1
a446 1
		OpenBSD 2.6, 2.8, 2.9
d450 1
a450 1
		Mac OS X 10.1
d485 12
d501 11
d525 4
d567 1
d570 2
d578 3
d616 3
a618 5
	code, you might want to join the BIND Workers mailing list.
	Send mail to

		bind-workers-request@@isc.org

d620 1
@


1.1.1.1
log
@Vender import of BIND 9.3.0rc4.
@
text
@@


1.1.1.2
log
@Vendor import of BIND 9.3.1
@
text
@a45 7
BIND 9.3.1

        BIND 9.3.1 is a maintenance release, containing fixes for
        a number of bugs in 9.3.0.

        libbind: corresponds to that from BIND 8.4.6-REL.

a297 1
	* gcc-3.3.5 powerpc generates incorrect code at -02.
@


1.1.1.2.2.1
log
@MFC import of BIND 9.3.2
@
text
@a45 20
BIND 9.3.2

        BIND 9.3.2 is a maintenance release, containing fixes for
        a number of bugs in 9.3.1.

        libbind: corresponds to that from BIND 8.4.7-REL.

	Known Issues:

	The following INSIST can be triggered with DNSSEC enabled.

resolver.c:762: INSIST(result != 0 || dns_rdataset_isassociated(event->rdataset) || fctx->type == ((dns_rdatatype_t)dns_rdatatype_any) || fctx->type == ((dns_rdatatype_t)dns_rdatatype_rrsig)) failed

	We are still trying to isolate the cause.  If you have core
	dump please send a bug report to bind9-bugs@@isc.org with
	the location of the core, named executable and OS details.
	
	Note: contrib/nanny contains a perl script to restart named
	in the event of a INSIST/REQUIRE/ENSURE failure.

d213 1
a213 1
		Mac OS X 10.1, 10.3.8
a302 1
	Known compiler issues:
a305 1
	* Irix, MipsPRO 7.4.1m is known to cause problems.
@


1.1.1.2.2.1.4.1
log
@MFC upgrade to version 9.3.3

Approved by:    re (kensmith)
@
text
@a196 3
		--with-libtool does not work on SunOS 4.  configure
		requires "printf" which is not available.

d229 1
a229 1
		OpenBSD 2.6, 2.8, 2.9, 3.1, 3.6, 3.8
a267 2
		Disable dropping queries from particular well known ports.
		  -DNS_CLIENT_DROPPORT=0
a271 11
	The following need to be set when cross compiling.

	    BUILD_CC
		The native C compiler.
	    BUILD_CFLAGS (optional)
	    BUILD_CPPFLAGS (optional)
		Possible Settings:
		-DNEED_OPTARG=1		(optarg is not declared in <unistd.h>)
	    BUILD_LDFLAGS (optional)
	    BUILD_LIBS (optional)

@


1.1.1.2.2.2
log
@MFC upgrade to version 9.3.3

Approved by:	re (kensmith)
@
text
@a196 3
		--with-libtool does not work on SunOS 4.  configure
		requires "printf" which is not available.

d229 1
a229 1
		OpenBSD 2.6, 2.8, 2.9, 3.1, 3.6, 3.8
a267 2
		Disable dropping queries from particular well known ports.
		  -DNS_CLIENT_DROPPORT=0
a271 11
	The following need to be set when cross compiling.

	    BUILD_CC
		The native C compiler.
	    BUILD_CFLAGS (optional)
	    BUILD_CPPFLAGS (optional)
		Possible Settings:
		-DNEED_OPTARG=1		(optarg is not declared in <unistd.h>)
	    BUILD_LDFLAGS (optional)
	    BUILD_LIBS (optional)

@


1.1.1.2.2.3
log
@MFC the upgrade to BIND 9.3.4
@
text
@a44 8
BIND 9.3.4

	BIND 9.3.4 is a security release.

BIND 9.3.3

        BIND 9.3.3 is a maintenance release, containing fixes for
        a number of bugs in 9.3.2.
@


1.1.1.2.2.4
log
@Update to 9.3.4-P1, which fixes the following:

The DNS query id generation is vulnerable to cryptographic
analysis which provides a 1 in 8 chance of guessing the next
query id for 50% of the query ids. This can be used to perform
cache poisoning by an attacker.

This bug only affects outgoing queries, generated by BIND 9 to
answer questions as a resolver, or when it is looking up data
for internal uses, such as when sending NOTIFYs to slave name
servers.

All users are encouraged to upgrade.

See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926
@
text
@a44 4
BIND 9.3.4-P1

	BIND 9.3.4-P1 is a security release.

@


1.1.1.2.2.5
log
@SVN rev 179502 on 2008-06-03 05:38:10Z by dougb

Update to version 9.3.5. It contains the latest bug fixes, updates
to root server addresses, and a fix for the vulnerability mentioned
here: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122

Users of BIND 9.3.x are strongly encouraged to upgrade to this
version. Also, the 9.3.x branch is now in maintenance-only mode.
Users are encouraged to investigate BIND 9.4.x or perhaps 9.5.x.

http://www.isc.org/index.pl?/sw/bind/versions_and_support.php

This udpate is being done by updating the files directly in this
branch rather than an import + MFC because BIND in HEAD is 9.4.x.
@
text
@d45 12
@


1.1.1.2.2.6
log
@SVN rev 186999 on 2009-01-10 04:30:27Z by dougb

Merge from vendor/bind9/dist-9.3 as of the 9.3.6-P1 import
@
text
@a45 8
BIND 9.3.6

        BIND 9.3.6 is a maintenance release, containing fixes for
        a number of bugs in previous releases.
        
        The major change since 9.3.5 is query port randomization,
        to improve resilience against cache poisoning attacks.

d148 1
a148 1
	  - The source distribution now builds on Windows.
d197 5
a201 2
	A bug in some versions of the Microsoft DNS server can cause zone
        transfers from a BIND 9 server to a W2K server to fail.  For details,
d221 1
a221 5
		Windows XP/2003/2008

        NOTE:  As of BIND 9.5.1, 9.4.3, and 9.3.6, older versions of
        Windows, including Windows NT and Windows 2000, are no longer
        supported.
a272 4
		Enable workaround for Solaris kernel bug about /dev/poll
		  -DISC_SOCKET_USE_POLLWATCH=1
		  The watch timeout is also configurable, e.g.,
		  -DISC_SOCKET_POLLWATCH_TIMEOUT=20
a300 4
	On some platforms it is necessary to explictly request large
	file support to handle files bigger than 2GB.  This can be
	done by "--enable-largefile" on the configure command line.

a349 3
	SunOS 4 requires "printf" to be installed to make the shared
	libraries.  sh-utils-1.16 provides a "printf" which compiles
	on SunOS 4.
@


1.1.1.3
log
@Vendor import of BIND 9.3.2
@
text
@a45 20
BIND 9.3.2

        BIND 9.3.2 is a maintenance release, containing fixes for
        a number of bugs in 9.3.1.

        libbind: corresponds to that from BIND 8.4.7-REL.

	Known Issues:

	The following INSIST can be triggered with DNSSEC enabled.

resolver.c:762: INSIST(result != 0 || dns_rdataset_isassociated(event->rdataset) || fctx->type == ((dns_rdatatype_t)dns_rdatatype_any) || fctx->type == ((dns_rdatatype_t)dns_rdatatype_rrsig)) failed

	We are still trying to isolate the cause.  If you have core
	dump please send a bug report to bind9-bugs@@isc.org with
	the location of the core, named executable and OS details.
	
	Note: contrib/nanny contains a perl script to restart named
	in the event of a INSIST/REQUIRE/ENSURE failure.

d213 1
a213 1
		Mac OS X 10.1, 10.3.8
a302 1
	Known compiler issues:
a305 1
	* Irix, MipsPRO 7.4.1m is known to cause problems.
@


1.1.1.4
log
@Vendor import of BIND 9.3.3
@
text
@a196 3
		--with-libtool does not work on SunOS 4.  configure
		requires "printf" which is not available.

d229 1
a229 1
		OpenBSD 2.6, 2.8, 2.9, 3.1, 3.6, 3.8
a267 2
		Disable dropping queries from particular well known ports.
		  -DNS_CLIENT_DROPPORT=0
a271 11
	The following need to be set when cross compiling.

	    BUILD_CC
		The native C compiler.
	    BUILD_CFLAGS (optional)
	    BUILD_CPPFLAGS (optional)
		Possible Settings:
		-DNEED_OPTARG=1		(optarg is not declared in <unistd.h>)
	    BUILD_LDFLAGS (optional)
	    BUILD_LIBS (optional)

@


1.1.1.5
log
@Vendor import of BIND 9.3.4
@
text
@a44 8
BIND 9.3.4

	BIND 9.3.4 is a security release.

BIND 9.3.3

        BIND 9.3.3 is a maintenance release, containing fixes for
        a number of bugs in 9.3.2.
@


1.1.1.6
log
@Vendor import of BIND 9.4.1
@
text
@d45 1
d47 1
a47 1
BIND 9.4.1
d49 1
a49 4
	BIND 9.4.1 is a security release, containing a fix for a
	security bug in 9.4.0.
	
BIND 9.4.0
d51 2
a52 2
	BIND 9.4.0 has a number of new features over 9.3,
	including:
d54 1
a54 4
	Implemented "additional section caching" (or "acache"), an
	internal cache framework for additional section content to
	improve response performance.  Several configuration options
	were provided to control the behavior.
d56 2
a57 2
	New notify type 'master-only'.  Enable notify for master
	zones only.
d59 1
a59 1
	Accept 'notify-source' style syntax for query-source.
d61 1
a61 1
	rndc now allows addresses to be set in the server clauses.
d63 1
a63 5
	New option "allow-query-cache".  This lets allow-query be
	used to specify the default zone access level rather than
	having to have every zone override the global value.
	allow-query-cache can be set at both the options and view
	levels.  If allow-query-cache is not set allow-query applies.
d65 1
a65 1
	rndc: the source address can now be specified.
d67 6
a72 189
	ixfr-from-differences now takes master and slave in addition
	to yes and no at the options and view levels.

	Allow the journal's name to be changed via named.conf.

	'rndc notify zone [class [view]]' resend the NOTIFY messages
	for the specified zone.

	'dig +trace' now randomly selects the next servers to try.
	Report if there is a bad delegation.

	Improve check-names error messages.

	Make public the function to read a key file, dst_key_read_public().

	dig now returns the byte count for axfr/ixfr.
			
	allow-update is now settable at the options / view level.

	named-checkconf now checks the logging configuration.

	host now can turn on memory debugging flags with '-m'.

	Don't send notify messages to self.

	Perform sanity checks on NS records which refer to 'in zone' names.

	New zone option "notify-delay".  Specify a minimum delay
	between sets of NOTIFY messages.

	Extend adjusting TTL warning messages.

	Named and named-checkzone can now both check for non-terminal
	wildcard records.

	"rndc freeze/thaw" now freezes/thaws all zones.

	named-checkconf now check acls to verify that they only
	refer to existing acls.

	The server syntax has been extended to support a range of
	servers.

	Report differences between hints and real NS rrset and
	associated address records.

	Preserve the case of domain names in rdata during zone
	transfers.

	Restructured the data locking framework using architecture
	dependent atomic operations (when available), improving
	response performance on multi-processor machines significantly.
	x86, x86_64, alpha, powerpc, and mips are currently supported.

	UNIX domain controls are now supported.

	Add support for additional zone file formats for improving
	loading performance.  The masterfile-format option in
	named.conf can be used to specify a non-default format.  A
	separate command named-compilezone was provided to generate
	zone files in the new format.  Additionally, the -I and -O
	options for dnssec-signzone specify the input and output
	formats.

	dnssec-signzone can now randomize signature end times
	(dnssec-signzone -j jitter).

	Add support for CH A record.

	Add additional zone data consistancy checks.  named-checkzone
	has extended checking of NS, MX and SRV record and the hosts
	they reference.  named has extended post zone load checks.
	New zone options: check-mx and integrity-check.

	edns-udp-size can now be overridden on a per server basis.

	dig can now specify the EDNS version when making a query.

	Added framework for handling multiple EDNS versions.

	Additional memory debugging support to track size and mctx
	arguments.

	Detect duplicates of UDP queries we are recursing on and
	drop them.  New stats category "duplicates".

	Memory management. "USE INTERNAL MALLOC" is now runtime selectable.

	The lame cache is now done on a <qname,qclass,qtype> basis
	as some servers only appear to be lame for certain query
	types.

	Limit the number of recursive clients that can be waiting
	for a single query (<qname,qtype,qclass>) to resolve.  New
	options clients-per-query and max-clients-per-query.

	dig: report the number of extra bytes still left in the
	packet after processing all the records.

	Support for IPSECKEY rdata type.

	Raise the UDP receive buffer size to 32k if it is less than 32k.

	x86 and x86_64 now have separate atomic locking implementations.

	named-checkconf now validates update-policy entries.

	Attempt to make the amount of work performed in a iteration
	self tuning.  The covers nodes clean from the cache per
	iteration, nodes written to disk when rewriting a master
	file and nodes destroyed per iteration when destroying a
	zone or a cache.

	ISC string copy API.

	Automatic empty zone creation for D.F.IP6.ARPA and friends.
	Note: RFC 1918 zones are not yet covered by this but are
	likely to be in a future release.

	New options: empty-server, empty-contact, empty-zones-enable
	and disable-empty-zone.

	dig now has a '-q queryname' and '+showsearch' options.

	host/nslookup now continue (default)/fail on SERVFAIL.

	dig now warns if 'RA' is not set in the answer when 'RD'
	was set in the query.  host/nslookup skip servers that fail
	to set 'RA' when 'RD' is set unless a server is explicitly
	set.

	Integrate contributed DLZ code into named.

	Integrate contributed IDN code from JPNIC.

	Validate pending NS RRsets, in the authority section, prior
	to returning them if it can be done without requiring DNSKEYs
	to be fetched.

	It is now possible to configure named to accept expired
	RRSIGs.  Default "dnssec-accept-expired no;".  Setting
	"dnssec-accept-expired yes;" leaves named vulnerable to
	replay attacks.

	Additional memory leakage checks.

	The maximum EDNS UDP response named will send can now be
	set in named.conf (max-udp-size).  This is independent of
	the advertised receive buffer (edns-udp-size).

	Named now falls back to advertising EDNS with a 512 byte
	receive buffer if the initial EDNS queries fail.

	Control the zeroing of the negative response TTL to a soa
	query.  Defaults "zero-no-soa-ttl yes;" and
	"zero-no-soa-ttl-cache no;".
			
	Separate out MX and SRV to CNAME checks.

	dig/nslookup/host: warn about missing "QR".

	TSIG HMACSHA1, HMACSHA224, HMACSHA256, HMACSHA384 and
	HMACSHA512 support.

	dnssec-signzone: output the SOA record as the first record
	in the signed zone.

	Two new update policies.  "selfsub" and "selfwild".

	dig, nslookup and host now advertise a 4096 byte EDNS UDP
	buffer size by default.

	Report when a zone is removed.

	DS/DLV SHA256 digest algorithm support.

	Implement "rrset-order fixed".

	Check the KSK flag when updating a secure dynamic zone.
	New zone option "update-check-ksk yes;".

	It is now possible to explicitly enable DNSSEC validation.
	default dnssec-validation no; to be changed to yes in 9.5.0.

	It is now possible to enable/disable DNSSEC validation
	from rndc.  This is useful for the mobile hosts where the
	current connection point breaks DNSSEC (firewall/proxy).

		rndc validation newstate [view]
d74 1
a74 2
	dnssec-signzone can now update the SOA record of the signed
	zone, either as an increment or as the system time().
d76 2
a77 1
	Statistics about acache now recorded and sent to log.
d79 1
a79 1
	libbind: corresponds to that from BIND 8.4.7.
@


1.1.1.7
log
@Vendor import of 9.4.1-P1, which has fixes for the following:

1. The default access control lists (acls) are not being
correctly set. If not set anyone can make recursive queries
and/or query the cache contents.

See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2925

2. The DNS query id generation is vulnerable to cryptographic
analysis which provides a 1 in 8 chance of guessing the next
query id for 50% of the query ids. This can be used to perform
cache poisoning by an attacker.

This bug only affects outgoing queries, generated by BIND 9 to
answer questions as a resolver, or when it is looking up data
for internal uses, such as when sending NOTIFYs to slave name
servers.

All users are encouraged to upgrade.

See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926

Approved by:	re (kensmith, implicit)
@
text
@a45 5
BIND 9.4.1-P1

	BIND 9.4.1-P1 is a security release, containing a fixes for a
	security bugs in BIND 9.4.1.

@


1.1.1.7.2.1
log
@MFC contrib code and bmake changes for BIND version 9.4.2

Approved by:	re (kensmith)
@
text
@d46 1
a46 1
BIND 9.4.2
d48 2
a49 5
	BIND 9.4.2 is a maintenance release, containing fixes for
	a number of bugs in 9.4.1.

	Warning: If you installed BIND 9.4.2rc1 then any applications
	linked against this release candidate will need to be rebuilt.
d53 3
a55 3
	BIND 9.4.1 is a security release, containing a fix for
	a security bugs in 9.4.0.

d77 1
a77 3
	levels. If allow-query-cache is not set then allow-recursion
	is used if set, otherwise allow-query is used if set, otherwise
	the default (localhost; localnets;) is used.
d421 1
a421 1
		FreeBSD 4.10, 5.2.1, 6.2
a477 2
		Disable support for "rrset-order fixed".
		  -DDNS_RDATASET_FIXED=0
d590 5
a594 3
	code, you might want to join the BIND Forum as a Worker.
	This gives you access to the bind-workers@@isc.org mailing
	list and pre-release access to the code.
a595 1
		http://www.isc.org/sw/guild/bf/
@


1.1.1.7.2.2
log
@SVN rev 186996 on 2009-01-10 03:00:21Z by dougb

MFC the BIND 9.4.3 and 9.4.3-P1 updates
@
text
@a44 3
BIND 9.4.3

	BIND 9.4.3 is a maintenance release, fixing bugs in 9.4.2.
d358 1
a358 1
	  - The source distribution now builds on Windows.
d407 5
a411 2
	A bug in some versions of the Microsoft DNS server can cause zone
        transfers from a BIND 9 server to a W2K server to fail.  For details,
d431 1
a431 5
		Windows XP/2003/2008

        NOTE:  As of BIND 9.5.1, 9.4.3, and 9.3.6, older versions of
        Windows, including Windows NT and Windows 2000, are no longer
        supported.
a484 8
		Sibling glue checking in named-checkzone is enabled by default.
		To disable the default check set.  -DCHECK_SIBLING=0
		named-checkzone checks out-of-zone addresses by default.
		To disable this default set.  -DCHECK_LOCAL=0
		Enable workaround for Solaris kernel bug about /dev/poll
		  -DISC_SOCKET_USE_POLLWATCH=1
		  The watch timeout is also configurable, e.g.,
		  -DISC_SOCKET_POLLWATCH_TIMEOUT=20
a512 4
	On some platforms it is necessary to explictly request large
	file support to handle files bigger than 2GB.  This can be
	done by "--enable-largefile" on the configure command line.

a561 3
	SunOS 4 requires "printf" to be installed to make the shared
	libraries.  sh-utils-1.16 provides a "printf" which compiles
	on SunOS 4.
@


1.1.1.7.2.2.4.1
log
@SVN rev 203961 on 2010-02-16 18:10:35Z by dougb

Merge from stable/7, version 203948:

Upgrade to BIND 9.4-ESV. This version incorporates all bug and security
fixes since the release of 9.4.3, including the most recent -P5 security
fix detailed below.

From the README:
BIND 9.4-ESV will be supported until December 31, 2010, at
which time you will need to upgrade to the current release
of BIND.

This versions address the following vulnerabilities:

BIND 9 Cache Update from Additional Section
https://www.isc.org/advisories/CVE-2009-4022v6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022
A nameserver with DNSSEC validation enabled may incorrectly add
unauthenticated records to its cache that are received during the
resolution of a recursive client query

BIND 9 DNSSEC validation code could cause bogus NXDOMAIN responses
https://www.isc.org/advisories/CVE-2010-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097
There was an error in the DNSSEC NSEC/NSEC3 validation code that could
cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records
proven by NSEC or NSEC3 to exist) to be cached as if they had validated
correctly

These issues only affect systems with DNSSEC validation enabled.

Approved by:	re (kensmith)
@
text
@d30 2
a31 2
	BIND version 9 development has been under written by the following
	organisations:
a44 10
BIND 9.4-ESV (Extended Support Version)

	BIND 9.4-ESV is the Extended Support Version of BIND 9.4
	and incorporates the final maintenance release fixing bugs
	in BIND 9.4.3.

	BIND 9.4-ESV will be supported until December 31, 2010, at
	which time you will need to upgrade to the current release
	of BIND.

d70 1
a70 1
	were provided to control the behaviour.
d79 7
a85 8
	New option "allow-query-cache".  This lets "allow-query"
	be used to specify the default zone access level rather
	than having to have every zone override the global value.
	"allow-query-cache" can be set at both the options and view
	levels.  If "allow-query-cache" is not set then "allow-recursion"
	is used if set, otherwise "allow-query" is used if set
	unless "recursion no;" is set in which case "none;" is used,
	otherwise the default (localhost; localnets;) is used.
d153 1
a153 1
	dnssec-signzone can now randomise signature end times
d158 1
a158 1
	Add additional zone data consistency checks.  named-checkzone
@


1.1.1.7.2.3
log
@SVN rev 203948 on 2010-02-16 05:14:51Z by dougb

Upgrade to BIND 9.4-ESV. This version incorporates all bug and security
fixes since the release of 9.4.3, including the most recent -P5 security
fix detailed below.

From the README:
BIND 9.4-ESV will be supported until December 31, 2010, at
which time you will need to upgrade to the current release
of BIND.

This versions address the following vulnerabilities:

BIND 9 Cache Update from Additional Section
https://www.isc.org/advisories/CVE-2009-4022v6
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022
A nameserver with DNSSEC validation enabled may incorrectly add
unauthenticated records to its cache that are received during the
resolution of a recursive client query

BIND 9 DNSSEC validation code could cause bogus NXDOMAIN responses
https://www.isc.org/advisories/CVE-2010-0097
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097
There was an error in the DNSSEC NSEC/NSEC3 validation code that could
cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records
proven by NSEC or NSEC3 to exist) to be cached as if they had validated
correctly

These issues only affect systems with DNSSEC validation enabled.

Approved by:	re (kensmith)
@
text
@d30 2
a31 2
	BIND version 9 development has been under written by the following
	organisations:
a44 10
BIND 9.4-ESV (Extended Support Version)

	BIND 9.4-ESV is the Extended Support Version of BIND 9.4
	and incorporates the final maintenance release fixing bugs
	in BIND 9.4.3.

	BIND 9.4-ESV will be supported until December 31, 2010, at
	which time you will need to upgrade to the current release
	of BIND.

d70 1
a70 1
	were provided to control the behaviour.
d79 7
a85 8
	New option "allow-query-cache".  This lets "allow-query"
	be used to specify the default zone access level rather
	than having to have every zone override the global value.
	"allow-query-cache" can be set at both the options and view
	levels.  If "allow-query-cache" is not set then "allow-recursion"
	is used if set, otherwise "allow-query" is used if set
	unless "recursion no;" is set in which case "none;" is used,
	otherwise the default (localhost; localnets;) is used.
d153 1
a153 1
	dnssec-signzone can now randomise signature end times
d158 1
a158 1
	Add additional zone data consistency checks.  named-checkzone
@


1.1.1.7.2.4
log
@SVN rev 224601 on 2011-08-02 09:42:58Z by dougb

Update to version 9.4-ESV-R5 which contains various bug fixes
and improvements

See RELEASE-NOTES-BIND-9.4-ESV.* for details

This is expected to be the final release of the BIND 9.4 branch
@
text
@a44 5
BIND 9.4-ESV-R5 (Extended Support Version)

	BIND 9.4-ESV-R5 is expected to be the last release in the 9.4
	series.

d51 3
a53 2
	BIND 9.4-ESV will be supported until May 31, 2011, at which
	time you will need to upgrade to the current release of BIND.
@


1.1.1.8
log
@Vendor import of BIND 9.4.2
@
text
@d46 1
a46 1
BIND 9.4.2
d48 2
a49 5
	BIND 9.4.2 is a maintenance release, containing fixes for
	a number of bugs in 9.4.1.

	Warning: If you installed BIND 9.4.2rc1 then any applications
	linked against this release candidate will need to be rebuilt.
d53 3
a55 3
	BIND 9.4.1 is a security release, containing a fix for
	a security bugs in 9.4.0.

d77 1
a77 3
	levels. If allow-query-cache is not set then allow-recursion
	is used if set, otherwise allow-query is used if set, otherwise
	the default (localhost; localnets;) is used.
d421 1
a421 1
		FreeBSD 4.10, 5.2.1, 6.2
a477 2
		Disable support for "rrset-order fixed".
		  -DDNS_RDATASET_FIXED=0
d590 5
a594 3
	code, you might want to join the BIND Forum as a Worker.
	This gives you access to the bind-workers@@isc.org mailing
	list and pre-release access to the code.
a595 1
		http://www.isc.org/sw/guild/bf/
@


1.1.1.1.2.1
log
@MFC: BIND 9 and related bits.

Approved by:	re
@
text
@@


1.1.1.1.2.2
log
@MFC BIND 9.3.1 and related bmake updates

Approved by:	re (kensmith)
@
text
@a45 7
BIND 9.3.1

        BIND 9.3.1 is a maintenance release, containing fixes for
        a number of bugs in 9.3.0.

        libbind: corresponds to that from BIND 8.4.6-REL.

a297 1
	* gcc-3.3.5 powerpc generates incorrect code at -02.
@


1.1.1.1.2.3
log
@MFC import of BIND 9.3.2
@
text
@a45 20
BIND 9.3.2

        BIND 9.3.2 is a maintenance release, containing fixes for
        a number of bugs in 9.3.1.

        libbind: corresponds to that from BIND 8.4.7-REL.

	Known Issues:

	The following INSIST can be triggered with DNSSEC enabled.

resolver.c:762: INSIST(result != 0 || dns_rdataset_isassociated(event->rdataset) || fctx->type == ((dns_rdatatype_t)dns_rdatatype_any) || fctx->type == ((dns_rdatatype_t)dns_rdatatype_rrsig)) failed

	We are still trying to isolate the cause.  If you have core
	dump please send a bug report to bind9-bugs@@isc.org with
	the location of the core, named executable and OS details.
	
	Note: contrib/nanny contains a perl script to restart named
	in the event of a INSIST/REQUIRE/ENSURE failure.

d213 1
a213 1
		Mac OS X 10.1, 10.3.8
a302 1
	Known compiler issues:
a305 1
	* Irix, MipsPRO 7.4.1m is known to cause problems.
@


1.1.1.1.2.4
log
@MFC upgrade to version 9.3.3
@
text
@a196 3
		--with-libtool does not work on SunOS 4.  configure
		requires "printf" which is not available.

d229 1
a229 1
		OpenBSD 2.6, 2.8, 2.9, 3.1, 3.6, 3.8
a267 2
		Disable dropping queries from particular well known ports.
		  -DNS_CLIENT_DROPPORT=0
a271 11
	The following need to be set when cross compiling.

	    BUILD_CC
		The native C compiler.
	    BUILD_CFLAGS (optional)
	    BUILD_CPPFLAGS (optional)
		Possible Settings:
		-DNEED_OPTARG=1		(optarg is not declared in <unistd.h>)
	    BUILD_LDFLAGS (optional)
	    BUILD_LIBS (optional)

@


1.1.1.1.2.5
log
@MFC the upgrade to BIND 9.3.4
@
text
@a44 8
BIND 9.3.4

	BIND 9.3.4 is a security release.

BIND 9.3.3

        BIND 9.3.3 is a maintenance release, containing fixes for
        a number of bugs in 9.3.2.
@


1.1.1.1.2.6
log
@Update to 9.3.4-P1, which fixes the following:

The DNS query id generation is vulnerable to cryptographic
analysis which provides a 1 in 8 chance of guessing the next
query id for 50% of the query ids. This can be used to perform
cache poisoning by an attacker.

This bug only affects outgoing queries, generated by BIND 9 to
answer questions as a resolver, or when it is looking up data
for internal uses, such as when sending NOTIFYs to slave name
servers.

All users are encouraged to upgrade.

See also:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2926
@
text
@a44 4
BIND 9.3.4-P1

	BIND 9.3.4-P1 is a security release.

@


