Up to [cvs.NetBSD.org] / pkgsrc / net / isc-dhcp4
Request diff between arbitrary revisions
Keyword substitution: kv
Default branch: MAIN
Pullup ticket #6681 - requested by taca net/isc-dhcp4: security fix Revisions pulled up: - net/isc-dhcp4/Makefile.common 1.45 - net/isc-dhcp4/distinfo 1.34 --- Module Name: pkgsrc Committed By: taca Date: Wed Oct 5 16:16:54 UTC 2022 Modified Files: pkgsrc/net/isc-dhcp4: Makefile.common distinfo Log Message: net/isc-dhcp4: update to 4.4.3p1 4.4.3p1 (ISC DHCP 4.4.3-P1), 2022-10-05 Changes since 4.4.3 (Bug Fixes) ! Corrected a reference count leak that occurs when the server builds responses to leasequery packets. Thanks to VictorV of Cyber Kunlun Lab for reporting the issue. [Gitlab #253] CVE: CVE-2022-2928 ! Corrected a memory leak that occurs when unpacking a packet that has an FQDN option (81) that contains a label with length greater than 63 bytes. Thanks to VictorV of Cyber Kunlun Lab for reporting the issue. [Gitlab #254] CVE: CVE-2022-2929
net/isc-dhcp4: update to 4.4.3p1 4.4.3p1 (ISC DHCP 4.4.3-P1), 2022-10-05 Changes since 4.4.3 (Bug Fixes) ! Corrected a reference count leak that occurs when the server builds responses to leasequery packets. Thanks to VictorV of Cyber Kunlun Lab for reporting the issue. [Gitlab #253] CVE: CVE-2022-2928 ! Corrected a memory leak that occurs when unpacking a packet that has an FQDN option (81) that contains a label with length greater than 63 bytes. Thanks to VictorV of Cyber Kunlun Lab for reporting the issue. [Gitlab #254] CVE: CVE-2022-2929
net/isc-dhcp4: update to 4.4.3 Internet Systems Consortium DHCP Distribution Version 4.4.3 9 March 2022 Release Notes NEW FEATURES Please note that that ISC DHCP is licensed under the Mozilla Public License, MPL 2.0. Please see https://www.mozilla.org/en-US/MPL/2.0/ to read the MPL 2.0 license terms. NOTE: The client and relay components are now End-Of-Life. 4.4.3 is the final release for those components. For information on how to install, configure, and run this software, as well as how to find documentation and report bugs, please consult the README file. ISC DHCP uses the standard GNU configure command for installation. Please review the output of `./configure --help` to see what options are available. The system has only been tested on Linux and FreeBSD, and may not work on other platforms. Please subscribe to the dhcp-users mailing list at https://lists.isc.org/mailman/listinfo/dhcp-users and report any problems and/or suggested fixes to dhcp-users@lists.isc.org. ISC DHCP is open source software maintained by Internet Systems Consortium. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). Changes since 4.4.2-P1 (New Features) - Two new OMAPI function calls were added, `dhcpctl_timed_connect()` and `dhcpctl_timed_wait_for_completion()`. These provide timed versions of creating a connection and waiting for an operation to complete. [GitLab #76] - The BIND libraries have been updated to the latest version, 9.11.36. This fixes a number of compilation issues on various systems, including OpenWRT. Thanks to Philip Prindeville for testing on OpenWRT. [GitLab #218, #171, #180, #192] - Support was added for the new DHCPv4 option v6-only-preferred, specified in RFC 8925. A new reason code, V6ONLY, was added to the client script and the client Linux script sample was updated. [GitLab #132] Changes since 4.4.2-P1 (Bug Fixes) - Minor corrections were made to allow compilation under gcc 10. [GitLab #117] - The logic in dhclient that causes it to decline DHCPv4 leases if the client script exits abnormally (i.e. crashes) has been corrected. [GitLab #123] - The limit on the size of a lease file that can be loaded at startup is now only enforced on 32-bit systems. [GitLab #92] - The PRNG initialization has been improved. It now uses the configure flag `--with-randomdev=PATH`, which specifies the device from which to read the initial seed. That is typically `/dev/random` (the default value) or `/dev/urandom`, but may be specified otherwise on the local system. The old behavior can be forced by disabling this feature (`--with-randomdev=no`). If the initialization is disabled or reading from the random device fails, the previous algorithm (retrieve the last four bytes of hardware addresses from all network interfaces that have them, and use the current time and process ID) is used. [GitLab #197] - A minor dhclient code fix was made to remove compilation warnings. [GitLab #190] - The hard-coded MD5 algorithm name was removed in OMAPI connection logic. Previously, using any other algorithm via a key-algorithm statement would allow OMAPI connections to be made, but subsequent actions such as updating an object would fail. [GitLab #148] - The parallel build has been improved. Thanks to Sergei Trofimovich for the patch. The parallel build is still experimental, as officially the BIND 9 code does not support the parallel build for libraries. [GitLab #91] - Handling of LDAP options (`ldap-gssapi-principal` and `ldap-gssapi-keytab`) has been improved. This is contributed code that has not been tested by ISC. Thank you to Petr Mensik and Pavel Zhukov for the patches! [GitLab !56,!75] - It is now possible to use `option -g ipaddr` in the dhcrelay to replace the giaddr sent to clients with the given ipaddr, to work around bogus clients like Solaris 11 grub which use giaddr instead of the announced router (3) to set up their default route. Thanks to Jens Elkner for the patch! [GitLab #223, !86, !92]
net: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes Not committed (merge conflicts...): net/radsecproxy/distinfo The following distfiles could not be fetched (fetched conditionally?): ./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz ./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch ./net/djbdns/distinfo djbdns-1.05-test28.diff.xz ./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch ./net/djbdns/distinfo djbdns-1.05-multiip.diff ./net/djbdns/distinfo djbdns-cachestats.patch
net: Remove SHA1 hashes for distfiles
Pullup ticket #6464 - requested by taca net/isc-dhcp4: security fix Revisions pulled up: - net/isc-dhcp4/Makefile.common 1.42 - net/isc-dhcp4/distinfo 1.30 --- Module Name: pkgsrc Committed By: taca Date: Thu May 27 14:10:12 UTC 2021 Modified Files: pkgsrc/net/isc-dhcp4: Makefile.common distinfo Log Message: net/isc-dhcp4: update to 4.4.2p1 Update isc-dhcp4 to 4.4.2p1 (4.4.2-P1). Changes since 4.4.2 (Bug Fixes) ! Corrected a buffer overwrite possible when parsing hexadecimal literals with more than 1024 octets. Reported by Jon Franklin from Dell, and also by Pawel Wieczorkiewicz from Amazon Web Services. [Gitlab #182] CVE: CVE-2021-25217
net/isc-dhcp4: update to 4.4.2p1 Update isc-dhcp4 to 4.4.2p1 (4.4.2-P1). Changes since 4.4.2 (Bug Fixes) ! Corrected a buffer overwrite possible when parsing hexadecimal literals with more than 1024 octets. Reported by Jon Franklin from Dell, and also by Pawel Wieczorkiewicz from Amazon Web Services. [Gitlab #182] CVE: CVE-2021-25217
isc-dhcp: update ISC DHCP to 4.4.2 Update isc-dhcp4, isc-dhclient4, isc-dhcpd4 and isc-dhcrelay4 to 4.4.2. pkgsrc change: change LICENSE to mpl-2.0. Here is quote of RELNOTES: Internet Systems Consortium DHCP Distribution Version 4.4.2 22 January 2020 Release Notes NEW FEATURES Please note that that ISC DHCP is now licensed under the Mozilla Public License, MPL 2.0. Please see https://www.mozilla.org/en-US/MPL/2.0/ to read the MPL 2.0 license terms. While release 4.4.2 is primarily a maintenance release that addresses a number of defects, it does introduce a few new features: - Keama - Keama is a migration utility that assists in converting ISC DHCP server configuration files to Kea configuration files. It is found in the keama subdirectory and includes a README.md file with instructions on how to build it as well as a manpage on its usage. - Two new server parameters related to ping checking were added: 1. ping-cltt-secs which allows the user to specify the number of seconds that must elapse since CLTT before a ping check is conducted. 2. ping-timeout-ms which allows the user to specify the amount of time the server waits for a ping-check response in milliseconds rather than in seconds. In general, the areas of focus for ISC DHCP 4.4 were: 1. Dynamic DNS additions 2. dhclient improvements 3. Support for dynamic shared libraries Dynamic DNS Improvements: - We added three new server configuration parameters which influence DDNS conflict resolution: 1. ddns-dual-stack-mixed-mode - alters DNS conflict resolution behavior to mitigate issues with non-compliant clients in dual stack environments. 2. ddns-guard-id-must-match - relaxes the DHCID RR client id matching requirement of DNS conflict resolution. 3. ddns-other-guard-is-dynamic - alters dual-stack-mixed-mode behavior to allow unguarded DNS entries to be overwritten in certain cases - The server now honors update-static-leases parameter for static DHCPv6 hosts. dhclient Improvements: - We've added three command line parameters to dhclient: 1. --prefix-len-hint - directs dhclient to use the given length as the prefix length hint when requesting prefixes 2. --decline-wait-time - instructs the client to wait the given number of seconds after declining an IPv4 address before issuing a discover 3. --address-prefix-len - specifies the prefix length passed by dhclient into the client script (via the environment variable ip6_prefixlen) with each IPv6 address. We added this parameter because we have changed the default value from 64 to 128 in order to be compliant with RFC3315bis draft (-09, page 64) and RFC5942, Section 4, point 1. **WARNING**: The new default value of 128 may not be backwardly compatible with your environment. If you are operating without a router, such as between VMs on a host, you may find they cannot see each other with prefix length of 128. In such cases, you'll need to either provide routing or use the command line parameter to set the value to 64. Alternatively you may change the default at compile time by setting DHCLIENT_DEFAULT_PREFIX_LEN in includes/site.h. - dhclient will now generate a DHCPv6 DECLINE message when the client script indicates a DAD failure Dynamic shared library support: Configure script, configure.ac+lt, which supports libtool is now provided with the source tar ball. This script can be used to configure ISC DHCP to build with libtool and thus use dynamic shared libraries. Other Highlights: - The server now supports dhcp-cache-threshold for DHCPv6 operations - The server now supports DHPv6 address allocation based on EUI-64 DUIDs - Experimental support for alternate relay port in the both the server and relay for IPv4, IPv6 and 4o6 (see: draft-ietf-dhc-relay-port-10.txt)
net/isc-dhcp4: update to 4.4.1 The areas of focus for ISC DHCP 4.4 were: 1. Dynamic DNS additions 2. dhclient improvements 3. Support for dynamic shared libraries Dynamic DNS Improvements: - We added three new server configuration parameters which influence DDNS conflict resolution: 1. ddns-dual-stack-mixed-mode - alters DNS conflict resolution behavior to mitigate issues with non-compliant clients in dual stack environments. 2. ddns-guard-id-must-match - relaxes the DHCID RR client id matching requirement of DNS conflict resolution. 3. ddns-other-guard-is-dynamic - alters dual-stack-mixed-mode behavior to allow unguarded DNS entries to be overwritten in certain cases - The server now honors update-static-leases parameter for static DHCPv6 hosts. dhclient Improvements: - We've added three command line parameters to dhclient: 1. --prefix-len-hint - directs dhclient to use the given length as the prefix length hint when requesting prefixes 2. --decline-wait-time - instructs the client to wait the given number of seconds after declining an IPv4 address before issuing a discover 3. --address-prefix-len - specifies the prefix length passed by dhclient into the client script (via the environment variable ip6_prefixlen) with each IPv6 address. We added this parameter because we have changed the default value from 64 to 128 in order to be compliant with RFC3315bis draft (-09, page 64) and RFC5942, Section 4, point 1. **WARNING**: The new default value of 128 may not be backwardly compatible with your environment. If you are operating without a router, such as between VMs on a host, you may find they cannot see each other with prefix length of 128. In such cases, you'll need to either provide routing or use the command line parameter to set the value to 64. Alternatively you may change the default at compile time by setting DHCLIENT_DEFAULT_PREFIX_LEN in includes/site.h. - dhclient will now generate a DHCPv6 DECLINE message when the client script indicates a DAD failure Dynamic shared library support: Configure script, configure.ac+lt, which supports libtool is now provided with the source tar ball. This script can be used to configure ISC DHCP to build with libtool and thus use dynamic shared libraries. Other Highlights: - The server now supports dhcp-cache-threshold for DHCPv6 operations - The server now supports DHPv6 address allocation based on EUI-64 DUIDs - Experimental support for alternate relay port in the both the server and relay for IPv4, IPv6 and 4o6 (see: draft-ietf-dhc-relay-port-10.txt) For information on how to install, configure and run this software, as well as how to find documentation and report bugs, please consult the README file. ISC DHCP uses standard GNU configure for installation. Please review the output of "./configure --help" to see what options are available. The system has only been tested on Linux, FreeBSD, and Solaris, and may not work on other platforms. Please report any problems and suggested fixes to <dhcp-users@isc.org>. ISC DHCP is open source software maintained by Internet Systems Consortium. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). Changes since 4.4.0 (New Features) - none Changes since 4.4.0 (Bug Fixes) - A delayed-ack value of 0 (the default), now correctly disables the delayed feature. A change in 4.4.0 prohibited lease updates marking leases active from be written to the lease file when delayed-ack is 0. This in turn, caused servers to lose active lease assignments upon restart. [ISC-Bugs #47141] ! Option reference count was not correctly decremented in error path when parsing buffer for options. Reported by Felix Wilhelm, Google Security Team. [ISC-Bugs #47140] CVE: CVE-2018-5733 ! Corrected an issue where large sized 'X/x' format options were causing option handling logic to overwrite memory when expanding them to human readable form. Reported by Felix Wilhelm, Google Security Team. [ISC-Bugs #47139] CVE: CVE-2018-5732
Pullup ticket #5712 - requested by taca net/isc-dhcp4: security update Revisions pulled up: - net/isc-dhcp4/Makefile.common 1.35 - net/isc-dhcp4/distinfo 1.27 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: taca Date: Thu Mar 1 00:53:05 UTC 2018 Modified Files: pkgsrc/net/isc-dhcp4: Makefile.common distinfo Log Message: net/isc-dhcp4: update to 4.3.6p1 (ISC DHCP 4.3.6-P1) Changes since 4.3.6 !- Plugged a socket descriptor leak in OMAPI, that can occur when there is data pending to be written to an OMAPI connection, when the connection is closed by the reader. [ISc-Bugs #46767] ! Corrected an issue where large sized 'X/x' format options were causing option handling logic to overwrite memory when expanding them to human readable form. Reported by Felix Wilhelm, Google Security Team. [ISC-Bugs #47139] CVE: CVE-2018-5732 ! Option reference count was not correctly decremented in error path when parsing buffer for options. Reported by Felix Wilhelm, Google Security Team. [ISC-Bugs #47140] CVE: CVE-2018-5733 To generate a diff of this commit: cvs rdiff -u -r1.34 -r1.35 pkgsrc/net/isc-dhcp4/Makefile.common cvs rdiff -u -r1.26 -r1.27 pkgsrc/net/isc-dhcp4/distinfo
net/isc-dhcp4: update to 4.3.6p1 (ISC DHCP 4.3.6-P1) Changes since 4.3.6 !- Plugged a socket descriptor leak in OMAPI, that can occur when there is data pending to be written to an OMAPI connection, when the connection is closed by the reader. [ISc-Bugs #46767] ! Corrected an issue where large sized 'X/x' format options were causing option handling logic to overwrite memory when expanding them to human readable form. Reported by Felix Wilhelm, Google Security Team. [ISC-Bugs #47139] CVE: CVE-2018-5732 ! Option reference count was not correctly decremented in error path when parsing buffer for options. Reported by Felix Wilhelm, Google Security Team. [ISC-Bugs #47140] CVE: CVE-2018-5733
Update isc-dhcp4 to 4.3.6. This is mainly bug fix release and changes from 4.3.4 are too many to write here, please refer RELNOTES in detail.
Update isc-dhcp4 to 4.3.4, including security fixes. This is the release of ISC DHCP 4.3.4, a maintenance release which contains a number of bug fixes and two fixes for previously released security issues. Full changes are too many to write here, please refer <https://kb.isc.org/article/AA-01364/0/DHCP-4.3.4-Release-Notes.html>.
The previous update to the isc-dhcp packages replaced @PREFIX@ and @PKG_SYSCONFDIR@ with hardcoded paths to /usr/pkg, possibly due to SUBST_STAGE being set to post-patch. Revert that change, move SUBST_STAGE to pre-configure, and perform some minor cleanup while here. Bump PKGREVISION of all packages, ignoring pkglint's error that this shouldn't be done in Makefile.common.
Update isc-dhcp4 to 4.3.3-P1, security fix. Changes since 4.3.3 ! Update the bounds checking when receiving a packet. Thanks to Sebastian Poehn from Sophos for the bug report and a suggested patch. [ISC-Bugs #41267]
Add SHA512 digests for distfiles for net category Problems found with existing digests: Package haproxy distfile haproxy-1.5.14.tar.gz 159f5beb8fdc6b8059ae51b53dc935d91c0fb51f [recorded] da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated] Problems found locating distfiles: Package bsddip: missing distfile bsddip-1.02.tar.Z Package citrix_ica: missing distfile citrix_ica-10.6.115659/en.linuxx86.tar.gz Package djbdns: missing distfile djbdns-1.05-test25.diff.bz2 Package djbdns: missing distfile djbdns-cachestats.patch Package djbdns: missing distfile 0002-dnscache-cache-soa-records.patch Package gated: missing distfile gated-3-5-11.tar.gz Package owncloudclient: missing distfile owncloudclient-2.0.2.tar.xz Package poink: missing distfile poink-1.6.tar.gz Package ra-rtsp-proxy: missing distfile rtspd-src-1.0.0.0.tar.gz Package ucspi-ssl: missing distfile ucspi-ssl-0.70-ucspitls-0.1.patch Package waste: missing distfile waste-source.tar.gz Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
Update ISC DHCP packages to 4.3.3. Changes are too many to write here, please refer RELNOTES file.
Update ISC DHCP packages to 4.3.2. Changes since 4.3.2rc2 - None Changes since 4.3.2rc1 - Corrected a compilation error introduced by the fix for ISC-Bugs #37415. The error occurs on Linux variants that do not support VLAN tag information in packet auxiliary data. The configure script now only enables inclusion of the VLAN tag-based logic if it is supported by the underlying OS. [ISC-Bugs #38677] Changes since 4.3.2b1 - Specifying the option, --disable-debug, on the configure script command line now disables debug features. Prior to this, specifying --disable-debug incorrectly enabled debug features. Thanks to Gustavo Zacarias for reporting the issue. [ISC-Bugs #37780] - Unit test execution now uses a path augmented during configuration processing of the --with-atf option to locate ATF runtime tools, atf-run and atf-report. For most installations of ATF, this should alleviate the need to manually include them in the PATH, as was formerly required. If the configure script cannot locate the tools it will emit a warning, informing the user that the tools must be in the PATH when running unit tests. Secondly, please note that "make check" will now exit with a failure status code (non-zero) if one or more unit tests fail. This means that invoking "make check" from an upper level directory will cause the make process to STOP after the first test subdirectory with failed test(s). To force all tests in all subdirectories to run, regardless of individual test outcome, use the command "make -k check". [ISC-Bugs #38619]
Update isc-dhcp4 and related packages to 4.3.1. Changes since 4.3.1rc1 - None Changes since 4.3.1b1 - Modify the linux and openwrt dhclient scripts to process information from a stateless request. Thanks to Jiri Popelka at Red Hat for the bug report and patch. [ISC-Bugs 36102] - Remove more unused RCSID tags. These weren't noticed in 4.3 as the code isn't used anymore but we remove them here to keep the code consistent across versions. [ISC-Bugs #36451]
Update ISC DHCP related pacakges to 4.2.0. Changes since 4.2.0 (new features) - If a client renews before 'dhcp-cache-threshold' percent of its lease has elapsed (default 25%), the server will reuse the allocated lease (provide a lease within the currently allocated lease-time) rather than extend or renew the lease. This absolves the server of needing to perform an fsync() operation on the lease database before reply, which improves performance. [ISC-Bugs #22228] Updated this patch to support asynchronous DDNS. If the server is attempting to do DDNS on a lease it should be udpated and written to disk even if that wouldn't be necessary due to the thresholding. [ISC-Bugs #26311] - The 'no available billing' log line now also logs the name of the last matching billing class tried before failing to provide a billing. [ISC-Bugs #21759] - A problem with missing get_hw_addr function when --enable-use-sockets was used is now solved on GNU/Linux, BSD and GNU/Hurd systems. Note that use-sockets feature was not tested on those systems. Client and server code no longer use MAX_PATH constant that is not defined on GNU/Hurd systems. [ISC-Bugs #25979] - Add a perl script in the contrib directory, dhcp-lease-list.pl, which can parse v4 lease files and output the lease information in a more human friendly manner. This was written by Christian Hammers with some updates by vom and ISC. This is contributed code and is not supported by ISC; however it may be useful to some users. [ISC-Bugs #20680] - Add support in v6 for on-commit, on-expire and on-release. [ISC-Bugs #27912] - Add support for using classes with v6. [ISC-Bugs #26510] - Update the DDNS code to current standards and allow for sharing of DDNS entries between v4 and v6 clients. The new code is used if the ddns-update-style is set to "standard", the older code is still available if ddns-update-style is set to "interim". The oldest DDNS code "ad-hoc" has been removed. Thanks to Thomas Pegeot who submitted a patch for this issue. This patch is based on that work with some modifications. [ISC-Bugs #21139] - Add a configuration option to the server to suppress using fsync(). Enabling this option will mean that fsync() is never called. This may provide better performance but there is also a risk that a lease will not be properly written to the disk after it has been issued to a client and before the server stops. Using this option is not recommended. [ISC-Bugs #34810] - Add some logging statements to indicate when the server is ready to serve. One statement is emitted after the server has finished reading its files and is about to enter the dispatch loop. This is "Server starting service.". The second is emitted when a server determines that both it and its failover peer are in the normal state. This is "failover peer <name>: Both servers normal." [ISC-Bugs #33208] - Add support for accessing options from v6 relays. The v6relay statement allows the administrator to choose which relay to use when searching for an option, see the dhcp-options man page for a description. The host-identifier option has also been updated to support the use of relay options, see the dhcpd.conf man page for a description. [ISC-Bugs #19598] - When doing DDNS if there isn't an appropriate zone statement attempt to find a reasonable nameserver via a DNS resolver. This restores some functionality that was lost in the transition to asynchronous DDNS. Due to the lack of security and increase in fragility of the system when using this feature we strongly recommend the use of appropriate zone statements rather than using this functionality. [ISC-Bugs #30461] - Add support for specifying the address from which to send DDNS updates on the DHCP server. There are two new options "ddns-local-address4" and "ddns-local-address6" that each take one instance of their respective address types. [ISC-Bugs #34779] - Add ignore-client-uids option in the server. This option causes the server to not record a client's uid in its lease. This violates the specification but may also be useful when a client can dual boot using different client ids but the same mac address. Thank you to Brian De Wolf at Cal Poly Pomona for the patch. [ISC-Bugs #32427] [ISC-Bugs #35066] - Extend the DHCPINFORM processing to honor the subnet selection option and take host declarations into account. Thanks to Christof Chen for testing and submitting the patch. [ISC-Bugs #35015] - Extend the hardware expression to look into the lease structure for a hardware address if there is no packet. This allows the server to find the hardware address during on-expiry processing. [ISC-Bugs #24584] - Add definitions for some options that have been specified by the IETF. [ISC-Bugs #29268] [ISC-Bugs #35198] Changes since 4.3.0b1 - Tidy up receive packet processing. Thanks to Brad Plank of GTA for reporting the issue and suggesting a possible patch. [ISC-Bugs #34447] Changes since 4.3.0a1 - Modify the message displayed when a process hits a fatal error. The new message is much shorter and simply points to the README and our website for directions on bug submissions. [ISC-Bugs #24789] - Handle an absent resolv.conf file better. [ISC-Bugs #35194]
Fix net/isc-dhcp4 cross-build on NetBSD. Requires a hack to patch and configure the internal copy of bind for cross-compilation. Bump pkgrevision in case the way I did this hack changes anything. ok agc
Add support for Crossbow style NICs on SunOS. Fix default paths for inet6 files.
Pullup ticket #4106 - requested by taca net/isc-dhclient4: security update net/isc-dhcp4: security update net/isc-dhcpd4: security update net/isc-dhcrelay4: security update Revisions pulled up: - net/isc-dhclient4/Makefile 1.7 - net/isc-dhcp4/Makefile 1.9-1.10 - net/isc-dhcp4/Makefile.common 1.18-1.19 - net/isc-dhcp4/distinfo 1.14-1.15 - net/isc-dhcpd4/Makefile 1.7 --- Module Name: pkgsrc Committed By: jperkin Date: Wed Feb 6 23:24:19 UTC 2013 Modified Files: pkgsrc/net/isc-dhcp4: Makefile Log Message: PKGREVISION bumps for the security/openssl 1.0.1d update. --- Module Name: pkgsrc Committed By: taca Date: Fri Jan 11 13:35:58 UTC 2013 Modified Files: pkgsrc/net/isc-dhclient4: Makefile pkgsrc/net/isc-dhcp4: Makefile.common distinfo pkgsrc/net/isc-dhcpd4: Makefile Log Message: Update ISC DHCP to 4.2.5. Changes are too many to write here, please refer RELNOTES. --- Module Name: pkgsrc Committed By: taca Date: Tue Mar 26 16:25:06 UTC 2013 Modified Files: pkgsrc/net/isc-dhcp4: Makefile Makefile.common distinfo Log Message: Update ISC DHCP packages to 4.2.5p1 (4.2.5-P1). isc-dhclient4 isc-dhcp4 isc-dhcpd4 isc-dhcrelay4
Update ISC DHCP packages to 4.2.5p1 (4.2.5-P1). isc-dhclient4 isc-dhcp4 isc-dhcpd4 isc-dhcrelay4 Changes since 4.2.5 - A security issue in Bind9 was found and fixed. This release includes the fixed Bind9 code. There have been no code changes to the DHCP code. [ISC-Bugs #32688] CVE: CVE-2013-2266
Update ISC DHCP to 4.2.5. Changes are too many to write here, please refer RELNOTES.
Pullup ticket #3920 - requested by taca net/{isc-dhcp4,isc-dhcpd4,isc-dhclient4,isc-dhcrelay} security fix Revisions pulled up: - net/isc-dhcp4/Makefile.common 1.17 - net/isc-dhcp4/distinfo 1.13 --- Module Name: pkgsrc Committed By: taca Date: Thu Sep 13 01:38:58 UTC 2012 Modified Files: pkgsrc/net/isc-dhcp4: Makefile.common distinfo Log Message: Update ISC DHCP package to 4.2.4p2 (ISC DHCP 4.2.4-P2). Changes since 4.2.4-P1 ! An issue with the use of lease times was found and fixed. Making certain changes to the end time of an IPv6 lease could cause the server to abort. Thanks to Glen Eustace of Massey University, New Zealand for finding this issue. [ISC-Bugs #30281] CVE: CVE-2012-3955
Update ISC DHCP package to 4.2.4p2 (ISC DHCP 4.2.4-P2). Changes since 4.2.4-P1 ! An issue with the use of lease times was found and fixed. Making certain changes to the end time of an IPv6 lease could cause the server to abort. Thanks to Glen Eustace of Massey University, New Zealand for finding this issue. [ISC-Bugs #30281] CVE: CVE-2012-3955
Pullup ticket #3869 - requested by taca net/isc-dhcp4: security update Revisions pulled up: - net/isc-dhcp4/Makefile.common 1.16 - net/isc-dhcp4/distinfo 1.12 - net/isc-dhcp4/patches/patch-includes_Makefile.in 1.2 ------------------------------------------------------------------- Module Name: pkgsrc Committed By: taca Date: Wed Jul 25 00:56:53 UTC 2012 Modified Files: pkgsrc/net/isc-dhcp4: Makefile.common distinfo pkgsrc/net/isc-dhcp4/patches: patch-includes_Makefile.in Log Message: Update isc-dhcp4 package to 4.2.4p1 (ISC DHCP 4.2.4-P1). Fixes security problems. Changes since 4.2.4 ! Previously the server code was relaxed to allow packets with zero length client ids to be processed. Under some situations use of zero length client ids can cause the server to go into an infinite loop. As such ids are not valid according to RFC 2132 section 9.14 the server no longer accepts them. Client ids with a length of 1 are also invalid but the server still accepts them in order to minimize disruption. The restriction will likely be tightened in the future to disallow ids with a length of 1. Thanks to Markus Hietava of Codenomicon CROSS project for the finding this issue and CERT-FI for vulnerability coordination. [ISC-Bugs #29851] CVE: CVE-2012-3571 ! When attempting to convert a DUID from a client id option into a hardware address handle unexpected client ids properly. Thanks to Markus Hietava of Codenomicon CROSS project for the finding this issue and CERT-FI for vulnerability coordination. [ISC-Bugs #29852] CVE: CVE-2012-3570 ! A pair of memory leaks were found and fixed. Thanks to Glen Eustace of Massey University, New Zealand for finding this issue. [ISC-Bugs #30024] CVE: CVE-2012-3954 To generate a diff of this commit: cvs rdiff -u -r1.15 -r1.16 pkgsrc/net/isc-dhcp4/Makefile.common cvs rdiff -u -r1.11 -r1.12 pkgsrc/net/isc-dhcp4/distinfo cvs rdiff -u -r1.1 -r1.2 \ pkgsrc/net/isc-dhcp4/patches/patch-includes_Makefile.in
Update isc-dhcp4 package to 4.2.4p1 (ISC DHCP 4.2.4-P1). Fixes security problems. Changes since 4.2.4 ! Previously the server code was relaxed to allow packets with zero length client ids to be processed. Under some situations use of zero length client ids can cause the server to go into an infinite loop. As such ids are not valid according to RFC 2132 section 9.14 the server no longer accepts them. Client ids with a length of 1 are also invalid but the server still accepts them in order to minimize disruption. The restriction will likely be tightened in the future to disallow ids with a length of 1. Thanks to Markus Hietava of Codenomicon CROSS project for the finding this issue and CERT-FI for vulnerability coordination. [ISC-Bugs #29851] CVE: CVE-2012-3571 ! When attempting to convert a DUID from a client id option into a hardware address handle unexpected client ids properly. Thanks to Markus Hietava of Codenomicon CROSS project for the finding this issue and CERT-FI for vulnerability coordination. [ISC-Bugs #29852] CVE: CVE-2012-3570 ! A pair of memory leaks were found and fixed. Thanks to Glen Eustace of Massey University, New Zealand for finding this issue. [ISC-Bugs #30024] CVE: CVE-2012-3954
Update isc-{dhclient4,dhcp4,dhcpd4,dhcrelay4} to 4.2.4. ISC's Release Signing Key can be obtained at: http://www.isc.org/about/openpgp/ Changes since 4.2.4rc1 - Rotate the lease file when running in v6 mode. Thanks to Christoph Moench-Tegeder at Astaro for the report and the first version of the patch. [ISC-Bugs #24887] Changes since 4.2.4b1 - None Changes since 4.2.3 ! Add a check for a null pointer before calling the regexec function. Without this check we could, under some circumstances, pass a null pointer to the regexec function causing it to segfault. Thanks to a report from BlueCat Networks. [ISC-Bugs #26704]. CVE: CVE-2011-4539 ! Modify the DDNS handling code. In a previous patch we added logging code to the DDNS handling. This code included a bug that caused it to attempt to dereference a NULL pointer and eventually segfault. While reviewing the code as we addressed this problem, we determined that some of the updates to the lease structures would not work as planned since the structures being updated were in the process of being freed: these updates were removed. In addition we removed an incorrect call to the DDNS removal function that could cause a failure during the removal of DDNS information from the DNS server. Thanks to Jasper Jongmans for reporting this issue. [ISC-Bugs #27078] CVE: CVE-2011-4868 - Fixed the code that checks if an address the server is planning to hand out is in a reserved range. This would appear as the server being out of addresses in pools with particular ranges. [ISC-Bugs #26498] - In the DDNS code handle error conditions more gracefully and add more logging code. The major change is to handle unexpected cancel events from the DNS client code. [ISC-Bugs #26287] - Tidy up the receive calls and eliminate the need for found_pkt. [ISC-Bugs #25066] - Add support for Infiniband over sockets to the server and relay code. We've tested this on Solaris and hope to expand support for Infiniband in the future. This patch also corrects some issues we found in the socket code. [ISC-Bugs #24245] - Add a compile time check for the presence of the noreturn attribute and use it for log_fatal if it's available. This will help code checking programs to eliminate false positives. [ISC-Bugs #27539] - Fixed many compilation problems ("set, but not used" warnings) for gcc 4.6 that may affect Ubuntu 11.10 users. [ISC-Bugs #27588] - Modify the code that determines if an outstanding DDNS request should be cancelled. This patch results in cancelling the outstanding request less often. It fixes the problem caused by a client doing a release where the TXT and PTR records weren't removed from the DNS. [ISC-BUGS #27858] - Use offsetof() instead of sizeof() to get the sizes for dhcpv6_relay_packet and dhcpv6_packet in several more places. Thanks to a report from Bruno Verstuyft and Vincent Demaertelaere of Excentis. [ISC-Bugs #27941] - Remove outdated note in the description of the bootp keyword about the option not satisfying the requirement of failover peers for denying dynamic bootp clients. [ISC-bugs #28574] - Multiple items to clean up IPv6 address processing. When processing an IA that we've seen check to see if the addresses are usable (not in use by somebody else) before handing it out. When reading in leases from the file discard expired addresses. When picking an address for a client include the IA ID in addition to the client ID to generally pick different addresses for different IAs. [ISC-Bugs #23138] [ISC-Bugs #27945] [ISC-Bugs #25586] [ISC-Bugs #27684] - Remove unnecessary checks in the lease query code and clean up several compiler issues (some dereferences of NULL and treating an int as a boolean). [ISC-Bugs #26203] - Fix the NA and PD allocation code to handle the case where a client provides a preference and the server doesn't have any addresses or prefixes available. Previoulsy the server ignored the request with this patch it replies with a NoAddrsAvail or NoPrefixAvail response. By default the code performs according to the errata of August 2010 for RFC 3315 section 17.2.2; to enable the previous style see the section on RFC3315_PRE_ERRATA_2010_08 in includes/site.h. This option may be removed in the future. Thanks to Jiri Popelka at Red Hat for the patch. [ISC-Bugs #22676] - Fix up some issues found by static analysis. A potential memory leak and NULL dereference in omapi. The use of a boolean test instead of a bitwise test in dst. [ISC-Bugs #28941]
Pullup ticket #3651 - requested by taca net/isc-dhcp4: security update Revisions pulled up: - net/isc-dhcp4/Makefile.common 1.14 - net/isc-dhcp4/distinfo 1.10 --- Module Name: pkgsrc Committed By: taca Date: Fri Jan 13 13:42:09 UTC 2012 Modified Files: pkgsrc/net/isc-dhcp4: Makefile.common distinfo Log Message: Update isc-dhcp4 package to 4.2.3p2. (ISC DHCP 4.2.3-P2). Alwo update isc-dhclient4, isc-dhcpd4 and isc-dhcrelay4. Changes since 4.2.3-P1 ! Modify the DDNS handling code. In a previous patch we added logging code to the DDNS handling. This code included a bug that caused it to attempt to dereference a NULL pointer and eventually segfault. While reviewing the code as we addressed this problem, we determined that some of the updates to the lease structures would not work as planned since the structures being updated were in the process of being freed: these updates were removed. In addition we removed an incorrect call to the DDNS removal function that could cause a failure during the removal of DDNS information from the DNS server. Thanks to Jasper Jongmans for reporting this issue. [ISC-Bugs #27078] CVE: CVE-2011-4868
Update isc-dhcp4 package to 4.2.3p2. (ISC DHCP 4.2.3-P2). Alwo update isc-dhclient4, isc-dhcpd4 and isc-dhcrelay4. Changes since 4.2.3-P1 ! Modify the DDNS handling code. In a previous patch we added logging code to the DDNS handling. This code included a bug that caused it to attempt to dereference a NULL pointer and eventually segfault. While reviewing the code as we addressed this problem, we determined that some of the updates to the lease structures would not work as planned since the structures being updated were in the process of being freed: these updates were removed. In addition we removed an incorrect call to the DDNS removal function that could cause a failure during the removal of DDNS information from the DNS server. Thanks to Jasper Jongmans for reporting this issue. [ISC-Bugs #27078] CVE: CVE-2011-4868
Update isc-dhcp4 package to 4.2.3p1 (4.2.3-P1). It implicitly update isc-dhclient4, isc-dhcpd4 and isc-dhcrelay4 to 4.2.3p1. Changes since 4.2.3 ! Add a check for a null pointer before calling the regexec function. Without out this check we could, under some circumstances, pass a null pointer to the regexec function causing it to segfault. Thanks to a report from BlueCat Networks. [ISC-Bugs #26704]. CVE: CVE-2011-4539
Update ISC DHCP packages to 4.2.3. net/isc-dhclient net/isc-dhcp net/isc-dhcpd net/isc-dhcrelay * Update MASTER_SITES. * CHanges: Changes since 4.2.3rc1 - None. Changes since 4.2.2 - Fix the code that checks for an existing DDNS transaction to cancel when removing DDNS information, so that we will continue with the processing if we have a lease even if it doesn't have an outstanding transaction. [ISC-Bugs #24682] - Add AM_MAINTAINER_MODE to configure.ac to avoid rebuilding configuration files. [ISC-Bugs #24107] - Add support for passing DDNS information to a DNS server over an IPv6 address. [ISC-Bugs #22647] - Enhanced patch for 23595 to handle IPv4 fixed addresses more cleanly. [ISC-Bugs #23595]
Update isc-dhcp4 package to 4.2.2 and it also update isc-dhcpd4, isc-dhclient4 and isc-dhcrelay4. Here is quote from DHCP 4.2.2 Release Notes. (http://ftp.isc.org/isc/dhcp/dhcp-4.2.2-RELNOTES) Internet Systems Consortium DHCP Distribution Version 4.2.2 27 July 2011 Release Notes NEW FEATURES ISC DHCP 4.2.x includes features that were not included in DHCP 4.1.x. These include: Processing the DHCP to DNS server transactions in an asynchronous fashion. The DHCP server or client can now continue with it's processing while awaiting replies from the DNS server. There are a number of DHCPv6 limitations and features missing in this release, which will be addressed in the future: - Only Solaris, Linux, FreeBSD, NetBSD, and OpenBSD are supported. - DHCPv6 includes human-readable text in status code messages, in English. A method to reconfigure or support other languages would be preferable. - The "host-identifier" option is limited to a simple token. - The client and server can only operate DHCPv4 or DHCPv6 at a time, not both. To use both protocols simultaneously, two instances of the relevant daemon are required, one with the '-6' command line option. For information on how to install, configure and run this software, as well as how to find documentation and report bugs, please consult the README file. ISC DHCP uses standard GNU configure for installation. Please review the output of "./configure --help" to see what options are available. The system has only been tested on Linux, FreeBSD, and Solaris, and may not work on other platforms. Please report any problems and suggested fixes to <dhcp-users@isc.org>. Changes since 4.2.2rc1 ! Two packets were found that cause a server to halt. The code has been updated to properly process or reject the packets as appropriate. Thanks to David Zych at University of Illinois for reporting this issue. [ISC-Bugs #24960] One CVE number for each class of packet. CVE-2011-2748 CVE-2011-2749 Changes since 4.2.2b1 - Strict checks for content of domain-name DHCPv4 option can now be configured during compilation time. Even though RFC2132 does not allow to store more than one domain in domain-name option, such behavior is now enabled by default, but this may change some time in the future. See ACCEPT_LIST_IN_DOMAIN_NAME define in includes/site.h. [ISC-Bugs #24167] - DNS Update fix. A misconfigured server could crash during DNS update processing if the configuration included overlapping pools or multiple fixed-address entries for a single address. This issue affected both IPv4 and IPv6. The fix allows a server to detect such conditions, provides the user with extra information and recommended steps to fix the problem. If the user enables the appropriate option in site.h then server will be terminated [ISC-Bugs #23595]
Pullup ticket #3407 - requested by taca net/isc-dhclient4: security update net/isc-dhcp4: security update net/isc-dhcpd4: security update net/isc-dhcrelay4: security update Revisions pulled up: - net/isc-dhclient4/Makefile 1.5 - net/isc-dhcp4/Makefile 1.7 - net/isc-dhcp4/Makefile.common 1.9 - net/isc-dhcp4/PLIST 1.4 - net/isc-dhcp4/distinfo 1.6 - net/isc-dhcp4/patches/patch-aa 1.4 - net/isc-dhcp4/patches/patch-ab 1.4 - net/isc-dhcp4/patches/patch-ac 1.2 - net/isc-dhcp4/patches/patch-includes_Makefile.in 1.1 - net/isc-dhcpd4/Makefile 1.5 - net/isc-dhcrelay4/Makefile 1.5 --- Module Name: pkgsrc Committed By: taca Date: Fri Apr 8 14:09:24 UTC 2011 Modified Files: pkgsrc/net/isc-dhclient4: Makefile pkgsrc/net/isc-dhcp4: Makefile Makefile.common PLIST distinfo pkgsrc/net/isc-dhcp4/patches: patch-aa patch-ab patch-ac pkgsrc/net/isc-dhcpd4: Makefile pkgsrc/net/isc-dhcrelay4: Makefile Added Files: pkgsrc/net/isc-dhcp4/patches: patch-includes_Makefile.in Log Message: Update ISC DHCP package to 4.2.1p1 (4.2.1-P1), fixes a few security problems. For more detail, please refer: http://ftp.isc.org/isc/dhcp/dhcp-4.2.1-P1-RELNOTES
Update ISC DHCP package to 4.2.1p1 (4.2.1-P1), fixes a few security problems. For more detail, please refer: http://ftp.isc.org/isc/dhcp/dhcp-4.2.1-P1-RELNOTES
updating the isc-dhcp packages to 4.1.1-P1 Changelog: NEW FEATURES ISC DHCP 4.1.x includes several new DHCPv6 features that were not included in DHCP 4.0.x. These include: - Support for the rapid-commit option on the client side - Prefix Delegation support - IA_TA address support - A basic DHCPv6 relay agent - Basic and partial DHCPv6 leasequery support There are a number of DHCPv6 limitations and features missing in this release, which will be addressed in the future: - Only Solaris, Linux, FreeBSD, NetBSD, and OpenBSD are supported. - Only a single address is supported per IA. - DHCPv6 includes human-readable text in status code messages. These should be configurable, and probably localized via gettext() or the like. - The "host-identifier" option is limited to a simple token. - The client and server can only operate DHCPv4 or DHCPv6 at a time, not both. To use both protocols simultaneously, two instances of the relevant daemon are required, one with the '-6' command line option. For information on how to install, configure and run this software, as well as how to find documentation and report bugs, please consult the README file. ISC DHCP uses standard GNU configure for installation. Please review the output of "./configure --help" to see what options are available. The system has only been tested on Linux, FreeBSD, and Solaris, and may not work on other platforms. Please report any problems and suggested fixes to <dhcp-users@isc.org>. Changes since 4.1.1 - A bug was fixed that could cause the DHCPv6 server to advertise/assign a previously allocated (active) lease to a client that has changed subnets, despite being on different shared networks. Dynamic prefixes specifically allocated in shared networks also now are not offered if the client has moved. [ISC-Bugs #21152] ! Accept a client id of length 0 while hashing. Previously the server would exit if it attempted to hash a zero length client id, providing attackers with a simple denial of service attack. [ISC-Bugs #21253] Changes since 4.1.1rc1 - When using 'ignore client-updates;', the FQDN returned to the client is no longer truncated to one octet. Changes since 4.1.1b3 - None. Changes since 4.1.1b2 - Fix test in dhcp_interface_signal_handler to check that the inner handler has a signal_handler before calling it. - Both host and subnet6 configuration groups are now included whether a fixed-address6 (DHCPv6) is in use or not. Host scoped configuration takes precedence. This fixes two bugs, one where host scoped configuration would not be included from a non-fixed-address6 host record, and the equal and opposite bug where subnet6 scoped configuration would not be used when over-riding values were not present in a matching fixed-address6 host configuration. - ./configure now checks to ensure the intX_t and u_intX_t types are defined, correcting a compilation failure when using Sun's compiler. - Modified the handling of a connection to avoid releasing the omapi io object for the connection while it is still in use. One symptom from this error was a segfault when a failover secondary attempted to connect to the failover primary if their clocks were not synchronized. Changes since 4.1.1b1 - Remove infinite loop in token_print_indent_concat(). - Memory leak in the load_balance_mine() function is fixed. This would leak ~20-30 octets per DHCPDISCOVER packet while failover was in use and in normal state. - Various compilation fixes have been included for the memory related DEBUG #defines in includes/site.h. - Fixed Linux client script 'unary operator expected' errors with DHCPv6. - Fixed setting hostname in Linux hosts that require hostname argument to be double-quoted. Also allow server-provided hostname to override hostnames 'localhost' and '(none)'. - Added client support for setting interface MTU and metric, thanks to Roy "UberLord" Marples <roy@marples.name>. - Fixed failover reconnection retry code to continue to retry to reconnect rather than restarting the listener. - Compilation on Solaris with USE_SOCKETS defined in includes/site.h has been repaired. Other USE_ overrides should work better. - A check for the local flavor of IFNAMSIZ had a broken 'else' condition, that probably still resulted in the correct behaviour (but wouldn't use a larger defined value provided by the host OS). - Fixed a bug where an OMAPI socket disconnection message would not result in scheduling a failover reconnection, if the link had not negotiated a failover connect yet (e.g.: connection refused, asynch socket connect() timeouts). - A bug was fixed that caused the 'conflict-done' state to fail to be parsed in failover state records. ! A stack overflow vulnerability was fixed in dhclient that could allow remote attackers to execute arbitrary commands as root on the system, or simply terminate the client, by providing an over-long subnet-mask option. CERT VU#410676 - CVE-2009-0692 - Versions 3.0.x syntax with multiple name->code option definitions is now supported. Note that, similarly to 3.0.x, for by-code lookups only the last option definition is used. - Fixed a bug where a time difference of greater than 60 seconds between a failover pair could cause the primary to crash on contact with the secondary. Thanks to a patch from Steinar Haug. - Don't look for IPv6 interfaces on Linux when running in DHCPv4 mode. Thanks to patches from Matthew Newton and David Cantrell. - Secondary servers in a failover pair will now perform ddns removals if they had performed ddns updates on a lease that is expiring, or was released through the primary. As part of the same fix, stale binding scopes will now be removed if a change in identity of a lease's active client is detected, rather than simply if a lease is noticed to have expired (which it may have expired without a failover server noticing in some situations). - A patch supplied by David Cantrell at RedHat was applied that detects invalid calling parameters given to the ns_name_ntop() function. Specifically, it detects if the caller passed a pointer and size pair that causes the pointer to integer-wrap past zero. ! Fixed a fenceposting bug when a client had two host records configured, one using 'uid' and the other using 'hardware ethernet'. CVE-2009-1892 Changes since 4.1.0 - Validate the argument to the -p option. - The notorious 'option <unknown> ... larger than buffer' log line, which is seen in some malformed DHCP client packets, was modified. It now logs the universe name, and does not log the length values (which are bogus corruption read from the packet anyway). It also carries a hopefully more useful explanation. - A bug was fixed that caused the server not to answer some valid Solicit and Request packets, if the dynamic range covering any requested addresses had been deleted from configuration. - Suppress spurious warnings from configure about --datarootdir - Update the code to deal with GCC 4.3. This included two sets of changes. The first is to the configuration files to include the use of AC_USE_SYSTEM_EXTENSIONS. The second is to deal with return values that were being ignored. - The db-time-format option was documented in manpages. - Using reserved leases no longer results in 'lease with binding state free not on its queue' error messages, thanks to a patch from Frode Nordahl. - DDNS removal routines were updated so that the DHCID is not removed until the client has been deprived of all A and AAAA records (not only the last one of either of those). This resolves a bug where dual stack clients would not be able to regain their names after either expiration event. - Fix a build error in dhcrelay, using older versions of gcc with dhcpv6 disabled. - Two uninitialized stack structures are now memset to zero, thanks to patch from David Cantrell at Red Hat. - Fixed a cosmetic bug where pretty-printing valid domain-search options would result in an erroneous error log message ('garbage in format string'). - A bug in DLPI packet transmission (Solaris, HP/UX) that caused the server to stop receiving packets is fixed. The same fix also means that the MAC address will no longer appear 'bogus' on DLPI-based systems. - A bug in select handling was discovered where the results of one select() call were discarded, causing the server to process the next select() call and use more system calls than required. This has been repaired - the sockets will be handled after the first return from select(), resulting in fewer system calls. - The update-conflict-detection feature would leave an FQDN updated without a DHCID (still currently implemented as a TXT RR). This would cause later expiration or release events to fail to remove the domain name. The feature now also inserts the client's up to date DHCID record, so records may safely be removed at expiration or release time. Thanks to a patch submitted by Christof Chen.
Pullup ticket #2818 - requested by adrianp isc-dhcp4: security update net/isc-dhcp4/Makefile.common 1.5 net/isc-dhcp4/distinfo 1.4 --- Module Name: pkgsrc Committed By: adrianp Date: Thu Jul 16 18:41:11 UTC 2009 Modified Files: pkgsrc/net/isc-dhcp4: Makefile.common distinfo Log Message: Bump to p1 * A stack overflow vulnerability was fixed in dhclient that could allow remote attackers to execute arbitrary commands as root on the system, or simply terminate the client, by providing an over-long subnet-mask option.
Bump to p1 * A stack overflow vulnerability was fixed in dhclient that could allow remote attackers to execute arbitrary commands as root on the system, or simply terminate the client, by providing an over-long subnet-mask option.
Update to 4.1.0 ISC DHCP 4.1.x will have several new DHCPv6 features that were not in DHCP 4.0.x. These new features include: * Support for the rapid-commit option on the client side * Prefix Delegation support * IA_TA address support * A basic DHCPv6 relay agent * basic DHCPv6 Leasequery support
Despite supporting --sysconfdir isc-dhcp hard sets the location of configuration files and binaries in a number of cases. This should hopefully fix them all. Without this patch they look in /etc only and fail to start if the file is not present.
ISC's Dynamic Host Configuration Protocol Distribution provides a freely redistributable reference implementation of all aspects of DHCP, through a suite of DHCP tools: * A DHCP server * A DHCP client * A DHCP relay agent These tools all use a modular API which is designed to be sufficiently general that it can easily be made to work on POSIX-compliant operating systems and also non-POSIX systems like Windows NT and MacOS. The DHCP server, client and relay agent are provided both as reference implementations of the protocol and as working, fully-featured sample implementations. Both the client and the server provide functionality that, while not strictly required by the protocol, is very useful in practice. The DHCP server also makes allowances for non-compliant clients which one might still like to support. This package contains the Base component.
Initial revision