Up to [cvs.NetBSD.org] / pkgsrc / net / maradns
Request diff between arbitrary revisions
Keyword substitution: kv
Default branch: MAIN
net: Replace RMD160 checksums with BLAKE2s checksums All checksums have been double-checked against existing RMD160 and SHA512 hashes Not committed (merge conflicts...): net/radsecproxy/distinfo The following distfiles could not be fetched (fetched conditionally?): ./net/citrix_ica/distinfo citrix_ica-10.6.115659/en.linuxx86.tar.gz ./net/djbdns/distinfo dnscache-1.05-multiple-ip.patch ./net/djbdns/distinfo djbdns-1.05-test28.diff.xz ./net/djbdns/distinfo djbdns-1.05-ignoreip2.patch ./net/djbdns/distinfo djbdns-1.05-multiip.diff ./net/djbdns/distinfo djbdns-cachestats.patch
net: Remove SHA1 hashes for distfiles
maradns: Update to 2.0.17 maradns-2.0.17: This is the stable release of MaraDNS. No security updates were made. Deadwood updated to 3.2.14 Default max_mem value doubled as discussed in GitHub issue #52.
Update maradns to 2.0.16. maradns-2.0.16: This is the stable release of MaraDNS. A very minor security update was made. Deadwood updated to 3.2.12 maradns-2.0.15: This is the stable release of MaraDNS. No security updates were done in this release. Deadwood updated to 3.2.11 maradns-2.0.14: This is the stable release of MaraDNS. No security updates were done in this release. Deadwood updated to 3.2.10
Add SHA512 digests for distfiles for net category Problems found with existing digests: Package haproxy distfile haproxy-1.5.14.tar.gz 159f5beb8fdc6b8059ae51b53dc935d91c0fb51f [recorded] da39a3ee5e6b4b0d3255bfef95601890afd80709 [calculated] Problems found locating distfiles: Package bsddip: missing distfile bsddip-1.02.tar.Z Package citrix_ica: missing distfile citrix_ica-10.6.115659/en.linuxx86.tar.gz Package djbdns: missing distfile djbdns-1.05-test25.diff.bz2 Package djbdns: missing distfile djbdns-cachestats.patch Package djbdns: missing distfile 0002-dnscache-cache-soa-records.patch Package gated: missing distfile gated-3-5-11.tar.gz Package owncloudclient: missing distfile owncloudclient-2.0.2.tar.xz Package poink: missing distfile poink-1.6.tar.gz Package ra-rtsp-proxy: missing distfile rtspd-src-1.0.0.0.tar.gz Package ucspi-ssl: missing distfile ucspi-ssl-0.70-ucspitls-0.1.patch Package waste: missing distfile waste-source.tar.gz Otherwise, existing SHA1 digests verified and found to be the same on the machine holding the existing distfiles (morden). All existing SHA1 digests retained for now as an audit trail.
Update to 2.0.13 Add LICENSE Upstream changes: maradns-2.0.13: This is the stable release of MaraDNS. Two non-critical buffer overflows from ParseMaraRc fixed. One can never be exploited; the other one can only be exploted by the (usually) root user by writing to the system mararc file. Deadwood updated to 3.2.09 (2015-09-25) maradns-2.0.12: This is the stable release of MaraDNS. Security fix for improper free() in zoneserver Deadwood updated to 3.2.08 Zone transfers now work with newer versions of dig Documentation updates (2015.08.19) maradns-2.0.11: This is the stable release of MaraDNS. Deadwood updated to 3.2.07 (2015.01.30) maradns-2.0.10: This is the stable release of MaraDNS. Deadwood updated to 3.2.06 Zoneserver now compiles and runs in Cygwin (so Windows users can have DNS-over-TCP support). (2015.01.24) maradns-2.0.09: This is the stable release of MaraDNS. Deadwood updated to 3.2.05 Startup scripts are now chkconfig-compatible (2014.02.12) maradns-2.0.08: This is the stable release of MaraDNS. Deadwood updated to 3.2.04 Make DNS packet compression case-insensitive Attach IPv6 glue to NS and MX records when MaraDNS is compiled for IPv6 Remove warning when MaraDNS is compiled for IPv6 Remove warning when compiling getzone.c (2014.01.14) maradns-2.0.07d: This is the stable release of MaraDNS. Deadwood updated to 3.2.03d to patch security hole discussed at samiam.org/blog/20131202.html (2013.12.02) maradns-2.0.07c: This is the stable release of MaraDNS. Seven-line fix to Deadwood to fix resolution problem; more details in blog (2013.07.20; declared stable 2013.09.20) maradns-2.0.07b: This is the stable release of MaraDNS. One-line fix to Deadwood to fix resolution problem (2013.04.23; declared stable 2013.06.22) maradns-2.0.07: This is the stable release of MaraDNS. MaraDNS updated for CentOS 6 Deadwood updated to 3.2.03 GPG key updated Installs and tests pass in new CentOS install (2013.01.20) maradns-2.0.06: This is a stable release of MaraDNS. Deadwood updated to 3.2.02 (2012.03.11)
Update to 2.0.05 by package maintainer + my fixes. maradns-2.0.05: This is a stable release of MaraDNS. * Security bugfix for CVE-2011-5056 * Deadwood updated to Deadwood 3.2.01 * Nicholas Bamber's Makefile.freebsd file added. (2012.02.12) maradns-1.4.10: The hash compression function has better collision resistance. More details at http://bam2.vk.tj (2012.01.13) maradns-1.4.09: Hotfix: The hash randomization now has 31 bits of entropy, and the hash does a fairly good job of choosing a random hash bucket again. More details at http://al72.vk.tj (2011.12.30) maradns-1.4.08: Security hotfix: Hash randomization added to MaraDNS 1's recursive resolver. MaraDNS 2 is not impacted (it's been using a randomized hash since 2007). More details at http://al62.vk.tj (2011.12.29) maradns-1.4.07: This is a legacy release of MaraDNS. All patches are backports of MaraDNS 2.0 bug fixes. * A typo fix for fetchzone * AXFR-over-UDP packets are now correctly marked "truncated" * It is now possible to have the '/' in hostnames * Fix for Debian bug #607739: Hostname shown when complaining about DDIP issues * AngelD's issue with zone transfers when there are a lot of FQDN4 records fixed. * Karim's issue with '/read' directive fixed (2011.11.11)
Pullup ticket #3424 - requested by obache net/maradns: security update Revisions pulled up: - net/maradns/Makefile 1.23 - net/maradns/distinfo 1.12 - net/maradns/patches/patch-ad 1.4 --- Module Name: pkgsrc Committed By: obache Date: Fri May 6 11:36:24 UTC 2011 Modified Files: pkgsrc/net/maradns: Makefile distinfo pkgsrc/net/maradns/patches: patch-ad Log Message: Update maradns to 1.4.06. maradns-1.4.06: This is the stable branch of MaraDNS. * Fix for CVE-2011-0520 * Deadwood updated to 3.0.02 (2011.01.28) maradns-1.4.05: This is a stable branch of MaraDNS. * Deadwood updated to the stable 3.0.01 release. * MicroDNS now returns "not implemented" when given an EDNS packet * FAQ updated. (2010.09.25) maradns-1.4.04: This is the stable branch of MaraDNS. * Bugfix: NAPTR records now work when ~ is used to separate records * NAPTR records now documented * Bugfix: ANY queries now correctly work with NS referrals * Example IPv6 addresses now use RFC-4193 compliant IPs * Website updated to point out that Deadwood is now feature complete and ready for beta-testing * Some updates to the SQA regressions * Deadwood updated to Deadwood 2.9.02 * Windows-only mkSecretTxt program added (*NIX users can just type in "dd if=/dev/urandom of=secret.txt bs=64 count=1"; this gives Windows the same ability). (2010.07.31)
Update maradns to 1.4.06. maradns-1.4.06: This is the stable branch of MaraDNS. * Fix for CVE-2011-0520 * Deadwood updated to 3.0.02 (2011.01.28) maradns-1.4.05: This is a stable branch of MaraDNS. * Deadwood updated to the stable 3.0.01 release. * MicroDNS now returns "not implemented" when given an EDNS packet * FAQ updated. (2010.09.25) maradns-1.4.04: This is the stable branch of MaraDNS. * Bugfix: NAPTR records now work when ~ is used to separate records * NAPTR records now documented * Bugfix: ANY queries now correctly work with NS referrals * Example IPv6 addresses now use RFC-4193 compliant IPs * Website updated to point out that Deadwood is now feature complete and ready for beta-testing * Some updates to the SQA regressions * Deadwood updated to Deadwood 2.9.02 * Windows-only mkSecretTxt program added (*NIX users can just type in "dd if=/dev/urandom of=secret.txt bs=64 count=1"; this gives Windows the same ability). (2010.07.31)
updated to 1.4.03 patched to support Darwin
Fix a Denial-of-Service vulnerability in maradns version 1.2.12.06 Crafted CNAME entries can be used to DoS MaraDNS without this patch See CVE-2008-0061 for more details Approved-by: wiz
Update to maradns-1.2.12.06. Most important changes: - full Y2038 compliance - full support for DNS over TCP - some changes in the zone format.
Update maradns to 1.0.39. changelog: maradns-1.0.39: * Backport of memory leak fix to 1.0 branch of MaraDNS (2006.07.24) maradns-1.0.38: Backport of MaraDNS 1.2.09 Microsoft.com fix to legacy 1.0 branch (2006.06.16) maradns-1.0.37: This is an update for the 1.0 legacy branch of MaraDNS * Removed all example mararc files which allow any IP on the internet to perform recursive queries (these can be used for denial of service attacks) (2006.04.07) maradns-1.0.36: This is a bugfix release for the legacy 1.0 branch of MaraDNS. * A backport of the 2-line patch recently posted to the mailing list concerning incorrect dangling CNAME warnings (2005.12.31) maradns-1.0.35: * Backport of 1.1.x fix of csv1 example in documentation * Backport of 1.1.x fix of MINFO RR description * Backport of 1.1.x security fix. (2005.11.20) maradns-1.0.34: * Hotfix: recursion works again * Regression procedure added. (2005.10.26) maradns-1.0.33: * Fixed occassional crash that happens while reading zone files at MaraDNS startup. * Fixed occassional compression error which shows up in MaraDNS logs. * Update man page to point out some unimplemented features will be in 1.2 (2005.10.24) maradns-1.0.32: Hotfix: RR rotation now works again. (2005.08.08) maradns-1.0.31: Two patches by Albert Lee that improve Maras stability. (2005.08.07) maradns-1.0.30: * Warn the user when they have dangling CNAME records * Fix bug with MX records with preferences > 255 in getzone tool (2005.06.30) maradns-1.0.29: This release improves how MaraDNS'recursive resolver parses packets so that Mara can interoperate better with some stub resolvers that dont bother looking past the header of a DNS packet. (2005.05.13)
DragonFly also needs sys/time.h before sys/resource.h.
Pullup ticket 501 - requested by Lubomir Sedlacik security fix for maradns Revisions pulled up: - pkgsrc/net/maradns/DESCR 1.2 - pkgsrc/net/maradns/Makefile 1.14 - pkgsrc/net/maradns/PLIST 1.4 - pkgsrc/net/maradns/distinfo 1.6 - pkgsrc/net/maradns/patches/patch-aa 1.3 - pkgsrc/net/maradns/patches/patch-ae 1.1 - pkgsrc/net/maradns/patches/patch-af 1.1 - pkgsrc/net/maradns/patches/patch-ag 1.1 - pkgsrc/net/maradns/patches/patch-ah 1.1 - pkgsrc/net/maradns/patches/patch-ai 1.1 - pkgsrc/net/maradns/patches/patch-aj 1.1 Module Name: pkgsrc Committed By: salo Date: Fri May 13 13:25:55 UTC 2005 Modified Files: pkgsrc/net/maradns: DESCR Makefile PLIST distinfo pkgsrc/net/maradns/patches: patch-aa Added Files: pkgsrc/net/maradns/patches: patch-ae patch-af patch-ag patch-ah patch-ai patch-aj Log Message: Update to version 1.0.28 Too many changes to list, see CHANGELOG within the source tarball. This update was prompted by an issue with random number generator, see the following url for details: http://www.maradns.org/download/patches/maradns-1.0.26-rekey_rng
Update to version 1.0.28 Too many changes to list, see CHANGELOG within the source tarball. This update was prompted by an issue with random number generator, see the following url for details: http://www.maradns.org/download/patches/maradns-1.0.26-rekey_rng
Add RMD160 digests.
o Better handling of pthreads dependency o Fixes to make building and installing more easy o Make MaraDNS actually look into ${PKG_SYSCONFDIR} for its configuration file, thus bumping PKGREVISION.
Make build with pth.
Updated to 1.0.18 Changes: Cleaned up and fixed a bug in the MaraDNS startup script. Now, the only prorcesses that will be killed will be bona fide MaraDNS processes. Closes PR pkg/22963.
Initial import of maradns 1.0.17. Package provided by pancake <pancake@phreaker.net> via pkgsrc-wip. MaraDNS is a package that implements the Domain Name Service (DNS), an essential internet service. MaraDNS is intended for environments where a DNS server must be secure and where the server must use the absolute minimum number of resources possible. MaraDNS was created in response to issues people had with the DNS servers available in early 2001; and has the following design goals: Security-aware programming. A DNS server needs to be secure. I have a number of security features in the code, including: 1. The code uses a special string library which is resistant to buffer overflows. 2. The code, if started as root, mandates running as an unpriviledged user in a chroot() jail. Open-Source. The 1.0 release of the DNS server is public-domain code; the 1.2 release will be released under a very liberal BSD-style license. Simplicity. This DNS server has the minimum number of features needed to correctly act as an authoritative and/or recursive name server.
Initial revision