Bv9ARM.ch09.html revision 832fa787d4a13fa89d64f868e51016ff4adb0d89
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen - Copyright (C) 2004-2015 Internet Systems Consortium, Inc. ("ISC")
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen - Copyright (C) 2000-2003 Internet Software Consortium.
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen - Permission to use, copy, modify, and/or distribute this software for any
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila - purpose with or without fee is hereby granted, provided that the above
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen - copyright notice and this permission notice appear in all copies.
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
d3acad538059ba27f269d390516be7e9fb44294fTimo Sirainen - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
d3acad538059ba27f269d390516be7e9fb44294fTimo Sirainen - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen - PERFORMANCE OF THIS SOFTWARE.
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<link rel="home" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<link rel="up" href="Bv9ARM.html" title="BIND 9 Administrator Reference Manual">
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<link rel="prev" href="Bv9ARM.ch08.html" title="Chapter�8.�Troubleshooting">
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<link rel="next" href="Bv9ARM.ch10.html" title="Appendix�B.�A Brief History of the DNS and BIND">
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF">
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen<table width="100%" summary="Navigation header">
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen<tr><th colspan="3" align="center">Appendix�A.�Release Notes</th></tr>
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen<a accesskey="p" href="Bv9ARM.ch08.html">Prev</a>�</td>
2ac5f36aa7c2e7a07ba8815d43a6d7483f62e74cTimo Sirainen<td width="20%" align="right">�<a accesskey="n" href="Bv9ARM.ch10.html">Next</a>
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen<div class="titlepage"><div><div><h1 class="title">
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen<a name="Bv9ARM.ch09"></a>Release Notes</h1></div></div></div>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#id-1.10.2">Release Notes for BIND Version 9.11.0pre-alpha</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_intro">Introduction</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_download">Download</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_security">Security Fixes</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_features">New Features</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_changes">Feature Changes</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_port">Porting Changes</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_bugs">Bug Fixes</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#end_of_life">End of Life</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<dt><span class="section"><a href="Bv9ARM.ch09.html#relnotes_thanks">Thank You</a></span></dt>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<div class="titlepage"><div><div><h2 class="title" style="clear: both">
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<a name="id-1.10.2"></a>Release Notes for BIND Version 9.11.0pre-alpha</h2></div></div></div>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<div class="titlepage"><div><div><h3 class="title">
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<a name="relnotes_intro"></a>Introduction</h3></div></div></div>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen This document summarizes changes since the last production release
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen of BIND on the corresponding major release branch.
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<div class="titlepage"><div><div><h3 class="title">
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<a name="relnotes_download"></a>Download</h3></div></div></div>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen The latest versions of BIND 9 software can always be found at
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen <a class="link" href="http://www.isc.org/downloads/" target="_top">http://www.isc.org/downloads/</a>.
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen There you will find additional information about each release,
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen source code, and pre-compiled versions for Microsoft Windows
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen operating systems.
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<div class="titlepage"><div><div><h3 class="title">
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<a name="relnotes_security"></a>Security Fixes</h3></div></div></div>
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen Duplicate EDNS COOKIE options in a response could trigger
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen an assertion failure. This flaw is disclosed in CVE-2016-2088.
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen Insufficient testing when parsing a message allowed
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen records with an incorrect class to be be accepted,
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen triggering a REQUIRE failure when those records
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen were subsequently cached. This flaw is disclosed
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen in CVE-2015-8000. [RT #40987]
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen Incorrect reference counting could result in an INSIST
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen failure if a socket error occurred while performing a
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945]
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen An incorrect boundary check in the OPENPGPKEY rdatatype
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen could trigger an assertion failure. This flaw is disclosed
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen in CVE-2015-5986. [RT #40286]
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen A buffer accounting error could trigger an assertion failure
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen when parsing certain malformed DNSSEC keys.
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen This flaw was discovered by Hanno B�ck of the Fuzzing
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen Project, and is disclosed in CVE-2015-5722. [RT #40212]
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen A specially crafted query could trigger an assertion failure
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen This flaw was discovered by Jonathan Foote, and is disclosed
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen in CVE-2015-5477. [RT #40046]
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen On servers configured to perform DNSSEC validation, an
bf698b98d3a3a1eced66cc682c449f23bf2b67d0Timo Sirainen assertion failure could be triggered on answers from
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen a specially configured server.
d3acad538059ba27f269d390516be7e9fb44294fTimo Sirainen This flaw was discovered by Breno Silveira Soares, and is
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen disclosed in CVE-2015-4620. [RT #39795]
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen On servers configured to perform DNSSEC validation using
7b3f0e0a464ec0632b9a831b58bce16c2f85ea1aTimo Sirainen managed trust anchors (i.e., keys configured explicitly
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen via <span class="command"><strong>managed-keys</strong></span>, or implicitly
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen via <span class="command"><strong>dnssec-validation auto;</strong></span> or
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen <span class="command"><strong>dnssec-lookaside auto;</strong></span>), revoking
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen a trust anchor and sending a new untrusted replacement
c25abb52b05f4a7e380134ac21e7525d0b46187aTimo Sirainen could cause <span class="command"><strong>named</strong></span> to crash with an
c25abb52b05f4a7e380134ac21e7525d0b46187aTimo Sirainen assertion failure. This could occur in the event of a
c25abb52b05f4a7e380134ac21e7525d0b46187aTimo Sirainen botched key rollover, or potentially as a result of a
c25abb52b05f4a7e380134ac21e7525d0b46187aTimo Sirainen deliberate attack if the attacker was in position to
c25abb52b05f4a7e380134ac21e7525d0b46187aTimo Sirainen monitor the victim's DNS traffic.
c25abb52b05f4a7e380134ac21e7525d0b46187aTimo Sirainen This flaw was discovered by Jan-Piet Mens, and is
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen disclosed in CVE-2015-1349. [RT #38344]
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen A flaw in delegation handling could be exploited to put
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen <span class="command"><strong>named</strong></span> into an infinite loop, in which
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen each lookup of a name server triggered additional lookups
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen of more name servers. This has been addressed by placing
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen limits on the number of levels of recursion
37dfa8907f8216aa73e3880f3f98aba634458e42Timo Sirainen <span class="command"><strong>named</strong></span> will allow (default 7), and
d3acad538059ba27f269d390516be7e9fb44294fTimo Sirainen on the number of queries that it will send before
d3acad538059ba27f269d390516be7e9fb44294fTimo Sirainen terminating a recursive query (default 50).
f07e311812e0bc77760f321e3b6329ba5f41ce53Timo Sirainen The recursion depth limit is configured via the
f07e311812e0bc77760f321e3b6329ba5f41ce53Timo Sirainen <code class="option">max-recursion-depth</code> option, and the query limit
d3acad538059ba27f269d390516be7e9fb44294fTimo Sirainen via the <code class="option">max-recursion-queries</code> option.
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila The flaw was discovered by Florian Maury of ANSSI, and is
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila disclosed in CVE-2014-8500. [RT #37580]
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen Two separate problems were identified in BIND's GeoIP code that
efe78d3ba24fc866af1c79b9223dc0809ba26cadStephan Bosch could lead to an assertion failure. One was triggered by use of
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila both IPv4 and IPv6 address families, the other by referencing
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen a GeoIP database in <code class="filename">named.conf</code> which was
dcb783533ad1d6944db7c227cde46414a575d81cTimo Sirainen not installed. Both are covered by CVE-2014-8680. [RT #37672]
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila A less serious security flaw was also found in GeoIP: changes
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila to the <span class="command"><strong>geoip-directory</strong></span> option in
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila <code class="filename">named.conf</code> were ignored when running
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila <span class="command"><strong>rndc reconfig</strong></span>. In theory, this could allow
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila <span class="command"><strong>named</strong></span> to allow access to unintended clients.
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila Specific APL data could trigger an INSIST. This flaw
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila is disclosed in CVE-2015-8704. [RT #41396]
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila Certain errors that could be encountered when printing out
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila or logging an OPT record containing a CLIENT-SUBNET option
7c1ce38a29ecdc17480aacb5bac184f42ac05786Teemu Huovila could be mishandled, resulting in an assertion failure.
the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
<a class="link" href="http://localhost:8888/xml/v3/traffic" target="_top">http://localhost:8888/xml/v3/traffic</a>
<a class="link" href="http://localhost:8888/json/v1/traffic" target="_top">http://localhost:8888/json/v1/traffic</a>.
<span class="command"><strong>rndc signing -serial <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>zonename</code></em></strong></span>.
in order to persist across restarts of the <span class="command"><strong>named</strong></span> server.
<span class="command"><strong>dig +ttlunits</strong></span> causes <span class="command"><strong>dig</strong></span>
<span class="command"><strong>dig +dscp=<em class="replaceable"><code>value</code></em></strong></span>
<span class="command"><strong>named -L <em class="replaceable"><code>filename</code></em></strong></span>
causes <span class="command"><strong>named</strong></span> to send log messages to the specified file by
Updated the compiled in addresses for H.ROOT-SERVERS.NET.
When using native PKCS#11 cryptography (i.e.,
(e.g., when a zone file cannot be loaded) have been clarified
If <span class="command"><strong>named</strong></span> is not configured to validate the answer then
The SIT-related named.conf options have been marked as
Retrieving the local port range from net.ipv4.ip_local_port_range
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
Authoritative servers that were marked as bogus (e.g. blackholed
<span class="command"><strong>dig</strong></span>, <span class="command"><strong>host</strong></span> and
in zt.c. [RT #37573]
cause an assertion failure in mem.c. [RT #38979]
The server could crash if policy zones were updated (e.g.
rpz.c when further incremental updates were made to the
<a class="link" href="https://www.isc.org/downloads/software-support-policy/" target="_top">https://www.isc.org/downloads/software-support-policy/</a>