notes.html revision 0226754d9e537fd56b690d5890cfe215a6c59f89
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews<!--
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews -
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews - Permission to use, copy, modify, and/or distribute this software for any
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews - purpose with or without fee is hereby granted, provided that the above
0c27b3fe77ac1d5094ba3521e8142d9e7973133fMark Andrews - copyright notice and this permission notice appear in all copies.
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson -
6bf23b0270d0f39afcc1d6c4da25c1473c5fd264Automatic Updater - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
9c3531d72aeaad6c5f01efe6a1c82023e1379e4dDavid Lawrence - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson - PERFORMANCE OF THIS SOFTWARE.
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson-->
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson<!-- $Id$ -->
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson<html>
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson<head>
361a4334ec8ef9d678dcd6c94f96547efedb02bdAndreas Gustafsson<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
361a4334ec8ef9d678dcd6c94f96547efedb02bdAndreas Gustafsson<title></title>
361a4334ec8ef9d678dcd6c94f96547efedb02bdAndreas Gustafsson<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
76458ec215a57c6806afdd831b9c9a30b93344b0Andreas Gustafsson</head>
aff4e48c82c1de198a627fe7a57fb6f400d6d3c1Andreas Gustafsson<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="article"><div class="section">
aff4e48c82c1de198a627fe7a57fb6f400d6d3c1Andreas Gustafsson<div class="titlepage"></div>
76458ec215a57c6806afdd831b9c9a30b93344b0Andreas Gustafsson<span style="color: red">&lt;title&gt;Release Notes for BIND Version 9.11.0pre-alpha&lt;/title&gt;</span><div class="section">
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson<div class="titlepage"><div><div><h3 class="title">
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson<a name="relnotes_intro"></a>Introduction</h3></div></div></div>
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson<p>
b3651a8e87c12ea0428eeb5cf4b304be5bcd9db0Brian Wellington This document summarizes changes since the last production release
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson of BIND on the corresponding major release branch.
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson </p>
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson</div>
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson<div class="section">
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson<div class="titlepage"><div><div><h3 class="title">
bfe7da9c6b20573c2da09ad2e7cac0a54c8cd47bMark Andrews<a name="relnotes_download"></a>Download</h3></div></div></div>
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson<p>
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson The latest versions of BIND 9 software can always be found at
c5b14e2676e8832de77bf63b8f58890d13a6c1e2Andreas Gustafsson <a class="link" href="http://www.isc.org/downloads/" target="_top">http://www.isc.org/downloads/</a>.
65dfcdc392b93f9d67684adce8b33a1d8168e67cAndreas Gustafsson There you will find additional information about each release,
f11c81f4fe26ae9f1ef990257b3b2cac6ab5be12Mark Andrews source code, and pre-compiled versions for Microsoft Windows
f11c81f4fe26ae9f1ef990257b3b2cac6ab5be12Mark Andrews operating systems.
f11c81f4fe26ae9f1ef990257b3b2cac6ab5be12Mark Andrews </p>
f11c81f4fe26ae9f1ef990257b3b2cac6ab5be12Mark Andrews</div>
0e780f132d725c59bae021b6c0bcb34b800a9230Mark Andrews<div class="section">
0e780f132d725c59bae021b6c0bcb34b800a9230Mark Andrews<div class="titlepage"><div><div><h3 class="title">
0e780f132d725c59bae021b6c0bcb34b800a9230Mark Andrews<a name="relnotes_security"></a>Security Fixes</h3></div></div></div>
0e780f132d725c59bae021b6c0bcb34b800a9230Mark Andrews<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
0e780f132d725c59bae021b6c0bcb34b800a9230Mark Andrews<li class="listitem"><p>
0e780f132d725c59bae021b6c0bcb34b800a9230Mark Andrews Insufficient testing when parsing a message allowed
0e780f132d725c59bae021b6c0bcb34b800a9230Mark Andrews records with an incorrect class to be be accepted,
0e873a120279dbae16ec3773d7c67d473602b7c6Andreas Gustafsson triggering a REQUIRE failure when those records
0e873a120279dbae16ec3773d7c67d473602b7c6Andreas Gustafsson were subsequently cached. This flaw is disclosed
0e873a120279dbae16ec3773d7c67d473602b7c6Andreas Gustafsson in CVE-2015-8000. [RT #40987]
0e873a120279dbae16ec3773d7c67d473602b7c6Andreas Gustafsson </p></li>
76458ec215a57c6806afdd831b9c9a30b93344b0Andreas Gustafsson<li class="listitem"><p>
72e278abc7c73059de68017eceae7d5138ee98c1Andreas Gustafsson Incorrect reference counting could result in an INSIST
72e278abc7c73059de68017eceae7d5138ee98c1Andreas Gustafsson failure if a socket error occurred while performing a
76458ec215a57c6806afdd831b9c9a30b93344b0Andreas Gustafsson lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945]
c5b14e2676e8832de77bf63b8f58890d13a6c1e2Andreas Gustafsson </p></li>
d075bd326e34600c036c905eea6c80f565ea951fAndreas Gustafsson<li class="listitem"><p>
d075bd326e34600c036c905eea6c80f565ea951fAndreas Gustafsson An incorrect boundary check in the OPENPGPKEY rdatatype
361a4334ec8ef9d678dcd6c94f96547efedb02bdAndreas Gustafsson could trigger an assertion failure. This flaw is disclosed
7f800a6b10b0172e36e6fef855f48109717b6a2cAndreas Gustafsson in CVE-2015-5986. [RT #40286]
7f800a6b10b0172e36e6fef855f48109717b6a2cAndreas Gustafsson </p></li>
b976f9c60a09f4a098852d0653ad5df6842557a7Andreas Gustafsson<li class="listitem">
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews<p>
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews A buffer accounting error could trigger an assertion failure
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews when parsing certain malformed DNSSEC keys.
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews </p>
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews<p>
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews This flaw was discovered by Hanno B�ck of the Fuzzing
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews Project, and is disclosed in CVE-2015-5722. [RT #40212]
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews </p>
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews</li>
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews<li class="listitem">
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews<p>
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews A specially crafted query could trigger an assertion failure
9be408c36882c768c1a3554803d8b4dbf44557e4Mark Andrews in message.c.
a1bb4b0e4f71fb2878050905087d279cfa87b786Andreas Gustafsson </p>
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson<p>
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews This flaw was discovered by Jonathan Foote, and is disclosed
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews in CVE-2015-5477. [RT #40046]
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews </p>
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews</li>
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews<li class="listitem">
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews<p>
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews On servers configured to perform DNSSEC validation, an
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews assertion failure could be triggered on answers from
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews a specially configured server.
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews </p>
3f5510b6fd74d8458aa4c8ead297bbfdd70547f0Mark Andrews<p>
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson This flaw was discovered by Breno Silveira Soares, and is
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson disclosed in CVE-2015-4620. [RT #39795]
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson </p>
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson</li>
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson<li class="listitem">
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson<p>
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson On servers configured to perform DNSSEC validation using
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson managed trust anchors (i.e., keys configured explicitly
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson via <span class="command"><strong>managed-keys</strong></span>, or implicitly
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson via <span class="command"><strong>dnssec-validation auto;</strong></span> or
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson <span class="command"><strong>dnssec-lookaside auto;</strong></span>), revoking
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson a trust anchor and sending a new untrusted replacement
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson could cause <span class="command"><strong>named</strong></span> to crash with an
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson assertion failure. This could occur in the event of a
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson botched key rollover, or potentially as a result of a
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson deliberate attack if the attacker was in position to
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson monitor the victim's DNS traffic.
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson </p>
63404af69b0b99b8fa551e92702921f01c3bbfd7Andreas Gustafsson<p>
6af37648dd5e0cb407cbef1fed5255dd874e61efAndreas Gustafsson This flaw was discovered by Jan-Piet Mens, and is
6af37648dd5e0cb407cbef1fed5255dd874e61efAndreas Gustafsson disclosed in CVE-2015-1349. [RT #38344]
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson </p>
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson</li>
3d4a70fe38769e42b943717256208b63fec05f32Andreas Gustafsson<li class="listitem">
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson<p>
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson A flaw in delegation handling could be exploited to put
3d4a70fe38769e42b943717256208b63fec05f32Andreas Gustafsson <span class="command"><strong>named</strong></span> into an infinite loop, in which
3d4a70fe38769e42b943717256208b63fec05f32Andreas Gustafsson each lookup of a name server triggered additional lookups
3d4a70fe38769e42b943717256208b63fec05f32Andreas Gustafsson of more name servers. This has been addressed by placing
3d4a70fe38769e42b943717256208b63fec05f32Andreas Gustafsson limits on the number of levels of recursion
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson <span class="command"><strong>named</strong></span> will allow (default 7), and
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson on the number of queries that it will send before
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson terminating a recursive query (default 50).
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson </p>
6f6fbed6eb4d755198a452e557eead49f215d54bAndreas Gustafsson<p>
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson The recursion depth limit is configured via the
6af37648dd5e0cb407cbef1fed5255dd874e61efAndreas Gustafsson <code class="option">max-recursion-depth</code> option, and the query limit
6af37648dd5e0cb407cbef1fed5255dd874e61efAndreas Gustafsson via the <code class="option">max-recursion-queries</code> option.
6af37648dd5e0cb407cbef1fed5255dd874e61efAndreas Gustafsson </p>
6af37648dd5e0cb407cbef1fed5255dd874e61efAndreas Gustafsson<p>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence The flaw was discovered by Florian Maury of ANSSI, and is
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson disclosed in CVE-2014-8500. [RT #37580]
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence </p>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence</li>
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson<li class="listitem">
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson<p>
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson Two separate problems were identified in BIND's GeoIP code that
f8b11dc88787139b40c12f4cd797fef7d27e6809Mark Andrews could lead to an assertion failure. One was triggered by use of
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence both IPv4 and IPv6 address families, the other by referencing
021a3183ec1db24e2b9627bdd059a121c56ab886Andreas Gustafsson a GeoIP database in <code class="filename">named.conf</code> which was
021a3183ec1db24e2b9627bdd059a121c56ab886Andreas Gustafsson not installed. Both are covered by CVE-2014-8680. [RT #37672]
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence [RT #37679]
3494f301f7d3897a56350010005a5758aad32711Rob Austein </p>
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein<p>
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein A less serious security flaw was also found in GeoIP: changes
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein to the <span class="command"><strong>geoip-directory</strong></span> option in
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein <code class="filename">named.conf</code> were ignored when running
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein <span class="command"><strong>rndc reconfig</strong></span>. In theory, this could allow
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein <span class="command"><strong>named</strong></span> to allow access to unintended clients.
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein </p>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence</li>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence</ul></div>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence</div>
1ae59f0202d4dd5f41f978804b092115c6e053eaDavid Lawrence<div class="section">
1ae59f0202d4dd5f41f978804b092115c6e053eaDavid Lawrence<div class="titlepage"><div><div><h3 class="title">
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence<a name="relnotes_features"></a>New Features</h3></div></div></div>
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein<li class="listitem">
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein<p>
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein Added support for DynDB, a new interface for loading zone data
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein from an external database, developed by Red Hat for the FreeIPA
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein project. (Thanks in particular to Adam Tkac and Petr
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein Spacek of Red Hat for the contribution.)
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews </p>
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein<p>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence Unlike the existing DLZ and SDB interfaces, which provide a
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence limited subset of database functionality within BIND &#8212;
f11c81f4fe26ae9f1ef990257b3b2cac6ab5be12Mark Andrews translating DNS queries into real-time database lookups with
3494f301f7d3897a56350010005a5758aad32711Rob Austein relatively poor performance and with no ability to handle
1676408640d8283c9f17eec0b183e1302ea7fd70Mark Andrews DNSSEC-signed data &#8212; DynDB is able to fully implement
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein and extend the database API used natively by BIND.
f11c81f4fe26ae9f1ef990257b3b2cac6ab5be12Mark Andrews </p>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence<p>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence A DynDB module could pre-load data from an external data
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein source, then serve it with the same performance and
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein functionality as conventional BIND zones, and with the
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence ability to take advantage of database features not
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence available in BIND, such as multi-master replication.
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence </p>
b5ecd4d276c0daa3371d645aba7840b4d8419310Mark Andrews</li>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence<li class="listitem">
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews<p>
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews New quotas have been added to limit the queries that are
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews sent by recursive resolvers to authoritative servers
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews experiencing denial-of-service attacks. When configured,
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews these options can both reduce the harm done to authoritative
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews servers and also avoid the resource exhaustion that can be
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews experienced by recursives when they are being used as a
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence vehicle for such an attack.
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence </p>
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: circle; ">
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence<li class="listitem"><p>
1ae59f0202d4dd5f41f978804b092115c6e053eaDavid Lawrence <code class="option">fetches-per-server</code> limits the number of
1ae59f0202d4dd5f41f978804b092115c6e053eaDavid Lawrence simultaneous queries that can be sent to any single
1e730144b4cbb0767510f5f6adef6666bf861bbbMark Andrews authoritative server. The configured value is a starting
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein point; it is automatically adjusted downward if the server is
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein partially or completely non-responsive. The algorithm used to
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein adjust the quota can be configured via the
5d2568aa9d3218e32bcbe795473e6d2d710a4ab6Mark Andrews <code class="option">fetch-quota-params</code> option.
2984f8f7bf213642e47affe710851ff0d6580083Mark Andrews </p></li>
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein<li class="listitem"><p>
2984f8f7bf213642e47affe710851ff0d6580083Mark Andrews <code class="option">fetches-per-zone</code> limits the number of
2984f8f7bf213642e47affe710851ff0d6580083Mark Andrews simultaneous queries that can be sent for names within a
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein single domain. (Note: Unlike "fetches-per-server", this
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein value is not self-tuning.)
818bb50f16abdb79ada224cd910d500d5fd71278Rob Austein </p></li>
2984f8f7bf213642e47affe710851ff0d6580083Mark Andrews</ul></div>
2984f8f7bf213642e47affe710851ff0d6580083Mark Andrews<p>
2984f8f7bf213642e47affe710851ff0d6580083Mark Andrews Statistics counters have also been added to track the number
070347dafd61757886d03b80628ada12214fec61Mark Andrews of queries affected by these quotas.
04bdb234571448ed6194e1d4048e6512f2446f1cDavid Lawrence </p>
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson</li>
76458ec215a57c6806afdd831b9c9a30b93344b0Andreas Gustafsson<li class="listitem">
f5eb48652c7ec98514256b5b6e6fd7cbc22b1916Andreas Gustafsson<p>
76458ec215a57c6806afdd831b9c9a30b93344b0Andreas Gustafsson Added support for <span class="command"><strong>dnstap</strong></span>, a fast,
021a3183ec1db24e2b9627bdd059a121c56ab886Andreas Gustafsson flexible method for capturing and logging DNS traffic,
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson developed by Robert Edmonds at Farsight Security, Inc.,
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson whose assistance is gratefully acknowledged.
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson </p>
6f6fbed6eb4d755198a452e557eead49f215d54bAndreas Gustafsson<p>
6f6fbed6eb4d755198a452e557eead49f215d54bAndreas Gustafsson To enable <span class="command"><strong>dnstap</strong></span> at compile time,
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
20df5357b17d31a3adc4d6f7cfdd9d4f1c5addf2Andreas Gustafsson libraries must be available, and BIND must be configured with
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson <code class="option">--enable-dnstap</code>.
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson </p>
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson<p>
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson A new utility <span class="command"><strong>dnstap-read</strong></span> has been added
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson to allow <span class="command"><strong>dnstap</strong></span> data to be presented in
c5b14e2676e8832de77bf63b8f58890d13a6c1e2Andreas Gustafsson a human-readable format.
021a3183ec1db24e2b9627bdd059a121c56ab886Andreas Gustafsson </p>
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson<p>
d5a0b9c15c0a81a982fd7375a195f368c30a47b9Andreas Gustafsson For more information on <span class="command"><strong>dnstap</strong></span>, see
d5a0b9c15c0a81a982fd7375a195f368c30a47b9Andreas Gustafsson <a class="link" href="http://dnstap.info" target="_top">http://dnstap.info</a>.
d5a0b9c15c0a81a982fd7375a195f368c30a47b9Andreas Gustafsson </p>
d5a0b9c15c0a81a982fd7375a195f368c30a47b9Andreas Gustafsson</li>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson<li class="listitem"><p>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson New statistics counters have been added to track traffic
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson sizes, as specified in RSSAC002. Query and response
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson message sizes are broken up into ranges of histogram buckets:
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson TCP and UDP queries of size 0-15, 16-31, ..., 272-288, and 288+,
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson and TCP and UDP responses of size 0-15, 16-31, ..., 4080-4095,
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson and 4096+. These values can be accessed via the XML and JSON
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson statistics channels at, for example,
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson <a class="link" href="http://localhost:8888/xml/v3/traffic" target="_top">http://localhost:8888/xml/v3/traffic</a>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson or
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson <a class="link" href="http://localhost:8888/json/v1/traffic" target="_top">http://localhost:8888/json/v1/traffic</a>.
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson </p></li>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson<li class="listitem"><p>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson The serial number of a dynamically updatable zone can
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson now be set using
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson <span class="command"><strong>rndc signing -serial <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>zonename</code></em></strong></span>.
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson This is particularly useful with <code class="option">inline-signing</code>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson zones that have been reset. Setting the serial number to a value
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson larger than that on the slaves will trigger an AXFR-style
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson transfer.
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson </p></li>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson<li class="listitem"><p>
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson When answering recursive queries, SERVFAIL responses can now be
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson cached by the server for a limited time; subsequent queries for
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson the same query name and type will return another SERVFAIL until
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson the cache times out. This reduces the frequency of retries
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson when a query is persistently failing, which can be a burden
d5a0b9c15c0a81a982fd7375a195f368c30a47b9Andreas Gustafsson on recursive serviers. The SERVFAIL cache timeout is controlled
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson by <code class="option">servfail-ttl</code>, which defaults to 1 second
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson and has an upper limit of 30.
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson </p></li>
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson<li class="listitem"><p>
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson The new <span class="command"><strong>rndc nta</strong></span> command can now be used to
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson set a "negative trust anchor" (NTA), disabling DNSSEC validation for
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson a specific domain; this can be used when responses from a domain
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson are known to be failing validation due to administrative error
b1e7bb6aef7f9c559a2b42d8fcc82001d8c83b21Andreas Gustafsson rather than because of a spoofing attack. NTAs are strictly
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson temporary; by default they expire after one hour, but can be
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson configured to last up to one week. The default NTA lifetime
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson can be changed by setting the <code class="option">nta-lifetime</code> in
f7aa8ce0b3cf7f5df618a42beecf8d5517c000acAndreas Gustafsson <code class="filename">named.conf</code>. When added, NTAs are stored in a
c7d445ce7f4db5262ba3412eac7b1ee9d053b93dAndreas Gustafsson file (<code class="filename"><em class="replaceable"><code>viewname</code></em>.nta</code>)
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson in order to persist across restarts of the <span class="command"><strong>named</strong></span> server.
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson </p></li>
2357f291c53de433c39ce844d2f0abc0bccfa9fcAndreas Gustafsson<li class="listitem"><p>
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson The EDNS Client Subnet (ECS) option is now supported for
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson authoritative servers; if a query contains an ECS option then
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson ACLs containing <code class="option">geoip</code> or <code class="option">ecs</code>
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson elements can match against the the address encoded in the option.
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson This can be used to select a view for a query, so that different
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson answers can be provided depending on the client network.
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson </p></li>
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson<li class="listitem"><p>
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson The EDNS EXPIRE option has been implemented on the client
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson side, allowing a slave server to set the expiration timer
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson correctly when transferring zone data from another slave
b976f9c60a09f4a098852d0653ad5df6842557a7Andreas Gustafsson server.
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson </p></li>
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson<li class="listitem"><p>
20df5357b17d31a3adc4d6f7cfdd9d4f1c5addf2Andreas Gustafsson A new <code class="option">masterfile-style</code> zone option controls
20df5357b17d31a3adc4d6f7cfdd9d4f1c5addf2Andreas Gustafsson the formatting of text zone files: When set to
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson <code class="literal">full</code>, the zone file will dumped in
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson single-line-per-record format.
c33679b400a69afeeb719addc390a3134f61ecfcAndreas Gustafsson </p></li>
c33679b400a69afeeb719addc390a3134f61ecfcAndreas Gustafsson<li class="listitem"><p>
c33679b400a69afeeb719addc390a3134f61ecfcAndreas Gustafsson <span class="command"><strong>dig +ednsopt</strong></span> can now be used to set
c33679b400a69afeeb719addc390a3134f61ecfcAndreas Gustafsson arbitrary EDNS options in DNS requests.
c33679b400a69afeeb719addc390a3134f61ecfcAndreas Gustafsson </p></li>
7736b3327ede0998c44c925b8301de7d61b0f4abAndreas Gustafsson<li class="listitem"><p>
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson <span class="command"><strong>dig +ednsflags</strong></span> can now be used to set
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson yet-to-be-defined EDNS flags in DNS requests.
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson </p></li>
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson<li class="listitem"><p>
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson <span class="command"><strong>dig +[no]ednsnegotiation</strong></span> can now be used enable /
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson disable EDNS version negotiation.
fdf2eaf21bf4530114049f3c77421a56d585aabcAndreas Gustafsson </p></li>
682d0209e8a67d53594fb524b5d9ae4141bcc9b2Evan Hunt<li class="listitem"><p>
682d0209e8a67d53594fb524b5d9ae4141bcc9b2Evan Hunt <span class="command"><strong>dig +header-only</strong></span> can now be used to send
2d54cf04fc02db7c369592b6f91bbd1330df3387Andreas Gustafsson queries without a question section.
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson </p></li>
36bc6a0a8312de762caf1e984efe15c8e7170d9dAndreas Gustafsson<li class="listitem"><p>
<span class="command"><strong>dig +ttlunits</strong></span> causes <span class="command"><strong>dig</strong></span>
to print TTL values with time-unit suffixes: w, d, h, m, s for
weeks, days, hours, minutes, and seconds.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>dig +zflag</strong></span> can be used to set the last
unassigned DNS header flag bit. This bit in normally zero.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>dig +dscp=<em class="replaceable"><code>value</code></em></strong></span>
can now be used to set the DSCP code point in outgoing query
packets.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>dig +mapped</strong></span> can now be used to determine
if mapped IPv4 addresses can be used.
</p></li>
<li class="listitem"><p>
<code class="option">serial-update-method</code> can now be set to
<code class="literal">date</code>. On update, the serial number will
be set to the current date in YYYYMMDDNN format.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>dnssec-signzone -N date</strong></span> also sets the serial
number to YYYYMMDDNN.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>named -L <em class="replaceable"><code>filename</code></em></strong></span>
causes <span class="command"><strong>named</strong></span> to send log messages to the specified file by
default instead of to the system log.
</p></li>
<li class="listitem"><p>
The rate limiter configured by the
<code class="option">serial-query-rate</code> option no longer covers
NOTIFY messages; those are now separately controlled by
<code class="option">notify-rate</code> and
<code class="option">startup-notify-rate</code> (the latter of which
controls the rate of NOTIFY messages sent when the server
is first started up or reconfigured).
</p></li>
<li class="listitem"><p>
The default number of tasks and client objects available
for serving lightweight resolver queries have been increased,
and are now configurable via the new <code class="option">lwres-tasks</code>
and <code class="option">lwres-clients</code> options in
<code class="filename">named.conf</code>. [RT #35857]
</p></li>
<li class="listitem"><p>
Log output to files can now be buffered by specifying
<span class="command"><strong>buffered yes;</strong></span> when creating a channel.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>delv +tcp</strong></span> will exclusively use TCP when
sending queries.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>named</strong></span> will now check to see whether
other name server processes are running before starting up.
This is implemented in two ways: 1) by refusing to start
if the configured network interfaces all return "address
in use", and 2) by attempting to acquire a lock on a file
specified by the <code class="option">lock-file</code> option or
the <span class="command"><strong>-X</strong></span> command line option. The
default lock file is
<code class="filename">/var/run/named/named.lock</code>.
Specifying <code class="literal">none</code> will disable the lock
file check.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>rndc delzone</strong></span> can now be applied to zones
which were configured in <code class="filename">named.conf</code>;
it is no longer restricted to zones which were added by
<span class="command"><strong>rndc addzone</strong></span>. (Note, however, that
this does not edit <code class="filename">named.conf</code>; the zone
must be removed from the configuration or it will return
when <span class="command"><strong>named</strong></span> is restarted or reloaded.)
</p></li>
<li class="listitem"><p>
<span class="command"><strong>rndc modzone</strong></span> can be used to reconfigure
a zone, using similar syntax to <span class="command"><strong>rndc addzone</strong></span>.
</p></li>
<li class="listitem"><p>
<span class="command"><strong>rndc showzone</strong></span> displays the current
configuration for a specified zone.
</p></li>
<li class="listitem">
<p>
Added server-side support for pipelined TCP queries. Clients
may continue sending queries via TCP while previous queries are
processed in parallel. Responses are sent when they are
ready, not necessarily in the order in which the queries were
received.
</p>
<p>
To revert to the former behavior for a particular
client address or range of addresses, specify the address prefix
in the "keep-response-order" option. To revert to the former
behavior for all clients, use "keep-response-order { any; };".
</p>
</li>
<li class="listitem"><p>
The new <span class="command"><strong>mdig</strong></span> command is a version of
<span class="command"><strong>dig</strong></span> that sends multiple pipelined
queries and then waits for responses, instead of sending one
query and waiting the response before sending the next. [RT #38261]
</p></li>
<li class="listitem"><p>
To enable better monitoring and troubleshooting of RFC 5011
trust anchor management, the new <span class="command"><strong>rndc managed-keys</strong></span>
can be used to check status of trust anchors or to force keys
to be refreshed. Also, the managed-keys data file now has
easier-to-read comments. [RT #38458]
</p></li>
<li class="listitem"><p>
An <span class="command"><strong>--enable-querytrace</strong></span> configure switch is
now available to enable very verbose query tracelogging. This
option can only be set at compile time. This option has a
negative performance impact and should be used only for
debugging. [RT #37520]
</p></li>
<li class="listitem"><p>
A new <span class="command"><strong>tcp-only</strong></span> option can be specified
in <span class="command"><strong>server</strong></span> statements to force
<span class="command"><strong>named</strong></span> to connect to the specified
server via TCP. [RT #37800]
</p></li>
<li class="listitem"><p>
The <span class="command"><strong>nxdomain-redirect</strong></span> option specifies
a DNS namespace to use for NXDOMAIN redirection. When a
recursive lookup returns NXDOMAIN, a second lookup is
initiated with the specified name appended to the query
name. This allows NXDOMAIN redirection data to be supplied
by multiple zones configured on the server or by recursive
queries to other servers. (The older method, using
a single <span class="command"><strong>type redirect</strong></span> zone, has
better average performance but is less flexible.) [RT #37989]
</p></li>
<li class="listitem"><p>
The following types have been implemented: CSYNC, NINFO, RKEY,
SINK, TA, TALINK.
</p></li>
<li class="listitem"><p>
A new <span class="command"><strong>message-compression</strong></span> option can be
used to specify whether or not to use name compression when
answering queries. Setting this to <strong class="userinput"><code>no</code></strong>
results in larger responses, but reduces CPU consumption and
may improve throughput. The default is <strong class="userinput"><code>yes</code></strong>.
</p></li>
<li class="listitem"><p>
A "read-only" clause is now available for non-destructive
control channel access. In such cases, a restricted set of
rndc commands are allowed for querying information from named.
By default, control channel access is read-write.
</p></li>
</ul></div>
</div>
<div class="section">
<div class="titlepage"><div><div><h3 class="title">
<a name="relnotes_changes"></a>Feature Changes</h3></div></div></div>
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
<li class="listitem"><p>
Updated the compiled in addresses for H.ROOT-SERVERS.NET.
</p></li>
<li class="listitem"><p>
ACLs containing <span class="command"><strong>geoip asnum</strong></span> elements were
not correctly matched unless the full organization name was
specified in the ACL (as in
<span class="command"><strong>geoip asnum "AS1234 Example, Inc.";</strong></span>).
They can now match against the AS number alone (as in
<span class="command"><strong>geoip asnum "AS1234";</strong></span>).
</p></li>
<li class="listitem"><p>
When using native PKCS#11 cryptography (i.e.,
<span class="command"><strong>configure --enable-native-pkcs11</strong></span>) HSM PINs
of up to 256 characters can now be used.
</p></li>
<li class="listitem"><p>
NXDOMAIN responses to queries of type DS are now cached separately
from those for other types. This helps when using "grafted" zones
of type forward, for which the parent zone does not contain a
delegation, such as local top-level domains. Previously a query
of type DS for such a zone could cause the zone apex to be cached
as NXDOMAIN, blocking all subsequent queries. (Note: This
change is only helpful when DNSSEC validation is not enabled.
"Grafted" zones without a delegation in the parent are not a
recommended configuration.)
</p></li>
<li class="listitem"><p>
Update forwarding performance has been improved by allowing
a single TCP connection to be shared between multiple updates.
</p></li>
<li class="listitem"><p>
By default, <span class="command"><strong>nsupdate</strong></span> will now check
the correctness of hostnames when adding records of type
A, AAAA, MX, SOA, NS, SRV or PTR. This behavior can be
disabled with <span class="command"><strong>check-names no</strong></span>.
</p></li>
<li class="listitem"><p>
Added support for OPENPGPKEY type.
</p></li>
<li class="listitem"><p>
The names of the files used to store managed keys and added
zones for each view are no longer based on the SHA256 hash
of the view name, except when this is necessary because the
view name contains characters that would be incompatible with use
as a file name. For views whose names do not contain forward
slashes ('/'), backslashes ('\'), or capital letters - which
could potentially cause namespace collision problems on
case-insensitive filesystems - files will now be named
after the view (for example, <code class="filename">internal.mkeys</code>
or <code class="filename">external.nzf</code>). However, to ensure
consistent behavior when upgrading, if a file using the old
name format is found to exist, it will continue to be used.
</p></li>
<li class="listitem"><p>
"rndc" can now return text output of arbitrary size to
the caller. (Prior to this, certain commands such as
"rndc tsig-list" and "rndc zonestatus" could return
truncated output.)
</p></li>
<li class="listitem"><p>
Errors reported when running <span class="command"><strong>rndc addzone</strong></span>
(e.g., when a zone file cannot be loaded) have been clarified
to make it easier to diagnose problems.
</p></li>
<li class="listitem"><p>
When encountering an authoritative name server whose name is
an alias pointing to another name, the resolver treats
this as an error and skips to the next server. Previously
this happened silently; now the error will be logged to
the newly-created "cname" log category.
</p></li>
<li class="listitem"><p>
If <span class="command"><strong>named</strong></span> is not configured to validate the answer then
allow fallback to plain DNS on timeout even when we know
the server supports EDNS. This will allow the server to
potentially resolve signed queries when TCP is being
blocked.
</p></li>
<li class="listitem"><p>
Large inline-signing changes should be less disruptive.
Signature generation is now done incrementally; the number
of signatures to be generated in each quantum is controlled
by "sig-signing-signatures <em class="replaceable"><code>number</code></em>;".
[RT #37927]
</p></li>
<li class="listitem">
<p>
The experimental SIT option (code point 65001) of BIND
9.10.0 through BIND 9.10.2 has been replaced with the COOKIE
option (code point 10). It is no longer experimental, and
is sent by default, by both <span class="command"><strong>named</strong></span> and
<span class="command"><strong>dig</strong></span>.
</p>
<p>
The SIT-related named.conf options have been marked as
obsolete, and are otherwise ignored.
</p>
</li>
<li class="listitem"><p>
When <span class="command"><strong>dig</strong></span> receives a truncated (TC=1)
response or a BADCOOKIE response code from a server, it
will automatically retry the query using the server COOKIE
that was returned by the server in its initial response.
[RT #39047]
</p></li>
<li class="listitem"><p>
A alternative NXDOMAIN redirect method (nxdomain-redirect)
which allows the redirect information to be looked up from
a namespace on the Internet rather than requiring a zone
to be configured on the server is now available.
</p></li>
<li class="listitem"><p>
Retrieving the local port range from net.ipv4.ip_local_port_range
on Linux is now supported.
</p></li>
<li class="listitem"><p>
Within the <code class="option">response-policy</code> option, it is now
possible to configure RPZ rewrite logging on a per-zone basis
using the <code class="option">log</code> clause.
</p></li>
<li class="listitem"><p>
The default preferred glue is now the address type of the
transport the query was received over.
</p></li>
<li class="listitem"><p>
On machines with 2 or more processors (CPU), the default value
for the number of UDP listeners has been changed to the number
of detected processors minus one.
</p></li>
<li class="listitem"><p>
Zone transfers now use smaller message sizes to improve
message compression. This results in reduced network usage.
</p></li>
</ul></div>
</div>
<div class="section">
<div class="titlepage"><div><div><h3 class="title">
<a name="relnotes_port"></a>Porting Changes</h3></div></div></div>
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
The Microsoft Windows install tool
<span class="command"><strong>BINDInstall.exe</strong></span> which requires a
non-free version of Visual Studio to be built, now uses two
files (lists of flags and files) created by the Configure
perl script with all the needed information which were
previously compiled in the binary. Read
<code class="filename">win32utils/build.txt</code> for more details.
[RT #38915]
</p></li></ul></div>
</div>
<div class="section">
<div class="titlepage"><div><div><h3 class="title">
<a name="relnotes_bugs"></a>Bug Fixes</h3></div></div></div>
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
<li class="listitem"><p>
<span class="command"><strong>dig</strong></span>, <span class="command"><strong>host</strong></span> and
<span class="command"><strong>nslookup</strong></span> aborted when encountering
a name which, after appending search list elements,
exceeded 255 bytes. Such names are now skipped, but
processing of other names will continue. [RT #36892]
</p></li>
<li class="listitem"><p>
The error message generated when
<span class="command"><strong>named-checkzone</strong></span> or
<span class="command"><strong>named-checkconf -z</strong></span> encounters a
<code class="option">$TTL</code> directive without a value has
been clarified. [RT #37138]
</p></li>
<li class="listitem"><p>
Semicolon characters (;) included in TXT records were
incorrectly escaped with a backslash when the record was
displayed as text. This is actually only necessary when there
are no quotation marks. [RT #37159]
</p></li>
<li class="listitem"><p>
When files opened for writing by <span class="command"><strong>named</strong></span>,
such as zone journal files, were referenced more than once
in <code class="filename">named.conf</code>, it could lead to file
corruption as multiple threads wrote to the same file. This
is now detected when loading <code class="filename">named.conf</code>
and reported as an error. [RT #37172]
</p></li>
<li class="listitem"><p>
When checking for updates to trust anchors listed in
<code class="option">managed-keys</code>, <span class="command"><strong>named</strong></span>
now revalidates keys based on the current set of
active trust anchors, without relying on any cached
record of previous validation. [RT #37506]
</p></li>
<li class="listitem"><p>
Large-system tuning
(<span class="command"><strong>configure --with-tuning=large</strong></span>) caused
problems on some platforms by setting a socket receive
buffer size that was too large. This is now detected and
corrected at run time. [RT #37187]
</p></li>
<li class="listitem"><p>
When NXDOMAIN redirection is in use, queries for a name
that is present in the redirection zone but a type that
is not present will now return NOERROR instead of NXDOMAIN.
</p></li>
<li class="listitem"><p>
Due to an inadvertent removal of code in the previous
release, when <span class="command"><strong>named</strong></span> encountered an
authoritative name server which dropped all EDNS queries,
it did not always try plain DNS. This has been corrected.
[RT #37965]
</p></li>
<li class="listitem"><p>
A regression caused nsupdate to use the default recursive servers
rather than the SOA MNAME server when sending the UPDATE.
</p></li>
<li class="listitem"><p>
Adjusted max-recursion-queries to accommodate the smaller
initial packet sizes used in BIND 9.10 and higher when
contacting authoritative servers for the first time.
</p></li>
<li class="listitem"><p>
Built-in "empty" zones did not correctly inherit the
"allow-transfer" ACL from the options or view. [RT #38310]
</p></li>
<li class="listitem"><p>
Two leaks were fixed that could cause <span class="command"><strong>named</strong></span>
processes to grow to very large sizes. [RT #38454]
</p></li>
<li class="listitem"><p>
Fixed some bugs in RFC 5011 trust anchor management,
including a memory leak and a possible loss of state
information. [RT #38458]
</p></li>
<li class="listitem"><p>
Asynchronous zone loads were not handled correctly when the
zone load was already in progress; this could trigger a crash
in zt.c. [RT #37573]
</p></li>
<li class="listitem"><p>
A race during shutdown or reconfiguration could
cause an assertion failure in mem.c. [RT #38979]
</p></li>
<li class="listitem"><p>
Some answer formatting options didn't work correctly with
<span class="command"><strong>dig +short</strong></span>. [RT #39291]
</p></li>
<li class="listitem">
<p>
Several bugs have been fixed in the RPZ implementation:
</p>
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: circle; ">
<li class="listitem"><p>
Policy zones that did not specifically require recursion
could be treated as if they did; consequently, setting
<span class="command"><strong>qname-wait-recurse no;</strong></span> was
sometimes ineffective. This has been corrected.
In most configurations, behavioral changes due to this
fix will not be noticeable. [RT #39229]
</p></li>
<li class="listitem"><p>
The server could crash if policy zones were updated (e.g.
via <span class="command"><strong>rndc reload</strong></span> or an incoming zone
transfer) while RPZ processing was still ongoing for an
active query. [RT #39415]
</p></li>
<li class="listitem"><p>
On servers with one or more policy zones configured as
slaves, if a policy zone updated during regular operation
(rather than at startup) using a full zone reload, such as
via AXFR, a bug could allow the RPZ summary data to fall out
of sync, potentially leading to an assertion failure in
rpz.c when further incremental updates were made to the
zone, such as via IXFR. [RT #39567]
</p></li>
<li class="listitem"><p>
The server could match a shorter prefix than what was
available in CLIENT-IP policy triggers, and so, an
unexpected action could be taken. This has been
corrected. [RT #39481]
</p></li>
<li class="listitem"><p>
The server could crash if a reload of an RPZ zone was
initiated while another reload of the same zone was
already in progress. [RT #39649]
</p></li>
<li class="listitem"><p>
Negative trust anchors (NTAs) were incorrectly deleted
when the server was reloaded or reconfigured. [RT #41058]
</p></li>
<li class="listitem"><p>
Zones configured to use <span class="command"><strong>map</strong></span> format
master files can't be used as policy zones because RPZ
summary data isn't compiled when such zones are mapped into
memory. This limitation may be fixed in a future release,
but in the meantime it has been documented, and attempting
to use such zones in <span class="command"><strong>response-policy</strong></span>
statements is now a configuration error. [RT #38321]
</p></li>
</ul></div>
</li>
</ul></div>
</div>
<div class="section">
<div class="titlepage"><div><div><h3 class="title">
<a name="end_of_life"></a>End of Life</h3></div></div></div>
<p>
The end of life for BIND 9.11 is yet to be determined but
will not be before BIND 9.13.0 has been released for 6 months.
<a class="link" href="https://www.isc.org/downloads/software-support-policy/" target="_top">https://www.isc.org/downloads/software-support-policy/</a>
</p>
</div>
<div class="section">
<div class="titlepage"><div><div><h3 class="title">
<a name="relnotes_thanks"></a>Thank You</h3></div></div></div>
<p>
Thank you to everyone who assisted us in making this release possible.
If you would like to contribute to ISC to assist us in continuing to
make quality open source software, please visit our donations page at
<a class="link" href="http://www.isc.org/donate/" target="_top">http://www.isc.org/donate/</a>.
</p>
</div>
</div></div></body>
</html>