notes.html revision 1609eab3caf63287d1caa0d3f8b4819a0c2becff
75c0816e8295e180f4bc7f10db3d0d880383bc1cMark Andrews - Permission to use, copy, modify, and/or distribute this software for any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - purpose with or without fee is hereby granted, provided that the above
6ea1b817e31b89a627e146fe69e23ea0a64c89ecBob Halley - copyright notice and this permission notice appear in all copies.
6ea1b817e31b89a627e146fe69e23ea0a64c89ecBob Halley - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews - PERFORMANCE OF THIS SOFTWARE.
8a66318e41ed14c5a88130e8c362610e8faa2121Mark Andrews<!-- $Id$ -->
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
e21a2904f02a03fa06b6db04d348f65fe9c67b2bMark Andrews<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="article"><div class="section">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<span style="color: red"><title>Release Notes for BIND Version 9.11.0pre-alpha</title></span><div class="section">
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="relnotes_intro"></a>Introduction</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This document summarizes changes since the last production release
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of BIND on the corresponding major release branch.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="relnotes_download"></a>Download</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The latest versions of BIND 9 software can always be found at
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a class="link" href="http://www.isc.org/downloads/" target="_top">http://www.isc.org/downloads/</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein There you will find additional information about each release,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein source code, and pre-compiled versions for Microsoft Windows
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein operating systems.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="relnotes_security"></a>Security Fixes</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Insufficient testing when parsing a message allowed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein records with an incorrect class to be be accepted,
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater triggering a REQUIRE failure when those records
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein were subsequently cached. This flaw is disclosed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in CVE-2015-8000. [RT #40987]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Incorrect reference counting could result in an INSIST
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein failure if a socket error occurred while performing a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein An incorrect boundary check in the OPENPGPKEY rdatatype
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein could trigger an assertion failure. This flaw is disclosed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in CVE-2015-5986. [RT #40286]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A buffer accounting error could trigger an assertion failure
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when parsing certain malformed DNSSEC keys.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This flaw was discovered by Hanno B�ck of the Fuzzing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Project, and is disclosed in CVE-2015-5722. [RT #40212]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A specially crafted query could trigger an assertion failure
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This flaw was discovered by Jonathan Foote, and is disclosed
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein in CVE-2015-5477. [RT #40046]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein On servers configured to perform DNSSEC validation, an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein assertion failure could be triggered on answers from
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a specially configured server.
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews This flaw was discovered by Breno Silveira Soares, and is
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews disclosed in CVE-2015-4620. [RT #39795]
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews On servers configured to perform DNSSEC validation using
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews managed trust anchors (i.e., keys configured explicitly
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews via <span class="command"><strong>managed-keys</strong></span>, or implicitly
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews via <span class="command"><strong>dnssec-validation auto;</strong></span> or
a1b05dea35aa30b152a47115e18bbe679d3fcf19Mark Andrews <span class="command"><strong>dnssec-lookaside auto;</strong></span>), revoking
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a trust anchor and sending a new untrusted replacement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein could cause <span class="command"><strong>named</strong></span> to crash with an
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein assertion failure. This could occur in the event of a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein botched key rollover, or potentially as a result of a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein deliberate attack if the attacker was in position to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein monitor the victim's DNS traffic.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This flaw was discovered by Jan-Piet Mens, and is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein disclosed in CVE-2015-1349. [RT #38344]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A flaw in delegation handling could be exploited to put
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>named</strong></span> into an infinite loop, in which
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein each lookup of a name server triggered additional lookups
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of more name servers. This has been addressed by placing
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein limits on the number of levels of recursion
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="command"><strong>named</strong></span> will allow (default 7), and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on the number of queries that it will send before
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein terminating a recursive query (default 50).
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The recursion depth limit is configured via the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">max-recursion-depth</code> option, and the query limit
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein via the <code class="option">max-recursion-queries</code> option.
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater The flaw was discovered by Florian Maury of ANSSI, and is
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater disclosed in CVE-2014-8500. [RT #37580]
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater Two separate problems were identified in BIND's GeoIP code that
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater could lead to an assertion failure. One was triggered by use of
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater both IPv4 and IPv6 address families, the other by referencing
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater a GeoIP database in <code class="filename">named.conf</code> which was
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater not installed. Both are covered by CVE-2014-8680. [RT #37672]
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater A less serious security flaw was also found in GeoIP: changes
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater to the <span class="command"><strong>geoip-directory</strong></span> option in
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater <code class="filename">named.conf</code> were ignored when running
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater <span class="command"><strong>rndc reconfig</strong></span>. In theory, this could allow
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater <span class="command"><strong>named</strong></span> to allow access to unintended clients.
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater Specific APL data could trigger an INSIST. This flaw
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein is disclosed in CVE-2015-8704. [RT #41396]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Certain errors that could be encountered when printing out
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein or logging an OPT record containing a CLIENT-SUBNET option
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein could be mishandled, resulting in an assertion failure.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein This flaw is disclosed in CVE-2015-8705. [RT #41397]
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Malformed control messages can trigger assertions in named
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and rndc. This flaw is disclosed in CVE-2016-1285. [RT
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="titlepage"><div><div><h3 class="title">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="relnotes_features"></a>New Features</h3></div></div></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
d71e2e0c61df16ff37c9934c371a4a60c08974f7Mark Andrews Added support for DynDB, a new interface for loading zone data
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein from an external database, developed by Red Hat for the FreeIPA
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein project. (Thanks in particular to Adam Tkac and Petr
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Spacek of Red Hat for the contribution.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Unlike the existing DLZ and SDB interfaces, which provide a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein limited subset of database functionality within BIND —
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein translating DNS queries into real-time database lookups with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein relatively poor performance and with no ability to handle
d71e2e0c61df16ff37c9934c371a4a60c08974f7Mark Andrews DNSSEC-signed data — DynDB is able to fully implement
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and extend the database API used natively by BIND.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A DynDB module could pre-load data from an external data
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein source, then serve it with the same performance and
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein functionality as conventional BIND zones, and with the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein ability to take advantage of database features not
d71e2e0c61df16ff37c9934c371a4a60c08974f7Mark Andrews available in BIND, such as multi-master replication.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein New quotas have been added to limit the queries that are
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sent by recursive resolvers to authoritative servers
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein experiencing denial-of-service attacks. When configured,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein these options can both reduce the harm done to authoritative
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein servers and also avoid the resource exhaustion that can be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein experienced by recursives when they are being used as a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein vehicle for such an attack.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: circle; ">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">fetches-per-server</code> limits the number of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein simultaneous queries that can be sent to any single
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein authoritative server. The configured value is a starting
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein point; it is automatically adjusted downward if the server is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein partially or completely non-responsive. The algorithm used to
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein adjust the quota can be configured via the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">fetch-quota-params</code> option.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <code class="option">fetches-per-zone</code> limits the number of
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein simultaneous queries that can be sent for names within a
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater single domain. (Note: Unlike "fetches-per-server", this
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein value is not self-tuning.)
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Statistics counters have also been added to track the number
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein of queries affected by these quotas.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Added support for <span class="command"><strong>dnstap</strong></span>, a fast,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein flexible method for capturing and logging DNS traffic,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein developed by Robert Edmonds at Farsight Security, Inc.,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein whose assistance is gratefully acknowledged.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein To enable <span class="command"><strong>dnstap</strong></span> at compile time,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein libraries must be available, and BIND must be configured with
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein A new utility <span class="command"><strong>dnstap-read</strong></span> has been added
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein to allow <span class="command"><strong>dnstap</strong></span> data to be presented in
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein a human-readable format.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein For more information on <span class="command"><strong>dnstap</strong></span>, see
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a class="link" href="http://dnstap.info" target="_top">http://dnstap.info</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein New statistics counters have been added to track traffic
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein sizes, as specified in RSSAC002. Query and response
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein message sizes are broken up into ranges of histogram buckets:
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein TCP and UDP queries of size 0-15, 16-31, ..., 272-288, and 288+,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and TCP and UDP responses of size 0-15, 16-31, ..., 4080-4095,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and 4096+. These values can be accessed via the XML and JSON
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein statistics channels at, for example,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a class="link" href="http://localhost:8888/xml/v3/traffic" target="_top">http://localhost:8888/xml/v3/traffic</a>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <a class="link" href="http://localhost:8888/json/v1/traffic" target="_top">http://localhost:8888/json/v1/traffic</a>.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein The serial number of a dynamically updatable zone can
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein now be set using
1224c3b69b3d18f7127aa042644936af25a2d679Mark Andrews <span class="command"><strong>rndc signing -serial <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>zonename</code></em></strong></span>.
1224c3b69b3d18f7127aa042644936af25a2d679Mark Andrews This is particularly useful with <code class="option">inline-signing</code>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein zones that have been reset. Setting the serial number to a value
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein larger than that on the slaves will trigger an AXFR-style
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein When answering recursive queries, SERVFAIL responses can now be
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein cached by the server for a limited time; subsequent queries for
c4d99a62407cebca29653666ae11f87e4f56ebbcAutomatic Updater the same query name and type will return another SERVFAIL until
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein the cache times out. This reduces the frequency of retries
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein when a query is persistently failing, which can be a burden
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein on recursive serviers. The SERVFAIL cache timeout is controlled
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein by <code class="option">servfail-ttl</code>, which defaults to 1 second
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein and has an upper limit of 30.
in order to persist across restarts of the <span class="command"><strong>named</strong></span> server.
<span class="command"><strong>dig +ttlunits</strong></span> causes <span class="command"><strong>dig</strong></span>
<span class="command"><strong>dig +dscp=<em class="replaceable"><code>value</code></em></strong></span>
<span class="command"><strong>named -L <em class="replaceable"><code>filename</code></em></strong></span>
causes <span class="command"><strong>named</strong></span> to send log messages to the specified file by
Updated the compiled in addresses for H.ROOT-SERVERS.NET.
When using native PKCS#11 cryptography (i.e.,
(e.g., when a zone file cannot be loaded) have been clarified
If <span class="command"><strong>named</strong></span> is not configured to validate the answer then
The SIT-related named.conf options have been marked as
Retrieving the local port range from net.ipv4.ip_local_port_range
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
Authoritative servers that were marked as bogus (e.g. blackholed
<span class="command"><strong>dig</strong></span>, <span class="command"><strong>host</strong></span> and
in zt.c. [RT #37573]
cause an assertion failure in mem.c. [RT #38979]
The server could crash if policy zones were updated (e.g.
rpz.c when further incremental updates were made to the
<a class="link" href="https://www.isc.org/downloads/software-support-policy/" target="_top">https://www.isc.org/downloads/software-support-policy/</a>