notes.html revision c42708dcc8ca18a41152251654d29f0cdd5b9533
d4ef65050feac78554addf6e16a06c6e2e0bd331Brian Wellington - Permission to use, copy, modify, and/or distribute this software for any
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - purpose with or without fee is hereby granted, provided that the above
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - copyright notice and this permission notice appear in all copies.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson - PERFORMANCE OF THIS SOFTWARE.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="article"><div class="section">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<span style="color: red"><title>Release Notes for BIND Version 9.11.0pre-alpha</title></span><div class="section">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<div class="titlepage"><div><div><h3 class="title">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<a name="relnotes_intro"></a>Introduction</h3></div></div></div>
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson This document summarizes changes since the last production release
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson of BIND on the corresponding major release branch.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<div class="titlepage"><div><div><h3 class="title">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<a name="relnotes_download"></a>Download</h3></div></div></div>
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson The latest versions of BIND 9 software can always be found at
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <a class="link" href="http://www.isc.org/downloads/" target="_top">http://www.isc.org/downloads/</a>.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson There you will find additional information about each release,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson source code, and pre-compiled versions for Microsoft Windows
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson operating systems.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<div class="titlepage"><div><div><h3 class="title">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<a name="relnotes_security"></a>Security Fixes</h3></div></div></div>
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Insufficient testing when parsing a message allowed
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson records with an incorrect class to be be accepted,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson triggering a REQUIRE failure when those records
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson were subsequently cached. This flaw is disclosed
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson in CVE-2015-8000. [RT #4098]
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson An incorrect boundary check in the OPENPGPKEY rdatatype
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson could trigger an assertion failure. This flaw is disclosed
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson in CVE-2015-5986. [RT #40286]
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson A buffer accounting error could trigger an assertion failure
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson when parsing certain malformed DNSSEC keys.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson This flaw was discovered by Hanno B�ck of the Fuzzing
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Project, and is disclosed in CVE-2015-5722. [RT #40212]
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson A specially crafted query could trigger an assertion failure
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson This flaw was discovered by Jonathan Foote, and is disclosed
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson in CVE-2015-5477. [RT #40046]
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson On servers configured to perform DNSSEC validation, an
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson assertion failure could be triggered on answers from
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson a specially configured server.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson This flaw was discovered by Breno Silveira Soares, and is
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson disclosed in CVE-2015-4620. [RT #39795]
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson On servers configured to perform DNSSEC validation using
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson managed trust anchors (i.e., keys configured explicitly
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson via <span class="command"><strong>managed-keys</strong></span>, or implicitly
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson via <span class="command"><strong>dnssec-validation auto;</strong></span> or
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <span class="command"><strong>dnssec-lookaside auto;</strong></span>), revoking
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson a trust anchor and sending a new untrusted replacement
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson could cause <span class="command"><strong>named</strong></span> to crash with an
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson assertion failure. This could occur in the event of a
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson botched key rollover, or potentially as a result of a
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson deliberate attack if the attacker was in position to
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson monitor the victim's DNS traffic.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson This flaw was discovered by Jan-Piet Mens, and is
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson disclosed in CVE-2015-1349. [RT #38344]
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson A flaw in delegation handling could be exploited to put
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <span class="command"><strong>named</strong></span> into an infinite loop, in which
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson each lookup of a name server triggered additional lookups
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson of more name servers. This has been addressed by placing
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson limits on the number of levels of recursion
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <span class="command"><strong>named</strong></span> will allow (default 7), and
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson on the number of queries that it will send before
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson terminating a recursive query (default 50).
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson The recursion depth limit is configured via the
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <code class="option">max-recursion-depth</code> option, and the query limit
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson via the <code class="option">max-recursion-queries</code> option.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson The flaw was discovered by Florian Maury of ANSSI, and is
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson disclosed in CVE-2014-8500. [RT #37580]
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Two separate problems were identified in BIND's GeoIP code that
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson could lead to an assertion failure. One was triggered by use of
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson both IPv4 and IPv6 address families, the other by referencing
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson a GeoIP database in <code class="filename">named.conf</code> which was
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson not installed. Both are covered by CVE-2014-8680. [RT #37672]
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson A less serious security flaw was also found in GeoIP: changes
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson to the <span class="command"><strong>geoip-directory</strong></span> option in
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson <code class="filename">named.conf</code> were ignored when running
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson <span class="command"><strong>rndc reconfig</strong></span>. In theory, this could allow
8eea877894ea5bcf5cdd9ca124a8601ad421d753Andreas Gustafsson <span class="command"><strong>named</strong></span> to allow access to unintended clients.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<div class="titlepage"><div><div><h3 class="title">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<a name="relnotes_features"></a>New Features</h3></div></div></div>
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Added support for DynDB, a new interface for loading zone data
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson from an external database, developed by Red Hat for the FreeIPA
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson project. (Thanks in particular to Adam Tkac and Petr
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Spacek of Red Hat for the contribution.)
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Unlike the existing DLZ and SDB interfaces, which provide a
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson limited subset of database functionality within BIND —
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson translating DNS queries into real-time database lookups with
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson relatively poor performance and with no ability to handle
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson DNSSEC-signed data — DynDB is able to fully implement
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson and extend the database API used natively by BIND.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson A DynDB module could pre-load data from an external data
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson source, then serve it with the same performance and
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson functionality as conventional BIND zones, and with the
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson ability to take advantage of database features not
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson available in BIND, such as multi-master replication.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson New quotas have been added to limit the queries that are
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson sent by recursive resolvers to authoritative servers
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson experiencing denial-of-service attacks. When configured,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson these options can both reduce the harm done to authoritative
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson servers and also avoid the resource exhaustion that can be
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson experienced by recursives when they are being used as a
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson vehicle for such an attack.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: circle; ">
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <code class="option">fetches-per-server</code> limits the number of
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson simultaneous queries that can be sent to any single
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson authoritative server. The configured value is a starting
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson point; it is automatically adjusted downward if the server is
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson partially or completely non-responsive. The algorithm used to
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson adjust the quota can be configured via the
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <code class="option">fetch-quota-params</code> option.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <code class="option">fetches-per-zone</code> limits the number of
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson simultaneous queries that can be sent for names within a
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson single domain. (Note: Unlike "fetches-per-server", this
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson value is not self-tuning.)
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Statistics counters have also been added to track the number
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson of queries affected by these quotas.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson Added support for <span class="command"><strong>dnstap</strong></span>, a fast,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson flexible method for capturing and logging DNS traffic,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson developed by Robert Edmonds at Farsight Security, Inc.,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson whose assistance is gratefully acknowledged.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson To enable <span class="command"><strong>dnstap</strong></span> at compile time,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson libraries must be available, and BIND must be configured with
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <code class="option">--enable-dnstap</code>.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson A new utility <span class="command"><strong>dnstap-read</strong></span> has been added
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson to allow <span class="command"><strong>dnstap</strong></span> data to be presented in
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson a human-readable format.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson For more information on <span class="command"><strong>dnstap</strong></span>, see
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <a class="link" href="http://dnstap.info" target="_top">http://dnstap.info</a>.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson New statistics counters have been added to track traffic
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson sizes, as specified in RSSAC002. Query and response
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson message sizes are broken up into ranges of histogram buckets:
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson TCP and UDP queries of size 0-15, 16-31, ..., 272-288, and 288+,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson and TCP and UDP responses of size 0-15, 16-31, ..., 4080-4095,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson and 4096+. These values can be accessed via the XML and JSON
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson statistics channels at, for example,
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <a class="link" href="http://localhost:8888/xml/v3/traffic" target="_top">http://localhost:8888/xml/v3/traffic</a>
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <a class="link" href="http://localhost:8888/json/v1/traffic" target="_top">http://localhost:8888/json/v1/traffic</a>.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson The serial number of a dynamically updatable zone can
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson now be set using
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <span class="command"><strong>rndc signing -serial <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>zonename</code></em></strong></span>.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson This is particularly useful with <code class="option">inline-signing</code>
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson zones that have been reset. Setting the serial number to a value
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson larger than that on the slaves will trigger an AXFR-style
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson When answering recursive queries, SERVFAIL responses can now be
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson cached by the server for a limited time; subsequent queries for
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson the same query name and type will return another SERVFAIL until
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson the cache times out. This reduces the frequency of retries
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson when a query is persistently failing, which can be a burden
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson on recursive serviers. The SERVFAIL cache timeout is controlled
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson by <code class="option">servfail-ttl</code>, which defaults to 1 second
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson and has an upper limit of 30.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson The new <span class="command"><strong>rndc nta</strong></span> command can now be used to
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson set a "negative trust anchor" (NTA), disabling DNSSEC validation for
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson a specific domain; this can be used when responses from a domain
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson are known to be failing validation due to administrative error
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson rather than because of a spoofing attack. NTAs are strictly
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson temporary; by default they expire after one hour, but can be
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson configured to last up to one week. The default NTA lifetime
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson can be changed by setting the <code class="option">nta-lifetime</code> in
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson <code class="filename">named.conf</code>. When added, NTAs are stored in a
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson file (<code class="filename"><em class="replaceable"><code>viewname</code></em>.nta</code>)
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson in order to persist across restarts of the <span class="command"><strong>named</strong></span> server.
ddccd5811feff696ba460dabfb666ce61040f545Andreas Gustafsson The EDNS Client Subnet (ECS) option is now supported for
<span class="command"><strong>dig +ttlunits</strong></span> causes <span class="command"><strong>dig</strong></span>
<span class="command"><strong>dig +dscp=<em class="replaceable"><code>value</code></em></strong></span>
<span class="command"><strong>named -L <em class="replaceable"><code>filename</code></em></strong></span>
causes <span class="command"><strong>named</strong></span> to send log messages to the specified file by
When using native PKCS#11 cryptography (i.e.,
(e.g., when a zone file cannot be loaded) have been clarified
If <span class="command"><strong>named</strong></span> is not configured to validate the answer then
The SIT-related named.conf options have been marked as
Retrieving the local port range from net.ipv4.ip_local_port_range
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
<span class="command"><strong>dig</strong></span>, <span class="command"><strong>host</strong></span> and
in zt.c. [RT #37573]
cause an assertion failure in mem.c. [RT #38979]
The server could crash if policy zones were updated (e.g.
rpz.c when further incremental updates were made to the
<a class="link" href="https://www.isc.org/downloads/software-support-policy/" target="_top">https://www.isc.org/downloads/software-support-policy/</a>