notes.html revision de283bda6a902c2102a795192eeab3a769001c7d
499b34cea04a46823d003d4c0520c8b03e8513cbBrian Wellington - Permission to use, copy, modify, and/or distribute this software for any
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington - purpose with or without fee is hereby granted, provided that the above
ec5347e2c775f027573ce5648b910361aa926c01Automatic Updater - copyright notice and this permission notice appear in all copies.
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews - PERFORMANCE OF THIS SOFTWARE.
dafcb997e390efa4423883dafd100c975c4095d6Mark Andrews<!-- $Id$ -->
d7201de09b85929a86b157f4b2d91667c68c6b52Automatic Updater<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="article" lang="en"><div class="sect1" lang="en">
29747dfe5e073a299b3681e01f5c55540f8bfed7Mark Andrews<div class="titlepage"><div><div><h2 class="title" style="clear: both">
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein<a name="id2542126"></a>Release Notes for BIND Version 9.11.0pre-alpha</h2></div></div></div>
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington<div class="titlepage"><div><div><h3 class="title">
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington<a name="relnotes_intro"></a>Introduction</h3></div></div></div>
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington This document summarizes changes since the last production release
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington of BIND on the corresponding major release branch.
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt<div class="titlepage"><div><div><h3 class="title">
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt<a name="relnotes_download"></a>Download</h3></div></div></div>
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt The latest versions of BIND 9 software can always be found at
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt <a href="http://www.isc.org/downloads/" target="_top">http://www.isc.org/downloads/</a>.
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt There you will find additional information about each release,
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington source code, and pre-compiled versions for Microsoft Windows
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt operating systems.
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington<div class="titlepage"><div><div><h3 class="title">
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington<a name="relnotes_security"></a>Security Fixes</h3></div></div></div>
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington On servers configured to perform DNSSEC validation using
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein managed trust anchors (i.e., keys configured explicitly
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein via <span><strong class="command">managed-keys</strong></span>, or implicitly
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington via <span><strong class="command">dnssec-validation auto;</strong></span> or
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington <span><strong class="command">dnssec-lookaside auto;</strong></span>), revoking
fb827ed6df9a473770fb69a75a455b4ad0d14f52Mark Andrews a trust anchor and sending a new untrusted replacement
fb827ed6df9a473770fb69a75a455b4ad0d14f52Mark Andrews could cause <span><strong class="command">named</strong></span> to crash with an
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington assertion failure. This could occur in the event of a
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington botched key rollover, or potentially as a result of a
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington deliberate attack if the attacker was in position to
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt monitor the victim's DNS traffic.
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington This flaw was discovered by Jan-Piet Mens, and is
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington disclosed in CVE-2015-1349. [RT #38344]
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt A flaw in delegation handling could be exploited to put
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington <span><strong class="command">named</strong></span> into an infinite loop, in which
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington each lookup of a name server triggered additional lookups
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein of more name servers. This has been addressed by placing
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein limits on the number of levels of recursion
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt <span><strong class="command">named</strong></span> will allow (default 7), and
67adc03ef81fb610f8df093b17f55275ee816754Evan Hunt on the number of queries that it will send before
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington terminating a recursive query (default 50).
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein The recursion depth limit is configured via the
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington <code class="option">max-recursion-depth</code> option, and the query limit
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington via the <code class="option">max-recursion-queries</code> option.
307d2084502eddc7ce921e5ce439aec3531d90e0Tatuya JINMEI 神明達哉 The flaw was discovered by Florian Maury of ANSSI, and is
307d2084502eddc7ce921e5ce439aec3531d90e0Tatuya JINMEI 神明達哉 disclosed in CVE-2014-8500. [RT #37580]
307d2084502eddc7ce921e5ce439aec3531d90e0Tatuya JINMEI 神明達哉 Two separate problems were identified in BIND's GeoIP code that
307d2084502eddc7ce921e5ce439aec3531d90e0Tatuya JINMEI 神明達哉 could lead to an assertion failure. One was triggered by use of
307d2084502eddc7ce921e5ce439aec3531d90e0Tatuya JINMEI 神明達哉 both IPv4 and IPv6 address families, the other by referencing
307d2084502eddc7ce921e5ce439aec3531d90e0Tatuya JINMEI 神明達哉 a GeoIP database in <code class="filename">named.conf</code> which was
307d2084502eddc7ce921e5ce439aec3531d90e0Tatuya JINMEI 神明達哉 not installed. Both are covered by CVE-2014-8680. [RT #37672]
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington A less serious security flaw was also found in GeoIP: changes
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington to the <span><strong class="command">geoip-directory</strong></span> option in
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein <code class="filename">named.conf</code> were ignored when running
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein <span><strong class="command">rndc reconfig</strong></span>. In theory, this could allow
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein <span><strong class="command">named</strong></span> to allow access to unintended clients.
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein<div class="titlepage"><div><div><h3 class="title">
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein<a name="relnotes_features"></a>New Features</h3></div></div></div>
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein The serial number of a dynamically updatable zone can
8a713ca49ddddb36e432d4717800f9258a5c2ea9Mark Andrews now be set using
8a713ca49ddddb36e432d4717800f9258a5c2ea9Mark Andrews <span><strong class="command">rndc signing -serial <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>zonename</code></em></strong></span>.
8a713ca49ddddb36e432d4717800f9258a5c2ea9Mark Andrews This is particularly useful with <code class="option">inline-signing</code>
8a713ca49ddddb36e432d4717800f9258a5c2ea9Mark Andrews zones that have been reset. Setting the serial number to a value
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein larger than that on the slaves will trigger an AXFR-style
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington When answering recursive queries, SERVFAIL responses can now be
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein cached by the server for a limited time; subsequent queries for
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein the same query name and type will return another SERVFAIL until
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein the cache times out. This reduces the frequency of retries
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein when a query is persistently failing, which can be a burden
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington on recursive serviers. The SERVFAIL cache timeout is controlled
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington by <code class="option">servfail-ttl</code>, which defaults to 10 seconds
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein and has an upper limit of 30.
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington The new <span><strong class="command">rndc nta</strong></span> command can now be used to
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington set a "negative trust anchor" (NTA), disabling DNSSEC validation for
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington a specific domain; this can be used when responses from a domain
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein are known to be failing validation due to administrative error
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington rather than because of a spoofing attack. NTAs are strictly
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington temporary; by default they expire after one hour, but can be
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington configured to last up to one week. The default NTA lifetime
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein can be changed by setting the <code class="option">nta-lifetime</code> in
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington <code class="filename">named.conf</code>. When added, NTAs are stored in a
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington file (<code class="filename"><em class="replaceable"><code>viewname</code></em>.nta</code>)
ab023a65562e62b85a824509d829b6fad87e00b1Rob Austein in order to persist across restarts of the named server.
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington The EDNS Client Subnet (ECS) option is now supported for
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington authoritative servers; if a query contains an ECS option then
30e6ea9dedbe0738f9729833b1b59042dbebc4dfBrian Wellington ACLs containing <code class="option">geoip</code> or <code class="option">ecs</code>
<span><strong class="command">dig +ttlunits</strong></span> causes <span><strong class="command">dig</strong></span>
<span><strong class="command">dig +dscp=<em class="replaceable"><code>value</code></em></strong></span>
<span><strong class="command">named -L <em class="replaceable"><code>filename</code></em></strong></span>
When using native PKCS#11 cryptography (i.e.,
(e.g., when a zone file cannot be loaded) have been clarified
<span><strong class="command">dig</strong></span>, <span><strong class="command">host</strong></span> and
<a href="https://www.isc.org/downloads/software-support-policy/" target="_top">https://www.isc.org/downloads/software-support-policy/</a>