notes.html revision e285c11870c6263cd79b418e104c7eb3e2d96952
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - Permission to use, copy, modify, and/or distribute this software for any
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - purpose with or without fee is hereby granted, provided that the above
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen - copyright notice and this permission notice appear in all copies.
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen - PERFORMANCE OF THIS SOFTWARE.
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen<meta name="generator" content="DocBook XSL Stylesheets V1.78.1">
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="article"><div class="section">
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen<div class="titlepage"><div><div><h2 class="title" style="clear: both">
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen<a name="id-1.2"></a>Release Notes for BIND Version 9.11.0a1</h2></div></div></div>
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen<div class="titlepage"><div><div><h3 class="title">
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen<a name="relnotes_intro"></a>Introduction</h3></div></div></div>
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen BIND 9.11.0 is a new feature release of BIND, still under development.
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen This document summarizes new features and functional changes that
cfa8a04466cd46bdc422bd9eba8e6794758d677bTimo Sirainen have been introduced on this branch. With each development
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen release leading up to the final BIND 9.11.0 release, this document
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen will be updated with additional features added and bugs fixed.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen<div class="titlepage"><div><div><h3 class="title">
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen<a name="relnotes_download"></a>Download</h3></div></div></div>
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen The latest versions of BIND 9 software can always be found at
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen <a class="link" href="http://www.isc.org/downloads/" target="_top">http://www.isc.org/downloads/</a>.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen There you will find additional information about each release,
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen source code, and pre-compiled versions for Microsoft Windows
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen operating systems.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen<div class="titlepage"><div><div><h3 class="title">
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen<a name="relnotes_security"></a>Security Fixes</h3></div></div></div>
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; ">
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen Duplicate EDNS COOKIE options in a response could trigger
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen an assertion failure. This flaw is disclosed in CVE-2016-2088.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen Insufficient testing when parsing a message allowed
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen records with an incorrect class to be be accepted,
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen triggering a REQUIRE failure when those records
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen were subsequently cached. This flaw is disclosed
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen in CVE-2015-8000. [RT #40987]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen Incorrect reference counting could result in an INSIST
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen failure if a socket error occurred while performing a
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen lookup. This flaw is disclosed in CVE-2015-8461. [RT#40945]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen An incorrect boundary check in the OPENPGPKEY rdatatype
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen could trigger an assertion failure. This flaw is disclosed
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen in CVE-2015-5986. [RT #40286]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen A buffer accounting error could trigger an assertion failure
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen when parsing certain malformed DNSSEC keys.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen This flaw was discovered by Hanno B�ck of the Fuzzing
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen Project, and is disclosed in CVE-2015-5722. [RT #40212]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen A specially crafted query could trigger an assertion failure
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen This flaw was discovered by Jonathan Foote, and is disclosed
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen in CVE-2015-5477. [RT #40046]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen On servers configured to perform DNSSEC validation, an
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen assertion failure could be triggered on answers from
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen a specially configured server.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen This flaw was discovered by Breno Silveira Soares, and is
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen disclosed in CVE-2015-4620. [RT #39795]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen On servers configured to perform DNSSEC validation using
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen managed trust anchors (i.e., keys configured explicitly
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen via <span class="command"><strong>managed-keys</strong></span>, or implicitly
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen via <span class="command"><strong>dnssec-validation auto;</strong></span> or
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen <span class="command"><strong>dnssec-lookaside auto;</strong></span>), revoking
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen a trust anchor and sending a new untrusted replacement
947e4e68bbbfc584368b0e4febedbcc338650b88Timo Sirainen could cause <span class="command"><strong>named</strong></span> to crash with an
947e4e68bbbfc584368b0e4febedbcc338650b88Timo Sirainen assertion failure. This could occur in the event of a
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen botched key rollover, or potentially as a result of a
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen deliberate attack if the attacker was in position to
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen monitor the victim's DNS traffic.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen This flaw was discovered by Jan-Piet Mens, and is
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen disclosed in CVE-2015-1349. [RT #38344]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen A flaw in delegation handling could be exploited to put
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen <span class="command"><strong>named</strong></span> into an infinite loop, in which
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen each lookup of a name server triggered additional lookups
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen of more name servers. This has been addressed by placing
fe9fb910df7f6932b204184400c6321e5dee5b13Timo Sirainen limits on the number of levels of recursion
fe9fb910df7f6932b204184400c6321e5dee5b13Timo Sirainen <span class="command"><strong>named</strong></span> will allow (default 7), and
fe9fb910df7f6932b204184400c6321e5dee5b13Timo Sirainen on the number of queries that it will send before
fe9fb910df7f6932b204184400c6321e5dee5b13Timo Sirainen terminating a recursive query (default 50).
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen The recursion depth limit is configured via the
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen <code class="option">max-recursion-depth</code> option, and the query limit
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen via the <code class="option">max-recursion-queries</code> option.
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen The flaw was discovered by Florian Maury of ANSSI, and is
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen disclosed in CVE-2014-8500. [RT #37580]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen Two separate problems were identified in BIND's GeoIP code that
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen could lead to an assertion failure. One was triggered by use of
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen both IPv4 and IPv6 address families, the other by referencing
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen a GeoIP database in <code class="filename">named.conf</code> which was
947e4e68bbbfc584368b0e4febedbcc338650b88Timo Sirainen not installed. Both are covered by CVE-2014-8680. [RT #37672]
d9e404180ff26dbbaea68534a5f176765022b76bTimo Sirainen A less serious security flaw was also found in GeoIP: changes
the <span class="command"><strong>fstrm</strong></span> and <span class="command"><strong>protobuf-c</strong></span>
<a class="link" href="http://localhost:8888/xml/v3/traffic" target="_top">http://localhost:8888/xml/v3/traffic</a>
<a class="link" href="http://localhost:8888/json/v1/traffic" target="_top">http://localhost:8888/json/v1/traffic</a>.
<span class="command"><strong>rndc signing -serial <em class="replaceable"><code>number</code></em> <em class="replaceable"><code>zonename</code></em></strong></span>.
in order to persist across restarts of the <span class="command"><strong>named</strong></span> server.
<span class="command"><strong>dig +ttlunits</strong></span> causes <span class="command"><strong>dig</strong></span>
<span class="command"><strong>dig +dscp=<em class="replaceable"><code>value</code></em></strong></span>
<span class="command"><strong>named -L <em class="replaceable"><code>filename</code></em></strong></span>
causes <span class="command"><strong>named</strong></span> to send log messages to the specified file by
Updated the compiled in addresses for H.ROOT-SERVERS.NET.
When using native PKCS#11 cryptography (i.e.,
(e.g., when a zone file cannot be loaded) have been clarified
The SIT-related named.conf options have been marked as
Retrieving the local port range from net.ipv4.ip_local_port_range
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
<div class="itemizedlist"><ul class="itemizedlist" style="list-style-type: disc; "><li class="listitem"><p>
<a class="link" href="https://www.isc.org/downloads/software-support-policy/" target="_top">https://www.isc.org/downloads/software-support-policy/</a>