notes.xml revision 9716b6a5d61995a2f7d4af6489bd49baea4f8b69
1336066b632d14017167c052fae5eb4df64726deDanny Mayer - Copyright (C) 2014, 2015 Internet Systems Consortium, Inc. ("ISC")
1336066b632d14017167c052fae5eb4df64726deDanny Mayer - Permission to use, copy, modify, and/or distribute this software for any
5a61d4774900ea2c14b71b90c9a705a3f08234beMark Andrews - purpose with or without fee is hereby granted, provided that the above
78f79084fcfc40f1237c99e2d4325b24b750d012Evan Hunt - copyright notice and this permission notice appear in all copies.
b4eaa17e82f439a0b70b1b7079d1592564d9f621Mark Andrews - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
b4eaa17e82f439a0b70b1b7079d1592564d9f621Mark Andrews - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
57137377ef87e8b8fba681e8d43f23b552749289Evan Hunt - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews - PERFORMANCE OF THIS SOFTWARE.
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews<sect1 xmlns:xi="http://www.w3.org/2001/XInclude">
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews This document summarizes changes since the last production release
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews of BIND on the corresponding major release branch.
5a61d4774900ea2c14b71b90c9a705a3f08234beMark Andrews The latest versions of BIND 9 software can always be found at
57137377ef87e8b8fba681e8d43f23b552749289Evan Hunt There you will find additional information about each release,
1336066b632d14017167c052fae5eb4df64726deDanny Mayer source code, and pre-compiled versions for Microsoft Windows
1336066b632d14017167c052fae5eb4df64726deDanny Mayer operating systems.
c4baee15c812926cd83ee8b88a86e12d80b1c395Francis Dupont <itemizedlist>
1336066b632d14017167c052fae5eb4df64726deDanny Mayer An incorrect boundary check in the OPENPGPKEY rdatatype
1336066b632d14017167c052fae5eb4df64726deDanny Mayer could trigger an assertion failure. [RT #40286]
1336066b632d14017167c052fae5eb4df64726deDanny Mayer A buffer accounting error could trigger an assertion failure
c4baee15c812926cd83ee8b88a86e12d80b1c395Francis Dupont when parsing certain malformed DNSSEC keys.
5a61d4774900ea2c14b71b90c9a705a3f08234beMark Andrews This flaw was discovered by Hanno Boeck of the Fuzzing
c4baee15c812926cd83ee8b88a86e12d80b1c395Francis Dupont Project, and is disclosed in CVE-2015-5722. [RT #40212]
5a61d4774900ea2c14b71b90c9a705a3f08234beMark Andrews A specially crafted query could trigger an assertion failure
5a61d4774900ea2c14b71b90c9a705a3f08234beMark Andrews This flaw was discovered by Jonathan Foote, and is disclosed
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews in CVE-2015-5477. [RT #39795]
9e5390f3f335404dd425cc6df07158cf9ec8425dMark Andrews On servers configured to perform DNSSEC validation, an
94694e720a911a38b01ff5036c01d883b3c9cbb1Evan Hunt assertion failure could be triggered on answers from
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews a specially configured server.
1479200aa05414b2acf33607dbd1682c16f58c51Evan Hunt This flaw was discovered by Breno Silveira Soares, and is
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews disclosed in CVE-2015-4620. [RT #39795]
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews On servers configured to perform DNSSEC validation using
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews managed trust anchors (i.e., keys configured explicitly
c4baee15c812926cd83ee8b88a86e12d80b1c395Francis Dupont via <command>managed-keys</command>, or implicitly
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews via <command>dnssec-validation auto;</command> or
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews <command>dnssec-lookaside auto;</command>), revoking
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews a trust anchor and sending a new untrusted replacement
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews could cause <command>named</command> to crash with an
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews assertion failure. This could occur in the event of a
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews botched key rollover, or potentially as a result of a
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews deliberate attack if the attacker was in position to
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews monitor the victim's DNS traffic.
7641867b4c39914cdcd3711ba0c89ed9c49f3c83Francis Dupont This flaw was discovered by Jan-Piet Mens, and is
5a61d4774900ea2c14b71b90c9a705a3f08234beMark Andrews disclosed in CVE-2015-1349. [RT #38344]
5a61d4774900ea2c14b71b90c9a705a3f08234beMark Andrews A flaw in delegation handling could be exploited to put
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews <command>named</command> into an infinite loop, in which
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews each lookup of a name server triggered additional lookups
9edd523c2295757f1e1c5e93ea369cae892f0754Evan Hunt of more name servers. This has been addressed by placing
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews limits on the number of levels of recursion
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews <command>named</command> will allow (default 7), and
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews on the number of queries that it will send before
57137377ef87e8b8fba681e8d43f23b552749289Evan Hunt terminating a recursive query (default 50).
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews The recursion depth limit is configured via the
57137377ef87e8b8fba681e8d43f23b552749289Evan Hunt <option>max-recursion-depth</option> option, and the query limit
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews via the <option>max-recursion-queries</option> option.
c4baee15c812926cd83ee8b88a86e12d80b1c395Francis Dupont The flaw was discovered by Florian Maury of ANSSI, and is
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews disclosed in CVE-2014-8500. [RT #37580]
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews Two separate problems were identified in BIND's GeoIP code that
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews could lead to an assertion failure. One was triggered by use of
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews both IPv4 and IPv6 address families, the other by referencing
7799a5edea56085d5683025c763030e4ce835d1cMark Andrews a GeoIP database in <filename>named.conf</filename> which was
57137377ef87e8b8fba681e8d43f23b552749289Evan Hunt not installed. Both are covered by CVE-2014-8680. [RT #37672]
1336066b632d14017167c052fae5eb4df64726deDanny Mayer A less serious security flaw was also found in GeoIP: changes
1336066b632d14017167c052fae5eb4df64726deDanny Mayer to the <command>geoip-directory</command> option in
1336066b632d14017167c052fae5eb4df64726deDanny Mayer <filename>named.conf</filename> were ignored when running
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews <command>rndc reconfig</command>. In theory, this could allow
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews <command>named</command> to allow access to unintended clients.
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews </itemizedlist>
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews <itemizedlist>
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews New quotas have been added to limit the queries that are
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews sent by recursive resolvers to authoritative servers
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews experiencing denial-of-service attacks. When configured,
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews these options can both reduce the harm done to authoritative
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews servers and also avoid the resource exhaustion that can be
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews experienced by recursives when they are being used as a
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews vehicle for such an attack.
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews <itemizedlist>
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews <option>fetches-per-server</option> limits the number of
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews simultaneous queries that can be sent to any single
1336066b632d14017167c052fae5eb4df64726deDanny Mayer authoritative server. The configured value is a starting
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews point; it is automatically adjusted downward if the server is
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews partially or completely non-responsive. The algorithm used to
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews adjust the quota can be configured via the
e51ba2650025460b26092fb2500e0b6dfbf6d548Mark Andrews <option>fetches-per-zone</option> limits the number of
<command>rndc signing -serial <replaceable>number</replaceable> <replaceable>zonename</replaceable></command>.
When using native PKCS#11 cryptography (i.e.,
(e.g., when a zone file cannot be loaded) have been clarified
The SIT-related named.conf options have been marked as
Retrieving the local port range from net.ipv4.ip_local_port_range
in zt.c. [RT #37573]
cause an assertion failure in mem.c. [RT #38979]
The server could crash if policy zones were updated (e.g.
rpz.c when further incremental updates were made to the