aboutsummaryrefslogtreecommitdiff
path: root/contrib/bind9/lib/lwres/man/lwres_hstrerror.html
Commit message (Collapse)AuthorAgeFilesLines
* Remove BIND.Dag-Erling Smørgrav2013-09-301-104/+0
| | | | | | | Approved by: re (gjb) Notes: svn path=/head/; revision=255949
* Update Bind to 9.9.3-P2Erwin Lansing2013-08-221-4/+4
|\ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Notable new features: * Elliptic Curve Digital Signature Algorithm keys and signatures in DNSSEC are now supported per RFC 6605. [RT #21918] * Introduces a new tool "dnssec-verify" that validates a signed zone, checking for the correctness of signatures and NSEC/NSEC3 chains. [RT #23673] * BIND now recognizes the TLSA resource record type, created to support IETF DANE (DNS-based Authentication of Named Entities) [RT #28989] * The new "inline-signing" option, in combination with the "auto-dnssec" option that was introduced in BIND 9.7, allows named to sign zones completely transparently. Approved by: delphij (mentor) MFC after: 3 days Sponsored by: DK Hostmaster A/S Notes: svn path=/head/; revision=254651
* | Update to version 9.8.2, the latest from ISC, which contains numerous bug fixes.Doug Barton2012-04-051-5/+5
|\| | | | | | | Notes: svn path=/head/; revision=233914
* | Upgrade to BIND version 9.8.1. Release notes at:Doug Barton2011-09-031-5/+5
|\| | | | | | | | | | | | | | | | | | | | | https://deepthought.isc.org/article/AA-00446/81/ or /usr/src/contrib/bind9/ Approved by: re (kib) Notes: svn path=/head/; revision=225361
* | Upgrade to version 9.8.0-P4Doug Barton2011-07-161-5/+5
|\| | | | | | | | | | | | | | | This version has many new features, see /usr/share/doc/bind9/README for details. Notes: svn path=/head/; revision=224092
* | Update to BIND 9.6.3, the latest from ISC on the 9.6 branch.Doug Barton2011-02-061-5/+5
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | All 9.6 users with DNSSEC validation enabled should upgrade to this version, or the latest version in the 9.7 branch, prior to 2011-03-31 in order to avoid validation failures for names in .COM as described here: https://www.isc.org/announcement/bind-9-dnssec-validation-fails-new-ds-record In addition the fixes for this and other bugs, there are also the following: * Various fixes to kerberos support, including GSS-TSIG * Various fixes to avoid leaking memory, and to problems that could prevent a clean shutdown of named Notes: svn path=/head/; revision=218384
* | Update to 9.6-ESV-R2, the latest from ISC.Doug Barton2010-10-311-1/+1
|\| | | | | | | | | | | | | | | | | This version contains bug fixes that are relevant to any caching/resolving name server; as well as DNSSEC-related fixes. Notes: svn path=/head/; revision=214586
* | Update to 9.6.2-P1, the latest patchfix release which deals withDoug Barton2010-03-181-5/+5
|\| | | | | | | | | | | | | | | | | | | | | the problems related to the handling of broken DNSSEC trust chains. This fix is only relevant for those who have DNSSEC validation enabled and configure trust anchors from third parties, either manually, or through a system like DLV. Notes: svn path=/head/; revision=205292
* | Upgrade to version 9.6.2. This version includes all previously releasedDoug Barton2010-03-031-6/+6
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | security patches to the 9.6.1 version, as well as many other bug fixes. This version also incorporates a different fix for the problem we had patched in contrib/bind9/bin/dig/dighost.c, so that file is now back to being the same as the vendor version. Due to the fact that the DNSSEC algorithm that will be used to sign the root zone is only included in this version and in 9.7.x those who wish to do validation MUST upgrade to one of these prior to July 2010. Notes: svn path=/head/; revision=204619
* | Upgrade to BIND 9.6.1-P3.Doug Barton2010-01-251-5/+5
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | This version address the following vulnerabilities: BIND 9 Cache Update from Additional Section https://www.isc.org/advisories/CVE-2009-4022v6 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022 A nameserver with DNSSEC validation enabled may incorrectly add unauthenticated records to its cache that are received during the resolution of a recursive client query BIND 9 DNSSEC validation code could cause bogus NXDOMAIN responses https://www.isc.org/advisories/CVE-2010-0097 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0097 There was an error in the DNSSEC NSEC/NSEC3 validation code that could cause bogus NXDOMAIN responses (that is, NXDOMAIN responses for records proven by NSEC or NSEC3 to exist) to be cached as if they had validated correctly These issues only affect systems with DNSSEC validation enabled. Notes: svn path=/head/; revision=202961
* | Update BIND to version 9.6.1rc1. This version has better performance andDoug Barton2009-05-311-1/+1
|\| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | lots of new features compared to 9.4.x, including: Full NSEC3 support Automatic zone re-signing New update-policy methods tcp-self and 6to4-self DHCID support. More detailed statistics counters including those supported in BIND 8. Faster ACL processing. Efficient LRU cache-cleaning mechanism. NSID support. Notes: svn path=/head/; revision=193149
| * Flatten bind9 vendor work areaPeter Wemm2008-07-121-104/+0
|/ | | | Notes: svn path=/vendor/bind9/dist/; revision=180456
* Vendor import of BIND 9.4.1Doug Barton2007-06-021-48/+52
| | | | Notes: svn path=/vendor/bind9/dist/; revision=170222
* Vendor import of BIND 9.3.3Doug Barton2006-12-101-6/+6
| | | | Notes: svn path=/vendor/bind9/dist/; revision=165071
* Vendor import of BIND 9.3.2Doug Barton2005-12-291-226/+85
| | | | Notes: svn path=/vendor/bind9/dist/; revision=153816
* Vender import of BIND 9.3.0rc4.Tom Rhodes2004-09-191-0/+241
Notes: svn path=/vendor/bind9/dist/; revision=135446