aboutsummaryrefslogtreecommitdiffstats
path: root/dns/bind96/distinfo
Commit message (Expand)AuthorAgeFilesLines
* Update to 9.6-ESV-R8erwin2012-10-191-4/+4
* Upgrade to the latest BIND patch level:erwin2012-10-101-4/+4
* Upgrade to the latest BIND patch level:dougb2012-09-191-4/+4
* Heavy DNSSEC Validation Load Can Cause a "Bad Cache" Assertion Failuredougb2012-07-251-4/+4
* Upgrade to 9.6-ESV-R7-P1, 9.7.6-P1, 9.8.3-P1, and 9.9.1-P1, the latestdougb2012-06-051-4/+4
* Upgrade to BIND versions 9.9.1, 9.8.3, 9.7.6, and 9.6-ESV-R7,dougb2012-05-231-4/+4
* Update to version 9.6-ESV-R6, the latest from ISC, which contains numerous bu...dougb2012-04-051-4/+4
* Upgrade to the latest security patch releases to address thedougb2011-11-171-4/+4
* Update to version 9.6-ESV-R5 which contains various bug fixesdougb2011-08-021-4/+4
* Update to versions 9.7.3-P3, and 9.6-ESV-R4-P3.dougb2011-07-061-4/+4
* Upgrade to 9.6-ESV-R4-P1 and 9.7.3-P1, which address the following issues:dougb2011-05-281-4/+4
* Update to BIND 9.6.3, the latest from ISC on the 9.6 branch.dougb2011-02-051-4/+4
* Update to version 9.6-ESV-R3, the latest from ISC, which addressesdougb2010-12-041-4/+4
* Update to 9.6-ESV-R2, the latest from ISC.dougb2010-10-311-6/+4
* Update to the latest patch set from ISC, which addresses the following:dougb2010-05-201-6/+6
* Update to the latest patchfix releases to deal with the problemsdougb2010-03-171-6/+6
* Upgrade to version 9.6.2. This version includes all previously releaseddougb2010-03-021-6/+6
* Upgrade to BIND 9.4.3-P5, 9.5.2-P2, and 9.6.1-P3. These versions addressdougb2010-01-251-6/+6
* Update to the latest patchlevels for BINDs 9.[456]. The vulnerabilitydougb2009-11-301-6/+6
* Update the hashes of the PGP signature files for the new releases.dougb2009-07-301-2/+2
* Update to patched versions which address a remote DoS vulnerability:dougb2009-07-291-6/+6
* Update to version 9.6.1, the latest from ISC. This version containsdougb2009-06-191-6/+6
* Update to the -P1 versions of the current BIND ports which containdougb2009-01-081-6/+6
* Update after repo-copy for BIND 9.6.0dougb2009-01-041-6/+6
* Upgrade to version 9.5.1 which includes numerous bug fixes and performancedougb2008-12-301-6/+6
* All -P2 versions now have PGP signatures with ISC's standarddougb2008-08-091-3/+3
* Update to patchlevel 2 for all versions:dougb2008-08-021-6/+6
* Upgrade to the -P1 versions of each port, which add stronger randomizationdougb2008-07-101-6/+6
* Update for 9.5.0dougb2008-07-031-6/+6
* Update to BIND 9.4.2. Many bugs are fixed, please see the CHANGESdougb2007-12-021-6/+6
* Update to 9.4.1-P1, which has fixes for the following:dougb2007-07-251-6/+6
* Update to version 9.4.1, a security update from ISC:dougb2007-05-011-6/+6
* Update to the release version of 9.4.0.dougb2007-02-261-6/+6
* Complete the update for bind94 after the repocopy, and hook it up.dougb2007-01-291-6/+6
* Upgrade to version 9.3.4, the latest from ISC, which addresses thedougb2007-01-251-6/+6
* Upgrade to version 9.3.3, the latest from ISC. This isdougb2006-12-101-6/+6
* Update to version 9.3.2-P2, which addresses the vulnerabilitydougb2006-11-031-6/+6
* Upgrade to version 9.3.2-P1, which addresses the following securitydougb2006-09-071-6/+6
* Update to 9.3.2, the latest from ISCdougb2005-12-281-6/+6
* Add SHA256 checksums to my portsdougb2005-11-241-0/+2
* Upgrade to 9.3.1, the latest version from ISC. This version containsdougb2005-03-131-8/+4
* Include a patch from ISC to deal with the following vulnerability:dougb2005-01-291-0/+4
* Update to BIND 9.3.0, the latest from ISC. This version has severaldougb2004-09-241-2/+4
* Now that the SIZE thing has stabilized, add it to the ports I maintain.dougb2004-03-141-0/+1
* Upgrade to the 9.2.3 release versiondougb2003-10-251-1/+1
* Upgrade to version 9.2.3rc4.dougb2003-09-251-1/+1
* * Update to version 9.2.2, the latest from ISC. This version contains nodougb2003-03-041-1/+1
* Upgrade to 9.2.2rc1. This version has been available for several months, anddougb2003-01-261-1/+1
* Update to the latest release versiondougb2002-05-221-1/+1
* Upgrade to 9.2.1rc2, the latest from ISC. Numerous bugs were fixed,dougb2002-04-081-1/+1
* Upgrade to the latest release candidate, 9.2.1rc1. Numerous 9.x bugsdougb2002-03-171-1/+1
* Update port version to ISC's latest stable releasedougb2001-07-251-1/+1
* Upgrade to 9.1.3rc1, whose most significant change is a fix fordougb2001-05-281-1/+1
* Upgrade to BIND 9.1.2-Release. There is no newe functionality, butdougb2001-05-091-1/+1
* Update to the actual release version of 9.1.1. If you're usingdougb2001-04-031-1/+1
* Latest bug fixes, FOR GREAT JUSTICE !!dougb2001-03-271-1/+1
* Latest bug fixes and documentation updates.dougb2001-03-231-1/+1
* Latest bug fixes, no features added.dougb2001-03-191-1/+1
* Upgrade to ISC's latest. No new features, but a few useful bug fixes.dougb2001-03-111-1/+1
* Update to ISC's latestdougb2001-02-271-1/+1
* Latest update from ISC. Truly just bugfixes.dougb2001-02-131-1/+1
* Update to ISC's bug fix release. For those who wish to (or need to)dougb2001-02-081-1/+1
* Update to 9.1.0; replace Makefile.in patch with perl regex.will2001-01-211-1/+1
* Update to 9.0.1dougb2000-11-201-1/+1
* Update to BIND version 9.0.0, now with better DNSSEC support among lotswill2000-10-291-0/+1
* Temporarily remove bind9, it is a repo-copy from bind8 not updated.asami2000-10-221-2/+0
* Upgrade to 8.2.2 patch 5jseger1999-11-151-3/+2
* Upgrade to bind-8.2.2.p3 + patch4. Fixes some security issues.jseger1999-11-121-2/+3
* Upgrade to bind 8.2.1jseger1999-08-091-3/+2
* Bring back bind8, even -CURRENT only has 8.1.2, this port is more up-to-date.billf1999-06-291-0/+3
* Nuke bind8, it's been in the base system for a while now.jseger1999-06-261-3/+0
* Use latest patches from ISC.jseger1999-06-011-0/+1
* Upgrade to bind 8.2jseger1999-04-041-2/+2
* Upgrade to version 8.1.2.jseger1998-05-211-2/+2
* Import of bind 8.1.1 port.jseger1997-11-261-0/+2