aboutsummaryrefslogtreecommitdiffstats
path: root/dns
Commit message (Collapse)AuthorAgeFilesLines
* Assign to new volunteer.linimon2011-08-031-1/+1
| | | | | PR: ports/159394 Submitted by: ports@eitanadler.com
* - Update to 0.07culot2011-08-032-3/+6
| | | | | | - Add LICENSE (Artistic 1 & GPLv1) Changes: http://search.cpan.org/dist/Net-DNS-Lite/Changes
* Deprecate some ports where I can't find distfiles and upstreambapt2011-08-031-0/+3
|
* Mark BROKEN: Does not fetchbapt2011-08-021-0/+2
|
* Update to version 9.7.4 which contains various bug fixes and improvements:dougb2011-08-023-7/+13
| | | | ftp://ftp.isc.org/isc/bind9/9.7.4/RELEASE-NOTES-BIND-9.7.4.html
* Remove patch incorporated into version 9.7.4dougb2011-08-021-14/+0
|
* Update to version 9.6-ESV-R5 which contains various bug fixesdougb2011-08-023-7/+13
| | | | | | and improvements: ftp://ftp.isc.org/isc/bind9/9.6-ESV-R5/RELEASE-NOTES-BIND-9.6-ESV.html
* Remove patch incorporated into version 9.6-ESV-R5dougb2011-08-021-14/+0
|
* Update to 1.8.1 [1]zi2011-07-294-41/+18
| | | | | | | | Add LICENSE PR: ports/159199 Submitted by: Rob Farmer <rfarmer@predatorlabs.net> (maintainer) [1] Approved by: tabthorpe (mentor)
* Removed dns/dhid -- expired 25/Julycrees2011-07-2812-347/+0
| | | | 2011-07-25 dns/dhid: Unmaintained, distfile has changed with no explanation
* Now that the Java 1.3 and Java 1.4 ports are deprecated and will expire soon,linimon2011-07-211-1/+1
| | | | | | | | | | | | | | | | remove support for them from bsd.java.mk. As Jikes is not available in Java 1.5 or higher, remove it from bsd.java.mk too (suggested by hq@) and from the ports which used it (only occurences were USE_JIKES=no). Support for the Blackdown VM is also removed, as it is not available in Java 1.5 and higher. Also remove the mapping from Java 1.1-1.4 to Java 1.5+ in bsd.java.mk to detect old, broken ports; therefore bump the minimal value of JAVA_VERSION to 1.5. While here, replace static values of JAVA_VERSION in files/*.in by %%JAVA_VERSION%% . PR: ports/158969 Submitted by: rene Tested on: pointyhat-west -exp
* - Use USERS and GROUPScrees2011-07-205-45/+23
| | | | | | | | - Stop clobbering config files on deinstall PR: ports/157854 Submitted by: Leo Vandewoestijne <freebsd@dns-lab.com> Approved by: rene (mentor, implicit), maintainer timeout (14 days)
* Fix the location of the default pid file in named.8dougb2011-07-173-0/+3
| | | | | | | Problem pointed out in the PR PR: conf/155006 Submitted by: Helmut Schneider <jumper99@gmx.de>
* Mark as broken on sparc64: does not compile.linimon2011-07-161-0/+4
|
* Update my email address on the ports I maintain.zi2011-07-162-2/+2
| | | | Approved by: wxs@ (mentor)
* Update to 1.3.0jlaffaye2011-07-164-8/+75
| | | | | | PR: ports/158865 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) Approved by: bapt (mentor)
* - Update to 1.4.12 (a bugfix release)sem2011-07-153-5/+18
| | | | | - Disable GOST by default - Depend on dns/ldns
* Update to 1.22jlaffaye2011-07-112-3/+3
| | | | | | PR: ports/158785 Submitted by: Hung-Yi Chen <gaod@hychen.org> (maintainer) Approved by: bapt (mentor, implicit)
* Pass maintainership to submittercrees2011-07-101-1/+1
| | | | | PR: ports/156029 Approved by: rene (mentor, implicit), maintainer (linimon, in PR close message)
* Update to 2.3.5. Changes:linimon2011-07-104-17/+29
| | | | | | | | | | | | | - Add SPF support - Added rotation of name servers - SF Patch ID: 2795929. - Address sourceforge patch requests 2981978, 2795932 to add revlookupall and raise DNSError instead of IndexError on server fail. - Use blocking IO with timeout for TCP replies. - Don't try to close socket when never opened. - Clarify CNRI (academic-style) license. PR: ports/156029 Submited by: Ruslan Mahmatkhanov <cvs-src@yandex.ru>
* Use USERScrees2011-07-102-22/+2
| | | | | | PR: ports/157597 Submitted by: crees (me) Reviewed by: rene (mentor, implicit), maintainer timeout (sem, 34 days)
* Update to versions 9.8.0-P4, 9.7.3-P3, and 9.6-ESV-R4-P3.dougb2011-07-063-24/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | ALL BIND USERS ENCOURAGED TO UPGRADE IMMEDIATELY This update addresses the following vulnerabilities: CVE-2011-2464 ============= Severity: High Exploitable: Remotely Description: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464 https://www.isc.org/software/bind/advisories/cve-2011-2464 CVE-2011-2465 ============= Severity: High Exploitable: Remotely Description: A defect in the affected versions of BIND could cause the "named" process to exit when queried, if the server has recursion enabled and was configured with an RPZ zone containing certain types of records. Specifically, these are any DNAME record and certain kinds of CNAME records. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2465 https://www.isc.org/software/bind/advisories/cve-2011-2465 Additional changes in this version: * If named is configured to be both authoritative and resursive and receives a recursive query for a CNAME in a zone that it is authoritative for, if that CNAME also points to a zone the server is authoritative for, the recursive part of name will not follow the CNAME change and the response will not be a complete CNAME chain. [RT #24455] Thus the patch for this bug has been removed from the port * Using Response Policy Zone (RPZ) to query a wildcard CNAME label with QUERY type SIG/RRSIG, it can cause named to crash. Fix is query type independant. [RT #24715] [CVE-2011-1907]
* Update to versions 9.7.3-P3, and 9.6-ESV-R4-P3.dougb2011-07-064-12/+12
| | | | | | | | | | | | | | | | | | | | | | ALL BIND USERS ARE ENCOURAGED TO UPGRADE IMMEDIATELY This update addresses the following vulnerability: CVE-2011-2464 ============= Severity: High Exploitable: Remotely Description: A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464 https://www.isc.org/software/bind/advisories/cve-2011-2464
* - Use USERS and GROUPScrees2011-07-052-34/+2
| | | | | PR: ports/157601 Approved by: rene (mentor, implicit)
* - Use USERS and GROUPScrees2011-07-033-57/+2
| | | | | | PR: ports/157587 Submitted by: Chris Rees <utisoft@gmail.com> Approved by: rene (mentor)
* - Update to 1.4.11sem2011-07-012-3/+3
|
* Fix clang build, using REINPLACE_CMD to change gcc to ${CC}.mandree2011-07-013-1/+23
| | | | | Add missing #include <string.h> in dns.c (adds files/patch-dns.c) Fix obvious format string error in html.c (adds files/patch-html.c)
* - Use USERS and GROUPScrees2011-06-282-34/+3
| | | | | | PR: ports/157578 Submitted by: Chris Rees (utisoft@gmail.com) Approved by: tabthorpe (co-mentor)
* - Update to 0.111300sunpoet2011-06-262-5/+3
| | | | | | | Changes: http://search.cpan.org/dist/Net-Amazon-Route53/Changes PR: ports/158288 Submitted by: Jin-Sih Lin <linpct@gmail.com> Approved by: Jui-Nan Lin <jnlin@csie.nctu.edu.tw> (maintainer)
* - Deprecate; Unmaintained, distfile has changed with no explanation, uses pw ↵crees2011-06-261-0/+3
| | | | | | | | | directly Expires in one month PR: ports/157603 Approved by: rene (mentor)
* - Cannoicalize the WWW: [again],pgollucci2011-06-241-1/+1
| | | | - Save redirects s/http/https/ for github
* Fix build with clang.nox2011-06-231-4/+22
| | | | | PR: ports/158180 Submitted by: Niclas Zeising <niclas.zeising@gmail.com>
* - Update to 20110502.wxs2011-06-222-3/+5
| | | | | | | | - Add LICENSE. PR: ports/157675 Submitted by: Ryan Steinmetz <rpsfa@rit.edu> Approved by: maintainer timeout
* - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.az2011-06-213-3/+6
| | | | | | | See http://wiki.freebsd.org/Perl for details. - Change maintainership from ports@ to perl@ for ports in this changeset. - Remove MD5 checksum - Utilize CPAN macro
* - Replace ../../authors in MASTER_SITE_SUBDIR with CPAN:CPANID macro.az2011-06-201-1/+1
| | | | | | See http://wiki.freebsd.org/Perl for details. - Change maintainership from ports@ to perl@ for ports in this changeset. - Remove MD5 checksum
* Net::DNS is a pure Ruby DNS library, with a cleanswills2011-06-204-0/+28
| | | | | | | | | OO interface and an extensible API WWW: http://rubygems.org/gems/net-dns PR: ports/158012 Submitted by: rpsfa at rit.edu
* Update to 1.2.1ehaupt2011-06-182-3/+3
|
* ftp master site no more availablebapt2011-06-161-2/+1
|
* Update my e-mail to my FreeBSD one.jlaffaye2011-06-091-1/+1
| | | | | | While I am here, use GOOGLE_CODE instead of ${MASTER_SITE_GOOGLE_CODE} Approved by: bapt (mentor)
* - Update to 1.01swills2011-06-052-3/+4
| | | | | | - Add build depend to silence build warning Changes: http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
* Net::DNS::Check is a collection of OOP Perl modules allowing easyculot2011-06-015-0/+81
| | | | | | | | | implementation of applications for domain name checking. WWW: http://search.cpan.org/dist/Net-DNS-Check/ PR: ports/157445 Submitted by: Ryan Steinmetz <rpsfa@rit.edu>
* - Update to 1.6.10wen2011-06-013-4/+6
| | | | | PR: ports/157478 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* BIND 9.4.x is now EOLdougb2011-06-019-579/+0
|
* Fix PKGVERSION for 9.7.3-P1dougb2011-05-281-1/+1
| | | | Submitted by: Craig Leres <leres@ee.lbl.gov>
* Upgrade to 9.8.0-P2, which addresses the following issues:dougb2011-05-284-6/+38
| | | | | | | | | | | | | | | | | | | | 1. Very large RRSIG RRsets included in a negative cache can trigger an assertion failure that will crash named (BIND 9 DNS) due to an off-by-one error in a buffer size check. This bug affects all resolving name servers, whether DNSSEC validation is enabled or not, on all BIND versions prior to today. There is a possibility of malicious exploitation of this bug by remote users. 2. Named could fail to validate zones listed in a DLV that validated insecure without using DLV and had DS records in the parent zone. Add a patch provided by ru@ and confirmed by ISC to fix a crash at shutdown time when a SIG(0) key is being used. Add a patch from ISC that will be in 9.8.1 to handle intermittent failure of recursive queries involving CNAMEs and previously cached responses.
* Upgrade to 9.6-ESV-R4-P1 and 9.7.3-P1, which address the following issues:dougb2011-05-286-11/+39
| | | | | | | | | | | | | | | | 1. Very large RRSIG RRsets included in a negative cache can trigger an assertion failure that will crash named (BIND 9 DNS) due to an off-by-one error in a buffer size check. This bug affects all resolving name servers, whether DNSSEC validation is enabled or not, on all BIND versions prior to today. There is a possibility of malicious exploitation of this bug by remote users. 2. Named could fail to validate zones listed in a DLV that validated insecure without using DLV and had DS records in the parent zone. Add a patch provided by ru@ and confirmed by ISC to fix a crash at shutdown time when a SIG(0) key is being used.
* Upgrade to 9.4-ESV-R4-P1, which addresses the following issues:dougb2011-05-282-6/+6
| | | | | | | | | | | | | 1. Very large RRSIG RRsets included in a negative cache can trigger an assertion failure that will crash named (BIND 9 DNS) due to an off-by-one error in a buffer size check. This bug affects all resolving name servers, whether DNSSEC validation is enabled or not, on all BIND versions prior to today. There is a possibility of malicious exploitation of this bug by remote users. 2. Named could fail to validate zones listed in a DLV that validated insecure without using DLV and had DS records in the parent zone.
* - Update to 1.4.10sem2011-05-252-3/+3
| | | | * CVE-2011-1922 VU#531342 fixed
* - Add licensesylvio2011-05-211-0/+2
|
* Miscellaneous cleanups and fixes, some of the windowmaker stuffdougb2011-05-169-9/+9
| | | | gracefully provided by danfe.
* adsuck is a DNS relay that returns NXdomain for hosts that match names in abapt2011-05-0710-0/+140
| | | | | | | | | blacklist for quick and non browser plugin based ad blocking. WWW: http://opensource.conformal.com/wiki/Adsuck PR: ports/156644 Submitted by: Philippe Pepiot <phil@philpep.org>
* Upgrade to version 9.8.0-P1:dougb2011-05-072-7/+7
| | | | | | | | | Certain response policy zone configurations could trigger an INSIST when receiving a query of type RRSIG. https://www.isc.org/CVE-2011-1907 This vulnerability is only possible if you have enable the new RPZ feature.
* - Update to 1.1.0wen2011-05-052-24/+34
|
* - Update to 0.912wen2011-05-053-6/+12
| | | | | | | - Add LICENSE PR: ports/156804 Submitted by: Jase Thew <freebsd@beardz.net> (maintainer)
* - Mark CONFLICTS between devel/py-boto-devel and dns/p5-Net-Amazon-Route53sunpoet2011-05-031-0/+3
| | | | - Bump PORTREVISION
* - Add p5-Net-Amazon-Route53 0.110310sunpoet2011-04-275-0/+54
| | | | | | | | | | | | The Net::Amazon::Route53 Perl module allows you to manage DNS records for your domains via Amazon's Route 53 service. For more information, visit http://aws.amazon.com/route53/ WWW: http://search.cpan.org/dist/Net-Amazon-Route53/ PR: ports/156611, ports/156661 Submitted by: Jui-Nan Lin <jnlin@csie.nctu.edu.tw>
* Update to 1.2.0ehaupt2011-04-173-10/+31
|
* Add an option for installing python bindings.ehaupt2011-04-172-2/+21
| | | | | PR: 156419 Approved by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* - Add missing USERS/GROUPS for binddecke2011-04-122-4/+33
| | | | | | | - Improve ident for syslog messages to only show "maradns:" instead of "/usr/local/sbin/maradns:" - Bump PORTREVISION Submitted by: n j <nino80@gmail.com>
* - Update to 1.9.4miwi2011-04-122-3/+3
| | | | | | PR: 156069 Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru> Approved by: maintainer
* This is Net::Bonjour, a set of perl modules to utilize DNS for servicebapt2011-04-065-0/+51
| | | | | | | discovery. This method of service discovery is branded as Bonjour by Apple Computer. WWW: http://search.cpan.org/dist/Net-Bonjour/
* Garbage collect expired portsrene2011-04-054-71/+0
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | 2011-04-01 accessibility/linux-f8-atk: End of Life since Jan 7, 2009 2011-04-01 archivers/linux-f8-ucl: End of Life since Jan 7, 2009 2011-04-01 archivers/linux-f8-upx: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-alsa-lib: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-arts: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-esound: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-freealut: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-libaudiofile: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-libogg: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-libvorbis: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-mikmod: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-nas-libs: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-openal: End of Life since Jan 7, 2009 2011-04-01 audio/linux-f8-sdl_mixer: End of Life since Jan 7, 2009 2011-04-01 databases/linux-f8-sqlite3: End of Life since Jan 7, 2009 2011-04-02 databases/postgresql81-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-02 databases/postgresql73-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-02 databases/postgresql74-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-02 databases/postgresql80-server: EOL see http://wiki.postgresql.org/wiki/PostgreSQL_Release_Support_Policy 2011-04-01 devel/linux-f8-libglade: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-sdl12: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-allegro: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-libsigc++20: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-libglade2: End of Life since Jan 7, 2009 2011-04-01 devel/linux-f8-nspr: End of Life since Jan 7, 2009 2011-04-01 dns/linux-f8-libidn: End of Life since Jan 7, 2009 2011-04-01 emulators/linux_base-f8: End of Life since Jan 7, 2009 2011-04-01 emulators/linux_base-f9: End of Life since Jul 10, 2009 2011-04-01 emulators/linux_base-fc6: End of Life since December 7, 2007 2011-04-01 emulators/linux_base-f7: End of Life since June 13, 2008 2011-04-01 ftp/linux-f8-curl: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-sdl_image: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-ungif: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-imlib: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-cairo: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-dri: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-gdk-pixbuf: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-jpeg: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-png: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-libGLU: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-libmng: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-png10: End of Life since Jan 7, 2009 2011-04-01 graphics/linux-f8-tiff: End of Life since Jan 7, 2009 2011-04-01 lang/linux-f8-libg2c: End of Life since Jan 7, 2009 2011-04-01 lang/linux-f8-tcl84: End of Life since Jan 7, 2009 2011-04-01 multimedia/linux-f8-libtheora: End of Life since Jan 7, 2009 2011-04-02 net-p2p/dcd: No fetch sources and looks like project abandoned 2011-03-31 net/straw: abandoned upstream and does not work with python 2.6+ 2011-04-01 security/linux-f8-libssh2: End of Life since Jan 7, 2009 2011-04-01 security/linux-f8-nss: End of Life since Jan 7, 2009 2011-04-01 security/linux-f8-openssl: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-libxml2: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-scim-gtk: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-scim-libs: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-expat: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-libxml: End of Life since Jan 7, 2009 2011-04-01 textproc/linux-f8-aspell: End of Life since Jan 7, 2009 2011-04-01 www/linux-f8-flashplugin10: End of Life since Jan 7, 2009 2011-03-30 www/mediawiki112: abandoned upstream 2011-03-30 www/mediawiki113: abandoned upstream 2011-03-30 www/mediawiki114: abandoned upstream 2011-03-30 www/mediawiki16: abandoned upstream 2011-04-01 x11-fonts/linux-f8-fontconfig: End of Life since Jan 7, 2009 2011-03-01 x11-themes/gnome-icons-cool-gorilla: "no mastersite" 2011-04-01 x11-themes/linux-f8-hicolor-icon-theme: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-gtk: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-gtk2: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-openmotif: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-pango: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-qt33: End of Life since Jan 7, 2009 2011-04-01 x11-toolkits/linux-f8-tk84: End of Life since Jan 7, 2009 2011-04-01 x11/linux-f8-xorg-libs: End of Life since Jan 7, 2009
* - change maintainers mail addressohauer2011-03-312-2/+2
| | | | Appoved by maintainer via mail
* - update to version 3.2.8ohauer2011-03-302-4/+4
| | | | | | | | | | | | | | | | | | Bugfixes: Do setusercontext before chroot, otherwise login.conf etc. are required inside chroot. Bugfix #216: Fix leak of compressiontable when the domain table increases in size. Bugfix #348: Don't include header/library path if OpenSSL is in /usr. Bugfix #350: Refused notifies should log client ip. Bugfix #352: Fix hard coded paths in man pages. Bugfix #354: The realclean target deletes a bit too much. Bugfix #357, make xfrd quit with many zones. Bugfix #362: outgoing-interface and v4 vs. v6 leads to spurious warning messages. Bugfix #363: nsd-checkconf -v does not print outgoing-interface ok. Bugfix: nsd-checkconf -o outgoing-interface omits NOKEY. Undo Bugfix #235: Don't skip dname compression, messes up packets that do need compression. PR: ports/155785 Submitted by: Jaap Akkerhuis <jaap _at_ nlnetlabs.nl> (maintainer)
* - Pass -Dbsd_with_getifaddrs to CFLAGS in order to get a correct networkehaupt2011-03-295-58/+11
| | | | | | | interface list [1] PR: 155974 [1] Submitted by: David Naylor <naylor.b.david@gmail.com> [1]
* - Mark BROKEN on 9.X: does not configurepav2011-03-261-1/+7
| | | | Reported by: pointyhat
* - update to 1.15bapt2011-03-252-3/+3
|
* - Update to 1.2.1dhn2011-03-254-9/+25
| | | | | PR: ports/155889 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* - Update to 1.4.9sem2011-03-242-3/+3
|
* - Add LICENSE knob(s)mm2011-03-231-0/+3
|
* Remove some leftover files from a long time ago.edwin2011-03-235-624/+0
|
* Update to version 134edwin2011-03-233-27/+5
| | | | Submitted by: "Wessels, Duane" <dwessels@verisign.com>
* Fix distinfomm2011-03-231-2/+2
| | | | Reported by: pointyhat (pav)
* - Update to 0.1 [1]mm2011-03-221-7/+5
| | | | | | | - Add LICENSE information (GPLv2) PR: ports/155191 [1] Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru> [1]
* - Get Rid MD5 supportmiwi2011-03-20116-132/+1
|
* - Update to 1.52clsung2011-03-202-3/+3
|
* Bump PORTREVISION for ports linking to default libmysqlclient.ale2011-03-192-1/+2
|
* Update my MAINTAINER address to sbz at FreeBSD.org.sbz2011-03-181-1/+1
| | | | Approved by: jadawin@ (mentor)
* - Update to 0.06miwi2011-03-182-4/+4
| | | | | PR: 155630 Submitted by: maintainer
* - Update to 1.6.9wen2011-03-172-3/+3
| | | | | PR: ports/155613 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* update MASTER_SITESbapt2011-03-162-2/+1
| | | | while here remove md5
* - Update to 2.1.1wen2011-03-142-4/+3
|
* - Bump PORTREVISION to chase the update of dns/libidnwen2011-03-142-2/+3
|
* - Update to 1.19wen2011-03-143-7/+5
| | | | | PR: ports/153499 Submitted by: Hung-Yi Chen <gaod@hychen.org> (maintainer)
* - fix with non-standard PREFIX/LOCALBASEmakc2011-03-132-3/+26
| | | | | | | | - fix error with undefined variables on some services. This is upstream ticket #2: http://sourceforge.net/apps/trac/ddclient/ticket/2 PR: ports/155486 Submitted by: Rob Farmer (maintainer)
* - Pass maintainership to new volunteerwen2011-03-101-1/+1
| | | | Submitted by: rfarmer@predatorlabs.net (new maintainer, via email)
* - Reset maintainer [1]wen2011-03-102-2/+1
| | | | | | | - Drop MD5 PR: ports/155424 [1] Submitted by: Radek Kozlowski <radek@raadradd.com> (previous maintainer) [1]
* - Add missing filesmiwi2011-03-081-1/+2
| | | | PR: 155351
* CurveDNS is a forwarding nameserver adding DNSCurve to DNS,miwi2011-03-049-0/+146
| | | | | | | | | | and it's the first publicly released forwarding implementation that implements the DNSCurve protocol. WWW: http://curvedns.on2it.net/ PR: ports/153881 Submitted by: Leo Vandewoestijne <freebsd at dns-lab.com>
* This is 9.8.0, the first release version in the 9.8 series.dougb2011-03-022-8/+7
| | | | | | | | | | | | | | | | | | | | | New features versus previous release candidates include: * There is a new option in dig, +onesoa, that allows the final SOA record in an AXFR response to be suppressed. [RT #20929 * There is additional information displayed in the recursing log (qtype, qclass, qid and whether we are following the original name). [RT #22043] * Added option 'resolver-query-timeout' in named.conf (max query timeout in seconds) to set a different value than the default (30 seconds). A value of 0 means 'use the compiled in default'; anything longer than 30 will be silently set to 30. [RT #22852] * For Mac OS X, you can now have the test interfaces used during "make test" stay beyond reboot. See bin/tests/system/README for details. There are also numerous bug fixes and enhancements. See http://ftp.isc.org/isc/bind9/9.8.0/RELEASE-NOTES-BIND-9.8.html for more information.
* Deprecate all non-default Fedora based linux_base respectively linux-fx-*netchild2011-02-281-0/+3
| | | | | | | | | ports. All of them are End of Life (no security updates) since a loooong time. As they are not the default, I decided to go with a short expiration date (one month). The maintainer of the few ports which depend upon the f8 infrastructure is informed to take action (update to the default f10 infrastructure, or to deprecate).
* Add p5-POE-Component-Resolver 0.911, a non-blocking getaddrinfo()skv2011-02-275-0/+50
| | | | resolver.
* - Update to 1.0.7miwi2011-02-262-4/+4
|
* Chase after net/openldap24-server update.delphij2011-02-252-1/+2
| | | | Reminded by: miwi
* - Move over to py25+ or abovemiwi2011-02-253-3/+4
| | | | - While here kick md5 support
* Update dnsmasq rc.d script again (sorry for the churn with portrev. 1)mandree2011-02-233-16/+69
| | | | | | | | | | | | | | | | | | | | | - Start before named, to unbreak named_wait if /etc/resolv.conf points to dnsmasq (when named is the resolver that dnsmasq forwards to). Is also more robust/maintenance friendly if other scripts depend on "named". - Track if the configuration has changed since start, and upgrade reload to restart by default in that case (can be disabled with dnsmasq_restart="NO" in /etc/rc.conf[.local]), to work around dnsmasq shortcoming - Add a "logstats" action to the rcscript, and document it. - Document the "reload" action and the new dnsmasq_restart variable. - Properly quote variable expansions. - Enhance pkg-message to point to the rcfile for feature documentation. - Bump PORTREVISION to 2.
* Change rc.d file to ensure proper startup order:mandree2011-02-232-3/+13
| | | | | | | - depend on named, in case dnsmasq uses named as resolver - start before ntpdate and rpcbase (which require named). Bump PORTREVISION.
* Upgrade to new upstream release 2.57.mandree2011-02-213-22/+24
| | | | | | | | | | | | | | | | | | | | Remove support for FreeBSD releases 6.X. Allow build with IDN but without NLS (this requires that dns/libidn is also built WITHOUT_NLS) to expose an upstream change. Useful for embedded devices. Warn user if this is requested but libidn needs NLS libraries because in that case dnsmasq inherits the NLS dependencies from libidn. Remove files/patch-aa, it was a preview patch from a 2.57 test release, fixing a regression in 2.56 that caused hex constants to be rejected in the configuratino if they contained the '*' wildcard. Further upstream changes: - use own header for DNS protocol, rather than using arpa/nameser.h - correct ctype.h function argument casts (isdigit(), isxdigit(), etc.) - Accept extra empty arguments on command line to avoid libvirt breakage.
* - Update to 1.9.2miwi2011-02-193-15/+31
| | | | | | PR: 154535 Submitted by: Ruslan Mahmatkhanov <cvs-src@yandex.ru> Approved by: maintainer
* Expand NLS/IDN comment.mandree2011-02-161-1/+2
|
* Update pkg-descr and add author attribution since it's a full quote.mandree2011-02-161-12/+11
|
* Fix regression in config parser.mandree2011-02-162-0/+12
| | | | http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2011q1/004750.html
* Update to new upstream release 2.56.mandree2011-02-162-6/+7
| | | | | | | Replace uni-paderborn.de master site by MASTER_SITE_LOCAL. Add LICENSE=GPLv2. Changelog: http://www.thekelleys.org.uk/dnsmasq/CHANGELOG
* Update to 9.8.0rc1, the latest from ISC:dougb2011-02-152-6/+6
| | | | | | | | | | | * The ADB hash table stores informations about which authoritative servers to query about particular domains. Previous versions of BIND had the hash table size as a fixed value. On a busy recursive server, this could lead to hash table collisions in the ADB cache, resulting in degraded response time to queries. Bind 9.8 now has a dynamically scalable ADB hash table, which helps a busy server to avoid hash table collisions and maintain a consistent query response time.
* Update to 9.7.3, the latest from ISC:dougb2011-02-152-6/+6
| | | | | | | | | | | | | | * Zones may be dynamically added and removed with the "rndc addzone" and "rndc delzone" commands. These dynamically added zones are written to a per-view configuration file. Do not rely on the configuration file name nor contents as this will change in a future release. This is an experimental feature at this time. * A new command "rndc secroots" was added to dump a combined summary of the currently managed keys combined with statically configured trust anchors. * Added support to load new keys into managed zones without signing immediately with "rndc loadkeys". Added support to link keys with "dnssec-keygen -S" and "dnssec-settime -S".
* - Update to 1.0.1wen2011-02-132-5/+5
|
* Update to BIND 9.6.3, the latest from ISC on the 9.6 branch.dougb2011-02-052-6/+6
| | | | | | | | | | | | | | | | All 9.6 users with DNSSEC validation enabled should upgrade to this version, or the latest version in the 9.7 branch, prior to 2011-03-31 in order to avoid validation failures for names in .COM as described here: https://www.isc.org/announcement/bind-9-dnssec-validation-fails-new-ds-record In addition the fixes for this and other bugs, there are also the following: * Various fixes to kerberos support, including GSS-TSIG * Various fixes to avoid leaking memory, and to problems that could prevent a clean shutdown of named Feature safe: yes
* - Update to 1.4.06decke2011-01-312-4/+3
| | | | | | | | - Remove MD5 checksum Submitted by: n j <nino80 at gmail dot com> Security: 8015600f-2c80-11e0-9cc1-00163e5bf4f9 Feature safe: yes
* Remove expired ports:rene2011-01-305-61/+0
| | | | | | | | | 2011-01-24 dns/staticcharge: abandoned by author 2011-01-21 shells/bash3-static: Use shells/bash or shells/bash-static instead shells/bash3 is still used by devel/quilt Feature safe: yes
* - Update to 1.6.8pav2011-01-263-3/+13
| | | | | | PR: ports/154269 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) Feature safe: yes
* - Update to 3.2.7pav2011-01-262-4/+3
| | | | | | PR: ports/154264 Submitted by: Jaap Akkerhuis <jaap@nlnetlabs.nl> (maintainer) Feature safe: yes
* - Update to 1.6.8pav2011-01-263-16/+43
| | | | | | PR: ports/154268 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) Feature safe: yes
* Add LICENSE and remove MD5 sums.ehaupt2011-01-264-2/+4
| | | | Feature safe: yes
* - Update to 1.4.8sem2011-01-252-3/+3
| | | | Feature safe: yes
* Update to 9.8.0b1, which in addition to DNS64 support also hasdougb2011-01-222-6/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the following new features: * BIND now supports a new zone type, static-stub. This allows the administrator of a recursive nameserver to force queries for a particular zone to go to IP addresses of the administrator's choosing, on a per zone basis, both globally or per view. * BIND now supports Response Policy Zones, a way of expressing "reputation" in real time via specially constructed DNS zones. See the draft specification here: http://ftp.isc.org/isc/dnsrpz/isc-tn-2010-1.txt * Dynamically Loadable Zones (DLZ) now support dynamic updates. Contributed by Andrew Tridgell of the Samba Project. * Added a "dlopen" DLZ driver, allowing the creation of external DLZ drivers that can be loaded as shared objects at runtime rather than having to be linked with named at compile time. Currently this is switched on via a compile-time option, "configure --with-dlz-dlopen". Note: the syntax for configuring DLZ zones is likely to be refined in future releases. Contributed by Andrew Tridgell of the Samba Project. * numerous GSS-TSIG improvements * There is a new update-policy match type "external". This allows named to decide whether to allow a dynamic update by checking with an external daemon. Contributed by Andrew Tridgell of the Samba Project. * many other improvements Feature safe: yes
* - Update to 1.2.0pav2011-01-193-49/+13
| | | | | | PR: ports/154026 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) Feature safe: yes
* Mark DEPRECATED and set an EXPIRATION_DATEarved2011-01-101-0/+2
| | | | | PR: 153737 Submitted by: Mahlon E. Smith
* Update to 0.10.tobez2011-01-102-5/+4
| | | | Changes: http://search.cpan.org/dist/Data-Validate-Domain/Changes
* - Update to 20110107culot2011-01-092-4/+3
| | | | | | | Changes: http://dns.measurement-factory.com/tools/dnstop/src/CHANGES PR: ports/153806 Submitted by: Mark Foster <mark AT foster.cc> (maintainer) Approved by: sahil@/wen@ (mentors, implicit)
* The actual EOL date is 2011-05-31, as clarified indougb2011-01-081-1/+1
| | | | https://lists.isc.org/pipermail/bind-users/2011-January/082285.html
* Remove dns/bind95 which entered EOL 2010-09dougb2011-01-017-547/+0
|
* Garbage-collect expired ports:rene2011-01-015-96/+0
| | | | | | | | | | | | | | | | | | | | | | | 2010-12-30 databases/p5-sqlrelay: broken and upstream disapeared 2010-12-30 devel/php-dbg2: No upstream support 2010-12-30 dns/fourcdns: upstream has disapeared 2010-12-31 emulators/win4bsd: Development has ceased and distfile is no longer available 2010-12-31 french/mozilla-flp: www/seamonkey port is deprecated. Consider using the www/firefox-i18n. 2010-12-31 french/xtel: Minitel services will be discontinued at the end of 2010. 2010-12-30 ftp/ftpq: upstream has disapeared 2010-12-30 graphics/paintlib: does not compile with new tiff and no more maintained upstream 2010-12-30 graphics/g3dviewer: does not build with gcc 4.2, upstream disapeared 2010-12-30 lang/scriba: Does not compile with gcc 4.2+, looks like abandonware 2010-12-30 math/rascal: Broken on every arch since 2008, looks like an abandonware 2010-12-31 net-mgmt/nrg: Project has vanished. Use cacti instead. 2010-12-31 security/hostsentry: Project is dead. 2010-12-31 sysutils/kcube: Project has vanished 2010-12-31 www/cybercalendar: has been unmaintained since 2001 and is unusable with dates after 2010 (see ports/150974) 2010-12-31 www/flock: Flock 3 moves from Firefox to Chromium 2010-12-31 www/linux-flock: Flock 3 moves from Firefox to Chromium 2010-12-30 x11-clocks/xtu: Looks like abandonware Leave java/tya in for now, as it has outstanding PRs.
* - DISTNAME= ${PORTNAME}-${PORTVERSION} is the default and not needed.pgollucci2010-12-301-1/+0
| | | | | | | PR: ports/153292 Submitted by: myself (pgollucci) Tested by: -exp run by pav Approved by: portmgr (pav)
* Over to submitter of last update.linimon2010-12-281-1/+1
|
* Reset krion@FreeBSD.org due to 6 months of inactivity and maintainer-linimon2010-12-281-1/+1
| | | | | | timeouts. Hat: portmgr
* - Update to 1.2.8.31culot2010-12-269-261/+20
| | | | | | PR: ports/153446 Submitted by: Hung-Yi Chen <gaod at hychen.org> (maintainer) Approved by: sahil@/wen@ (mentors, implicit)
* Sync to final (for now) bsd.autotools.mkade2010-12-233-5/+9
|
* - change maintainer to submitter (NLnetNLabs)ohauer2010-12-211-4/+7
| | | | | | | | | | - patch includes fix for PR ports/153165 port dns/ldns fails to build with config (EXAMPLES=on and GOST=off) - bump PORTREVISION PR: ports/153228 ports/153165 Submitted by: Jaap Akkerhuis <jaap _at_ NLnetLabs.nl> (new maintainer) Approved by: Konstantin Saurbier <konstantin _at_ saurbier.net> (old maintainer)
* Update to c-ares-1.7.4 and fix a bashism in the configure script.roam2010-12-205-12/+29
|
* We need _all_ the fixes from ../bind97dougb2010-12-181-0/+1
|
* We need the fixes from bind97 for the perl problem here, not bind96dougb2010-12-181-3/+7
|
* CONFLICTS for bind98dougb2010-12-182-2/+2
|
* Continue BIND cleanup:dougb2010-12-181-1/+4
| | | | | | | DEPRECATED= Past EOL EXPIRATION_DATE= 2011-01-01 While I'm here, update CONFLICTS for bind98.
* Give people fair warning:dougb2010-12-181-1/+4
| | | | | | | DEPRECATED= Reaches EOL May 2011 EXPIRATION_DATE= 2011-04-30 While I'm here update CONFLICTS for bind98
* Add a -devel port for 9.8.0a1, which will allow people to experimentdougb2010-12-185-0/+537
| | | | | | | | | | | | | | | | | | | | | | | | | with DNS64. Once 9.8.0 is released officially the -devel tag will be removed. BIND version 9 is a major rewrite of nearly all aspects of the underlying BIND architecture. Some of the important features of BIND 9 are: DNS Security: DNSSEC (signed zones), TSIG (signed DNS requests) IP version 6: Answers DNS queries on IPv6 sockets, IPv6 resource records (AAAA) Experimental IPv6 Resolver Library DNS Protocol Enhancements: IXFR, DDNS, Notify, EDNS0 Improved standards conformance Views: One server process can provide multiple "views" of the DNS namespace, e.g. an "inside" view to certain clients, and an "outside" view to others. Multiprocessor Support BIND 9.8 includes a number of changes from BIND 9.7 and earlier releases, including: Preliminary DNS64 support (AAAA synthesis only initially) See the CHANGES file for more information on features. WWW: https://www.isc.org/software/bind
* - Update to 1.6.7culot2010-12-172-4/+3
| | | | | | PR: ports/153192 Submitted by: Jaap Akkerhuis <jaap at NLnetLabs.nl> Approved by: sahil@/wen@ (mentors, implicit)
* - Pass to perl@pgollucci2010-12-131-1/+1
|
* - @comment cleanup in p5-* pkg-plistpgollucci2010-12-121-1/+0
|
* - Add databases/sqlite3 to BUILD_DEPENDS (minimal version required 3.4.2)nivit2010-12-122-2/+3
| | | | | | | | - Bump PORTREVISION - Remove MD5 checksum from distinfo PR: ports/152542 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* Update to 1.6.7beech2010-12-112-6/+11
| | | | | | | PR: ports/152578 Submitted by: Jaap Akkerhuis (jaap@NLnetLabs.nl) Approved by: Konstantin Saurbier (konstantin@saurbier.net) (maintainer) itetcu (mentor) (implicit)
* With portmgr hat, reassign some ports from clsung to perl, since clsunglinimon2010-12-081-1/+1
| | | | is apparently having some trouble with email.
* Sync to new bsd.autotools.mkade2010-12-049-9/+9
|
* Update to version 9.4-ESV-R4, the latest from ISC, which addressesdougb2010-12-042-24/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | the following security vulnerability. For more information regarding these issues please see: http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories Key algorithm rollover http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614 Affects resolver operators who are validating with DNSSEC, and querying zones which are in a key rollover period. The bug will cause answers to incorrectly be marked as insecure. For the port: 1. Add CONFLICT for the ../bind-tools port 2. Remove CONFLICT for the removed ../bind9 port 3. Remove OPTION for threads on < RELENG_7 4. Remove MD5 from distinfo 5. Switch to pkg-install to create the symlinks to /etc/namedb/ as requested in [1] PR: ports/151635 [1] Submitted by: Benjamin Lee <ben@b1c1l1.com> [1]
* Update to version 9.6-ESV-R3, the latest from ISC, which addressesdougb2010-12-042-20/+10
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the following security vulnerabilities. For more information regarding these issues please see: http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories 1. Cache incorrectly allows ncache and rrsig for the same type http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613 Affects resolver operators whose servers are open to potential attackers. Triggering the bug will cause the server to crash. This bug applies even if you do not have DNSSEC enabled. 2. Using "allow-query" in the "options" or "view" statements to restrict access to authoritative zones has no effect. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615 Affects authoritative server operators who wish to generally restrict queries to their authoritative zones, and are running 9.6.2-P2 or any version of 9.7.x. The bug will allow unauthorized end users to receive answers to queries they should not. For the port: 1. Add CONFLICT for the ../bind-tools port 2. Remove CONFLICT for the removed ../bind9 port 3. Remove OPTION for threads on < RELENG_7 4. Switch to pkg-install to create the symlinks to /etc/namedb/ as requested in [1] PR: ports/151635 [1] Submitted by: Benjamin Lee <ben@b1c1l1.com> [1]
* Actually remove the MD5, oopsdougb2010-12-041-2/+0
|
* For the port:dougb2010-12-041-15/+4
| | | | | | | | | | | | 1. Add CONFLICT for the ../bind-tools port 2. Remove CONFLICT for the removed ../bind9 port 3. Remove OPTION for threads on < RELENG_7 4. Remove MD5 from distinfo 5. Switch to pkg-install to create the symlinks to /etc/namedb/ as requested in [1] PR: ports/151635 [1] Submitted by: Benjamin Lee <ben@b1c1l1.com> [1]
* Update to version 9.7.2-P3, the latest from ISC, which addressesdougb2010-12-043-12/+21
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | the following security vulnerabilities. For more information regarding these issues please see: http://www.isc.org/announcement/guidance-regarding-dec-1st-2010-security-advisories 1. Cache incorrectly allows ncache and rrsig for the same type http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613 Affects resolver operators whose servers are open to potential attackers. Triggering the bug will cause the server to crash. This bug applies even if you do not have DNSSEC enabled. 2. Using "allow-query" in the "options" or "view" statements to restrict access to authoritative zones has no effect. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615 Affects authoritative server operators who wish to generally restrict queries to their authoritative zones, and are running 9.6.2-P2 or any version of 9.7.x. The bug will allow unauthorized end users to receive answers to queries they should not. 3. Key algorithm rollover http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614 Affects resolver operators who have 9.7.2-P2 installed, are validating with DNSSEC, and querying zones which are in a key rollover period. The bug will cause answers to incorrectly be marked as insecure. For the port: 1. Add CONFLICT for the ../bind-tools port 2. Switch to pkg-install to create the symlinks to /etc/namedb/ as requested in [1] PR: ports/151635 [1] Submitted by: Benjamin Lee <ben@b1c1l1.com> [1]
* This is now a proper slave port to the latest version, atm ../bind97dougb2010-12-043-84/+10
|
* Convert this to a master port for ../bind-toolsdougb2010-12-042-16/+15
| | | | | | | | Remove CONFLICTS for the now-removed BIND 9.3 Remove OPTION for threads on < RELENG_7 Remove MD5 from distinfo
* Fix build by referring to the most recent version of BIND, insteaddougb2010-12-011-2/+2
| | | | of the long-EOL and now-removed one. :)
* As previously advertised, remove BIND 9.3.x coincident with thedougb2010-12-017-469/+0
| | | | EOL of RELENG_6.
* - Update MASTER_SITES, MAINTAINER and WWWsunpoet2010-11-273-4/+3
| | | | | | | | | | | References: - ports/150525 - http://www.robtex.com/dns/netleader.com.au.html - http://www.robtex.com/dns/downtools.com.au.html PR: ports/152392 Submitted by: Jarrod Sayers <jarrod@downtools.com.au> Approved by: Jarrod Sayers <jarrod@netleader.com.au> (maintainer)
* This module provides a replacement function for Socket::inet_aton,pgollucci2010-11-275-0/+38
| | | | | | | | | with support for timeouts. WWW: http://search.cpan.org/dist/Net-DNS-Lite/ PR: ports/152591 Submitted by: Gea-Suan Lin <gslin at gslin.org>
* - Update to 1.00pgollucci2010-11-272-9/+11
| | | | | | | PR: ports/152138 Submitted by: Gea-Suan Lin <gslin@gslin.org> Approved by: maintainer timeout (clsung ; 15 days) Changes: http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes
* - fix status command in rc filebapt2010-11-263-2/+2
| | | | | | | | | - while here remove MD5 entry bump port revision PR: ports/152565 Submitted by: eli <elij.mx _at_ gmail.com> Approved by: Jaap Akkerhuis <jaap _at_ nlnetlabs.nl>
* improvements on rc script:bapt2010-11-242-6/+22
| | | | | | | | | | | | | - support reload command - use nsdc cli has command and let it perform the actual start,stop,... of the daemon - at start check if the database exists if not built it (this prevent the daemon to fail at starting) - remove the now userless sleep in stop command bump portrevision PR: ports/152331 Submitted by: Philippe Pepiot <phil _at_ philpep.org> Approved by: Jaap Akkerhuis <jaap _at_ NLnetLabs.nl> (maintainer)
* - Update to 1.51pgollucci2010-11-162-4/+3
| | | | | With Hat: ruby@ Sponsored by: RideCharge Inc. / TaxiMagic
* - Update to 1.4.7sem2010-11-093-7/+16
| | | | | * It uses GOST by default and depends on port's openssl 1.0.0 (may be turned off by an option).
* Update WWWehaupt2010-11-011-1/+1
|
* Update to 9.6-ESV-R2, the latest from ISC.dougb2010-10-312-8/+6
| | | | | | This version contains bug fixes that are relevant to any caching/resolving name server; as well as DNSSEC-related fixes.
* Mark as deprecated and set expiration date to 2010-12-30 for unmaintainedbapt2010-10-301-0/+2
| | | | | | ports (ports@) that are broken and which seems abandonned upstream and are broken for long or only build on 6.x which will be unsupported at that time
* Update to 1.1.6ehaupt2010-10-292-4/+4
|
* - Update to 0.1.0wen2010-10-283-6/+7
| | | | | PR: ports/151787 Submitted by: Chris St Denis <chris@ctgameinfo.com> (maintainer)
* pear-Net_DNS2 provides (roughly) the same functionality as Net_DNS, butwen2010-10-274-0/+53
| | | | | | | | | | using PHP5 objects, exceptions for error handling, better sockets support. This release is (in most cases) 2x - 10x faster than Net_DNS, as well as includes more RR's (including DNSSEC RR's), and improved sockets and streams support. WWW: http://pear.php.net/package/Net_DNS2/
* Update to 9.4-ESV-R3, the latest from ISC.dougb2010-10-192-8/+8
|
* Update to 9.7.2-P2, the latest version from ISCdougb2010-10-192-8/+8
|
* DEPRECATED= Past EOL, will be removed when RELENG_6 goes EOLdougb2010-10-181-0/+3
| | | | EXPIRATION_DATE= 2010-11-30
* Punt autoconf267->autoconf268ade2010-10-163-3/+3
|
* Round one migration of ports from automake{19,110} to automake111ade2010-10-063-3/+19
|
* - update to 1.10leeym2010-10-052-4/+4
|
* - Mark BROKEN: does not fetch.erwin2010-09-301-1/+3
| | | | | | - Reset maintainer: <rscheckelhoff@fourcalorieservers.com>: host fwd1.hosts.co.uk[85.233.160.23] said: 550 Administrative prohibition (in reply to RCPT TO command)
* - Update to 3.3miwi2010-09-303-41/+41
| | | | | PR: 150981 Submitted by: Sten Spans <sten@blinkenlights.nl> (maintainer)
* - Update to 1.4.05decke2010-09-272-4/+4
| | | | Approved by: beat (co-mentor, implicit)
* Update to 1.1.5ehaupt2010-09-272-4/+4
|
* Update MASTER_SITES and WWWehaupt2010-09-272-5/+4
|
* Update to 3.1ehaupt2010-09-272-4/+4
|
* - only 13% of the p5- ports embed @comment $FreeBSD$:pgollucci2010-09-247-7/+0
| | | | | | so standarize and remove it With Hat: perl@
* - /mach/ -> /%%PERL_ARCH%%/pgollucci2010-09-241-2/+2
| | | | With Hat: perl@
* - Update MAINTAINER to my FreeBSD.org addresssunpoet2010-09-231-1/+1
| | | | Approved by: pgollucci (mentor)
* - Update to 1.50pgollucci2010-09-222-4/+4
| | | | | With Hat: ruby@ Sponsored by: RideCharge Inc. / TaxiMagic
* Explicitly depend on p5-Digest-MD5 only if PERL_LEVEL < 500703mm2010-09-221-1/+5
| | | | Explicitly depend on p5-Digest-SHA only if PERL_LEVEL < 501000
* Autotools update. Read ports/UPDATING 20100915 for details.ade2010-09-163-6/+7
| | | | | Approved by: portmgr (for Mk/bsd.port.mk part) Tested by: Multiple -exp runs
* - Add missing perl5 virtual categoriespgollucci2010-09-141-1/+1
|
* - Update to 1.1.3.araujo2010-09-132-4/+4
| | | | | PR: ports/150487 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* Update to 3.0.a2ehaupt2010-09-092-7/+7
| | | | | PR: 150439 Submitted by: skreuzer
* - Update to 1.14wen2010-09-092-4/+4
|
* - Update to 1.16pgollucci2010-09-092-5/+4
| | | | | | PR: ports/143265 Submitted by: Hung-Yi Chen <gaod@hychen.org> Approved by: maintainer timeout (krion ; 219 days)
* - Update to 1.1.2sylvio2010-09-062-8/+6
| | | | | PR: ports/150248 Submitted by: Jaap Akkerhuis <japp@nlnetlabs.nl> (maintainer)
* - Update to 1.6.6bapt2010-09-032-6/+14
| | | | | | | | | - Add GHOST option - While here add license PR: ports/149975 Submitted by: Jaap Akkerhuis <jaap _at_ NLnetLabs.nl> Approved by: Konstantin Saurbier <konstantin _at_ saurbier.net> (maintainer)
* DNSCheck is a program that is designed to help people check, measure andashish2010-09-0110-0/+318
| | | | | | | | | | | | hopefully also understand the workings of the Domain Name System. When used to check an domain (aka zone) is submitted to DNSCheck, it will investigate the general health by performing various tests and sanity checks. WWW: http://dnscheck.iis.se/ PR: ports/148370 Submitted by: dnscheckengine-port at academ.com (Stan Barber) Approved by: tabthorpe (mentor)
* - Fix RUN_DEPENDS thus fixing net/p5-Net-LDAP-AutoServerpgollucci2010-08-281-0/+4
| | | | | | PR: ports/147396 Reported by: myself (pgollucci) Submitted by: "Zane C.B." <vvelox@vvelox.net> (maintainer)
* - Update to 1.49pgollucci2010-08-272-4/+4
| | | | | PR: ports/149971 With Hat: ruby@
* Move wen@FreeBSD.org -> ruby@FreeBSD.org for rubygem-*pgollucci2010-08-271-1/+1
| | | | | Approved by: wen With Hat: ruby
* - Update to 10.1.0lwhsu2010-08-243-4/+7
| | | | | | PR: ports/149784 Submitted by: lwhsu Approved by: Neal Nelson <neal AT nelson.name> (maintainer)
* - Update to 0.5.2jadawin2010-08-243-40/+5
| | | | | | | | - Submitter is now maintainer - Remove useless patch file PR: ports/149529 Submitted by: Sofian Brabez <sbrabez _AT_ gmail.com>
* - Update to 0.98pgollucci2010-08-232-4/+4
| | | | | | | Changes: http://search.cpan.org/dist/Net-Domain-ExpireDate/Changes PR: ports/147614 Submitted by: pgollucci (myself) Approved by: maintainer timeout (clsung; > 2.5 months)
* - update to 1.13leeym2010-08-192-7/+8
|
* - Update to 1.6.6sahil2010-08-182-4/+4
| | | | | PR: ports/149656 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* - add periodic daily script to force updateohauer2010-08-185-2/+109
| | | | | | | | | | - connect to license framework - add special patch from glarkin to ensure daemon detach from tty, change some printf to use the warning function instead. PR: 148586 Submitted by: Chris Howey <howeyc _at_ gmail.com> Approved by: maintainer, glarkin (mentor)
* Increase minimum required version of dnsrubyarved2010-08-151-1/+2
| | | | | | PR: 148887 Submitted by: Ruben van Staveren <ruben@verweg.com> Approved by: maitainer
* - Rename net/p5-IO-INET6 to net/p5-IO-Socket-INET6.nemoliu2010-08-091-1/+1
| | | | | PR: ports/148309 Submitted by: Sunpoet Po-Chuan Hsieh <sunpoet@sunpoet.net>
* - Update to 1.4.04decke2010-08-052-4/+4
| | | | Approved by: miwi (mentor)
* - Update to 1.4.6sem2010-08-042-5/+4
|
* - Update to 3.2.6lwhsu2010-08-042-11/+8
| | | | | PR: ports/149234 Submitted by: Jaap Akkerhuis <jaap AT NLnetLabs.nl> (maintainer)
* Minor tweaksdougb2010-08-032-2/+2
|
* - Update to 1.00jadawin2010-07-292-4/+4
| | | | - Changelog: <http://cpansearch.perl.org/src/MSCHILLI/DNS-ZoneParse-1.00/Changes>
* - Update my MAINTAINER address to sahil@FreeBSD.orgsahil2010-07-291-1/+1
|
* - Update to 1.48sylvio2010-07-262-4/+4
| | | | | | PR: ports/148886 Submitted by: Ruben Van Staveren <ruben@verweg.com> Approved by: wen@ (He is on vacation, I've his permission for commit your PR)
* Update libevent to 1.4.14bmm2010-07-251-0/+1
| | | | | PR: ports/147723 Approved by: maintainer (timeout)
* Update to 1.6.5makc2010-07-192-4/+4
| | | | | | PR: ports/147565 Submitted by: Jaap Akkerhuis <jaap at NLnetLabs.nl> Approved by: Konstantin Saurbier (maintainer)
* Updgrade to version 9.7.1-P2 which addresses a DNSSEC-related bug.dougb2010-07-172-8/+8
| | | | | | | | | | | | | | | | | | If a query is made explicitly for a record of type 'RRSIG' to a validating recursive server running BIND 9.7.1 or 9.7.1-P1, and the server has one or more trust anchors configured statically and/or via DLV, then if the answer is not already in cache, the server enters a loop which repeatedly generates queries for RRSIGs to the authoritative servers for the zone containing the queried name. CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0213 CERT: http://www.kb.cert.org/vuls/id/211905 Versions affected: 9.7.1, 9.7.1-P1 Severity: High Exploitable: remotely http://www.isc.org/software/bind/advisories/cve-2010-0213
* - Drop maintainershipsahil2010-07-141-1/+1
|
* Update to 9.7.1-P1, the latest version from ISC.dougb2010-07-122-8/+8
|
* - Update to 1.1.1.araujo2010-07-112-4/+4
| | | | | PR: ports/148476 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* Upgrade to version 9.7.1-P1. The patch addresses 2 areas in the resolverdougb2010-07-112-8/+8
| | | | | | | | | | | | | | | code where the 9.7.x series tightened its adherence to the DNS protocol as written, vs. the 9.6.x series which was more liberal in what it accepted. Specifically: 1. Restore processing of certain forms of negative responses that do not contain all of the required elements to avoid aggressive re-querying of authority servers. 2. Accept answers from authority servers without the AA bit set if they meet the other requirements of an answer packet. More detail can be found here: https://www.isc.org/community/blog/201007/compatibility-issues-bind-970-and-971
* - Update to 1.0.araujo2010-07-062-8/+10
| | | | | | PR: ports/148359 Submitted by: Frank Behrens <frank+ports@ilse.behrens.de> (maintainer) Feature safe: yes
* Class to setup a number of nameservers that respond to specific DNS querieswen2010-06-275-0/+48
| | | | | | | | | | | | | | | | (QNAME,QTYPE) by prespecified answers. This class is to be used in test suites where you want to have servers to show predefined behavior. If the server will do a lookup based on QNAME,QTYPE and return the specified data. If there is no QNAME, QTYPE match the server will return a SERVFAIL. A log will be written to STDERR it contains time, IP/PORT, QNAME, QTYPE, RCODE. WWW: http://search.cpan.org/dist/Net-DNS-TestNS/ PR: ports/148161 Submitted by: Sunpoet Po-Chuan Hsieh <sunpoet@sunpoet.net> Feature safe: yes
* - Update to 1.6.5miwi2010-06-212-4/+4
| | | | | | PR: 147905 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer) Feature safe: yes
* Turns out that the bind.keys.h file is not a new dependency, so my previousdougb2010-06-182-53/+4
| | | | | | | | | | fix was too hasty. Employ a more robust fix that removes the _perl_ dep for both this file and bind9.xsl.h. The pre-generated versions of these files are identical to the newly generated ones, which is why this perl issue never came up previously. I still have reservations about baking the ISC DLV key into named, but given that this was already done in 9.7.0+ at least this way we don't violate POLA.
* The newly added bind.keys.h file requires perl for its creation,dougb2010-06-181-0/+53
| | | | | | | | | which is a problem, however what it's doing is baking the ISC DLV key into named which is not something I think is reasonable to do by default. So, instead of adding perl as a build dependency eliminate the need for the file altogether.
* Update to version 9.7.1, the latest from ISC.dougb2010-06-182-8/+8
| | | | | | | This version has numerous minor bug fixes, please refer to the CHANGES file for details. Many (but not all) of the fixes are DNSSEC-related, and all users who are doing DNSSEC validation are encouraged to upgrade to this version.
* - Update to 1.4.5sem2010-06-152-4/+4
|
* - Adopt unmaintained ports.ashish2010-06-141-1/+1
| | | | Approved by: pgj, tabthorpe (mentors)
* Unbreak on HEADdougb2010-06-141-4/+7
|
* Add LICENSE* informationlioux2010-06-131-0/+2
|
* - Change my maintainer address.ashish2010-06-111-1/+1
| | | | Approved by: pgj (mentor)
* Update to c-ares-1.7.2 and declare the MIT license.roam2010-06-113-9/+11
|
* Upgrade to upstream bugfix release 2.55, removing version hack.mandree2010-06-092-8/+4
| | | | | | Note this version fixes two crashes on startup. Approved by: garga (mentor)
* - Drop maintainershipgabor2010-06-081-1/+1
|
* Remove bms from the pkg-descr's of ports he no longer maintains.dougb2010-06-071-3/+0
|
* - Update to 0.29pgollucci2010-06-072-5/+6
| | | | | | | PR: ports/147387 Approved by: greenwood.andy@gmail.com (maintainer) Submitted by: myself (pgollucci@) Changes: http://search.cpan.org/dist/Net-DNSBL-MultiDaemon/Changes
* - Add a EOL messagemiwi2010-06-062-1/+8
| | | | | PR: 145780 Submitted by: maintainer
* Update pkg-descr (minor fixes; formatting).mandree2010-06-051-13/+12
| | | | Approved by: miwi (mentor)
* Upgrade to new upstream release dnsmasq 2.53/2.54.mandree2010-06-042-5/+8
| | | | | | | | | | This release was inadvertently dubbed 2.54 in its logging by Simon Kelley, so adjust our PORTVERSION to match that, but still build the 2.53 tarball. Simon will treat 2.53 and 2.54 the same and release 2.55 next time. http://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2010q2/004105.html Check work/dnsmasq-2.53/src/config.h for VERSION after "make extract" to see. Approved by: garga (mentor)
* - Introduce a new USE_XZ knob that handles lzma/xz compressed distfilespav2010-06-042-3/+6
| | | | | | | | - Convert a bunch of ports to use it PR: ports/146329 Submitted by: mm With hat: portmgr
* Bounce PORTREVISION for gettext-related ports. Have fun, ya'll.ade2010-05-314-2/+4
|
* Update to 2.1.1arved2010-05-312-4/+4
| | | | | PR: 147225 Submitted by: Janos Mohacsi
* - Update to 1.1.0sylvio2010-05-293-9/+7
| | | | | PR: ports/147134 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* - Mass conversion of RF -> RG for MASTER_SITE for rubygem- portspgollucci2010-05-271-1/+1
| | | | | | | | | [RG aka rubygems.org] PR: ports/147005 Submitted by: pgollucci (myself) Approved by: portmgr (pav) With Hat: ruby@
* - Update to 1.47wen2010-05-242-4/+4
|
* Reset perky@FreeBSD.org due to maintainer-timeouts and no responselinimon2010-05-241-1/+1
| | | | | | to email. Hat: portmgr
* Update to the latest patch set from ISC, which addresses the following:dougb2010-05-2010-40/+40
| | | | | Named could return SERVFAIL for negative responses from unsigned zones.
* Net::DNS::RR::SRV::Helper is a perl module to order SRV recordswen2010-05-195-0/+41
| | | | | | | | | by priority and weight for Net::DNS. WWW: http://search.cpan.org/dist/Net-DNS-RR-SRV-Helper/ PR: ports/146572 Submitted by: "Zane C.B." <vvelox@vvelox.net>
* - Update to 3.2.5miwi2010-05-092-9/+13
| | | | | PR: 145781 Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
* Add dns/p5-BIND-Config-Parser 0.01, a Perl module thattobez2010-05-055-0/+39
| | | | parses BIND v8 and v9 configuration files.
* - Send my final p5- ports to perl@pgollucci2010-04-301-1/+1
|
* - Update to 1.4.4sem2010-04-222-4/+4
| | | | | | * mistly bugs fix release * ECC-GOST is not supported by the port yet because of it requires OpenSSL 1.0.0 from ports. (There is in TODO).
* Switch to use newer GMP version.ale2010-04-192-4/+4
| | | | | | PR: ports/144487 Submitted by: ale Approved by: portmgr (-exp run by erwin)
* - Update to 2.1.4wen2010-04-095-11/+109
| | | | | | PR: ports/144383 Submitted by: Pavel Chudakov <sonic@4rm.ru> Approved by: maintainer
* - Update to 1.46wen2010-04-092-4/+4
|