bind
Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols and provides an openly redistributable reference
implementation of the major components of the Domain Name System.
-
1
derived packages
- Links to network / bind
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:jcronenberg:branches:network/bind && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
bind-9.18.8.tar.xz | 0005267280 5.02 MB | |
bind-9.18.8.tar.xz.sha512.asc | 0000000833 833 Bytes | |
bind-ldapdump-use-valid-host.patch | 0000002541 2.48 KB | |
bind.changes | 0000170779 167 KB | |
bind.conf | 0000000444 444 Bytes | |
bind.keyring | 0000003966 3.87 KB | |
bind.spec | 0000021631 21.1 KB | |
dlz-schema.txt | 0000006292 6.14 KB | |
dnszone-schema.txt | 0000005637 5.5 KB | |
fix_documentation-Sphinx.patch | 0000034765 34 KB | |
named.conf | 0000000090 90 Bytes | |
named.root | 0000003310 3.23 KB | |
vendor-files.tar.bz2 | 0000020269 19.8 KB |
Revision 16 (latest revision is 40)
Jorik Cronenberg (jcronenberg)
committed
(revision 16)
- Update to bind release 9.18.8 New Features: * Support for parsing and validating the dohpath service parameter in SVCB records was added. * named now logs the supported cryptographic algorithms during startup and in the output of named -V. * The recursion not available and query (cache) '...' denied log messages were extended to include the name of the ACL that caused a given query to be denied. Bug Fixes: * An assertion failure was fixed in named that was caused by aborting the statistics channel connection while sending statistics data to the client. * Changing just the TSIG key names for primaries in catalog zones’ member zones was not effective. This has been fixed. Known Issues: * Upgrading from BIND 9.16.32, 9.18.6, or any older version may require a manual configuration change. The following configurations are affected: - type primary zones configured with dnssec-policy but without either allow-update or update-policy, - type secondary zones configured with dnssec-policy. In these cases please add inline-signing yes; to the individual zone configuration(s). Without applying this change, named will fail to start. For more details, see https://kb.isc.org/docs/dnssec-policy-requires-dynamic-dns-or-inline-signing * BIND 9.18 does not support dynamic update forwarding (see allow-update-forwarding) in conjuction with zone transfers over TLS (XoT).
Comments 0