bind
Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name
System (DNS) protocols and provides an openly redistributable reference
implementation of the major components of the Domain Name System.
- Devel package for openSUSE:Factory
-
17
derived packages
- Links to openSUSE:Factory / bind
- Has a link diff
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout network/bind && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
bind-9.18.8.tar.xz | 0005267280 5.02 MB | |
bind-9.18.8.tar.xz.sha512.asc | 0000000833 833 Bytes | |
bind-ldapdump-use-valid-host.patch | 0000002541 2.48 KB | |
bind.changes | 0000170779 167 KB | |
bind.conf | 0000000444 444 Bytes | |
bind.keyring | 0000003966 3.87 KB | |
bind.spec | 0000021417 20.9 KB | |
dlz-schema.txt | 0000006292 6.14 KB | |
dnszone-schema.txt | 0000005637 5.5 KB | |
fix_documentation-Sphinx.patch | 0000034765 34 KB | |
named.conf | 0000000090 90 Bytes | |
named.root | 0000003310 3.23 KB | |
vendor-files.tar.bz2 | 0000020269 19.8 KB |
Revision 362 (latest revision is 388)
Jorik Cronenberg (jcronenberg)
accepted
request 1034274
from
Jorik Cronenberg (jcronenberg)
(revision 362)
- Update to bind release 9.18.8 New Features: * Support for parsing and validating the dohpath service parameter in SVCB records was added. * named now logs the supported cryptographic algorithms during startup and in the output of named -V. * The recursion not available and query (cache) '...' denied log messages were extended to include the name of the ACL that caused a given query to be denied. Bug Fixes: * An assertion failure was fixed in named that was caused by aborting the statistics channel connection while sending statistics data to the client. * Changing just the TSIG key names for primaries in catalog zones’ member zones was not effective. This has been fixed. Known Issues: * Upgrading from BIND 9.16.32, 9.18.6, or any older version may require a manual configuration change. The following configurations are affected: - type primary zones configured with dnssec-policy but without either allow-update or update-policy, - type secondary zones configured with dnssec-policy. In these cases please add inline-signing yes; to the individual zone configuration(s). Without applying this change, named will fail to start. For more details, see https://kb.isc.org/docs/dnssec-policy-requires-dynamic-dns-or-inline-signing * BIND 9.18 does not support dynamic update forwarding (see allow-update-forwarding) in conjuction with zone transfers over TLS (XoT). This obsoletes the following patch: * fix_documentation-Sphinx.patch
Comments 0