From owner-freebsd-ports-bugs@freebsd.org Wed Oct 19 12:49:21 2016 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 02610C17720 for ; Wed, 19 Oct 2016 12:49:21 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id CD57BA5B for ; Wed, 19 Oct 2016 12:49:20 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id u9JCnKFq000265 for ; Wed, 19 Oct 2016 12:49:20 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 213610] [MAINTAINER] dns/opendnssec2: Update to version 2.0.3 Date: Wed, 19 Oct 2016 12:49:20 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: jaap@NLnetLabs.nl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Oct 2016 12:49:21 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D213610 Bug ID: 213610 Summary: [MAINTAINER] dns/opendnssec2: Update to version 2.0.3 Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: jaap@NLnetLabs.nl Attachment #175932 maintainer-approval+ Flags: Created attachment 175932 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D175932&action= =3Dedit Patch to Upgrade Features: Most of the changes are related to further smoothing the migration path from OpenDNSSEC 1.4 to 2.0. If you still need to migrate from 1.4.10 please migrate to 2.0.3 directly rather than from 2.0.1. Another important fix is a memory leak in the signer. It would cause a high memory usage for installations with very frequent outgoing IXFR's. Changes: * OpenDNSSEC-839: update all no longer deletes zones or policies. Policy import now has a --remove-missing-policies option. (thanks David Peall) * OpenDNSSEC-840: Fix migration script to correctly interpret SOA serial strategy. * OPENDNSSEC-843: MaxZoneTTL defaults to 0 instead of 1 day. * Migration script can handle converting a database with zones in rollover better. * Fixed incorrect behaviour when more than 2 ZSKs involved in roll. * SUPPORT-201: Remove old keys from converted DB. * OPENDNSSEC-845: Memory leak on IXFR out. --=20 You are receiving this mail because: You are the assignee for the bug.=