From owner-freebsd-ports-bugs@freebsd.org Tue Jan 26 15:27:18 2021 Return-Path: Delivered-To: freebsd-ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 88B3F4F30C4 for ; Tue, 26 Jan 2021 15:27:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4DQ9Zt3H3Vz4XdB for ; Tue, 26 Jan 2021 15:27:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 7087D4F3214; Tue, 26 Jan 2021 15:27:18 +0000 (UTC) Delivered-To: ports-bugs@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 704EB4F3213 for ; Tue, 26 Jan 2021 15:27:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DQ9Zt2gNxz4XpR for ; Tue, 26 Jan 2021 15:27:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4A3E93DAF for ; Tue, 26 Jan 2021 15:27:18 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 10QFRIox065374 for ; Tue, 26 Jan 2021 15:27:18 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 10QFRI76065373 for ports-bugs@FreeBSD.org; Tue, 26 Jan 2021 15:27:18 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 253026] dns/nsd: Update to 4.3.5 Date: Tue, 26 Jan 2021 15:27:17 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: jaap@NLnetLabs.nl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform bug_file_loc op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 26 Jan 2021 15:27:18 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D253026 Bug ID: 253026 Summary: dns/nsd: Update to 4.3.5 Product: Ports & Packages Version: Latest Hardware: Any URL: https://nlnetlabs.nl/news/2021/Jan/26/nsd-4.3.5-releas ed/ OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: jaap@NLnetLabs.nl Attachment #221938 maintainer-approval+ Flags: Created attachment 221938 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D221938&action= =3Dedit patch to upgrade NSD 4.3.5 is available: https://nlnetlabs.nl/downloads/nsd/nsd-4.3.5.tar.gz sha256 7da2b43e30b3d7f307722c608f719bfb169f0d985c764a34fa0669dc33484472 pgp https://nlnetlabs.nl/downloads/nsd/nsd-4.3.5.tar.gz.asc This release fixes a number of bugs. It fixes a number of corner case differences for the output more similar to Bind. The configure sources are compatible with the new autoconf 2.70. 4.3.5 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D BUG FIXES: - Fix #143: xfrd no hysteresis with NOT IMPLEMENTED rcode. - Fix #144: Typo fix in nsd.conf.5.in. - For #145: Fix that service of remaining TCP and TLS connections does not allow new queries to be made, the connection is closed. Only existing queries and zone transfers are answered, new ones are rejected by a close of the channel. - Fix that nsd-control has timeout when connection is down. - remove windows socket ifdefs from nsd-control. - Fix #148: CNAME need not be followed after a synthesized CNAME for a CNAME query. - Fix configure.ac for autoconf 2.70. - Fix #150: TXT record validation difference with BIND. - Fix #151: DNAME not applied more than once to resolve the query. - Fix #152: '*' in Rdata causes the return code to be NOERROR instead of NX. --=20 You are receiving this mail because: You are the assignee for the bug.=