head 1.3; access; symbols pkgsrc-2026Q1:1.3.0.114 pkgsrc-2026Q1-base:1.3 pkgsrc-2025Q4:1.3.0.112 pkgsrc-2025Q4-base:1.3 pkgsrc-2025Q3:1.3.0.110 pkgsrc-2025Q3-base:1.3 pkgsrc-2025Q2:1.3.0.108 pkgsrc-2025Q2-base:1.3 pkgsrc-2025Q1:1.3.0.106 pkgsrc-2025Q1-base:1.3 pkgsrc-2024Q4:1.3.0.104 pkgsrc-2024Q4-base:1.3 pkgsrc-2024Q3:1.3.0.102 pkgsrc-2024Q3-base:1.3 pkgsrc-2024Q2:1.3.0.100 pkgsrc-2024Q2-base:1.3 pkgsrc-2024Q1:1.3.0.98 pkgsrc-2024Q1-base:1.3 pkgsrc-2023Q4:1.3.0.96 pkgsrc-2023Q4-base:1.3 pkgsrc-2023Q3:1.3.0.94 pkgsrc-2023Q3-base:1.3 pkgsrc-2023Q2:1.3.0.92 pkgsrc-2023Q2-base:1.3 pkgsrc-2023Q1:1.3.0.90 pkgsrc-2023Q1-base:1.3 pkgsrc-2022Q4:1.3.0.88 pkgsrc-2022Q4-base:1.3 pkgsrc-2022Q3:1.3.0.86 pkgsrc-2022Q3-base:1.3 pkgsrc-2022Q2:1.3.0.84 pkgsrc-2022Q2-base:1.3 pkgsrc-2022Q1:1.3.0.82 pkgsrc-2022Q1-base:1.3 pkgsrc-2021Q4:1.3.0.80 pkgsrc-2021Q4-base:1.3 pkgsrc-2021Q3:1.3.0.78 pkgsrc-2021Q3-base:1.3 pkgsrc-2021Q2:1.3.0.76 pkgsrc-2021Q2-base:1.3 pkgsrc-2021Q1:1.3.0.74 pkgsrc-2021Q1-base:1.3 pkgsrc-2020Q4:1.3.0.72 pkgsrc-2020Q4-base:1.3 pkgsrc-2020Q3:1.3.0.70 pkgsrc-2020Q3-base:1.3 pkgsrc-2020Q2:1.3.0.66 pkgsrc-2020Q2-base:1.3 pkgsrc-2020Q1:1.3.0.46 pkgsrc-2020Q1-base:1.3 pkgsrc-2019Q4:1.3.0.68 pkgsrc-2019Q4-base:1.3 pkgsrc-2019Q3:1.3.0.64 pkgsrc-2019Q3-base:1.3 pkgsrc-2019Q2:1.3.0.62 pkgsrc-2019Q2-base:1.3 pkgsrc-2019Q1:1.3.0.60 pkgsrc-2019Q1-base:1.3 pkgsrc-2018Q4:1.3.0.58 pkgsrc-2018Q4-base:1.3 pkgsrc-2018Q3:1.3.0.56 pkgsrc-2018Q3-base:1.3 pkgsrc-2018Q2:1.3.0.54 pkgsrc-2018Q2-base:1.3 pkgsrc-2018Q1:1.3.0.52 pkgsrc-2018Q1-base:1.3 pkgsrc-2017Q4:1.3.0.50 pkgsrc-2017Q4-base:1.3 pkgsrc-2017Q3:1.3.0.48 pkgsrc-2017Q3-base:1.3 pkgsrc-2017Q2:1.3.0.44 pkgsrc-2017Q2-base:1.3 pkgsrc-2017Q1:1.3.0.42 pkgsrc-2017Q1-base:1.3 pkgsrc-2016Q4:1.3.0.40 pkgsrc-2016Q4-base:1.3 pkgsrc-2016Q3:1.3.0.38 pkgsrc-2016Q3-base:1.3 pkgsrc-2016Q2:1.3.0.36 pkgsrc-2016Q2-base:1.3 pkgsrc-2016Q1:1.3.0.34 pkgsrc-2016Q1-base:1.3 pkgsrc-2015Q4:1.3.0.32 pkgsrc-2015Q4-base:1.3 pkgsrc-2015Q3:1.3.0.30 pkgsrc-2015Q3-base:1.3 pkgsrc-2015Q2:1.3.0.28 pkgsrc-2015Q2-base:1.3 pkgsrc-2015Q1:1.3.0.26 pkgsrc-2015Q1-base:1.3 pkgsrc-2014Q4:1.3.0.24 pkgsrc-2014Q4-base:1.3 pkgsrc-2014Q3:1.3.0.22 pkgsrc-2014Q3-base:1.3 pkgsrc-2014Q2:1.3.0.20 pkgsrc-2014Q2-base:1.3 pkgsrc-2014Q1:1.3.0.18 pkgsrc-2014Q1-base:1.3 pkgsrc-2013Q4:1.3.0.16 pkgsrc-2013Q4-base:1.3 pkgsrc-2013Q3:1.3.0.14 pkgsrc-2013Q3-base:1.3 pkgsrc-2013Q2:1.3.0.12 pkgsrc-2013Q2-base:1.3 pkgsrc-2013Q1:1.3.0.10 pkgsrc-2013Q1-base:1.3 pkgsrc-2012Q4:1.3.0.8 pkgsrc-2012Q4-base:1.3 pkgsrc-2012Q3:1.3.0.6 pkgsrc-2012Q3-base:1.3 pkgsrc-2012Q2:1.3.0.4 pkgsrc-2012Q2-base:1.3 pkgsrc-2012Q1:1.3.0.2 pkgsrc-2012Q1-base:1.3 pkgsrc-2011Q4:1.2.0.4 pkgsrc-2011Q4-base:1.2 pkgsrc-2011Q2:1.2.0.2 pkgsrc-2011Q2-base:1.2 pkgsrc-2010Q1:1.1.0.22 pkgsrc-2010Q1-base:1.1 pkgsrc-2009Q4:1.1.0.20 pkgsrc-2009Q4-base:1.1 pkgsrc-2009Q3:1.1.0.18 pkgsrc-2009Q3-base:1.1 pkgsrc-2009Q2:1.1.0.16 pkgsrc-2009Q2-base:1.1 pkgsrc-2009Q1:1.1.0.14 pkgsrc-2009Q1-base:1.1 pkgsrc-2008Q4:1.1.0.12 pkgsrc-2008Q4-base:1.1 pkgsrc-2008Q3:1.1.0.10 pkgsrc-2008Q3-base:1.1 cube-native-xorg:1.1.0.8 cube-native-xorg-base:1.1 pkgsrc-2008Q2:1.1.0.6 pkgsrc-2008Q2-base:1.1 cwrapper:1.1.0.4 pkgsrc-2008Q1:1.1.0.2 pkgsrc-2008Q1-base:1.1; locks; strict; comment @# @; 1.3 date 2012.02.28.21.55.28; author cheusov; state Exp; branches; next 1.2; 1.2 date 2010.05.23.17.30.31; author schwarz; state dead; branches; next 1.1; 1.1 date 2008.03.19.22.55.21; author tonnerre; state Exp; branches; next ; desc @@ 1.3 log @ Update to 2.0.05 by package maintainer + my fixes. maradns-2.0.05: This is a stable release of MaraDNS. * Security bugfix for CVE-2011-5056 * Deadwood updated to Deadwood 3.2.01 * Nicholas Bamber's Makefile.freebsd file added. (2012.02.12) maradns-1.4.10: The hash compression function has better collision resistance. More details at http://bam2.vk.tj (2012.01.13) maradns-1.4.09: Hotfix: The hash randomization now has 31 bits of entropy, and the hash does a fairly good job of choosing a random hash bucket again. More details at http://al72.vk.tj (2011.12.30) maradns-1.4.08: Security hotfix: Hash randomization added to MaraDNS 1's recursive resolver. MaraDNS 2 is not impacted (it's been using a randomized hash since 2007). More details at http://al62.vk.tj (2011.12.29) maradns-1.4.07: This is a legacy release of MaraDNS. All patches are backports of MaraDNS 2.0 bug fixes. * A typo fix for fetchzone * AXFR-over-UDP packets are now correctly marked "truncated" * It is now possible to have the '/' in hostnames * Fix for Debian bug #607739: Hostname shown when complaining about DDIP issues * AngelD's issue with zone transfers when there are a lot of FQDN4 records fixed. * Karim's issue with '/read' directive fixed (2011.11.11) @ text @$NetBSD$ --- MaraDns.h.orig 2012-02-14 14:06:44.000000000 +0100 +++ MaraDns.h 2012-02-14 14:09:52.000000000 +0100 @@@@ -91,7 +91,7 @@@@ /* The directory that Duende runs in. This directory has to exist for Duende to be able to run. Again, IF YOU CHANGE THIS, CHANGE THE DUENDE MAN PAGE */ -#define DUENDE_CHROOT_DIR "/etc/maradns/logger" +#define DUENDE_CHROOT_DIR "@@PKG_SYSCONFDIR@@/maradns/logger" /* The default IP address that Askmara uses; this used to be 127.0.0.3 but is now 127.0.0.1 because many non-Linux systems only use 127.0.0.1 @ 1.2 log @updated to 1.4.03 patched to support Darwin @ text @d1 1 a1 1 $NetBSD: patch-am,v 1.1 2008/03/19 22:55:21 tonnerre Exp $ d3 11 a13 32 --- server/MaraDNS.c.orig 2007-05-17 06:01:44.000000000 +0200 +++ server/MaraDNS.c @@@@ -636,7 +636,8 @@@@ int udpsuccess(rr *where, int id, int so is buggy if we round-robin rotate data when we allow more than one additional record to be create per answer/authoritative record. */ - if(rotate_2nd != 0 && max_ar_chain == 1 && rotate_last != 0) { + if(rotate_2nd != 0 && max_ar_chain == 1 && rotate_last != 0 + && first_rr_type != RR_NS) { /* If it makes sense to do a round-robin rotation, do so. * Make rotate_1st, which was the first record, the last * record; make rotate_2nd, which was the second record, @@@@ -900,7 +901,8 @@@@ int udpsuccess(rr *where, int id, int so rotate_last = where; where = where->next; /* If it makes sense to do a round-robin rotation, do so */ - if(where == 0 && rotate_2nd != 0 && max_ar_chain == 1) { + if(where == 0 && rotate_2nd != 0 && max_ar_chain == 1 + && first_rr_type != RR_NS) { /* For records in the cache, we need to make sure that the custodian properly points to the first record in the chain or we will leak memory */ @@@@ -1113,7 +1115,8 @@@@ int add_answer(rr *where,js_string *most is buggy if we round-robin rotate data when we allow more than one additional record to be create per answer/authoritative record. */ - if(rotate_2nd != 0 && max_ar_chain == 1 && rotate_done == 0) { + if(rotate_2nd != 0 && max_ar_chain == 1 && rotate_done == 0 + && first_rr_type != RR_NS) { rotate_done = 1; /* If it makes sense to do a round-robin rotation */ rotate_1st->next = where; @ 1.1 log @Fix a Denial-of-Service vulnerability in maradns version 1.2.12.06 Crafted CNAME entries can be used to DoS MaraDNS without this patch See CVE-2008-0061 for more details Approved-by: wiz @ text @d1 1 a1 1 $NetBSD$ @