SHA256
1
0
forked from pool/bind
Commit Graph

180 Commits

Author SHA256 Message Date
Stephan Kulow
adb3422044 Accepting request 174827 from network
- Use updated config.guess/sub in the embedded idnkit sources (forwarded request 174818 from Andreas_Schwab)

OBS-URL: https://build.opensuse.org/request/show/174827
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=89
2013-05-13 12:43:11 +00:00
e2db8fe61f Accepting request 174818 from devel:ARM:AArch64:Factory
- Use updated config.guess/sub in the embedded idnkit sources

OBS-URL: https://build.opensuse.org/request/show/174818
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=113
2013-05-08 13:45:12 +00:00
Stephan Kulow
65bfa5b3d2 Accepting request 161413 from network
- Updated to 9.9.2-P2 (bnc#811876)
  Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266
  * Security Fixes
    Removed the check for regex.h in configure in order to disable regex
    syntax checking, as it exposes BIND to a critical flaw in libregex
    on some platforms. [RT #32688]
- added gpg key source verification

OBS-URL: https://build.opensuse.org/request/show/161413
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=88
2013-03-28 12:09:59 +00:00
eec4a4f40d - Updated to 9.9.2-P2 (bnc#811876)
Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266
  * Security Fixes
    Removed the check for regex.h in configure in order to disable regex
    syntax checking, as it exposes BIND to a critical flaw in libregex
    on some platforms. [RT #32688]
- added gpg key source verification

OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=111
2013-03-27 12:36:47 +00:00
Ismail Dönmez
00ba642f3d Accepting request 144433 from network
- Updated to 9.9.2-P1 (bnc#792926)
  https://kb.isc.org/article/AA-00828
  * Security Fixes
    Prevents named from aborting with a require assertion failure on
    servers with DNS64 enabled.  These crashes might occur as a result of
    specific queries that are received.  (Note that this fix is a subset
    of a series of updates that will be included in full in BIND 9.8.5
    and 9.9.3 as change #3388, RT #30996).  [CVE-2012-5688] [RT #30792]
    A deliberately constructed combination of records could cause
    named to hang while populating the additional section of a
    response. [CVE-2012-5166] [RT #31090]
    Prevents a named assert (crash) when queried for a record whose
    RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
    Prevents a named assert (crash) when validating caused by using
    "Bad cache" data before it has been initialized. [CVE-2012-3817]
    [RT #30025]
    A condition has been corrected where improper handling of zero-length
    RDATA could cause undesirable behavior, including termination of
    the named process. [CVE-2012-1667]  [RT #29644]
    ISC_QUEUE handling for recursive clients was updated to address a race
    condition that could cause a memory leak. This rarely occurred with
    UDP clients, but could be a significant problem for a server handling
    a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
New Features
    Elliptic Curve Digital Signature Algorithm keys and signatures in
    DNSSEC are now supported per RFC 6605. [RT #21918]
    Introduces a new tool "dnssec-checkds" command that checks a zone to
    determine which DS records should be published in the parent zone,
    or which DLV records should be published in a DLV zone, and queries
    the DNS to ensure that it exists. (Note: This tool depends on python;

OBS-URL: https://build.opensuse.org/request/show/144433
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=86
2012-12-07 13:06:47 +00:00
4d43181a2f OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=109 2012-12-06 15:46:53 +00:00
d414c6c46e OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=108 2012-12-06 15:46:13 +00:00
636c118d37 - Updated to 9.9.2-P1 (bnc#792926)
https://kb.isc.org/article/AA-00828
  * Security Fixes
    Prevents named from aborting with a require assertion failure on
    servers with DNS64 enabled.  These crashes might occur as a result of
    specific queries that are received.  (Note that this fix is a subset
    of a series of updates that will be included in full in BIND 9.8.5
    and 9.9.3 as change #3388, RT #30996).  [CVE-2012-5688] [RT #30792]
    A deliberately constructed combination of records could cause
    named to hang while populating the additional section of a
    response. [CVE-2012-5166] [RT #31090]
    Prevents a named assert (crash) when queried for a record whose
    RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
    Prevents a named assert (crash) when validating caused by using
    "Bad cache" data before it has been initialized. [CVE-2012-3817]
    [RT #30025]
    A condition has been corrected where improper handling of zero-length
    RDATA could cause undesirable behavior, including termination of
    the named process. [CVE-2012-1667]  [RT #29644]
    ISC_QUEUE handling for recursive clients was updated to address a race
    condition that could cause a memory leak. This rarely occurred with
    UDP clients, but could be a significant problem for a server handling
    a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
New Features
    Elliptic Curve Digital Signature Algorithm keys and signatures in
    DNSSEC are now supported per RFC 6605. [RT #21918]
    Introduces a new tool "dnssec-checkds" command that checks a zone to
    determine which DS records should be published in the parent zone,
    or which DLV records should be published in a DLV zone, and queries
    the DNS to ensure that it exists. (Note: This tool depends on python;

OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=107
2012-12-06 08:05:49 +00:00
Stephan Kulow
2f2a5e17d4 Accepting request 141805 from network
- added a ratelimiting (draft RFC) patch from Paul Vixie.
  see http://www.redbarn.org/dns/ratelimits
  suggested by Stefan Schaefer <stefan@invis-server.org>

OBS-URL: https://build.opensuse.org/request/show/141805
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=85
2012-11-20 09:15:16 +00:00
4161728e00 - added a ratelimiting (draft RFC) patch from Paul Vixie.
see http://www.redbarn.org/dns/ratelimits
  suggested by Stefan Schaefer <stefan@invis-server.org>

OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=105
2012-11-18 18:12:17 +00:00
Stephan Kulow
13cb2fb5aa Accepting request 141386 from network
- updated to 9.9.2
  https://kb.isc.org/article/AA-00798
  Security:
  * A deliberately constructed combination of records could cause
    named to hang while populating the additional section of a
    response. [CVE-2012-5166] [RT #31090]
  * Prevents a named assert (crash) when queried for a record whose
    RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
  * Prevents a named assert (crash) when validating caused by using "Bad
    cache" data before it has been initialized. [CVE-2012-3817]  [RT #30025]
  * A condition has been corrected where improper handling of zero-length
    RDATA could cause undesirable behavior, including termination of the
    named process. [CVE-2012-1667]  [RT #29644]
  * ISC_QUEUE handling for recursive clients was updated to address a race
    condition that could cause a memory leak. This rarely occurred with
    UDP clients, but could be a significant problem for a server handling
    a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
  New Features
  * Elliptic Curve Digital Signature Algorithm keys and signatures in
    DNSSEC are now supported per RFC 6605. [RT #21918]
  * Introduces a new tool "dnssec-checkds" command that checks a zone
    to determine which DS records should be published in the parent zone,
    or which DLV records should be published in a DLV zone, and queries
    the DNS to ensure that it exists. (Note: This tool depends on python;
    it will not be built or installed on systems that do not have a python
    interpreter.)  [RT #28099]
  * Introduces a new tool "dnssec-verify" that validates a signed zone,
    checking for the correctness of signatures and NSEC/NSEC3 chains.
    [RT #23673]
  * Adds configuration option "max-rsa-exponent-size <value>;" that can

OBS-URL: https://build.opensuse.org/request/show/141386
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=84
2012-11-17 06:19:12 +00:00
720e0417f1 - unfuzzed patches:
perl-path.diff
  pie_compile.diff
  workaround-compile-problem.diff

OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=103
2012-11-15 09:54:51 +00:00
d0bcf798bc Accepting request 141301 from home:msmeissn:branches:network
OBS-URL: https://build.opensuse.org/request/show/141301
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=102
2012-11-14 14:01:06 +00:00
96ef1056ef freshed patches
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=101
2012-11-14 10:31:31 +00:00
d3e988aaee - updated to 9.9.2
https://kb.isc.org/article/AA-00798
  Security:
  * A deliberately constructed combination of records could cause
    named to hang while populating the additional section of a
    response. [CVE-2012-5166] [RT #31090]
  * Prevents a named assert (crash) when queried for a record whose
    RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
  * Prevents a named assert (crash) when validating caused by using "Bad
    cache" data before it has been initialized. [CVE-2012-3817]  [RT #30025]
  * A condition has been corrected where improper handling of zero-length
    RDATA could cause undesirable behavior, including termination of the
    named process. [CVE-2012-1667]  [RT #29644]
  * ISC_QUEUE handling for recursive clients was updated to address a race
    condition that could cause a memory leak. This rarely occurred with
    UDP clients, but could be a significant problem for a server handling
    a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
  New Features
  * Elliptic Curve Digital Signature Algorithm keys and signatures in
    DNSSEC are now supported per RFC 6605. [RT #21918]
  * Introduces a new tool "dnssec-checkds" command that checks a zone
    to determine which DS records should be published in the parent zone,
    or which DLV records should be published in a DLV zone, and queries
    the DNS to ensure that it exists. (Note: This tool depends on python;
    it will not be built or installed on systems that do not have a python
    interpreter.)  [RT #28099]
  * Introduces a new tool "dnssec-verify" that validates a signed zone,
    checking for the correctness of signatures and NSEC/NSEC3 chains.
    [RT #23673]
  * Adds configuration option "max-rsa-exponent-size <value>;" that can

OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=100
2012-11-14 10:25:52 +00:00
Ismail Dönmez
4f0c7a2ced Accepting request 138821 from network
- Specially crafted DNS data can cause a lockup in named.
  CVE-2012-5166, bnc#784602.
- 9.9.1-P4

OBS-URL: https://build.opensuse.org/request/show/138821
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=83
2012-10-25 08:59:07 +00:00
c9d0046524 - Specially crafted DNS data can cause a lockup in named.
CVE-2012-5166, bnc#784602.
- 9.9.1-P4

OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=98
2012-10-19 12:14:00 +00:00
Stephan Kulow
5f51f43efe Accepting request 134434 from network
- Named could die on specially crafted record.
  [RT #30416] (bnc#780157) CVE-2012-4244
- 9.9.1-P3
- updated dnszone-schema.txt from upstream.

OBS-URL: https://build.opensuse.org/request/show/134434
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=82
2012-09-17 11:47:56 +00:00
a16486cc98 - Named could die on specially crafted record.
[RT #30416] (bnc#780157) CVE-2012-4244
- 9.9.1-P3
- updated dnszone-schema.txt from upstream.

OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=96
2012-09-15 16:23:25 +00:00
Stephan Kulow
864a31b0ad Accepting request 128983 from network
- Prevents a named assert (crash) when validating caused by using
  "Bad cache" data before it has been initialized.  [RT #30025]
  (bnc#772945)
- ISC_QUEUE handling for recursive clients was updated to address a
  race condition that could cause a memory leak.  This rarely occurred
  with UDP clients, but could be a significant problem for a server
  handling a steady rate of TCP queries.  [RT #29539 & #30233]
- Under heavy incoming TCP query loads named could experience a
  memory leak which could lead to significant reductions in query
  response or cause the server to be terminated on systems with
  "out of memory" killers. [RT #29539]
  (bnc#772946)
- A condition has been corrected where improper handling of zero-length
  RDATA could cause undesirable behavior, including termination of
  the named process.  [RT #29644]
- 9.9.1-P2

- license update: ISC
  ISC is generally seen as the correct license for bind

OBS-URL: https://build.opensuse.org/request/show/128983
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=81
2012-07-31 11:27:12 +00:00
Uwe Gansert
9d3afd5a9e security fix
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=94
2012-07-26 09:55:26 +00:00
Uwe Gansert
9aea24ec0b Accepting request 127699 from home:babelworx:ldig:branches:network
license update: ISC
ISC is generally seen as the correct license for bind

OBS-URL: https://build.opensuse.org/request/show/127699
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=93
2012-07-12 07:46:55 +00:00
Stephan Kulow
bd05b44c92 Accepting request 123696 from network
- updated dnszone-schema.txt

- VUL-0: bind remote DoS via zero length rdata field
  CVE-2012-1667
  bnc#765315
- 9.9.1-P1

OBS-URL: https://build.opensuse.org/request/show/123696
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=79
2012-06-06 14:05:36 +00:00
Uwe Gansert
d65e10ef0f updates ldap schema
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=91
2012-06-05 14:30:53 +00:00
Uwe Gansert
878d773563 changes file was broken
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=90
2012-06-04 15:26:56 +00:00
Uwe Gansert
6b1a93e719 VUL-0: bind remote DoS via zero length rdata field
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=89
2012-06-04 15:26:08 +00:00
Stephan Kulow
d524784deb Accepting request 121732 from network
- this version has no new features but only bugfixes
- Addresses a race condition that can cause named to to crash when
  the masters list for a zone is updated via rndc reload/reconfig
- Fixes a race condition in zone.c that can cause named to crash
  during the processing of rndc delzone
- Prevents a named segfault from resolver.c due to procedure
  fctx_finddone() not being thread-safe
- SDB now handles unexpected errors from back-end database drivers
  gracefully instead of exiting on an assert.
- Prevents named crashes as a result of dereferencing a NULL pointer
  in zmgr_start_xfrin_ifquota if the zone was being removed while
  there were zone transfers still pending
- Corrects a parser bug that could cause named to crash while
  reading a malformed zone file
- many more smaller fixes
- version 9.9.1

OBS-URL: https://build.opensuse.org/request/show/121732
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=78
2012-05-23 07:21:39 +00:00
Uwe Gansert
8a196b5476 version 9.9.1
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=87
2012-05-22 08:08:00 +00:00
Stephan Kulow
2a2be8bcc1 Accepting request 120594 from network
- added patch to fix an assertion failure

OBS-URL: https://build.opensuse.org/request/show/120594
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=77
2012-05-10 13:13:10 +00:00
Uwe Gansert
766b6fb925 assertion failure fix added
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=85
2012-05-10 11:45:20 +00:00
Stephan Kulow
7a81ccba38 Accepting request 116455 from network
- many dnssec fixes and features (too many to list them
  here, check the changelog)
- improved startup time
- improved scalability
- Added support for Uniform Resource Identifier (URI) resource
  records
- Local copies of slave zones are now saved in raw format by
  default to improve startup performance
  BIND 9.9 changes the default storage format for slave zone
  files from text to raw.  Because named's behavior when a slave
  server cannot read or parse a zone file is to move the offending
  file out of the way and retransfer the zone, slave servers
  that are updated from a pre-9.9.0 version of BIND and which
  have existing copies of slave zone data may wind up with
  extraneous copies of zone data stored, as the existing
  text-format zone file copies will be moved aside to filenames
  of the format db-###### and journal files to the format
  jn-######  (where # represents a hexadecimal digit.)
- many many bugfixes. Please read changelog for details
- fixed handling of TXT records in ldapdump
  (bnc#743758)
- 9.9.0

OBS-URL: https://build.opensuse.org/request/show/116455
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=76
2012-05-08 10:25:28 +00:00
Uwe Gansert
91f038d7f6 version 9.9.0
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=83
2012-05-04 15:07:18 +00:00
Stephan Kulow
f510d24e52 Accepting request 106242 from network
Automatic submission by obs-autosubmit

OBS-URL: https://build.opensuse.org/request/show/106242
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=75
2012-03-01 16:18:46 +00:00
Uwe Gansert
a40cfc49bd Accepting request 104301 from devel:openSUSE:Factory:patch-license
patch license to follow spdx.org standard

OBS-URL: https://build.opensuse.org/request/show/104301
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=81
2012-02-13 13:54:04 +00:00
Uwe Gansert
a3097226b3 Accepting request 98618 from home:lmuelle:branches:network
- Ensure to create the required dir or sym link in /var/run; (bnc#738156).
- Cache lookup could return RRSIG data associated with nonexistent
  records, leading to an assertion failure. CVE-2011-4313; (bnc#730995).

OBS-URL: https://build.opensuse.org/request/show/98618
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=80
2012-01-03 15:16:12 +00:00
Uwe Gansert
e15a83c164 root.hint updated
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=79
2011-12-05 15:49:16 +00:00
Uwe Gansert
7fa43cec68 added managed-keys-directory to named.conf
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=78
2011-12-05 11:55:53 +00:00
Uwe Gansert
e0cc3ad3e3 fixed apparmor profile for lib and lib64 in chroot
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=77
2011-11-22 10:38:06 +00:00
Uwe Gansert
d4710ab62f Accepting request 91958 from home:fteodori:branches:network
OBS-URL: https://build.opensuse.org/request/show/91958
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=76
2011-11-17 13:46:40 +00:00
Uwe Gansert
a0157c5696 reverted last changes
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=75
2011-10-27 11:22:47 +00:00
Uwe Gansert
10e1739870 Accepting request 89487 from home:varkoly:branches:network
- bnc#656509 - don't use --bind on /var/lib/ntp/proc

OBS-URL: https://build.opensuse.org/request/show/89487
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=74
2011-10-27 09:28:17 +00:00
Stephan Kulow
5ecf1796d3 Accepting request 89350 from network
- on a 64bit system a chrooted bind failed to start if 32bit
  libs were installed (bnc#716745)

OBS-URL: https://build.opensuse.org/request/show/89350
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=74
2011-10-26 13:21:07 +00:00
Uwe Gansert
f8aa6fe93d bnc#716745
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=71
2011-10-26 09:15:48 +00:00
Ruediger Oertel
7e559b6e71 Accepting request 86242 from network
add libtool as buildrequires so we no longer rely on libtool in the project config of factory - it's only needed by <10% of all packages (forwarded request 85954 from coolo)

OBS-URL: https://build.opensuse.org/request/show/86242
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=72
2011-10-04 14:54:13 +00:00
Pavol Rusnak
5d9eec831c Accepting request 85954 from home:coolo:removelibtool
add libtool as buildrequires so we no longer rely on libtool in the project config of factory - it's only needed by <10% of all packages

OBS-URL: https://build.opensuse.org/request/show/85954
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=69
2011-10-03 11:38:53 +00:00
Lars Vogdt
68b70aa623 Accepting request 82899 from home:jengelh:bl-b
- Remove redundant tags/sections from specfile
- Use %_smp_mflags for parallel build

OBS-URL: https://build.opensuse.org/request/show/82899
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=68
2011-10-02 00:09:30 +00:00
Lars Vogdt
eba2cba972 Accepting request 82468 from network
- very first restart can create broken chroot
  (bnc#718441)

OBS-URL: https://build.opensuse.org/request/show/82468
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=71
2011-09-19 19:04:54 +00:00
Uwe Gansert
60deb7c4d8 bnc#718441
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=65
2011-09-16 13:48:57 +00:00
Lars Vogdt
8651331685 Accepting request 80897 from network
* fixed SSL in chroot environment (bnc#715881)

* Added a new include file with function typedefs for the DLZ
  "dlopen" driver. [RT #23629]
* Added a tool able to generate malformed packets to allow testing of
  how named handles them. [RT #24096]
* The root key is now provided in the file bind.keys allowing DNSSEC
  validation to be switched on at start up by adding
  "dnssec-validation auto;" to named.conf. If the root key provided
  has expired, named will log the expiration and validation will not
  work. More information and the most current copy of bind.keys can
  be found at http://www.isc.org/bind-keys. *Please note this feature
  was actually added in 9.8.0 but was not included in the 9.8.0
  release notes. [RT #21727]
* If named is configured with a response policy zone (RPZ) and a
  query of type RRSIG is received for a name configured for RRset
  replacement in that RPZ, it will trigger an INSIST and crash the
  server. RRSIG. [RT #24280]
* named, set up to be a caching resolver, is vulnerable to a user
  querying a domain with very large resource record sets (RRSets)
  when trying to negatively cache the response. Due to an off-by-one
  error, caching the response could cause named to crash. [RT #24650]
  [CVE-2011-1910]
* Using Response Policy Zone (RPZ) to query a wildcard CNAME label
  with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
  query type independant. [RT #24715]
* Using Response Policy Zone (RPZ) with DNAME records and querying
  the subdomain of that label can cause named to crash. Now logs that
  DNAME is not supported. [RT #24766]
* Change #2912 populated the message section in replies to UPDATE

OBS-URL: https://build.opensuse.org/request/show/80897
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=70
2011-09-05 14:20:29 +00:00
Uwe Gansert
fe71b72655 SSL in chroot fixed
OBS-URL: https://build.opensuse.org/package/show/network/bind?expand=0&rev=63
2011-09-05 09:42:44 +00:00