SHA256
1
0
forked from pool/bind
Go to file
Dominique Leuenberger 9d196639e3 Accepting request 1072172 from network
- Update to release 9.18.13
  New Features:
  * RPZ updates are now run on specialized “offload” threads to
    reduce the amount of time they block query processing on the
    main networking threads. This increases the responsiveness of
    named when RPZ updates are being applied after an RPZ zone has
    been successfully transferred.
  Feature Changes:
  * Catalog zone updates are now run on specialized “offload”
    threads to reduce the amount of time they block query
    processing on the main networking threads. This increases the
    responsiveness of named when catalog zone updates are being
    applied after a catalog zone has been successfully transferred.
  * libuv support for receiving multiple UDP messages in a single
    recvmmsg() system call has been tweaked several times between
    libuv versions 1.35.0 and 1.40.0; the current recommended libuv
    version is 1.40.0 or higher. New rules are now in effect for
    running with a different version of libuv than the one used at
    compilation time. These rules may trigger a fatal error at
    startup:
    - Building against or running with libuv versions 1.35.0 and
      1.36.0 is now a fatal error.
    - Running with libuv version higher than 1.34.2 is now a
      fatal error when named is built against libuv version
      1.34.2 or lower.
    - Running with libuv version higher than 1.39.0 is now a
      fatal error when named is built against libuv version
      1.37.0, 1.38.0, 1.38.1, or 1.39.0.
  * This prevents the use of libuv versions that may trigger an
    assertion failure when receiving multiple UDP messages in a
    single system call.
  Bug Fixes:
  * named could crash with an assertion failure when adding a new
    zone into the configuration file for a name which was already
    configured as a member zone for a catalog zone. This has been
    fixed.
  * When named starts up, it sends a query for the DNSSEC key for
    each configured trust anchor to determine whether the key has
    changed. In some unusual cases, the query might depend on a
    zone for which the server is itself authoritative, and would
    have failed if it were sent before the zone was fully loaded.
    This has now been fixed by delaying the key queries until all
    zones have finished loading.

OBS-URL: https://build.opensuse.org/request/show/1072172
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=193
2023-03-17 16:02:26 +00:00
.gitattributes OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=1 2006-12-18 23:15:14 +00:00
.gitignore OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/bind?expand=0&rev=1 2006-12-18 23:15:14 +00:00
bind-9.18.13.tar.xz Updating link to change in openSUSE:Factory/bind revision 193 2023-03-17 16:02:26 +00:00
bind-9.18.13.tar.xz.asc Updating link to change in openSUSE:Factory/bind revision 193 2023-03-17 16:02:26 +00:00
bind-ldapdump-use-valid-host.patch Accepting request 1008578 from home:mcepl:branches:network 2022-10-06 23:52:09 +00:00
bind.changes Updating link to change in openSUSE:Factory/bind revision 193 2023-03-17 16:02:26 +00:00
bind.conf Accepting request 992780 from home:jcronenberg:branches:network 2022-08-04 14:25:35 +00:00
bind.keyring Updating link to change in openSUSE:Factory/bind revision 192 2023-02-17 15:44:01 +00:00
bind.spec Updating link to change in openSUSE:Factory/bind revision 193 2023-03-17 16:02:26 +00:00
dlz-schema.txt Updating link to change in openSUSE:Factory/bind revision 45.0 2010-04-13 19:20:44 +00:00
dnszone-schema.txt Accepting request 614550 from home:nkukreja:branches:network 2018-06-07 06:48:37 +00:00
named.conf Accepting request 787151 from home:kukuk:container 2020-03-23 07:34:53 +00:00
named.root Accepting request 909186 from home:polslinux:branches:network 2021-07-29 13:39:41 +00:00
vendor-files.tar.bz2 Accepting request 1055962 from home:thiagomacieira:branches:network 2023-01-05 13:49:53 +00:00