2015-10-06 00:59:35 -04:00
|
|
|
<!DOCTYPE book [
|
|
|
|
|
<!ENTITY Scaron "Š">
|
|
|
|
|
<!ENTITY ccaron "č">
|
2016-04-28 03:12:33 -04:00
|
|
|
<!ENTITY aacute "á">
|
2015-10-06 00:59:35 -04:00
|
|
|
<!ENTITY mdash "—">
|
|
|
|
|
<!ENTITY ouml "ö">]>
|
2014-10-20 15:49:14 -04:00
|
|
|
<!--
|
2017-01-12 18:46:13 -05:00
|
|
|
- Copyright (C) 2014-2017 Internet Systems Consortium, Inc. ("ISC")
|
2014-10-20 15:49:14 -04:00
|
|
|
-
|
2016-06-27 00:56:38 -04:00
|
|
|
- This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
|
- License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
|
- file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
2014-10-20 15:49:14 -04:00
|
|
|
-->
|
2015-10-06 19:45:23 -04:00
|
|
|
|
2016-12-06 18:49:55 -05:00
|
|
|
<section xmlns:db="http://docbook.org/ns/docbook" version="5.0"><info/>
|
2015-10-06 00:59:35 -04:00
|
|
|
<xi:include xmlns:xi="http://www.w3.org/2001/XInclude" href="noteversion.xml"/>
|
|
|
|
|
<section xml:id="relnotes_intro"><info><title>Introduction</title></info>
|
2014-10-20 15:49:14 -04:00
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
This document summarizes changes since the last production
|
|
|
|
|
release on the BIND 9.11 branch.
|
2016-12-28 16:20:44 -05:00
|
|
|
Please see the <filename>CHANGES</filename> file for a further
|
|
|
|
|
list of bug fixes and other changes.
|
2014-10-20 15:49:14 -04:00
|
|
|
</para>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
2015-10-22 01:09:46 -04:00
|
|
|
|
2016-03-22 23:00:09 -04:00
|
|
|
<section xml:id="relnotes_download"><info><title>Download</title></info>
|
2014-10-20 15:49:14 -04:00
|
|
|
<para>
|
|
|
|
|
The latest versions of BIND 9 software can always be found at
|
2015-10-06 00:59:35 -04:00
|
|
|
<link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.isc.org/downloads/">http://www.isc.org/downloads/</link>.
|
2014-10-20 15:49:14 -04:00
|
|
|
There you will find additional information about each release,
|
|
|
|
|
source code, and pre-compiled versions for Microsoft Windows
|
|
|
|
|
operating systems.
|
|
|
|
|
</para>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
2015-10-22 01:09:46 -04:00
|
|
|
|
2017-02-05 01:15:30 -05:00
|
|
|
<section xml:id="root_key"><info><title>New DNSSEC Root Key</title></info>
|
|
|
|
|
<para>
|
|
|
|
|
ICANN is in the process of introducing a new Key Signing Key (KSK) for
|
|
|
|
|
the global root zone. BIND has multiple methods for managing DNSSEC
|
|
|
|
|
trust anchors, with somewhat different behaviors. If the root
|
|
|
|
|
key is configured using the <command>managed-keys</command>
|
|
|
|
|
statement, or if the pre-configured root key is enabled by using
|
|
|
|
|
<command>dnssec-validation auto</command>, then BIND can keep
|
|
|
|
|
keys up to date automatically. Servers configured in this way
|
|
|
|
|
will roll seamlessly to the new key when it is published in
|
|
|
|
|
the root zone. However, keys configured using the
|
|
|
|
|
<command>trusted-keys</command> statement are not automatically
|
|
|
|
|
maintained. If your server is performing DNSSEC validation
|
|
|
|
|
and is configured using <command>trusted-keys</command>, you are
|
|
|
|
|
advised to change your configuration before the root zone begins
|
|
|
|
|
signing with the new KSK. This is currently scheduled for
|
|
|
|
|
October 11, 2017.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
This release includes an updated version of the
|
|
|
|
|
<filename>bind.keys</filename> file containing the new root
|
|
|
|
|
key. This file can also be downloaded from
|
|
|
|
|
<link xmlns:xlink="http://www.w3.org/1999/xlink"
|
|
|
|
|
xlink:href="https://www.isc.org/bind-keys">
|
|
|
|
|
https://www.isc.org/bind-keys
|
|
|
|
|
</link>.
|
|
|
|
|
</para>
|
|
|
|
|
</section>
|
|
|
|
|
|
2016-06-27 13:01:58 -04:00
|
|
|
<section xml:id="relnotes_license"><info><title>License Change</title></info>
|
2016-07-05 23:01:40 -04:00
|
|
|
<para>
|
2016-12-28 19:07:40 -05:00
|
|
|
With the release of BIND 9.11.0, ISC changed to the open
|
2016-07-05 23:01:40 -04:00
|
|
|
source license for BIND from the ISC license to the Mozilla
|
2016-12-28 14:24:56 -05:00
|
|
|
Public License (MPL 2.0).
|
2016-07-05 23:01:40 -04:00
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
The MPL-2.0 license requires that if you make changes to
|
|
|
|
|
licensed software (e.g. BIND) and distribute them outside
|
|
|
|
|
your organization, that you publish those changes under that
|
|
|
|
|
same license. It does not require that you publish or disclose
|
|
|
|
|
anything other than the changes you made to our software.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
This new requirement will not affect anyone who is using BIND
|
|
|
|
|
without redistributing it, nor anyone redistributing it without
|
|
|
|
|
changes, therefore this change will be without consequence
|
|
|
|
|
for most individuals and organizations who are using BIND.
|
|
|
|
|
</para>
|
|
|
|
|
<para>
|
|
|
|
|
Those unsure whether or not the license change affects their
|
|
|
|
|
use of BIND, or who wish to discuss how to comply with the
|
|
|
|
|
license may contact ISC at <link
|
|
|
|
|
xmlns:xlink="http://www.w3.org/1999/xlink"
|
|
|
|
|
xlink:href="https://www.isc.org/mission/contact/">
|
|
|
|
|
https://www.isc.org/mission/contact/</link>.
|
|
|
|
|
</para>
|
2016-06-27 13:01:58 -04:00
|
|
|
</section>
|
|
|
|
|
|
2016-03-22 23:00:09 -04:00
|
|
|
<section xml:id="relnotes_security"><info><title>Security Fixes</title></info>
|
2014-10-20 15:49:14 -04:00
|
|
|
<itemizedlist>
|
2017-03-29 11:56:33 -04:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
'rndc ""' could trigger a assertion failure in named. This flaw
|
|
|
|
|
is disclosed in (CVE-2017-3138). [RT #44924]
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2017-02-23 17:55:10 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
Some chaining (i.e., type CNAME or DNAME) responses to upstream
|
|
|
|
|
queries could trigger assertion failures. This flaw is disclosed
|
|
|
|
|
in CVE-2017-3137. [RT #44734]
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2017-02-14 20:44:12 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
<command>dns64</command> with <command>break-dnssec yes;</command>
|
|
|
|
|
can result in an assertion failure. This flaw is disclosed in
|
2017-02-23 17:55:10 -05:00
|
|
|
CVE-2017-3136. [RT #44653]
|
2017-02-14 20:44:12 -05:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2017-01-23 17:53:21 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2017-01-23 23:04:30 -05:00
|
|
|
If a server is configured with a response policy zone (RPZ)
|
|
|
|
|
that rewrites an answer with local data, and is also configured
|
|
|
|
|
for DNS64 address mapping, a NULL pointer can be read
|
|
|
|
|
triggering a server crash. This flaw is disclosed in
|
|
|
|
|
CVE-2017-3135. [RT #44434]
|
2017-01-23 17:53:21 -05:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2016-11-02 02:31:27 -04:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 22:44:48 -05:00
|
|
|
A coding error in the <option>nxdomain-redirect</option>
|
|
|
|
|
feature could lead to an assertion failure if the redirection
|
|
|
|
|
namespace was served from a local authoritative data source
|
|
|
|
|
such as a local zone or a DLZ instead of via recursive
|
|
|
|
|
lookup. This flaw is disclosed in CVE-2016-9778. [RT #43837]
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
<command>named</command> could mishandle authority sections
|
|
|
|
|
with missing RRSIGs, triggering an assertion failure. This
|
|
|
|
|
flaw is disclosed in CVE-2016-9444. [RT #43632]
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
<command>named</command> mishandled some responses where
|
|
|
|
|
covering RRSIG records were returned without the requested
|
|
|
|
|
data, resulting in an assertion failure. This flaw is
|
|
|
|
|
disclosed in CVE-2016-9147. [RT #43548]
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
<command>named</command> incorrectly tried to cache TKEY
|
|
|
|
|
records which could trigger an assertion failure when there was
|
|
|
|
|
a class mismatch. This flaw is disclosed in CVE-2016-9131.
|
|
|
|
|
[RT #43522]
|
2016-11-02 02:31:27 -04:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2016-09-08 21:54:19 -04:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
It was possible to trigger assertions when processing
|
2016-12-28 22:44:48 -05:00
|
|
|
responses containing answers of type DNAME. This flaw is
|
2016-12-28 14:24:56 -05:00
|
|
|
disclosed in CVE-2016-8864. [RT #43465]
|
2016-02-22 01:52:43 -05:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2016-12-28 19:07:40 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 22:44:48 -05:00
|
|
|
Added the ability to specify the maximum number of records
|
|
|
|
|
permitted in a zone (<option>max-records #;</option>).
|
|
|
|
|
This provides a mechanism to block overly large zone
|
|
|
|
|
transfers, which is a potential risk with slave zones from
|
|
|
|
|
other parties, as described in CVE-2016-6170.
|
|
|
|
|
[RT #42143]
|
2016-12-28 19:07:40 -05:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2014-10-20 15:49:14 -04:00
|
|
|
</itemizedlist>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
2015-10-22 01:09:46 -04:00
|
|
|
|
2016-12-28 14:24:56 -05:00
|
|
|
<section xml:id="relnotes_changes"><info><title>Feature Changes</title></info>
|
2014-10-20 15:49:14 -04:00
|
|
|
<itemizedlist>
|
2017-02-03 20:11:06 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
<command>dnstap</command> now stores both the local and remote
|
|
|
|
|
addresses for all messages, instead of only the remote address.
|
|
|
|
|
The default output format for <command>dnstap-read</command> has
|
|
|
|
|
been updated to include these addresses, with the initiating
|
|
|
|
|
address first and the responding address second, separated by
|
|
|
|
|
"-%gt;" or "%lt;-" to indicate in which direction the message
|
|
|
|
|
was sent. [RT #43595]
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2016-05-26 15:23:19 -04:00
|
|
|
<listitem>
|
2016-07-02 17:06:27 -04:00
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
Expanded and improved the YAML output from
|
|
|
|
|
<command>dnstap-read -y</command>: it now includes packet
|
|
|
|
|
size and a detailed breakdown of message contents.
|
|
|
|
|
[RT #43622] [RT #43642]
|
2016-05-25 16:54:34 -04:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2016-07-22 06:02:17 -04:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
If an ACL is specified with an address prefix in which the
|
|
|
|
|
prefix length is longer than the address portion (for example,
|
|
|
|
|
192.0.2.1/8), <command>named</command> will now log a warning.
|
|
|
|
|
In future releases this will be a fatal configuration error.
|
|
|
|
|
[RT #43367]
|
2016-07-22 06:02:17 -04:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2014-10-20 15:49:14 -04:00
|
|
|
</itemizedlist>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
2015-10-22 01:09:46 -04:00
|
|
|
|
2016-12-28 14:24:56 -05:00
|
|
|
<section xml:id="relnotes_bugs"><info><title>Bug Fixes</title></info>
|
2014-10-20 15:49:14 -04:00
|
|
|
<itemizedlist>
|
2017-01-30 17:11:17 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
A synthesized CNAME record appearing in a response before the
|
|
|
|
|
associated DNAME could be cached, when it should not have been.
|
|
|
|
|
This was a regression introduced while addressing CVE-2016-8864.
|
|
|
|
|
[RT #44318]
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2017-01-11 22:25:45 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2017-02-07 11:18:55 -05:00
|
|
|
<command>named</command> could deadlock if multiple changes
|
|
|
|
|
to NSEC/NSEC3 parameters for the same zone were being processed
|
|
|
|
|
at the same time. [RT #42770]
|
2017-01-11 22:25:45 -05:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2017-01-11 22:17:43 -05:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2017-02-07 11:18:55 -05:00
|
|
|
<command>named</command> could trigger an assertion when
|
|
|
|
|
sending NOTIFY messages. [RT #44019]
|
2017-01-11 22:17:43 -05:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2016-05-04 17:27:38 -04:00
|
|
|
<listitem>
|
2016-09-22 17:49:26 -04:00
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
Referencing a nonexistent zone in a <command>response-policy</command>
|
|
|
|
|
statement could cause an assertion failure during configuration.
|
|
|
|
|
[RT #43787]
|
2016-05-05 12:33:28 -04:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2015-07-05 23:18:37 -04:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
<command>rndc addzone</command> could cause a crash
|
|
|
|
|
when attempting to add a zone with a type other than
|
|
|
|
|
<command>master</command> or <command>slave</command>.
|
|
|
|
|
Such zones are now rejected. [RT #43665]
|
2015-07-05 23:18:37 -04:00
|
|
|
</para>
|
2015-09-10 23:27:58 -04:00
|
|
|
</listitem>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
<command>named</command> could hang when encountering log
|
|
|
|
|
file names with large apparent gaps in version number (for
|
|
|
|
|
example, when files exist called "logfile.0", "logfile.1",
|
|
|
|
|
and "logfile.1482954169"). This is now handled correctly.
|
|
|
|
|
[RT #38688]
|
2015-09-10 23:27:58 -04:00
|
|
|
</para>
|
2015-10-02 21:36:49 -04:00
|
|
|
</listitem>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
If a zone was updated while <command>named</command> was
|
|
|
|
|
processing a query for nonexistent data, it could return
|
|
|
|
|
out-of-sync NSEC3 records causing potential DNSSEC validation
|
|
|
|
|
failure. [RT #43247]
|
2016-12-28 14:09:12 -05:00
|
|
|
</para>
|
|
|
|
|
</listitem>
|
2015-09-10 22:25:39 -04:00
|
|
|
</itemizedlist>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
2016-03-22 23:00:09 -04:00
|
|
|
|
2016-12-28 14:24:56 -05:00
|
|
|
<section xml:id="relnotes_maint"><info><title>Maintenance</title></info>
|
2014-10-20 15:49:14 -04:00
|
|
|
<itemizedlist>
|
2016-05-25 21:40:47 -04:00
|
|
|
<listitem>
|
|
|
|
|
<para>
|
2016-12-28 14:24:56 -05:00
|
|
|
The built-in root hints have been updated to include an
|
|
|
|
|
IPv6 address (2001:500:12::d0d) for G.ROOT-SERVERS.NET.
|
2016-03-23 00:38:25 -04:00
|
|
|
</para>
|
2015-05-21 17:29:22 -04:00
|
|
|
</listitem>
|
2014-10-20 15:49:14 -04:00
|
|
|
</itemizedlist>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
2015-10-22 01:09:46 -04:00
|
|
|
|
2016-12-26 19:52:07 -05:00
|
|
|
<section xml:id="relnotes_misc"><info><title>Miscellaneous Notes</title></info>
|
|
|
|
|
<itemizedlist>
|
|
|
|
|
<listitem>
|
|
|
|
|
<para>
|
|
|
|
|
Authoritative server support for the EDNS Client Subnet option
|
|
|
|
|
(ECS), introduced in BIND 9.11.0, was based on an early version
|
|
|
|
|
of the specification, and is now known to have incompatibilities
|
|
|
|
|
with other ECS implementations. It is also inefficient, requiring
|
|
|
|
|
a separate view for each answer, and is unable to correct for
|
|
|
|
|
overlapping subnets in the configuration. It is intended for
|
|
|
|
|
testing purposes but is not recommended for for production use.
|
|
|
|
|
This was not made sufficiently clear in the documentation at
|
|
|
|
|
the time of release.
|
|
|
|
|
</para>
|
|
|
|
|
</listitem>
|
|
|
|
|
</itemizedlist>
|
|
|
|
|
</section>
|
|
|
|
|
|
2016-05-25 21:40:47 -04:00
|
|
|
<section xml:id="end_of_life"><info><title>End of Life</title></info>
|
2014-10-30 22:08:42 -04:00
|
|
|
<para>
|
|
|
|
|
The end of life for BIND 9.11 is yet to be determined but
|
|
|
|
|
will not be before BIND 9.13.0 has been released for 6 months.
|
2015-10-06 00:59:35 -04:00
|
|
|
<link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.isc.org/downloads/software-support-policy/">https://www.isc.org/downloads/software-support-policy/</link>
|
2014-10-30 22:08:42 -04:00
|
|
|
</para>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
|
|
|
|
<section xml:id="relnotes_thanks"><info><title>Thank You</title></info>
|
2015-10-22 01:09:46 -04:00
|
|
|
|
2014-10-20 15:49:14 -04:00
|
|
|
<para>
|
|
|
|
|
Thank you to everyone who assisted us in making this release possible.
|
|
|
|
|
If you would like to contribute to ISC to assist us in continuing to
|
|
|
|
|
make quality open source software, please visit our donations page at
|
2015-10-06 00:59:35 -04:00
|
|
|
<link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.isc.org/donate/">http://www.isc.org/donate/</link>.
|
2014-10-20 15:49:14 -04:00
|
|
|
</para>
|
2015-10-06 00:59:35 -04:00
|
|
|
</section>
|
|
|
|
|
</section>
|