diff --git a/doc/arm/notes-9.16.2.xml b/doc/arm/notes-9.16.2.xml
index 106c6a3d1e..1306ac9a21 100644
--- a/doc/arm/notes-9.16.2.xml
+++ b/doc/arm/notes-9.16.2.xml
@@ -15,9 +15,9 @@
- DNS rebinding protection was ineffective when BIND 9 is configured as
- a forwarding DNS server. Found and responsibly reported by Tobias
- Klein. [GL #1574]
+ DNS rebinding protection was ineffective when BIND 9 is configured as
+ a forwarding DNS server. Found and responsibly reported by Tobias
+ Klein. [GL #1574]
@@ -27,29 +27,25 @@
- None.
+ We have received reports that in some circumstances, receipt of an
+ IXFR can cause the processing of queries to slow significantly. Some
+ of these were related to RPZ processing, which has been fixed in this
+ release (see below). Others appear to occur where there are
+ NSEC3-related changes (such as an operator changing the NSEC3 salt
+ used in the hash calculation). These are being investigated.
+ [GL #1685]
- New Features
-
-
-
- None.
-
-
-
-
-
Feature Changes
- The DNSSEC sign statistics used lots of memory. The number of keys
- to track is reduced to four per zone, which should be enough for
- 99% of all signed zones. [GL #1179]
+ The previous DNSSEC sign statistics used lots of memory. The number of
+ keys to track is reduced to four per zone, which should be enough for
+ 99% of all signed zones. [GL #1179]
@@ -59,20 +55,25 @@
- When an RPZ policy zone was updated via zone transfer
- and a large number of records were deleted, named
- could become nonresponsive for a short period while deleted
- names were removed from the RPZ summary database. This database
- cleanup is now done incrementally over a longer period of time,
- reducing such delays. [GL #1447]
+ When an RPZ policy zone was updated via zone transfer and a large
+ number of records was deleted, named could become
+ nonresponsive for a short period while deleted names were removed from
+ the RPZ summary database. This database cleanup is now done
+ incrementally over a longer period of time, reducing such delays.
+ [GL #1447]
- Migration to dnssec-policy from existing DNSSEC strategy with
- auto-dnssec maintain did not work due to bad initializing of the
- key states. Fixed by looking closely at the time metadata to
- set the key states to the correct values. [GL #1706]
+ When trying to migrate an already-signed zone from
+ auto-dnssec maintain to one based on
+ dnssec-policy, the existing keys were immediately
+ deleted and replaced with new ones. As the key rollover timing
+ constraints were not being followed, it was possible that some clients
+ would not have been able to validate responses until all old DNSSEC
+ information had timed out from caches. BIND now looks at the time
+ metadata of the existing keys and incorporates it into its DNSSEC
+ policy operation. [GL #1706]