diff --git a/RELEASE-NOTES-BIND-9.7.3.html b/RELEASE-NOTES-BIND-9.7.3.html
deleted file mode 100644
index 2798717474..0000000000
--- a/RELEASE-NOTES-BIND-9.7.3.html
+++ /dev/null
@@ -1,318 +0,0 @@
-
-
-
-
-
-
-
- BIND 9.7.3 is the current release of BIND 9.7.
-
-
- This document summarizes changes from BIND 9.7.1 to BIND 9.7.3.
- Please see the CHANGES file in the source code release for a
- complete list of all changes.
-
-
-
-
-
-
- The latest development version of BIND 9 software can always be found
- on our web site at
- http://www.isc.org/downloads/development.
- There you will find additional information about each release,
- source code, and some pre-compiled versions for certain operating
- systems.
-
-
-
-
-
-
-
-
-
-
-
- Zones may be dynamically added and removed with the
- “rndc addzone” and “rndc delzone” commands. These
- dynamically added zones are written to a per-view
- configuration file. Do not rely on the configuration
- file name nor contents as this will change in a future
- release. This is an experimental feature at this time.
-
-
- Added new “filter-aaaa-on-v4” access control list to
- select which IPv4 clients have AAAA record filtering
- applied.
-
-
- A new command “rndc secroots” was added to dump a combined
- summary of the currently managed keys combined with statically
- configured trust anchors.
-
-
- Added support to load new keys into managed zones without
- signing immediately with "rndc loadkeys". Added support
- to link keys with "dnssec-keygen -S" and
- "dnssec-settime -S".
-
-
-
-
-
-
-
-
-
-
- Documentation improvements
-
-
- ORCHID prefixes were removed from the automatic empty
- zone list.
-
-
- Improved handling of GSSAPI security contexts. Specifically,
- better memory management of cached contexts, limited lifetime
- of a context to 1 hour, and added a “realm” command to
- nsupdate to allow selection of a non-default realm name.
-
-
- The contributed tool “zkt” was updated to version 1.0.
-
-
-
-
-
-
-
-
-
-
- Adding a NO DATA signed negative response to cache failed to clear
- any matching RRSIG records already in cache. A subsequent lookup
- of the cached NO DATA entry could crash named (INSIST) when the
- unexpected RRSIG was also returned with the NO DATA cache entry.
- [RT #22288] [CVE-2010-3613] [VU#706148]
-
-
- BIND, acting as a DNSSEC validator, was determining if the NS RRset
- is insecure based on a value that could mean either that the RRset
- is actually insecure or that there wasn't a matching key for the RRSIG
- in the DNSKEY RRset when resuming from validating the DNSKEY RRset.
- This can happen when in the middle of a DNSKEY algorithm rollover,
- when two different algorithms were used to sign a zone but only the
- new set of keys are in the zone DNSKEY RRset.
- [RT #22309] [CVE-2010-3614] [VU#837744]
-
-
-
- When BIND is running as an authoritative server for a zone and
- receives a query for that zone data, it first checks for allow-query
- acls in the zone statement, then in that view, then in global
- options. If none of these exist, it defaults to allowing any query
- (allow-query {"any"};).
-
-
- With this bug, if the allow-query is not set in the zone statement,
- it failed to check in view or global options and fell back to the
- default of allowing any query. This means that queries that the zone
- owner did not wish to allow were incorrectly allowed.
- [RT #22418] [CVE-2010-3615] [VU#510208]
-
-
-
-
-
-
-
- A flaw where the wrong ACL was applied was fixed. This flaw
- allowed access to a cache via recursion even though the ACL
- disallowed it.
-
-
-
-
-
-
- If BIND, acting as a DNSSEC validating server, has two or more trust
- anchors configured in named.conf for the same zone (such as
- example.com) and the response for a record in that zone from the
- authoritative server includes a bad signature, the validating server
- will crash while trying to validate that query.
-
-
-
-
-
-
-
-
-
-
- BIND now builds with threads disabled in versions of NetBSD earlier
- than 5.0 and with pthreads enabled by default in NetBSD versions 5.0
- and higher. Also removes support for unproven-pthreads, mit-pthreads
- and ptl2. [RT #19203]
-
-
- Added a regression test for fix 2896/RT #21045 ("rndc sign" failed
- to properly update the zone when adding a DNSKEY for publication
- only). [RT #21324]
-
-
- "nsupdate -l" now gives error message if "session.key" file is not
- found. [RT #21670]
-
-
- HPUX now correctly defaults to using /dev/poll, which should
- increase performance. [RT #21919]
-
-
- If named is running as a threaded application, after an "rndc stop"
- command has been issued, other inbound TCP requests can cause named
- to hang and never complete shutdown. [RT #22108]
-
-
- After an "rndc reconfig", the refresh timer for managed-keys is ignored, resulting in managed-keys
- not being refreshed until named is restarted. [RT #22296]
-
-
- An NSEC3PARAM record placed inside a zone which is not properly
- signed with NSEC3 could cause named to crash, if changed via dynamic
- update. [RT #22363]
-
-
- "rndc -h" now includes "loadkeys" option. [RT #22493]
-
-
- When performing a GSS-TSIG signed dynamic zone update, memory could be
- leaked. This causes an unclean shutdown and may affect long-running
- servers. [RT #22573]
-
-
- A bug in NetBSD and FreeBSD kernels with SO_ACCEPTFILTER enabled allows
- for a TCP DoS attack. Until there is a kernel fix, ISC is disabling
- SO_ACCEPTFILTER support in BIND. [RT #22589]
-
-
-When signing records, named didn't filter out any TTL changes
-to DNSKEY records. This resulted in an incomplete key set. TTL
-changes are now dealt with before signing.
-[RT #22590]
-
-
- Corrected a defect where a combination of dynamic updates and zone transfers incorrectly locked the in-memory zone database, causing
- named to freeze. [RT #22614]
-
-
- Don't run MX checks (check-mx) when the MX record points to ".".
-[RT #22645]
-
-
- DST key reference counts can now be incremented via dst_key_attach.
-[RT #22672]
-
-
-The IN6_IS_ADDR_LINKLOCAL and
-IN6_IS_ADDR_SITELOCAL macros in win32 were updated/corrected
-per current Windows OS. [RT #22724]
-
-
- "dnssec-settime -S" no longer tests prepublication interval validity
- when the interval is set to 0. [RT #22761]
-
-
- isc_mutex_init_errcheck() in phtreads/mutex.c failed to destroy attr. [RT #22766]
-
-
- The Kerberos realm was being truncated when being pulled from the
- the host prinicipal, make krb5-self updates fail. [RT #22770]
-
-
- named failed to preserve the case of domain names in RDATA which is not compressible when writing master files. [RT #22863]
-
-
-The man page for dnssec-keyfromlabel incorrectly had "-U" rather
-than the correct option "-I". [RT #22887]
-
-
-The "rndc" command usage statement was missing the "-b" option.
-[RT #22937]
-
-
-There was a bug in how the clients-per-query code worked with some
-query patterns. This could result, in rare circumstances, in having all
-the client query slots filled with queries for the same DNS label,
-essentially ignoring the max-clients-per-query setting.
-[RT #22972]
-
-
-The secure zone update feature in named is based on the zone
-being signed and configured for dynamic updates. A bug in the ACL
-processing for "allow-update { none; };" resulted in a zone that is
-supposed to be static being treated as a dynamic zone. Thus, name
-would try to sign/re-sign that zone erroneously. [RT #23120]
-
-
-
-
-
-
- Microsoft changed the behavior of sockets between NT/XP based
- stacks vs Vista/windows7 stacks. Server 2003/2008 have the older
- behavior, 2008r2 has the new behavior. With the change, different
- error results are possible, so ISC adapted BIND to handle the new
- error results.
- This resolves an issue where sockets would shut down on
- Windows servers causing named to stop responding to queries.
- [RT #21906]
-
-
- Windows has non-POSIX compliant behavior in its rename() and unlink()
- calls. This caused journal compaction to fail on Windows BIND servers
- with the log error: "dns_journal_compact failed: failure".
- [RT #22434]
-
-
-
-
-
-
- A bug, introduced in BIND 9.7.2, caused named to fail to start
- if a master zone file was unreadable or missing. This has
- been corrected in 9.7.2-P1.
-
-
- BIND previously accepted answers from authoritative servers that did
- not provide a "proper" response, such as not setting AA bit. BIND was
- changed to be more strict in what it accepted but this caused
- operational issues. This new strictness has been backed out in
- 9.7.2-P1.
-
-
-
-
-
-
- Removed a warning message when running BIND 9 under Windows
- for when a TCP connection was aborted. This is a common
- occurrence and the warning was extraneous.
-
-
- Worked around a race condition in the cache database memory
- handling. Without this fix a DNS cache DB or ADB could
- incorrectly stay in an over memory state, effectively refusing
- further caching, which subsequently made a BIND 9 caching
- server unworkable.
-
-
- Partially disabled change 2864 because it would cause
- infinite attempts of RRSIG queries.
-
-
- BIND did not properly handle non-cacheable negative responses
- from insecure zones. This caused several non-protocol-compliant
- zones to become unresolvable. BIND is now more accepting of
- responses it receives from less strict servers.
-
-
-
-
-
Known issues in this release
-
-
-
-
- "make test" will fail on OSX and possibly other operating systems.
- The failure occurs in a new test to check for allow-query ACLs.
- The failure is caused because the source address is not specified on
- the dig commands issued in the test.
-
-
- If running "make test" is part of your usual acceptance process,
- please edit the file bin/tests/system/allow_query/test.sh
- and add
-
- -b 10.53.0.2
-
- to the DIGOPTS line.
-
-
-
-
-
-
-
- Thank you to everyone who assisted us in making this release possible.
- If you would like to contribute to ISC to assist us in continuing to make
- quality open source software, please visit our donations page at
- http://www.isc.org/supportisc.
-
-
-
diff --git a/RELEASE-NOTES-BIND-9.7.3.pdf b/RELEASE-NOTES-BIND-9.7.3.pdf
deleted file mode 100644
index c15f7b4d5d..0000000000
Binary files a/RELEASE-NOTES-BIND-9.7.3.pdf and /dev/null differ
diff --git a/RELEASE-NOTES-BIND-9.7.3.txt b/RELEASE-NOTES-BIND-9.7.3.txt
deleted file mode 100644
index a0fcc53d17..0000000000
--- a/RELEASE-NOTES-BIND-9.7.3.txt
+++ /dev/null
@@ -1,220 +0,0 @@
- __________________________________________________________________
-
-Introduction
-
- BIND 9.7.3 is the current release of BIND 9.7.
-
- This document summarizes changes from BIND 9.7.1 to BIND 9.7.3. Please
- see the CHANGES file in the source code release for a complete list of
- all changes.
-
-Download
-
- The latest development version of BIND 9 software can always be found
- on our web site at http://www.isc.org/downloads/development. There you
- will find additional information about each release, source code, and
- some pre-compiled versions for certain operating systems.
-
-Support
-
- Product support information is available on
- http://www.isc.org/services/support for paid support options. Free
- support is provided by our user community via a mailing list.
- Information on all public email lists is available at
- https://lists.isc.org/mailman/listinfo.
-
-New Features
-
-9.7.2
-
- * Zones may be dynamically added and removed with the "rndc addzone"
- and "rndc delzone" commands. These dynamically added zones are
- written to a per-view configuration file. Do not rely on the
- configuration file name nor contents as this will change in a
- future release. This is an experimental feature at this time.
- * Added new "filter-aaaa-on-v4" access control list to select which
- IPv4 clients have AAAA record filtering applied.
- * A new command "rndc secroots" was added to dump a combined summary
- of the currently managed keys combined with statically configured
- trust anchors.
- * Added support to load new keys into managed zones without signing
- immediately with "rndc loadkeys". Added support to link keys with
- "dnssec-keygen -S" and "dnssec-settime -S".
-
-Feature Changes
-
-9.7.2
-
- * Documentation improvements
- * ORCHID prefixes were removed from the automatic empty zone list.
- * Improved handling of GSSAPI security contexts. Specifically, better
- memory management of cached contexts, limited lifetime of a context
- to 1 hour, and added a "realm" command to nsupdate to allow
- selection of a non-default realm name.
- * The contributed tool "zkt" was updated to version 1.0.
-
-Security Fixes
-
-9.7.2-P3
-
- * Adding a NO DATA signed negative response to cache failed to clear
- any matching RRSIG records already in cache. A subsequent lookup of
- the cached NO DATA entry could crash named (INSIST) when the
- unexpected RRSIG was also returned with the NO DATA cache entry.
- [RT #22288] [CVE-2010-3613] [VU#706148]
- * BIND, acting as a DNSSEC validator, was determining if the NS RRset
- is insecure based on a value that could mean either that the RRset
- is actually insecure or that there wasn't a matching key for the
- RRSIG in the DNSKEY RRset when resuming from validating the DNSKEY
- RRset. This can happen when in the middle of a DNSKEY algorithm
- rollover, when two different algorithms were used to sign a zone
- but only the new set of keys are in the zone DNSKEY RRset. [RT
- #22309] [CVE-2010-3614] [VU#837744]
- * When BIND is running as an authoritative server for a zone and
- receives a query for that zone data, it first checks for
- allow-query acls in the zone statement, then in that view, then in
- global options. If none of these exist, it defaults to allowing any
- query (allow-query {"any"};).
- With this bug, if the allow-query is not set in the zone statement,
- it failed to check in view or global options and fell back to the
- default of allowing any query. This means that queries that the
- zone owner did not wish to allow were incorrectly allowed. [RT
- #22418] [CVE-2010-3615] [VU#510208]
-
-9.7.2-P2
-
- * A flaw where the wrong ACL was applied was fixed. This flaw allowed
- access to a cache via recursion even though the ACL disallowed it.
-
-9.7.2-P1
-
- * If BIND, acting as a DNSSEC validating server, has two or more
- trust anchors configured in named.conf for the same zone (such as
- example.com) and the response for a record in that zone from the
- authoritative server includes a bad signature, the validating
- server will crash while trying to validate that query.
-
-Bug Fixes
-
-9.7.3
-
- * BIND now builds with threads disabled in versions of NetBSD earlier
- than 5.0 and with pthreads enabled by default in NetBSD versions
- 5.0 and higher. Also removes support for unproven-pthreads,
- mit-pthreads and ptl2. [RT #19203]
- * Added a regression test for fix 2896/RT #21045 ("rndc sign" failed
- to properly update the zone when adding a DNSKEY for publication
- only). [RT #21324]
- * "nsupdate -l" now gives error message if "session.key" file is not
- found. [RT #21670]
- * HPUX now correctly defaults to using /dev/poll, which should
- increase performance. [RT #21919]
- * If named is running as a threaded application, after an "rndc stop"
- command has been issued, other inbound TCP requests can cause named
- to hang and never complete shutdown. [RT #22108]
- * After an "rndc reconfig", the refresh timer for managed-keys is
- ignored, resulting in managed-keys not being refreshed until named
- is restarted. [RT #22296]
- * An NSEC3PARAM record placed inside a zone which is not properly
- signed with NSEC3 could cause named to crash, if changed via
- dynamic update. [RT #22363]
- * "rndc -h" now includes "loadkeys" option. [RT #22493]
- * When performing a GSS-TSIG signed dynamic zone update, memory could
- be leaked. This causes an unclean shutdown and may affect
- long-running servers. [RT #22573]
- * A bug in NetBSD and FreeBSD kernels with SO_ACCEPTFILTER enabled
- allows for a TCP DoS attack. Until there is a kernel fix, ISC is
- disabling SO_ACCEPTFILTER support in BIND. [RT #22589]
- * When signing records, named didn't filter out any TTL changes to
- DNSKEY records. This resulted in an incomplete key set. TTL changes
- are now dealt with before signing. [RT #22590]
- * Corrected a defect where a combination of dynamic updates and zone
- transfers incorrectly locked the in-memory zone database, causing
- named to freeze. [RT #22614]
- * Don't run MX checks (check-mx) when the MX record points to ".".
- [RT #22645]
- * DST key reference counts can now be incremented via dst_key_attach.
- [RT #22672]
- * The IN6_IS_ADDR_LINKLOCAL and IN6_IS_ADDR_SITELOCAL macros in win32
- were updated/corrected per current Windows OS. [RT #22724]
- * "dnssec-settime -S" no longer tests prepublication interval
- validity when the interval is set to 0. [RT #22761]
- * isc_mutex_init_errcheck() in phtreads/mutex.c failed to destroy
- attr. [RT #22766]
- * The Kerberos realm was being truncated when being pulled from the
- the host prinicipal, make krb5-self updates fail. [RT #22770]
- * named failed to preserve the case of domain names in RDATA which is
- not compressible when writing master files. [RT #22863]
- * The man page for dnssec-keyfromlabel incorrectly had "-U" rather
- than the correct option "-I". [RT #22887]
- * The "rndc" command usage statement was missing the "-b" option. [RT
- #22937]
- * There was a bug in how the clients-per-query code worked with some
- query patterns. This could result, in rare circumstances, in having
- all the client query slots filled with queries for the same DNS
- label, essentially ignoring the max-clients-per-query setting. [RT
- #22972]
- * The secure zone update feature in named is based on the zone being
- signed and configured for dynamic updates. A bug in the ACL
- processing for "allow-update { none; };" resulted in a zone that is
- supposed to be static being treated as a dynamic zone. Thus, name
- would try to sign/re-sign that zone erroneously. [RT #23120]
-
-9.7.2-P3
-
- * Microsoft changed the behavior of sockets between NT/XP based
- stacks vs Vista/windows7 stacks. Server 2003/2008 have the older
- behavior, 2008r2 has the new behavior. With the change, different
- error results are possible, so ISC adapted BIND to handle the new
- error results. This resolves an issue where sockets would shut down
- on Windows servers causing named to stop responding to queries. [RT
- #21906]
- * Windows has non-POSIX compliant behavior in its rename() and
- unlink() calls. This caused journal compaction to fail on Windows
- BIND servers with the log error: "dns_journal_compact failed:
- failure". [RT #22434]
-
-9.7.2-P1
-
- * A bug, introduced in BIND 9.7.2, caused named to fail to start if a
- master zone file was unreadable or missing. This has been corrected
- in 9.7.2-P1.
- * BIND previously accepted answers from authoritative servers that
- did not provide a "proper" response, such as not setting AA bit.
- BIND was changed to be more strict in what it accepted but this
- caused operational issues. This new strictness has been backed out
- in 9.7.2-P1.
-
-9.7.2
-
- * Removed a warning message when running BIND 9 under Windows for
- when a TCP connection was aborted. This is a common occurrence and
- the warning was extraneous.
- * Worked around a race condition in the cache database memory
- handling. Without this fix a DNS cache DB or ADB could incorrectly
- stay in an over memory state, effectively refusing further caching,
- which subsequently made a BIND 9 caching server unworkable.
- * Partially disabled change 2864 because it would cause infinite
- attempts of RRSIG queries.
- * BIND did not properly handle non-cacheable negative responses from
- insecure zones. This caused several non-protocol-compliant zones to
- become unresolvable. BIND is now more accepting of responses it
- receives from less strict servers.
-
-Known issues in this release
-
- * "make test" will fail on OSX and possibly other operating systems.
- The failure occurs in a new test to check for allow-query ACLs. The
- failure is caused because the source address is not specified on
- the dig commands issued in the test.
- If running "make test" is part of your usual acceptance process,
- please edit the file bin/tests/system/allow_query/test.sh and add
- -b 10.53.0.2
- to the DIGOPTS line.
-
-Thank You
-
- Thank you to everyone who assisted us in making this release possible.
- If you would like to contribute to ISC to assist us in continuing to
- make quality open source software, please visit our donations page at
- http://www.isc.org/supportisc.