@@ -42,27 +43,110 @@
-
-
+
+-
- update-policy rules that otherwise ignore the name field now
- require that it be set to "." to ensure that any type list
- present is properly interpreted. Previously, if the name field
- was omitted from the rule declaration but a type list was
- present, it wouldn't be interpreted as expected.
+ When recursion is enabled but the allow-recursion
+ and allow-query-cache ACLs are not specified, they
+ should be limited to local networks, but they were inadvertently set
+ to match the default allow-query, thus allowing
+ remote queries. This flaw is disclosed in CVE-2018-5738. [GL #309]
-
+
+-
+
+ The serve-stale feature could cause an assertion failure in
+ rbtdb.c even when stale-answer-enable was false. The
+ simultaneous use of stale cache records and NSEC aggressive
+ negative caching could trigger a recursion loop in the
+ named process. This flaw is disclosed in
+ CVE-2018-5737. [GL #185]
+
+
+-
+
+ A bug in zone database reference counting could lead to a crash
+ when multiple versions of a slave zone were transferred from a
+ master in close succession. This flaw is disclosed in
+ CVE-2018-5736. [GL #134]
+
+
+
+
+
+
+
+
+-
+
+ update-policy rules that otherwise ignore the
+ name field now require that it be set to "." to ensure that any
+ type list present is properly interpreted. Previously, if the
+ name field was omitted from the rule declaration but a type list
+ was present, it wouldn't be interpreted as expected.
+
+
+-
+
+ named now supports the "root key sentinel"
+ mechanism. This enables validating resolvers to indicate
+ which trust anchors are configured for the root, so that
+ information about root key rollover status can be gathered.
+ To disable this feature, add
+ root-key-sentinel no; to
+ named.conf. [GL #37]
+
+
+-
+
+ Add the ability to not return a DNS COOKIE option when one
+ is present in the request. To prevent a cookie being returned
+ add 'answer-cookie no;' to named.conf. [GL #173]
+
+
+ answer-cookie is only available as a
+ temporary measure, for use when named
+ shares an IP address with other servers that do not yet
+ support DNS COOKIE. A mismatch between servers on the
+ same address is not expected to cause operational problems,
+ but the option to disable COOKIE responses so that all
+ servers have the same behavior is provided out of an
+ abundance of caution. DNS COOKIE is an important security
+ mechanism and should not be disabled unless absolutely
+ necessary. The answer-cookie option
+ is obsolete as of BIND 9.13.
+
+
+
-
-
+
+
+-
+
+ BIND now can be compiled against libidn2 library to add
+ IDNA2008 support. Previously BIND only supported IDNA2003
+ using (now obsolete) idnkit-1 library.
+
+
+-
+
+ dig +noidnin can be used to disable IDN
+ processing on the input domain name, when BIND is compiled
+ with IDN support.
+
+
+
@@ -99,6 +183,12 @@
completed. [RT #47076]
+
+
+ named could crash when rolling a
+ dnstap log file. [RT #46942]
+
+
diff --git a/doc/arm/notes.pdf b/doc/arm/notes.pdf
index 2cf944caba..5530739c99 100644
Binary files a/doc/arm/notes.pdf and b/doc/arm/notes.pdf differ
diff --git a/doc/arm/notes.txt b/doc/arm/notes.txt
index be47b98976..fad050590e 100644
--- a/doc/arm/notes.txt
+++ b/doc/arm/notes.txt
@@ -1,28 +1,10 @@
-Release Notes for BIND Version 9.13.0
+Release Notes for BIND Version 9.12.2rc1
Introduction
-BIND 9.13 is an unstable development release of BIND. This document
-summarizes new features and functional changes that have been introduced
-on this branch. With each development release leading up to the stable
-BIND 9.14 release, this document will be updated with additional features
-added and bugs fixed.
-
-Note on Version Numbering
-
-Prior to BIND 9.13, new feature development releases were tagged as
-"alpha" and "beta", leading up to the first stable release for a given
-development branch, which always ended in ".0".
-
-Now, however, BIND has adopted the "odd-unstable/even-stable" release
-numbering convention. There will be no "alpha" or "beta" releases in the
-9.13 branch, only increasing version numbers. So, for example, what would
-previously have been called 9.13.0a1, 9.13.0a2, 9.13.0b1, and so on, will
-instead be called 9.13.0, 9.13.1, 9.13.2, etc.
-
-The first stable release from this development branch will be renamed as
-9.14.0. Thereafter, maintenance releases will continue on the 9.14 branch,
-while unstable feature development proceeds in 9.15.
+This document summarizes changes since the last production release on the
+BIND 9.12 branch. Please see the CHANGES for a further list of bug fixes
+and other changes.
Download
@@ -33,86 +15,79 @@ operating systems.
Security Fixes
- * None.
+ * When recursion is enabled but the allow-recursion and
+ allow-query-cache ACLs are not specified, they should be limited to
+ local networks, but they were inadvertently set to match the default
+ allow-query, thus allowing remote queries. This flaw is disclosed in
+ CVE-2018-5738. [GL #309]
+
+ * The serve-stale feature could cause an assertion failure in rbtdb.c
+ even when stale-answer-enable was false. The simultaneous use of stale
+ cache records and NSEC aggressive negative caching could trigger a
+ recursion loop in the named process. This flaw is disclosed in
+ CVE-2018-5737. [GL #185]
+
+ * A bug in zone database reference counting could lead to a crash when
+ multiple versions of a slave zone were transferred from a master in
+ close succession. This flaw is disclosed in CVE-2018-5736. [GL #134]
New Features
- * BIND now can be compiled against the libidn2 library to add IDNA2008
- support. Previously, BIND supported IDNA2003 using the (now obsolete
- and unsupported) idnkit-1 library.
+ * update-policy rules that otherwise ignore the name field now require
+ that it be set to "." to ensure that any type list present is properly
+ interpreted. Previously, if the name field was omitted from the rule
+ declaration but a type list was present, it wouldn't be interpreted as
+ expected.
* named now supports the "root key sentinel" mechanism. This enables
- validating resolvers to indicate to which trust anchors are configured
+ validating resolvers to indicate which trust anchors are configured
for the root, so that information about root key rollover status can
be gathered. To disable this feature, add root-key-sentinel no; to
- named.conf.
+ named.conf. [GL #37]
- * The dnskey-sig-validity option allows the sig-validity-interval to be
- overriden for signatures covering DNSKEY RRsets. [GL #145]
+ * Add the ability to not return a DNS COOKIE option when one is present
+ in the request. To prevent a cookie being returned add 'answer-cookie
+ no;' to named.conf. [GL #173]
-Removed Features
-
- * dnssec-keygen can no longer generate HMAC keys for TSIG
- authentication. Use tsig-keygen to generate these keys. [RT #46404]
-
- * Support for OpenSSL 0.9.x has been removed. OpenSSL version 1.0.0 or
- greater, or LibreSSL is now required.
-
- * The configure --enable-seccomp option, which formerly turned on
- system-call filtering on Linux, has been removed. [GL #93]
-
- * IPv4 addresses in forms other than dotted-quad are no longer accepted
- in master files. [GL #13] [GL #56]
-
- * IDNA2003 support via (bundled) idnkit-1.0 has been removed.
-
- * The "rbtdb64" database implementation (a parallel implementation of
- "rbt") has been removed. [GL #217]
-
- * The -r randomdev option to explicitly select random device has been
- removed from the ddns-confgen, rndc-confgen, nsupdate, dnssec-confgen,
- and dnssec-signzone commands.
-
- The -p option to use pseudo-random data has been removed from the
- dnssec-signzone command.
+ answer-cookie is only available as a temporary measure, for use when
+ named shares an IP address with other servers that do not yet support
+ DNS COOKIE. A mismatch between servers on the same address is not
+ expected to cause operational problems, but the option to disable
+ COOKIE responses so that all servers have the same behavior is
+ provided out of an abundance of caution. DNS COOKIE is an important
+ security mechanism and should not be disabled unless absolutely
+ necessary. The answer-cookie option is obsolete as of BIND 9.13.
Feature Changes
- * BIND will now always use the best CSPRNG (cryptographically-secure
- pseudo-random number generator) available on the platform where it is
- compiled. It will use arc4random() family of functions on BSD
- operating systems, getrandom() on Linux and Solaris, CryptGenRandom on
- Windows, and the selected cryptography provider library (OpenSSL or
- PKCS#11) as the last resort. [GL #221]
-
- * BIND can no longer be built without DNSSEC support. A cryptography
- provder (i.e., OpenSSL or a hardware service module with PKCS#11
- support) must be available. [GL #244]
-
- * Zone types primary and secondary are now available as synonyms for
- master and slave, respectively, in named.conf.
-
* named will now log a warning if the old root DNSSEC key is explicitly
configured and has not been updated. [RT #43670]
- * dig +nssearch will now list name servers that have timed out, in
- addition to those that respond. [GL #64]
+ * BIND now can be compiled against libidn2 library to add IDNA2008
+ support. Previously BIND only supported IDNA2003 using (now obsolete)
+ idnkit-1 library.
* dig +noidnin can be used to disable IDN processing on the input domain
name, when BIND is compiled with IDN support.
- * Up to 64 response-policy zones are now supported by default;
- previously the limit was 32. [GL #123]
-
- * Several configuration options for time periods can now use TTL value
- suffixes (for example, 2h or 1d) in addition to an integer number of
- seconds. These include fstrm-set-reopen-interval, interface-interval,
- max-cache-ttl, max-ncache-ttl, max-policy-ttl, and min-update-interval
- . [GL #203]
-
Bug Fixes
- * None.
+ * When answering authoritative queries, named does not return the target
+ of a cross-zone CNAME between two locally served zones; this prevents
+ accidental cache poisoning. This same restriction was incorrectly
+ applied to recursive queries as well; this has been fixed. [RT #47078]
+
+ * named could crash when acting as a slave for a catalog zone if zone
+ contained a master definition without an IP address. [RT #45999]
+
+ * named could crash due to a race condition when rolling dnstap log
+ files. [RT #46942]
+
+ * rndc reload could cause named to leak memory if it was invoked before
+ the zone loading actions from a previous rndc reload command were
+ completed. [RT #47076]
+
+ * named could crash when rolling a dnstap log file. [RT #46942]
License
@@ -131,12 +106,11 @@ www.isc.org/mission/contact/.
End of Life
-BIND 9.13 is an unstable development branch. When its development is
-complete, it will be renamed to BIND 9.14, which will be a stable branch.
-
-The end of life date for BIND 9.14 has not yet been determined. For those
-needing long term support, the current Extended Support Version (ESV) is
-BIND 9.11, which will be supported until at least December 2021. See
+The end-of-life date for BIND 9.12 has not yet been determined. However,
+it is not intended to be an Extended Support Version (ESV) branch;
+accordingly, support will end after the next stable branch (9.14) becomes
+available. Those needing a longer-lived branch are encouraged to use the
+current ESV, BIND 9.11, which will be supported until December 2021. See
https://www.isc.org/downloads/software-support-policy/ for details of
ISC's software support policy.
diff --git a/doc/misc/options b/doc/misc/options
index f8a17392e1..62392b0b91 100644
--- a/doc/misc/options
+++ b/doc/misc/options
@@ -79,6 +79,7 @@ options {
] [ dscp
];
alt-transfer-source-v6 ( | * ) [ port ( |
* ) ] [ dscp ];
+ answer-cookie ;
attach-cache ;
auth-nxdomain ; // default changed
auto-dnssec ( allow | maintain | off );
@@ -640,8 +641,8 @@ view [ ] {
dnsrps-enable ] [ dnsrps-options {
} ];
rfc2308-type1 ; // not yet implemented
- root-key-sentinel ;
root-delegation-only [ exclude { ; ... } ];
+ root-key-sentinel ;
rrset-order { [ class ] [ type ] [ name
] ; ... };
send-cookie ;
diff --git a/isc-config.sh.1 b/isc-config.sh.1
index 869cdbe0ce..2921c33930 100644
--- a/isc-config.sh.1
+++ b/isc-config.sh.1
@@ -1,4 +1,4 @@
-.\" Copyright (C) 2009, 2014-2017 Internet Systems Consortium, Inc. ("ISC")
+.\" Copyright (C) 2009, 2014-2018 Internet Systems Consortium, Inc. ("ISC")
.\"
.\" This Source Code Form is subject to the terms of the Mozilla Public
.\" License, v. 2.0. If a copy of the MPL was not distributed with this
@@ -90,5 +90,5 @@ returns an exit status of 1 if invoked with invalid arguments or no arguments at
\fBInternet Systems Consortium, Inc\&.\fR
.SH "COPYRIGHT"
.br
-Copyright \(co 2009, 2014-2017 Internet Systems Consortium, Inc. ("ISC")
+Copyright \(co 2009, 2014-2018 Internet Systems Consortium, Inc. ("ISC")
.br
diff --git a/isc-config.sh.html b/isc-config.sh.html
index 8022b416a9..849b12d8d3 100644
--- a/isc-config.sh.html
+++ b/isc-config.sh.html
@@ -1,6 +1,6 @@