Fri Dec 18 19:46:02 2015 UTC ()
Pullup ticket #4872 - requested by taca
net/bind910: security fix

Revisions pulled up:
- net/bind910/Makefile                                          1.13-1.14
- net/bind910/distinfo                                          1.12-1.13
- net/bind910/patches/patch-bin_dig_dighost.c                   1.3
- net/bind910/patches/patch-bin_tests_system_Makefile.in        1.3
- net/bind910/patches/patch-configure                           1.4

---
   Module Name:    pkgsrc
   Committed By:   taca
   Date:           Sun Dec 13 17:35:22 UTC 2015

   Modified Files:
           pkgsrc/net/bind910: Makefile distinfo
           pkgsrc/net/bind910/patches: patch-bin_dig_dighost.c
               patch-bin_tests_system_Makefile.in patch-configure

   Log Message:
   Update bind910 to 9.10.3.

   Security Fixes

        * An incorrect boundary check in the OPENPGPKEY rdatatype could
          trigger an assertion failure. This flaw is disclosed in
          CVE-2015-5986. [RT #40286]
        * A buffer accounting error could trigger an assertion failure when
          parsing certain malformed DNSSEC keys.
          This flaw was discovered by Hanno B旦ck of the Fuzzing Project, and
          is disclosed in CVE-2015-5722. [RT #40212]
        * A specially crafted query could trigger an assertion failure in
          message.c.
          This flaw was discovered by Jonathan Foote, and is disclosed in
          CVE-2015-5477. [RT #40046]
        * On servers configured to perform DNSSEC validation, an assertion
          failure could be triggered on answers from a specially configured
          server.
          This flaw was discovered by Breno Silveira Soares, and is disclosed
          in CVE-2015-4620. [RT #39795]

   New Features

        * New quotas have been added to limit the queries that are sent by
          recursive resolvers to authoritative servers experiencing
          denial-of-service attacks. When configured, these options can both
          reduce the harm done to authoritative servers and also avoid the
          resource exhaustion that can be experienced by recursives when they
          are being used as a vehicle for such an attack.
          NOTE: These options are not available by default; use configure
          --enable-fetchlimit to include them in the build.
             + fetches-per-server limits the number of simultaneous queries
               that can be sent to any single authoritative server. The
               configured value is a starting point; it is automatically
               adjusted downward if the server is partially or completely
               non-responsive. The algorithm used to adjust the quota can be
               configured via the fetch-quota-params option.
             + fetches-per-zone limits the number of simultaneous queries
               that can be sent for names within a single domain. (Note:
               Unlike "fetches-per-server", this value is not self-tuning.)
          Statistics counters have also been added to track the number of
          queries affected by these quotas.
        * dig +ednsflags can now be used to set yet-to-be-defined EDNS flags
          in DNS requests.
        * dig +[no]ednsnegotiation can now be used enable / disable EDNS
          version negotiation.
        * An --enable-querytrace configure switch is now available to enable
          very verbose query tracelogging. This option can only be set at
          compile time. This option has a negative performance impact and
          should be used only for debugging.

   Feature Changes

        * Large inline-signing changes should be less disruptive. Signature
          generation is now done incrementally; the number of signatures to
          be generated in each quantum is controlled by
          "sig-signing-signatures number;". [RT #37927]
        * The experimental SIT extension now uses the EDNS COOKIE option code
          point (10) and is displayed as "COOKIE: <value>". The existing
          named.conf directives; "request-sit", "sit-secret" and
          "nosit-udp-size", are still valid and will be replaced by
          "send-cookie", "cookie-secret" and "nocookie-udp-size" in BIND
          9.11. The existing dig directive "+sit" is still valid and will be
          replaced with "+cookie" in BIND 9.11.
        * When retrying a query via TCP due to the first answer being
          truncated, dig will now correctly send the COOKIE value returned by
          the server in the prior response. [RT #39047]
        * Retrieving the local port range from net.ipv4.ip_local_port_range
          on Linux is now supported.
        * Active Directory names of the form gc._msdcs.<forest> are now
          accepted as valid hostnames when using the check-names option.
          <forest> is still restricted to letters, digits and hyphens.
        * Names containing rich text are now accepted as valid hostnames in
          PTR records in DNS-SD reverse lookup zones, as specified in RFC
          6763. [RT #37889]

   Bug Fixes

        * Asynchronous zone loads were not handled correctly when the zone
          load was already in progress; this could trigger a crash in zt.c.
          [RT #37573]
        * A race during shutdown or reconfiguration could cause an assertion
          failure in mem.c. [RT #38979]
        * Some answer formatting options didn't work correctly with dig
          +short. [RT #39291]
        * Malformed records of some types, including NSAP and UNSPEC, could
          trigger assertion failures when loading text zone files. [RT
          #40274] [RT #40285]
        * Fixed a possible crash in ratelimiter.c caused by NOTIFY messages
          being removed from the wrong rate limiter queue. [RT #40350]
        * The default rrset-order of random was inconsistently applied. [RT
          #40456]
        * BADVERS responses from broken authoritative name servers were not
          handled correctly. [RT #40427]
        * Several bugs have been fixed in the RPZ implementation:
             + Policy zones that did not specifically require recursion could
               be treated as if they did; consequently, setting
               qname-wait-recurse no; was sometimes ineffective. This has
               been corrected. In most configurations, behavioral changes due
               to this fix will not be noticeable. [RT #39229]
             + The server could crash if policy zones were updated (e.g. via
               rndc reload or an incoming zone transfer) while RPZ processing
               was still ongoing for an active query. [RT #39415]
             + On servers with one or more policy zones configured as slaves,
               if a policy zone updated during regular operation (rather than
               at startup) using a full zone reload, such as via AXFR, a bug
               could allow the RPZ summary data to fall out of sync,
               potentially leading to an assertion failure in rpz.c when
               further incremental updates were made to the zone, such as via
               IXFR. [RT #39567]
             + The server could match a shorter prefix than what was
               available in CLIENT-IP policy triggers, and so, an unexpected
               action could be taken. This has been corrected. [RT #39481]
             + The server could crash if a reload of an RPZ zone was
               initiated while another reload of the same zone was already in
               progress. [RT #39649]
             + Query names could match against the wrong policy zone if
               wildcard records were present. [RT #40357]

---
   Module Name:    pkgsrc
   Committed By:   taca
   Date:           Wed Dec 16 00:31:22 UTC 2015

   Modified Files:
           pkgsrc/net/bind910: Makefile distinfo

   Log Message:
   Update bind910 package to 9.10.3pl2 (BIND 9.10.3-P2), security release.

           --- 9.10.3-P2 released ---

   4270.   [security]      Update allowed OpenSSL versions as named is
                           potentially vulnerable to CVE-2015-3193.

   4261.   [maint]         H.ROOT-SERVERS.NET is 198.97.190.53 and 2001:500:1::53.
                           [RT #40556]

   4260.   [security]      Insufficient testing when parsing a message allowed
                           records with an incorrect class to be be accepted,
                           triggering a REQUIRE failure when those records
                           were subsequently cached. (CVE-2015-8000) [RT #40987]

   4253.   [security]      Address fetch context reference count handling error
                           on socket error. (CVE-2015-8461) [RT#40945]

           --- 9.10.3-P1 (withdrawn) ---


(bsiegert)
diff -r1.12 -r1.12.2.1 pkgsrc/net/bind910/Makefile
diff -r1.10 -r1.10.2.1 pkgsrc/net/bind910/distinfo
diff -r1.2 -r1.2.6.1 pkgsrc/net/bind910/patches/patch-bin_dig_dighost.c
diff -r1.2 -r1.2.8.1 pkgsrc/net/bind910/patches/patch-bin_tests_system_Makefile.in
diff -r1.3 -r1.3.6.1 pkgsrc/net/bind910/patches/patch-configure

cvs diff -r1.12 -r1.12.2.1 pkgsrc/net/bind910/Attic/Makefile (expand / switch to unified diff)

--- pkgsrc/net/bind910/Attic/Makefile 2015/09/03 00:33:31 1.12
+++ pkgsrc/net/bind910/Attic/Makefile 2015/12/18 19:46:02 1.12.2.1
@@ -1,30 +1,30 @@ @@ -1,30 +1,30 @@
1# $NetBSD: Makefile,v 1.12 2015/09/03 00:33:31 taca Exp $ 1# $NetBSD: Makefile,v 1.12.2.1 2015/12/18 19:46:02 bsiegert Exp $
2 2
3DISTNAME= bind-${BIND_VERSION} 3DISTNAME= bind-${BIND_VERSION}
4PKGNAME= ${DISTNAME:S/-P/pl/} 4PKGNAME= ${DISTNAME:S/-P/pl/}
5CATEGORIES= net 5CATEGORIES= net
6MASTER_SITES= ftp://ftp.isc.org/isc/bind9/${BIND_VERSION}/ \ 6MASTER_SITES= ftp://ftp.isc.org/isc/bind9/${BIND_VERSION}/ \
7 http://ftp.belnet.be/pub/mirror/ftp.isc.org/isc/bind9/${BIND_VERSION}/ 7 http://ftp.belnet.be/pub/mirror/ftp.isc.org/isc/bind9/${BIND_VERSION}/
8 8
9MAINTAINER= pkgsrc-users@NetBSD.org 9MAINTAINER= pkgsrc-users@NetBSD.org
10HOMEPAGE= http://www.isc.org/software/bind/ 10HOMEPAGE= http://www.isc.org/software/bind/
11COMMENT= Berkeley Internet Name Daemon implementation of DNS, version 9.10 11COMMENT= Berkeley Internet Name Daemon implementation of DNS, version 9.10
12 12
13CONFLICTS+= host-[0-9]* 13CONFLICTS+= host-[0-9]*
14 14
15MAKE_JOBS_SAFE= no 15MAKE_JOBS_SAFE= no
16 16
17BIND_VERSION= 9.10.2-P4 17BIND_VERSION= 9.10.3-P2
18 18
19.include "../../mk/bsd.prefs.mk" 19.include "../../mk/bsd.prefs.mk"
20 20
21BUILD_DEFS+= BIND_DIR VARBASE 21BUILD_DEFS+= BIND_DIR VARBASE
22 22
23.include "options.mk" 23.include "options.mk"
24 24
25USE_TOOLS+= pax perl 25USE_TOOLS+= pax perl
26USE_LIBTOOL= yes 26USE_LIBTOOL= yes
27GNU_CONFIGURE= yes 27GNU_CONFIGURE= yes
28#CONFIG_SHELL= sh -x 28#CONFIG_SHELL= sh -x
29 29
30CONFIGURE_ARGS+= --with-libtool 30CONFIGURE_ARGS+= --with-libtool

cvs diff -r1.10 -r1.10.2.1 pkgsrc/net/bind910/Attic/distinfo (expand / switch to unified diff)

--- pkgsrc/net/bind910/Attic/distinfo 2015/09/03 00:33:31 1.10
+++ pkgsrc/net/bind910/Attic/distinfo 2015/12/18 19:46:02 1.10.2.1
@@ -1,13 +1,14 @@ @@ -1,13 +1,14 @@
1$NetBSD: distinfo,v 1.10 2015/09/03 00:33:31 taca Exp $ 1$NetBSD: distinfo,v 1.10.2.1 2015/12/18 19:46:02 bsiegert Exp $
2 2
3SHA1 (bind-9.10.2-P4.tar.gz) = 55b8803c566aa0c9a9e4dbabbad06fb4536a8d5b 3SHA1 (bind-9.10.3-P2.tar.gz) = c23663a9b464cff6f2279e80513ef97f9fe5803b
4RMD160 (bind-9.10.2-P4.tar.gz) = 8b2e0501899a5d654d8a234a7bd939cf06c43948 4RMD160 (bind-9.10.3-P2.tar.gz) = 34e3f033fb177dd37868176fb2729f52da8311a9
5Size (bind-9.10.2-P4.tar.gz) = 8471531 bytes 5SHA512 (bind-9.10.3-P2.tar.gz) = 21905cdff464f9ff275b87744433970d4a80faa6d9245c66c092421a45e89e438bd78f3bfe0d795964312f072c936e44eb6867b72decbba86821619180ced210
6SHA1 (patch-bin_dig_dighost.c) = 582fa4c7288e70bcc6ac906e8429cf38e0ad5152 6Size (bind-9.10.3-P2.tar.gz) = 8523719 bytes
7SHA1 (patch-bin_tests_system_Makefile.in) = 8bb6130981a6ff2ac736cf53a061115782bb65a2 7SHA1 (patch-bin_dig_dighost.c) = 983e23a30d519982cbe88ed2277fcffc9cad616e
 8SHA1 (patch-bin_tests_system_Makefile.in) = aeb2de1b6c6cfdbae7ffbf38aeebf52e94af9e2f
8SHA1 (patch-config.threads.in) = 227b83efe9cb3e301aaac9b97cf42f1fb8ad06b2 9SHA1 (patch-config.threads.in) = 227b83efe9cb3e301aaac9b97cf42f1fb8ad06b2
9SHA1 (patch-configure) = 3ea12f60b26064679e086ef5e637420b95d165be 10SHA1 (patch-configure) = 754a510493ae8fae669a9ff79940ccb04bc1e57e
10SHA1 (patch-contrib_dlz_config.dlz.in) = f18bec63fbfce7cb2cd72929058ce3770fce458f 11SHA1 (patch-contrib_dlz_config.dlz.in) = f18bec63fbfce7cb2cd72929058ce3770fce458f
11SHA1 (patch-lib_dns_rbt.c) = 510dfc72bc7764e548a46e9c48b58b2543490d7a 12SHA1 (patch-lib_dns_rbt.c) = 510dfc72bc7764e548a46e9c48b58b2543490d7a
12SHA1 (patch-lib_lwres_getaddrinfo.c) = 69e9c8049fedcb93bd219c6053163f21ce3b2535 13SHA1 (patch-lib_lwres_getaddrinfo.c) = 69e9c8049fedcb93bd219c6053163f21ce3b2535
13SHA1 (patch-lib_lwres_getnameinfo.c) = 418ad349cf52925c9e8051b5c71d9d51ea8d2fb1 14SHA1 (patch-lib_lwres_getnameinfo.c) = 418ad349cf52925c9e8051b5c71d9d51ea8d2fb1

cvs diff -r1.2 -r1.2.6.1 pkgsrc/net/bind910/patches/Attic/patch-bin_dig_dighost.c (expand / switch to unified diff)

--- pkgsrc/net/bind910/patches/Attic/patch-bin_dig_dighost.c 2015/02/26 10:15:02 1.2
+++ pkgsrc/net/bind910/patches/Attic/patch-bin_dig_dighost.c 2015/12/18 19:46:02 1.2.6.1
@@ -1,128 +1,128 @@ @@ -1,128 +1,128 @@
1$NetBSD: patch-bin_dig_dighost.c,v 1.2 2015/02/26 10:15:02 taca Exp $ 1$NetBSD: patch-bin_dig_dighost.c,v 1.2.6.1 2015/12/18 19:46:02 bsiegert Exp $
2 2
3* Avoid to use true as variable name. 3* Avoid to use true as variable name.
4 4
5--- bin/dig/dighost.c.orig 2015-02-18 01:55:55.000000000 +0000 5--- bin/dig/dighost.c.orig 2015-09-09 02:23:40.000000000 +0000
6+++ bin/dig/dighost.c 6+++ bin/dig/dighost.c
7@@ -4678,7 +4678,7 @@ prepare_lookup(dns_name_t *name) 7@@ -4821,7 +4821,7 @@ prepare_lookup(dns_name_t *name)
8 isc_result_t result; 8 isc_buffer_t *b = NULL;
9 isc_region_t r; 9 isc_region_t r;
10 dns_rdataset_t *rdataset = NULL; 10 dns_rdataset_t *rdataset = NULL;
11- isc_boolean_t true = ISC_TRUE; 11- isc_boolean_t true = ISC_TRUE;
12+ isc_boolean_t isc_true = ISC_TRUE; 12+ isc_boolean_t isc_true = ISC_TRUE;
13 #endif 13 #endif
14  14
15 memset(namestr, 0, DNS_NAME_FORMATSIZE); 15 memset(namestr, 0, DNS_NAME_FORMATSIZE);
16@@ -4692,7 +4692,7 @@ prepare_lookup(dns_name_t *name) 16@@ -4835,7 +4835,7 @@ prepare_lookup(dns_name_t *name)
17  17
18 result = advanced_rrsearch(&rdataset, &ns.name, 18 result = advanced_rrsearch(&rdataset, &ns.name,
19 dns_rdatatype_aaaa, 19 dns_rdatatype_aaaa,
20- dns_rdatatype_any, &true); 20- dns_rdatatype_any, &true);
21+ dns_rdatatype_any, &isc_true); 21+ dns_rdatatype_any, &isc_true);
22 if (result == ISC_R_SUCCESS) { 22 if (result == ISC_R_SUCCESS) {
23 for (result = dns_rdataset_first(rdataset); 23 for (result = dns_rdataset_first(rdataset);
24 result == ISC_R_SUCCESS; 24 result == ISC_R_SUCCESS;
25@@ -4721,7 +4721,7 @@ prepare_lookup(dns_name_t *name) 25@@ -4864,7 +4864,7 @@ prepare_lookup(dns_name_t *name)
26  26
27 rdataset = NULL; 27 rdataset = NULL;
28 result = advanced_rrsearch(&rdataset, &ns.name, dns_rdatatype_a, 28 result = advanced_rrsearch(&rdataset, &ns.name, dns_rdatatype_a,
29- dns_rdatatype_any, &true); 29- dns_rdatatype_any, &true);
30+ dns_rdatatype_any, &isc_true); 30+ dns_rdatatype_any, &isc_true);
31 if (result == ISC_R_SUCCESS) { 31 if (result == ISC_R_SUCCESS) {
32 for (result = dns_rdataset_first(rdataset); 32 for (result = dns_rdataset_first(rdataset);
33 result == ISC_R_SUCCESS; 33 result == ISC_R_SUCCESS;
34@@ -4840,11 +4840,11 @@ isc_result_t 34@@ -4983,11 +4983,11 @@ isc_result_t
35 initialization(dns_name_t *name) 35 initialization(dns_name_t *name)
36 { 36 {
37 isc_result_t result; 37 isc_result_t result;
38- isc_boolean_t true = ISC_TRUE; 38- isc_boolean_t true = ISC_TRUE;
39+ isc_boolean_t isc_true = ISC_TRUE; 39+ isc_boolean_t isc_true = ISC_TRUE;
40  40
41 chase_nsrdataset = NULL; 41 chase_nsrdataset = NULL;
42 result = advanced_rrsearch(&chase_nsrdataset, name, dns_rdatatype_ns, 42 result = advanced_rrsearch(&chase_nsrdataset, name, dns_rdatatype_ns,
43- dns_rdatatype_any, &true); 43- dns_rdatatype_any, &true);
44+ dns_rdatatype_any, &isc_true); 44+ dns_rdatatype_any, &isc_true);
45 if (result != ISC_R_SUCCESS) { 45 if (result != ISC_R_SUCCESS) {
46 printf("\n;; NS RRset is missing to continue validation:" 46 printf("\n;; NS RRset is missing to continue validation:"
47 " FAILED\n\n"); 47 " FAILED\n\n");
48@@ -5202,7 +5202,7 @@ sigchase_td(dns_message_t *msg) 48@@ -5342,7 +5342,7 @@ sigchase_td(dns_message_t *msg)
49 isc_result_t result; 49 isc_result_t result;
50 dns_name_t *name = NULL; 50 dns_name_t *name = NULL;
51 isc_boolean_t have_answer = ISC_FALSE; 51 isc_boolean_t have_answer = ISC_FALSE;
52- isc_boolean_t true = ISC_TRUE; 52- isc_boolean_t true = ISC_TRUE;
53+ isc_boolean_t isc_true = ISC_TRUE; 53+ isc_boolean_t isc_true = ISC_TRUE;
54  54
55 if (msg->rcode != dns_rcode_noerror && 55 if (msg->rcode != dns_rcode_noerror &&
56 msg->rcode != dns_rcode_nxdomain) { 56 msg->rcode != dns_rcode_nxdomain) {
57@@ -5225,7 +5225,7 @@ sigchase_td(dns_message_t *msg) 57@@ -5365,7 +5365,7 @@ sigchase_td(dns_message_t *msg)
58 initialization(name); 58 initialization(name);
59 return; 59 return;
60 } 60 }
61- have_answer = true; 61- have_answer = true;
62+ have_answer = isc_true; 62+ have_answer = isc_true;
63 } else { 63 } else {
64 if (!current_lookup->trace_root_sigchase) { 64 if (!current_lookup->trace_root_sigchase) {
65 result = dns_message_firstname(msg, 65 result = dns_message_firstname(msg,
66@@ -5346,7 +5346,7 @@ sigchase_td(dns_message_t *msg) 66@@ -5484,7 +5484,7 @@ sigchase_td(dns_message_t *msg)
67 dns_rdatatype_rrsig, 67 dns_rdatatype_rrsig,
68 current_lookup 68 current_lookup
69 ->rdtype_sigchase, 69 ->rdtype_sigchase,
70- &true); 70- &true);
71+ &isc_true); 71+ &isc_true);
72 if (result == ISC_R_FAILURE) { 72 if (result == ISC_R_FAILURE) {
73 printf("\n;; RRset is missing to continue" 73 printf("\n;; RRset is missing to continue"
74 " validation SHOULD NOT APPEND:" 74 " validation SHOULD NOT APPEND:"
75@@ -5359,7 +5359,7 @@ sigchase_td(dns_message_t *msg) 75@@ -5497,7 +5497,7 @@ sigchase_td(dns_message_t *msg)
76 &chase_authority_name, 76 &chase_authority_name,
77 dns_rdatatype_rrsig, 77 dns_rdatatype_rrsig,
78 dns_rdatatype_any, 78 dns_rdatatype_any,
79- &true); 79- &true);
80+ &isc_true); 80+ &isc_true);
81 if (result == ISC_R_FAILURE) { 81 if (result == ISC_R_FAILURE) {
82 printf("\n;; RRSIG is missing to continue" 82 printf("\n;; RRSIG is missing to continue"
83 " validation SHOULD NOT APPEND:" 83 " validation SHOULD NOT APPEND:"
84@@ -5435,7 +5435,7 @@ sigchase_td(dns_message_t *msg) 84@@ -5573,7 +5573,7 @@ sigchase_td(dns_message_t *msg)
85 &chase_authority_name, 85 &chase_authority_name,
86 dns_rdatatype_rrsig, 86 dns_rdatatype_rrsig,
87 dns_rdatatype_ds, 87 dns_rdatatype_ds,
88- &true); 88- &true);
89+ &isc_true); 89+ &isc_true);
90 if (result != ISC_R_SUCCESS) { 90 if (result != ISC_R_SUCCESS) {
91 printf("\n;; DSset is missing to continue validation:" 91 printf("\n;; DSset is missing to continue validation:"
92 " FAILED\n\n"); 92 " FAILED\n\n");
93@@ -5523,7 +5523,7 @@ sigchase_td(dns_message_t *msg) 93@@ -5660,7 +5660,7 @@ sigchase_td(dns_message_t *msg)
94 result = advanced_rrsearch(&chase_rdataset, &chase_name, 94 result = advanced_rrsearch(&chase_rdataset, &chase_name,
95 current_lookup->rdtype_sigchase, 95 current_lookup->rdtype_sigchase,
96 dns_rdatatype_any , 96 dns_rdatatype_any ,
97- &true); 97- &true);
98+ &isc_true); 98+ &isc_true);
99 if (result == ISC_R_FAILURE) { 99 if (result == ISC_R_FAILURE) {
100 printf("\n;; RRsig of RRset is missing to continue validation" 100 printf("\n;; RRsig of RRset is missing to continue validation"
101 " SHOULD NOT APPEND: FAILED\n\n"); 101 " SHOULD NOT APPEND: FAILED\n\n");
102@@ -5566,7 +5566,7 @@ getneededrr(dns_message_t *msg) 102@@ -5703,7 +5703,7 @@ getneededrr(dns_message_t *msg)
103 dns_name_t *name = NULL; 103 dns_name_t *name = NULL;
104 dns_rdata_t sigrdata = DNS_RDATA_INIT; 104 dns_rdata_t sigrdata = DNS_RDATA_INIT;
105 dns_rdata_sig_t siginfo; 105 dns_rdata_sig_t siginfo;
106- isc_boolean_t true = ISC_TRUE; 106- isc_boolean_t true = ISC_TRUE;
107+ isc_boolean_t isc_true = ISC_TRUE; 107+ isc_boolean_t isc_true = ISC_TRUE;
108  108
109 if ((result = dns_message_firstname(msg, DNS_SECTION_ANSWER)) 109 if ((result = dns_message_firstname(msg, DNS_SECTION_ANSWER))
110 != ISC_R_SUCCESS) { 110 != ISC_R_SUCCESS) {
111@@ -5582,7 +5582,7 @@ getneededrr(dns_message_t *msg) 111@@ -5719,7 +5719,7 @@ getneededrr(dns_message_t *msg)
112 if (chase_rdataset == NULL) { 112 if (chase_rdataset == NULL) {
113 result = advanced_rrsearch(&chase_rdataset, name, 113 result = advanced_rrsearch(&chase_rdataset, name,
114 dns_rdatatype_any, 114 dns_rdatatype_any,
115- dns_rdatatype_any, &true); 115- dns_rdatatype_any, &true);
116+ dns_rdatatype_any, &isc_true); 116+ dns_rdatatype_any, &isc_true);
117 if (result != ISC_R_SUCCESS) { 117 if (result != ISC_R_SUCCESS) {
118 printf("\n;; No Answers: Validation FAILED\n\n"); 118 printf("\n;; No Answers: Validation FAILED\n\n");
119 return (ISC_R_NOTFOUND); 119 return (ISC_R_NOTFOUND);
120@@ -5701,7 +5701,7 @@ getneededrr(dns_message_t *msg) 120@@ -5838,7 +5838,7 @@ getneededrr(dns_message_t *msg)
121 result = advanced_rrsearch(&chase_sigdsrdataset, 121 result = advanced_rrsearch(&chase_sigdsrdataset,
122 &chase_signame, 122 &chase_signame,
123 dns_rdatatype_rrsig, 123 dns_rdatatype_rrsig,
124- dns_rdatatype_ds, &true); 124- dns_rdatatype_ds, &true);
125+ dns_rdatatype_ds, &isc_true); 125+ dns_rdatatype_ds, &isc_true);
126 if (result == ISC_R_FAILURE) { 126 if (result == ISC_R_FAILURE) {
127 printf(";; WARNING : NO RRSIG DS : RRSIG DS" 127 printf(";; WARNING : NO RRSIG DS : RRSIG DS"
128 " should come with DS\n"); 128 " should come with DS\n");

cvs diff -r1.2 -r1.2.8.1 pkgsrc/net/bind910/patches/Attic/patch-bin_tests_system_Makefile.in (expand / switch to unified diff)

--- pkgsrc/net/bind910/patches/Attic/patch-bin_tests_system_Makefile.in 2014/10/14 16:23:19 1.2
+++ pkgsrc/net/bind910/patches/Attic/patch-bin_tests_system_Makefile.in 2015/12/18 19:46:02 1.2.8.1
@@ -1,15 +1,15 @@ @@ -1,15 +1,15 @@
1$NetBSD: patch-bin_tests_system_Makefile.in,v 1.2 2014/10/14 16:23:19 taca Exp $ 1$NetBSD: patch-bin_tests_system_Makefile.in,v 1.2.8.1 2015/12/18 19:46:02 bsiegert Exp $
2 2
3Build fix for DragonFly while linking of driver.so. 3Build fix for DragonFly while linking of driver.so.
4 4
5--- bin/tests/system/Makefile.in.orig 2014-09-16 19:27:15.000000000 +0000 5--- bin/tests/system/Makefile.in.orig 2015-09-09 02:23:40.000000000 +0000
6+++ bin/tests/system/Makefile.in 6+++ bin/tests/system/Makefile.in
7@@ -21,7 +21,7 @@ top_srcdir = @top_srcdir@ 7@@ -19,7 +19,7 @@ top_srcdir = @top_srcdir@
8  8
9 @BIND9_MAKE_INCLUDES@ 9 @BIND9_MAKE_INCLUDES@
10  10
11-SUBDIRS = builtin dlzexternal filter-aaaa geoip lwresd rpz rsabigexponent tkey tsiggss 11-SUBDIRS = builtin dlzexternal fetchlimit filter-aaaa geoip lwresd rpz rsabigexponent statistics tkey tsiggss
12+SUBDIRS = builtin filter-aaaa geoip lwresd rpz rsabigexponent tkey tsiggss 12+SUBDIRS = builtin fetchlimit filter-aaaa geoip lwresd rpz rsabigexponent statistics tkey tsiggss
13 TARGETS = 13 TARGETS =
14  14
15 @BIND9_MAKE_RULES@ 15 @BIND9_MAKE_RULES@

cvs diff -r1.3 -r1.3.6.1 pkgsrc/net/bind910/patches/Attic/patch-configure (expand / switch to unified diff)

--- pkgsrc/net/bind910/patches/Attic/patch-configure 2015/02/26 10:15:02 1.3
+++ pkgsrc/net/bind910/patches/Attic/patch-configure 2015/12/18 19:46:02 1.3.6.1
@@ -1,44 +1,26 @@ @@ -1,44 +1,26 @@
1$NetBSD: patch-configure,v 1.3 2015/02/26 10:15:02 taca Exp $ 1$NetBSD: patch-configure,v 1.3.6.1 2015/12/18 19:46:02 bsiegert Exp $
2 2
3* Add DragonFly support. 3* Add DragonFly support.
4* Link proper postgresql library. 4* Link proper postgresql library.
5* Avoid using "==" for argument of test(1). 5* Avoid using "==" for argument of test(1).
6 6
7--- configure.orig 2015-02-18 01:55:55.000000000 +0000 7--- configure.orig 2015-09-09 02:23:40.000000000 +0000
8+++ configure 8+++ configure
9@@ -11840,7 +11840,7 @@ fi 9@@ -14388,6 +14388,8 @@ case $host in
10 test -n "$PYTHON" && break 
11 done 
12  
13- if test "X$PYTHON" == "X"; then 
14+ if test "X$PYTHON" = "X"; then 
15 continue; 
16 fi 
17 { $as_echo "$as_me:${as_lineno-$LINENO}: checking python module 'argparse'" >&5 
18@@ -11855,7 +11855,7 @@ $as_echo "not found" >&6; } 
19 unset ac_cv_path_PYTHON 
20 unset PYTHON 
21 done 
22- if test "X$PYTHON" == "X" 
23+ if test "X$PYTHON" = "X" 
24 then 
25 { $as_echo "$as_me:${as_lineno-$LINENO}: checking for python support" >&5 
26 $as_echo_n "checking for python support... " >&6; } 
27@@ -14379,6 +14379,8 @@ case $host in 
28 use_threads=false ;; 10 use_threads=false ;;
29 *-freebsd*) 11 *-freebsd*)
30 use_threads=true ;; 12 use_threads=true ;;
31+*-dragonfly*) 13+*-dragonfly*)
32+ use_threads=false ;; 14+ use_threads=false ;;
33 *-bsdi[234]*) 15 *-bsdi[234]*)
34 # Thread signals do not work reliably on some versions of BSD/OS. 16 # Thread signals do not work reliably on some versions of BSD/OS.
35 use_threads=false ;; 17 use_threads=false ;;
36@@ -21029,7 +21031,7 @@ $as_echo "no" >&6; } 18@@ -21276,7 +21278,7 @@ $as_echo "no" >&6; }
37 fi 19 fi
38 if test -n "-L$use_dlz_postgres_lib -lpq" 20 if test -n "-L$use_dlz_postgres_lib -lpq"
39 then 21 then
40- DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L$use_dlz_postgres_lib -lpq" 22- DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L$use_dlz_postgres_lib -lpq"
41+ DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L${PREFIX}/lib -lpq" 23+ DLZ_DRIVER_LIBS="$DLZ_DRIVER_LIBS -L${PREFIX}/lib -lpq"
42 fi 24 fi
43  25
44  26