Este contenido no está disponible en el idioma seleccionado.
8.20. bind
8.20.1. RHBA-2014:1373 — bind bug fix and enhancement update Copiar enlaceEnlace copiado en el portapapeles!
Copiar enlaceEnlace copiado en el portapapeles!
Updated bind packages that fix several bugs and add two enhancements are now available for Red Hat Enterprise Linux 6.
BIND (Berkeley Internet Name Domain) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (
named), which resolves host names to IP addresses; a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bug Fixes
- BZ#1044545
- Previously, the
allow-notifyconfiguration option did not take into account the Transaction SIGnature (TSIG) key for authentication. Consequently, this caused a slave server not to accept aNOTIFYmessage from a non-master server that used the TSIG key for authentication, even though the slave server was configured to acceptNOTIFYmessages when the specific TSIG key was used. Thenamedsource code has been fixed to also check the TSIG key ID when receiving aNOTIFYmessage from a non-master server, and the slave server now correctly acceptsNOTIFYmessages in this scenario. - BZ#1036700
- Prior to this update, the Response Rate Limiting (RRL) functionality in BIND distributed in Red Hat Enterprise Linux 6 was missing the
referrals-per-secondandnodata-per-secondoptions. As a consequence, users of BIND that was configured to use the RRL functionality could not explicitly filter empty responses for a valid domain and referrals or delegations to the server for a given domain. With this update, the missing functionality has been backported to BIND, and users can now explicitly filter empty responses for a valid domain and referrals or delegations to the server for a given domain when using the RRL functionality in BIND. - BZ#1008827
- Previously, the host utility used the same send buffer for all outgoing queries. As a consequence, under high network load, a race condition occurred when the buffer was used by multiple queries, and the host utility terminated unexpectedly with a segmentation fault when sending of one query finished after another query had been sent. The host utility source code has been modified to use a separate send buffer for all outgoing queries, and the described problem no longer occurs.
- BZ#993612
- Prior to this update, a bug in the BIND resolver source code caused a race condition, which could lead to prematurely freeing a fetch memory object. As a consequence, BIND could terminate unexpectedly with a segmentation fault when it accessed already freed memory. The BIND resolver source code has been fixed to guarantee that the resolver fetch object is not freed until there is no outstanding reference to that object, and BIND no longer crashes in this scenario.
- BZ#1023045
- Previously, the manual page for the dig utility contained upstream-specific options for an Internationalized Domain Name (IDN) library. Consequently, these options did not function as expected and users were incapable of disabling IDN support in dig following the steps from the manual page. The dig(1) manual page has been modified to include the options of the IDN library used in Red Hat Enterprise Linux and users can now successfully disable IDN support in dig following the steps from the manual page.
- BZ#919545
- Prior to this update, due to a regression, the dig utility could access an already freed query when trying multiple origins during domain name resolution. Consequently, the dig utility sometimes terminated unexpectedly with a segmentation fault, especially when running on a host that had multiple search domains configured in the
/etc/resolv.conffile. The dig source code has been modified to always use a query that is still valid when trying the next origin, and the dig utility no longer crashes in this scenario. - BZ#1066876
- Prior to this update, the
namedsource code was unable to correctly handle the Internet Control Message Protocol (ICMP) Destination unreachable (Protocol unreachable) responses. Consequently, an error message was logged bynamedupon receiving such an ICMP response but BIND did not add the address of the name server to a list of unreachable name servers. This bug has been fixed, and no errors are now logged when the ICMP Destination unreachable (Protocol unreachable) response is received. - BZ#902431
- Previously, the
/var/named/chroot/etc/localtimefile was created during the installation of the bind-chroot package, but its SELinux context was not restored. Consequently,/var/named/chroot/etc/localtimehad an incorrect SELinux context. With this update, the command to restore the SELinux context of/var/named/chroot/etc/localtimeafter creation has been added in the post transaction section of the SPEC file, and the correct SELinux context is preserved after installing bind-chroot. - BZ#917356
- Previously, the
/var/named/named.cafile was outdated and the IP addresses of certain root servers were not valid. Although thenamedservice fetches the current IP addresses of all root servers during its startup, invalid IP addresses can reduce performance just after a restart. Now,/var/named/named.cahas been updated to include the current IP addresses of root servers. - BZ#997743
- Prior to this update, the
namedinit script checked the existence of therndc.keyfile only during the server startup. Consequently, the init script generatedrndc.keyeven if the user had a custom Remote Name Daemon Control (RNDC) configuration. This bug has been fixed, and the init script no longer generatesrndc.keyif the user has a custom RNDC configuration. - BZ#919414
- Previously, when calling the
sqlitecommands, the zone2sqlite utility used a formatting option that did not add single quotes around the argument. As a consequence, zone2sqlite was unable to perform operations on tables whose name started with a digit or contained the period (.) or dash (–) characters. With this update, zone2sqlite has been fixed to use the correct formatting option and the described problem no longer occurs. - BZ#980632
- Previously, the
namedinit script did not check whether the PID written in thenamed.pidfile was a PID of a runningnamedserver. After an unclean shutdown of the server, the PID written innamed.pidcould belong to an existing process while thenamedserver was not running. Consequently, the init script could identify the server as running and therefore the user was unable to start the server. With this update, the init script has been enhanced to perform the necessary check, and if the PID written innamed.pidis not a PID of the runningnamedserver, the init script deletes thenamed.pidfile. The check is performed before starting, stopping, or reloading the server, and before checking its status. As a result, the user is able to start the server without problems in the described scenario. - BZ#1025008
- Prior to this update, BIND was not configured with the
--enable-filter-aaaaconfiguration option. As a consequence, thefilter-aaaa-on-v4option could not be used in the BIND configuration. The--enable-filter-aaaaoption has been added, and users can now configure thefilter-aaaa-on-v4option in BIND. - BZ#851123
- Prior to this update, the
namedinit script commandconfigtestdid not check if BIND was already running, and mounted or unmounted the file system into a chroot environment. As a consequence, thenamedchroot file system was damaged by executing theconfigtestcommand while thenamedservice was running in a chroot environment. This bug has been fixed, and using the init scriptconfigtestcommand no longer damages the file system ifnamedis running in a chroot environment. - BZ#848033
- Previously, due to a missing statement in the
namedinit script, the init script could return an incorrect exit status when calling certain commands (namely,checkconfig,configtest,check, andtest) if thenamedconfiguration included an error. Consequently, for example, when theservice named configtestcommand was run, the init script returned a zero value meaning success, regardless of the errors in the configuration. With this update, the init script has been fixed to correctly return a non-zero value in case of an error in thenamedconfiguration. - BZ#1051283
- Previously, ownership of some documentation files installed by the bind package was not correctly set. Consequently, the files were incorrectly owned by
namedinstead of therootuser. A patch has been applied, and the ownership of documentation files installed by the bind package has been corrected. - BZ#951255
- Prior to this update, the
/dev/randomdevice, which is a source of random data, did not have a sufficient amount of entropy when booting a newly installed virtual machine (VM). Consequently, generating the/etc/rndc.keyfile took excessively long when thenamedservice was started for the first time. The init script has been changed to use/dev/urandominstead of/dev/randomas the source of random data, and the generation of/etc/rndc.keynow consumes a more reasonable amount of time in this scenario. - BZ#1064045
- Previously, the nsupdate utility was unable to correctly handle an extra argument after the
-roption, which sets the number of User Datagram Protocol (UDP) retries. As a consequence, when an argument followed the-roption, nsupdate terminated unexpectedly with a segmentation fault. A patch has been applied, and nsupdate now handles the-roption with an argument as expected. - BZ#948743
- Previously, when the
namedservice was running in a chroot environment, the init script checked whether the server was already running after it had mounted the chroot file system. As a consequence, if some directories were empty in the chroot environment, they were mounted again when theservice named startcommand was used. With this update, the init script has been fixed to check whethernamedis running before mounting file system into the chroot environment and no directories are mounted multiple times in this scenario. - BZ#846065
- Previously, BIND was not configured with the
--with-dlopen=yesoption. As a consequence, external Dynamically Loadable Zones (DLZ) drivers could not be dynamically loaded. A patch has been applied, and external DLZ drivers are now dynamically loadable as expected.
Enhancements
- BZ#1092035
- Previously, the number of workers and client-objects was hard-coded in the Lightweight Resolver Daemon (
lwresd) source, and it was insufficient. This update adds two new options: thelwres-tasksoption, which can be used for modifying the number of workers created, and thelwres-clientsoption, which can be used for specifying the number of client objects created per worker. The options can be used inside thelwresstatement in thenamed/lwresdconfiguration file. - BZ#956685
- This update adds support for the TLSA resource record type in input zone files, as specified in RFC 6698. TLSA records together with Domain Name System Security Extensions (DNSSEC) are used for DNS-Based Authentication of Named Entities (DANE).
Users of bind are advised to upgrade to these updated packages, which fix these bugs and add these enhancements. After installing the update, the BIND daemon (
named) will be restarted automatically.