freebsd-ports/dns/bind95/distinfo
Doug Barton 0a1b168539 Update to the -P1 versions of the current BIND ports which contain
the fix for the following vulnerability: https://www.isc.org/node/373

Description:
Return values from OpenSSL library functions EVP_VerifyFinal()
and DSA_do_verify() were not checked properly.

Impact:
It is theoretically possible to spoof answers returned from
zones using the DNSKEY algorithms DSA (3) and NSEC3DSA (6).

In short, if you're not using DNSSEC to verify signatures you have
nothing to worry about.

While I'm here, address the issues raised in the PR by adding a knob
to disable building with OpenSSL altogether (which eliminates DNSSEC
capability), and fix the configure arguments to better deal with the
situation where the user has ssl bits in both the base and LOCALBASE.

PR:		ports/126297
Submitted by:	Ronald F.Guilmette <rfg@tristatelogic.com>
2009-01-08 08:18:45 +00:00

6 lines
402 B
Text

MD5 (bind-9.5.1-P1.tar.gz) = 8afc7f95f4fad1eaaba09596617b8089
SHA256 (bind-9.5.1-P1.tar.gz) = 31766a691e915a7553ece175970ca1cc000159025ffb1e903e1b99c22de9a4c7
SIZE (bind-9.5.1-P1.tar.gz) = 6690710
MD5 (bind-9.5.1-P1.tar.gz.asc) = ba0f5b279f2c4be6ada7ece0bc9683dc
SHA256 (bind-9.5.1-P1.tar.gz.asc) = 85f13223575b8246666d6a225612f1e41f478e0e13c373c2ad36765118a898e1
SIZE (bind-9.5.1-P1.tar.gz.asc) = 479