Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

bind-doc-9.9.9P1-48.6.1 RPM for noarch

From OpenSuSE 42.2 updates for noarch

Name: bind-doc Distribution: openSUSE Leap 42.2
Version: 9.9.9P1 Vendor: openSUSE
Release: 48.6.1 Build date: Fri Jun 30 00:04:29 2017
Group: Documentation/Other Build host: obs-power8-05
Size: 5311375 Source RPM: bind-9.9.9P1-48.6.1.src.rpm
Packager: http://bugs.opensuse.org
Url: http://isc.org/sw/bind/
Summary: BIND documentation
Documentation of the Berkeley Internet Name Domain (BIND) Domain Name
System implementation of the Domain Name System (DNS) protocols.  This
includes also the BIND Administrator Reference Manual (ARM).

Provides

Requires

License

ISC

Changelog

* Thu Jun 29 2017 psimons@suse.com
  - Added bind-CVE-2017-3142-and-3143.patch to fix a security issue
    where an attacker with the ability to send and receive messages
    to an authoritative DNS server was able to circumvent TSIG
    authentication of AXFR requests. A server that relies solely on
    TSIG keys for protection with no other ACL protection could be
    manipulated into (1) providing an AXFR of a zone to an
    unauthorized recipient and (2) accepting bogus Notify packets.
    [bsc#1046554, CVE-2017-3142, bsc#1046555, CVE-2017-3143]
* Tue Apr 11 2017 navin.kukreja@suse.com
  - Fix for Bug 1020983 - root umask 077 screws up the /etc/init.d/named init script
  - Fix a segmentation fault for long query name
    * CVE-2016-2775, bsc#989528
    * bind-CVE-2016-2775.patch
  - Fix a crash of secondaries from a malicious primary DNS servers
    * CVE-2016-6170, bsc#987866
    * bind-CVE-2016-6170.patch
  - Fix multiple assertion failures
    * CVE-2017-3136, bsc#1033466
    * CVE-2017-3137, bsc#1033467
    * CVE-2017-3138, bsc#1033468
    * bind-CVE-2017-3136.patch
    * bind-CVE-2017-3137.patch
    * bind-CVE-2017-3138.patch
* Wed Feb 15 2017 navin.kukreja@suse.com
  - Fix assertion failure or a NULL pointer read for configurations using both DNS64 and RPZ
    * CVE-2017-3135, bsc#1024130
    * bind-CVE-2017-3135.patch
* Sat Jan 07 2017 psimons@suse.com
  - Apply "bind-CVE-2016-9131.patch" to fix a potential assertion
    failure that could have been triggered by a malformed response to
    an ANY query. [CVE-2016-9131, bsc#1018700, bsc#1018699]
  - Apply "bind-CVE-2016-9147.patch" to fix a potential assertion
    failure that could have been triggered by responding to a query
    with inconsistent DNSSEC information. [CVE-2016-9147,
    bsc#1018701, bsc#1018699]
  - Apply "bind-CVE-2016-9444.patch" to fix potential assertion
    failure that could have been triggered by DNS responses that
    contain unusually-formed DS resource records. [CVE-2016-9444,
    bsc#1018702, bsc#1018699]
* Mon Oct 31 2016 sflees@suse.de
  - Fix an assertion failure that can lead to remote DoS:
    * CVE-2016-8864, bsc#1007829
    * bind-CVE-2016-8864.patch
  - Fix the hostname in ldapdump to be valid. bsc#965748
    * bind-ldapdump-use-valid-host.patch
* Fri Sep 23 2016 sflees@suse.de
  - Fix an assertion failure that can lead to remote DoS:
    * CVE-2016-2776, bsc#1000362
    * bind-CVE-2016-2776.patch
* Wed Jun 01 2016 max@suse.com
  - Update to 9.9.9-P1:
    * Adds quotas to be used in recursive resolvers that are under
      high query load for names in zones whose authoritative
      servers are nonresponsive or are experiencing a denial of
      service attack (fate#320694).
    * Obsoletes all CVE patches that were added to 9.9.6 over time.
  - Make /var/lib/named owned by the named user (bsc#908850).
  - Fetch the latest source signing key from upstream.
  - Add systemd service macros (bsc#977657).
  - --enable-fetchlimit (fate#320694 bsc#983505)
* Wed Mar 09 2016 max@suse.com
  - Fix two assertion failures that can lead to remote DoS:
    * CVE-2016-1285, bsc#970072
    * CVE-2016-1286, bsc#970073
    * bind-CVE-2016-1285.patch contains both fixes.
* Mon Jan 18 2016 max@suse.com
  - Fix Specific APL data could trigger an INSIST
    (CVE-2015-8704, bsc#962189).
* Wed Dec 16 2015 max@suse.com
  - Fix remote denial of service by misparsing incoming responses
    (CVE-2015-8000, bsc#958861).
* Mon Sep 28 2015 max@suse.com
  - Remove the start/stop dependency of named and lwresd on remote-fs
    to break a service dependency cycle (bsc#947483).
* Wed Sep 02 2015 max@suse.com
  - Fix DoS against servers performing validation on DNSSEC-signed
    records (CVE-2015-5722, bsc#944066).
* Tue Jul 28 2015 max@suse.com
  - Fix bind-CVE-2015-5477.patch.
* Mon Jul 27 2015 max@suse.com
  - Fix DoS against authoritative and recursive servers.
    bnc#939567, CVE-2015-5477
* Fri Jul 03 2015 max@suse.com
  - Make sure %version and %pkg_vers are in sync (bnc#937028).
* Thu Jul 02 2015 max@suse.com
  - A problem with trust anchor management can cause named to crash
    (CVE-2015-1349, bsc#918330)
  - Fix resolver crash when validating (CVE-2015-4620, bsc#936476).
* Mon Jan 12 2015 max@suse.com
  - Security update 9.9.6P1:
    * A flaw in delegation handling could be exploited to put named
      into an infinite loop.  This has been addressed by placing
      limits on the number of levels of recursion named will allow
      (default 7), and the number of iterative queries that it will
      send (default 50) before terminating a recursive query
      (CVE-2014-8500, bnc#908994).
    * The recursion depth limit is configured via the
      "max-recursion-depth" option, and the query limit via the
      "max-recursion-queries" option.
  - Remove rpz2+rl-9.9.5.patch, because no rpz2 patch for 9.9.6 is
    available from the author and rl support already went upstream
    in 9.9.3.
* Fri Nov 28 2014 meissner@suse.com
  - bind-fix-fips.patch: The GOST engine will not load in FIPS mode,
    make this non-fatal. bnc#906079
* Wed Sep 03 2014 max@suse.com
  - Version 9.9.5P1 also fixes a problem with zone transfers on
    multicore machines (bnc#882511).
* Thu Jul 31 2014 lmuelle@suse.com
  - Package dnssec-checkds and dnssec-coverage binaries and man pages only on
    post-11.1 systems.
* Thu Jul 31 2014 lmuelle@suse.com
  - Update to version 9.9.5P1
    Various bugfixes and some feature fixes. (see CHANGES files)
    Security and maintenance issues:
    - [bug] Don't call qsort with a null pointer. [RT #35968]
    - [bug] Disable GCC 4.9 "delete null pointer check". [RT #35968]
    - [port] linux: libcap support: declare curval at start of block. [RT #35387]
  - Update to version 9.9.5
    - [bug] Address double dns_zone_detach when switching to using automatic
      empty zones from regular zones. [RT #35177]
    - [port] Use built-in versions of strptime() and timegm() on all platforms
      to avoid portability issues. [RT #35183]
    - [bug] Address a portentry locking issue in dispatch.c. [RT #35128]
    - [bug] irs_resconf_load now returns ISC_R_FILENOTFOUND on a missing
      resolv.conf file and initializes the structure as if it had been
      configured with  nameserver ::1 nameserver 127.0.0.1  [RT #35194]
    - [contrib] queryperf: Fixed a possible integer overflow when printing
      results. [RT #35182]
    - [protocol] Accept integer timestamps in RRSIG records. [RT #35185]
    - [func] named-checkconf can now obscure shared secrets when printing by
      specifying '-x'. [RT #34465]
    - [bug] Improvements to statistics channel XSL stylesheet: the stylesheet can
      now be cached by the browser; section headers are omitted from the stats
      display when there is no data in those sections to be displayed; counters
      are now right-justified for easier readability. (Only available with
      configure --enable-newstats.) [RT #35117]
    - [cleanup] Replaced all uses of memcpy() with memmove(). [RT #35120]
    - [bug] Handle "." as a search list element when IDN support is enabled.
      [RT #35133]
    - [bug] dig failed to handle AXFR style IXFR responses which span multiple
      messages. [RT #35137]
    - [bug] Address a possible race in dispatch.c. [RT #35107]
    - [bug] Warn when a key-directory is configured for a zone, but does not
      exist or is not a directory. [RT #35108]
    - [security] memcpy was incorrectly called with overlapping ranges resulting
      in malformed names being generated on some platforms.  This could cause
      INSIST failures when serving NSEC3 signed zones (CVE-2014-0591).
      [RT #35120]
    - [bug] Two calls to dns_db_getoriginnode were fatal if there was no data at
      the node. [RT #35080]
    - [bug] Iterative responses could be missed when the source port for an
      upstream query was the same as the listener port (53). [RT #34925]
    - [bug] Fixed a bug causing an insecure delegation from one static-stub zone
      to another to fail with a broken trust chain. [RT #35081]
    - [bug] loadnode could return a freed node on out of memory. [RT #35106]
    - [bug] Address null pointer dereference in zone_xfrdone. [RT #35042]
    - [func] "dnssec-signzone -Q" drops signatures from keys that are still
      published but no longer active. [RT #34990]
    - [bug] "rndc refresh" didn't work correctly with slave zones usingi
      inline-signing. [RT #35105]
    - [cleanup] Add a more detailed "not found" message to rndc commands which
      specify a zone name. [RT #35059]
    - [bug] Correct the behavior of rndc retransfer to allow inline-signing slave
      zones to retain NSEC3 parameters instead of reverting to NSEC. [RT #34745]
    - [port] Update the Windows build system to support feature selection and
      WIN64 builds.  This is a work in progress. [RT #34160]
    - [bug] dig could fail to clean up TCP sockets still waiting on connect().
      [RT #35074]
    - [port] Update config.guess and config.sub. [RT #35060]
    - [bug] 'nsupdate' leaked memory if 'realm' was used multiple times.
      [RT #35073]
    - [bug] "named-checkconf -z" now checks zones of type hint and redirect as
      well as master. [RT #35046]
    - [misc] Provide a place for third parties to add version information for
      their extensions in the version file by setting the EXTENSIONS variable.
    - [bug] RPZ zeroed ttls if the query type was '*'. [RT #35026]
    - [func] Local address can now be specified when using dns_client API.
      [RT #34811]
    - [bug] Don't allow dnssec-importkey overwrite a existing non-imported
      private key.
    - [bug] Address read after free in server side of lwres_getrrsetbyname.
      [RT #29075]
    - [bug] Fix cast in lex.c which could see 0xff treated as eof. [RT #34993]
    - [bug] Failure to release lock on error in receive_secure_db. [RT #34944]
    - [bug] Updated OpenSSL PKCS#11 patches to fix active list locking and other
      bugs. [RT #34855]
    - [bug] Address bugs in dns_rdata_fromstruct and dns_rdata_tostruct for WKS
      and ISDN types. [RT #34910]
    - [bug] 'host' could die if a UDP query timed out. [RT #34870]
    - [bug] Address lock order reversal deadlock with inline zones. [RT #34856]
    - [cleanup] Changed the name of "isc-config.sh" to "bind9-config".
      [RT #23825]
    - [port] linux: Address platform specific compilation issue when libcap-devel
      is installed. [RT #34838]
    - [port] Some readline clones don't accept NULL pointers when calling
      add_history. [RT #34842]
    - [cleanup] Simplify TCP message processing when requesting a zone transfer.
      [RT #34825]
    - [bug] Address race condition with manual notify requests. [RT #34806]
    - [func] Create delegations for all "children" of empty zones except
      "forward first". [RT #34826]
    - [tuning] Adjust when a master server is deemed unreachable. [RT #27075]
    - [tuning] Use separate rate limiting queues for refresh and notify
      requests. [RT #30589]
    - [cleanup] Include a comment in .nzf files, giving the name of the
      associated view. [RT #34765]
    - [bug] Address a race condition when shutting down a zone. [RT #34750]
    - [bug] Journal filename string could be set incorrectly, causing garbage in
      log messages. [RT #34738]
    - [protocol] Use case sensitive compression when responding to queries.
      [RT #34737]
    - [protocol] Check that EDNS subnet client options are well formed.
      [RT #34718]
    - [func] Allow externally generated DNSKEY to be imported into the DNSKEY
      management framework.  A new tool dnssec-importkey is used to do this.
      [RT #34698]
    - [bug] Handle changes to sig-validity-interval settings better. [RT #34625]
    - [bug] ndots was not being checked when searching.  Only continue searching
      on NXDOMAIN responses.  Add the ability to specify ndots to nslookup.
      [RT #34711]
    - [bug] Treat type 65533 (KEYDATA) as opaque except when used in a key zone.
      [RT #34238]
  - Updated to current rpz patch from·http://ss.vix.su/~vjs/rrlrpz.html
    - rpz2-9.9.4.patch
    + rpz2+rl-9.9.5.patch
* Sun Jun 01 2014 chris@computersalat.de
  - add stuff for DNSSEC validation to named.conf
    * dnssec-enable, dnssec-validation
* Sun May 25 2014 crrodriguez@opensuse.org
  - Build with LFS_CFLAGS in 32 bit systems.
* Thu May 08 2014 ro@suse.de
  - use %_rundir macro
* Fri Mar 28 2014 lchiquitto@suse.de
  - Remove obsolete patch "workaround-compile-problem.diff"
* Fri Jan 24 2014 max@suse.com
  - Add the sdb-ldap backend module (fate#313216).
  - Details can be found here:
    * http://bind9-ldap.bayour.com/
    * http://bind9-ldap.bayour.com/dnszonehowto.html
* Tue Jan 21 2014 max@suse.com
  - Update to version 9.9.4P2
    * Fixes named crash when handling malformed NSEC3-signed zones
      (CVE-2014-0591, bnc#858639)
    * Obsoletes workaround-compile-problem.diff
  - Replace rpz2+rl-9.9.3-P1.patch by rpz2-9.9.4.patch, rl is now
    supported upstream (--enable-rrl).
* Mon Dec 09 2013 max@suse.com
  - Fix generation of /etc/named.conf.include
    (bnc#828678, bnc#848777, bnc#814978).
* Wed Aug 07 2013 max@suse.com
  - Systemd doesn't set $TERM, and hence breaks tput (bnc#823175).
* Tue Aug 06 2013 max@suse.com
  - Improve pie_compile.diff (bnc#828874).
  - dnssec-checkds and dnssec-coverage need python-base.
  - disable rpath in libtool.
* Mon Aug 05 2013 max@suse.com
  - Update to 9.9.3P2 fixes CVE-2013-4854, bnc#831899.
    * Incorrect bounds checking on private type 'keydata' can lead
      to a remotely triggerable REQUIRE failure.
* Wed Jul 24 2013 max@suse.com
  - Remove non-working apparmor profiles (bnc#740327).
* Wed Jul 17 2013 mls@suse.de
  - the README file is not a directory, drop the dir attribute
* Mon Jun 24 2013 meissner@suse.com
  - Updated to 9.9.3-P1
    Various bugfixes and some feature fixes. (see CHANGES files)
    Security and maintenance issues:
    - [security]	Caching data from an incompletely signed zone could
    trigger an assertion failure in resolver.c [RT #33690]
    - [security]	Support NAPTR regular expression validation on
    all platforms without using libregex, which
    can be vulnerable to memory exhaustion attack
    (CVE-2013-2266). [RT #32688]
    - [security]	RPZ rules to generate A records (but not AAAA records)
    could trigger an assertion failure when used in
    conjunction with DNS64 (CVE-2012-5689). [RT #32141]
    - [bug]		Fixed several Coverity warnings.
    Note: This change includes a fix for a bug that
    was subsequently determined to be an exploitable
    security vulnerability, CVE-2012-5688: named could
    die on specific queries with dns64 enabled.
    [RT #30996]
    - [maint]		Added AAAA for D.ROOT-SERVERS.NET.
    - [maint]		D.ROOT-SERVERS.NET is now 199.7.91.13.
  - Updated to current rate limiting + rpz patch from
    http://ss.vix.su/~vjs/rrlrpz.html
  - moved dnssec-* helpers to bind-utils package. bnc#813911
* Wed May 08 2013 schwab@suse.de
  - Use updated config.guess/sub in the embedded idnkit sources
* Wed Mar 27 2013 meissner@suse.com
  - Updated to 9.9.2-P2 (bnc#811876)
    Fix for: https://kb.isc.org/article/AA-00871 CVE-2013-2266
    * Security Fixes
      Removed the check for regex.h in configure in order to disable regex
      syntax checking, as it exposes BIND to a critical flaw in libregex
      on some platforms. [RT #32688]
  - added gpg key source verification
* Thu Dec 06 2012 meissner@suse.com
  - Updated to 9.9.2-P1 (bnc#792926)
    https://kb.isc.org/article/AA-00828
    * Security Fixes
      Prevents named from aborting with a require assertion failure on
      servers with DNS64 enabled.  These crashes might occur as a result of
      specific queries that are received.  (Note that this fix is a subset
      of a series of updates that will be included in full in BIND 9.8.5
      and 9.9.3 as change #3388, RT #30996).  [CVE-2012-5688] [RT #30792]
      A deliberately constructed combination of records could cause
      named to hang while populating the additional section of a
      response. [CVE-2012-5166] [RT #31090]
      Prevents a named assert (crash) when queried for a record whose
      RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
      Prevents a named assert (crash) when validating caused by using
      "Bad cache" data before it has been initialized. [CVE-2012-3817]
      [RT #30025]
      A condition has been corrected where improper handling of zero-length
      RDATA could cause undesirable behavior, including termination of
      the named process. [CVE-2012-1667]  [RT #29644]
      ISC_QUEUE handling for recursive clients was updated to address a race
      condition that could cause a memory leak. This rarely occurred with
      UDP clients, but could be a significant problem for a server handling
      a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
    New Features
      Elliptic Curve Digital Signature Algorithm keys and signatures in
      DNSSEC are now supported per RFC 6605. [RT #21918]
      Introduces a new tool "dnssec-checkds" command that checks a zone to
      determine which DS records should be published in the parent zone,
      or which DLV records should be published in a DLV zone, and queries
      the DNS to ensure that it exists. (Note: This tool depends on python;
      it will not be built or installed on systems that do not have a
      python interpreter.)  [RT #28099]
      Introduces a new tool "dnssec-verify" that validates a signed zone,
      checking for the correctness of signatures and NSEC/NSEC3 chains.
      [RT #23673]
      Adds configuration option "max-rsa-exponent-size <value>;" that
      can be used to specify the maximum rsa exponent size that will be
      accepted when validating [RT #29228]
    Feature Changes
      Improves OpenSSL error logging [RT #29932]
      nslookup now returns a nonzero exit code when it is unable to get
      an answer.  [RT #29492]
    Bug Fixes
      Uses binary mode to open raw files on Windows.  [RT #30944]
      When using DNSSEC inline signing with "rndc signing -nsec3param", a
      salt value of "-" can now be used to indicate 'no salt'.  [RT #30099]
      Prevents race conditions (address use after free) that could be
      encountered when named is shutting down and releasing structures
      used to manage recursive clients.  [RT #30241]
      Static-stub zones now accept "forward" and "fowarders" options
      (often needed for subdomains of the zone referenced to override
      global forwarding options).  These options are already available
      with traditional stub zones and their omission from zones of type
      "static-stub" was an inadvertent oversight. [RT #30482]
      Limits the TTL of signed RRsets in cache when their RRSIGs are
      approaching expiry. This prevents the persistence in cache of
      invalid RRSIGs in order to assist recovery from a situation where
      zone re-signing doesn't occur in a timely manner.   With this change,
      named will attempt to obtain new RRSIGs from the authoritative server
      once the original ones have expired, and even if the TTL of the old
      records would in other circumstances cause them to be kept in cache
      for longer.  [RT #26429]
      Corrects the syntax of isc_atomic_xadd() and isc_atomic_cmpxchg()
      which are employed on Itanium systems to speed up lock management
      by making use of atomic operations.  Without the syntax correction
      it is possible that concurrent access to the same structures could
      accidentally occur with unpredictable results.  [RT #25181]
      Improves OpenSSL error logging [RT #29932]
      The configure script now supports and detects libxml2-2.8.x correctly
      [RT #30440]
      The host command should no longer assert on some architectures
      and builds while handling the time values used with the -w (wait
      forever) option.  [RT #18723]
      Invalid zero settings for max-retry-time, min-retry-time,
      max-refresh-time, min-refresh-time will now be detected during parsing
      of named.conf and an error emitted instead of triggering an assertion
      failure on startup.  [RT #27730]
      Removes spurious newlines from log messages in zone.c [RT #30675]
      When built with readline support (i.e. on a system with readline
      installed) nsupdate no longer terminates unexpectedly in interactive
      mode. [RT #29550]
      All named tasks that perform task-exclusive operations now share the
      same single task.  Prior to this change, there was the possibility of
      a race condition between rndc operations and other functions such as
      re-sizing the adb hash table.  If the race condition was encountered,
      named would in most cases terminate unexpectedly with an assert.
      [RT #29872]
      Ensures that servers are expired from the ADB cache when the timeout
      limit is reached so that their learned attributes can be refreshed.
      Prior to this change, servers that were frequently queried might
      never have their entries removed and reinitialized.  This is of
      particular importance to DNSSEC-validating recursive servers that
      might erroneously set "no-edns" for an authoritative server following
      a period of intermittent connectivity. [RT #29856]
      Adds additional resilience to a previous security change (3218) by
      preventing RRSIG data from being added to cache when a pseudo-record
      matching the covering type and proving non-existence exists at a
      higher trust level. The earlier change prevented this inconsistent
      data from being retrieved from cache in response to client queries  -
      with this additional change, the RRSIG records are no longer inserted
      into cache at all. [RT #26809]
      dnssec-settime will now issue a warning when the writing of a new
      private key file would cause a change in the permissions of the
      existing file. [RT #27724]
      Fixes the defect introduced by change #3314 that was causing failures
      when saving stub zones to disk (resulting in excessive CPU usage in
      some cases).  [RT #29952]
      Address race condition in units tests: asyncload_zone and
      asyncload_zt. [RT #26100]
      It is now possible to using multiple control keys again - this
      functionality was inadvertently broken by change #3924 (RT #28265)
      which addressed a memory leak. [RT #29694]
      Named now holds a zone table reference while performing an
      asynchronous load of a zone.  This removes a race condition that
      could cause named to crash when zones are added using rndc addzone
      or by manually editing named's configuration file followed by rndc
      reconfig/reload. [RT #28326]
      Setting resolver-query-timeout too low could cause named problems
      recovering after a loss of connectivity.  [RT #29623]
      Reduces the potential build-up of stale RRsets in cache on a busy
      recursive nameserver by re-using cached DS and RRSIG rrsets when
      possible [RT #29446]
      Corrects a failure to authenticate non-existence of resource records
      in some circumstances when RPZ has been configured.  Also:
      adds an optional "recursive-only yes|no" to the response-policy
      statement
      adds an optional "max-policy-ttl" to the response-policy statement
      to limit the false data that "recursive-only no" can introduce
      into resolvers' caches
      introduces a predefined encoding of PASSTHRU policy by adding
      "rpz-passthru" to be used as the target of CNAME policy records
      (the old encoding is still accepted.)
      adds a RPZ performance test to bin/tests/system/rpz when queryperf is available.  [RT #26172]
      Upper-case/lower-case handling of RRSIG signer-names is now handled
      consistently: RRSIG records are generated with the signer-name in
      lower case. They are accepted with any case, but if they fail to
      validate, we try again in lower case. [RT #27451]
* Sun Nov 18 2012 meissner@suse.com
  - added a ratelimiting (draft RFC) patch from Paul Vixie.
    see http://www.redbarn.org/dns/ratelimits
    suggested by Stefan Schaefer <stefan@invis-server.org>
* Wed Nov 14 2012 meissner@suse.com
  - updated to 9.9.2
    https://kb.isc.org/article/AA-00798
    Security:
    * A deliberately constructed combination of records could cause
      named to hang while populating the additional section of a
      response. [CVE-2012-5166] [RT #31090]
    * Prevents a named assert (crash) when queried for a record whose
      RDATA exceeds 65535 bytes.  [CVE-2012-4244]  [RT #30416]
    * Prevents a named assert (crash) when validating caused by using "Bad
      cache" data before it has been initialized. [CVE-2012-3817]  [RT #30025]
    * A condition has been corrected where improper handling of zero-length
      RDATA could cause undesirable behavior, including termination of the
      named process. [CVE-2012-1667]  [RT #29644]
    * ISC_QUEUE handling for recursive clients was updated to address a race
      condition that could cause a memory leak. This rarely occurred with
      UDP clients, but could be a significant problem for a server handling
      a steady rate of TCP queries. [CVE-2012-3868]  [RT #29539 & #30233]
    New Features
    * Elliptic Curve Digital Signature Algorithm keys and signatures in
      DNSSEC are now supported per RFC 6605. [RT #21918]
    * Introduces a new tool "dnssec-checkds" command that checks a zone
      to determine which DS records should be published in the parent zone,
      or which DLV records should be published in a DLV zone, and queries
      the DNS to ensure that it exists. (Note: This tool depends on python;
      it will not be built or installed on systems that do not have a python
      interpreter.)  [RT #28099]
    * Introduces a new tool "dnssec-verify" that validates a signed zone,
      checking for the correctness of signatures and NSEC/NSEC3 chains.
      [RT #23673]
    * Adds configuration option "max-rsa-exponent-size <value>;" that can
      be used to specify the maximum rsa exponent size that will be accepted
      when validating [RT #29228]
    Feature Changes
    * Improves OpenSSL error logging [RT #29932]
    * nslookup now returns a nonzero exit code when it is unable to get an answer.  [RT #29492]
    Lots of bugfixes.
  - unfuzzed patches:
    perl-path.diff
    pie_compile.diff
    workaround-compile-problem.diff
* Fri Oct 19 2012 meissner@suse.com
  - Specially crafted DNS data can cause a lockup in named.
    CVE-2012-5166, bnc#784602.
  - 9.9.1-P4
* Sat Sep 15 2012 meissner@suse.com
  - Named could die on specially crafted record.
    [RT #30416] (bnc#780157) CVE-2012-4244
  - 9.9.1-P3
  - updated dnszone-schema.txt from upstream.
* Thu Jul 26 2012 ug@suse.de
  - Prevents a named assert (crash) when validating caused by using
    "Bad cache" data before it has been initialized.  [RT #30025]
    (bnc#772945)
  - ISC_QUEUE handling for recursive clients was updated to address a
    race condition that could cause a memory leak.  This rarely occurred
    with UDP clients, but could be a significant problem for a server
    handling a steady rate of TCP queries.  [RT0#295;9`& #30233]
  - Under heavy incoming TCP query loads named could experience a
    memory leak which could lead to significant reductions in query
    response or cause the server to be terminated on systems with
    "out of memory" killers. [RT #29539]
    (bnc#772946)
  - A condition has been corrected where improper handling of zero-length
    RDATA could cause undesirable behavior, including termination of
    the named process.  [RT #29644]
  - 9.9.1-P2
* Thu Jul 12 2012 cfarrell@suse.com
  - license update: ISC
    ISC is generally seen as the correct license for bind
* Tue Jun 05 2012 ug@suse.de
  - updated dnszone-schema.txt
* Mon Jun 04 2012 ug@suse.de
  - VUL-0: bind remote DoS via zero length rdata field
    CVE-2012-1667
    bnc#765315
  - 9.9.1-P1
* Tue May 22 2012 ug@suse.de
  - this version has no new features but only bugfixes
  - Addresses a race condition that can cause named to to crash when
    the masters list for a zone is updated via rndc reload/reconfig
  - Fixes a race condition in zone.c that can cause named to crash
    during the processing of rndc delzone
  - Prevents a named segfault from resolver.c due to procedure
    fctx_finddone() not being thread-safe
  - SDB now handles unexpected errors from back-end database drivers
    gracefully instead of exiting on an assert.
  - Prevents named crashes as a result of dereferencing a NULL pointer
    in zmgr_start_xfrin_ifquota if the zone was being removed while
    there were zone transfers still pending
  - Corrects a parser bug that could cause named to crash while
    reading a malformed zone file
  - many more smaller fixes
  - version 9.9.1
* Thu May 10 2012 ug@suse.de
  - added patch to fix an assertion failure
* Fri May 04 2012 ug@suse.de
  - many dnssec fixes and features (too many to list them
    here, check the changelog)
  - improved startup time
  - improved scalability
  - Added support for Uniform Resource Identifier (URI) resource
    records
  - Local copies of slave zones are now saved in raw format by
    default to improve startup performance
    BIND 9.9 changes the default storage format for slave zone
    files from text to raw.  Because named's behavior when a slave
    server cannot read or parse a zone file is to move the offending
    file out of the way and retransfer the zone, slave servers
    that are updated from a pre-9.9.0 version of BIND and which
    have existing copies of slave zone data may wind up with
    extraneous copies of zone data stored, as the existing
    text-format zone file copies will be moved aside to filenames
    of the format db-###### and journal files to the format
    jn-######  (where # represents a hexadecimal digit.)
  - many many bugfixes. Please read changelog for details
  - fixed handling of TXT records in ldapdump
    (bnc#743758)
  - 9.9.0
* Mon Feb 13 2012 coolo@suse.com
  - patch license to follow spdx.org standard
* Wed Dec 21 2011 lars@samba.org
  - Ensure to create the required dir or sym link in /var/run; (bnc#738156).
* Mon Dec 05 2011 ug@suse.de
  - root nameserver updated (root.hint file)
* Mon Dec 05 2011 ug@suse.de
  - added managed-keys-directory to named.conf
* Tue Nov 22 2011 ug@suse.de
  - fixed apparmor profile for lib and lib64 in chroot
    (bnc#716745)
* Thu Nov 17 2011 fteodori@suse.de
  - Cache lookup could return RRSIG data associated with nonexistent
    records, leading to an assertion failure. CVE-2011-4313; (bnc#730995).
* Wed Oct 26 2011 ug@suse.de
  - on a 64bit system a chrooted bind failed to start if 32bit
    libs were installed (bnc#716745)
* Fri Sep 30 2011 coolo@suse.com
  - add libtool as buildrequire to make the spec file more reliable
* Sat Sep 17 2011 jengelh@medozas.de
  - Remove redundant tags/sections from specfile
  - Use %_smp_mflags for parallel build
* Fri Sep 16 2011 ug@suse.de
  - very first restart can create broken chroot
    (bnc#718441)
* Mon Sep 05 2011 ug@suse.de
  * fixed SSL in chroot environment (bnc#715881)
* Mon Sep 05 2011 ug@suse.de
  * Added a new include file with function typedefs for the DLZ
    "dlopen" driver. [RT #23629]
    * Added a tool able to generate malformed packets to allow testing of
    how named handles them. [RT #24096]
    * The root key is now provided in the file bind.keys allowing DNSSEC
    validation to be switched on at start up by adding
    "dnssec-validation auto;" to named.conf. If the root key provided
    has expired, named will log the expiration and validation will not
    work. More information and the most current copy of bind.keys can
    be found at http://www.isc.org/bind-keys. *Please note this feature
    was actually added in 9.8.0 but was not included in the 9.8.0
    release notes. [RT #21727]
    * If named is configured with a response policy zone (RPZ) and a
    query of type RRSIG is received for a name configured for RRset
    replacement in that RPZ, it will trigger an INSIST and crash the
    server. RRSIG. [RT #24280]
    * named, set up to be a caching resolver, is vulnerable to a user
    querying a domain with very large resource record sets (RRSets)
    when trying to negatively cache the response. Due to an off-by-one
    error, caching the response could cause named to crash. [RT #24650]
    [CVE-2011-1910]
    * Using Response Policy Zone (RPZ) to query a wildcard CNAME label
    with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
    query type independant. [RT #24715]
    * Using Response Policy Zone (RPZ) with DNAME records and querying
    the subdomain of that label can cause named to crash. Now logs that
    DNAME is not supported. [RT #24766]
    * Change #2912 populated the message section in replies to UPDATE
    requests, which some Windows clients wanted. This exposed a latent
    bug that allowed the response message to crash named. With this
    fix, change 2912 has been reduced to copy only the zone section to
    the reply. A more complete fix for the latent bug will be released
    later. [RT #24777]
    * many bugfixes (see CHANGELOG)
    * 9.8.1
* Wed Aug 31 2011 rhafer@suse.de
  - Fixed the ldapdump tool to also respect the "uri" setting in
    /etc/openldap/ldap.conf (bnc#710430)
* Tue Jul 05 2011 ug@suse.de
  * Using Response Policy Zone (RPZ) with DNAME records and querying
    the subdomain of that label can cause named to crash. Now logs that
    DNAME is not supported. [RT #24766]
    * If named is configured to be both authoritative and resursive and
    receives a recursive query for a CNAME in a zone that it is
    authoritative for, if that CNAME also points to a zone the server
    is authoritative for, the recursive part of name will not follow
    the CNAME change and the response will not be a complete CNAME
    chain. [RT #24455]
    * Using Response Policy Zone (RPZ) to query a wildcard CNAME label
    with QUERY type SIG/RRSIG, it can cause named to crash. Fix is
    query type independant. [RT #24715] [CVE-2011-1907]
    * Change #2912 (see CHANGES) exposed a latent bug in the DNS message
    processing code that could allow certain UPDATE requests to crash
    named. This was fixed by disambiguating internal database
    representation vs DNS wire format data. [RT #24777] [CVE-2011-2464]
    * 9.8.0-P4
* Tue Jun 07 2011 ug@suse.de
  - A large RRSET from a remote authoritative server that results in
    the recursive resolver trying to negatively cache the response can
    hit an off by one code error in named, resulting in named crashing.
    [RT #24650] [CVE-2011-1910]
  - Zones that have a DS record in the parent zone but are also listed
    in a DLV and won't validate without DLV could fail to validate. [RT
    [#24631]]
* Mon May 23 2011 crrodriguez@opensuse.org
  - Build with -DNO_VERSION_DATE to avoid timestamps in binaries.
* Thu May 19 2011 meissner@suse.de
  - buildreq update-desktop-files for newer rpms
* Thu May 05 2011 ug@suse.de
  - The ADB hash table stores informations about which authoritative
    servers to query about particular domains
  - BIND now supports a new zone type, static-stub
  - BIND now supports Response Policy Zones
  - BIND 9.8.0 now has DNS64 support
  - Dynamically Loadable Zones (DLZ) now support dynamic updates.
  - Added a "dlopen" DLZ driver, allowing the creation of external DLZ
    drivers that can be loaded as shared objects at runtime rather than
    having to be linked with named
  - named now retains GSS-TSIG keys across restarts
  - There is a new update-policy match type "external".
  - bugfixes
  - version to 9.8.0
* Thu Feb 24 2011 ug@suse.de
  - fixed security issue
    VUL-0: bind: IXFR or DDNS update combined with high query rate
    DoS vulnerability (CVE-2011-0414 bnc#674431)
  - version to 9.7.3
* Wed Jan 05 2011 meissner@suse.de
  - ifdef the sysvinit specific prereqs for openSUSE 11.4 and later
* Thu Dec 09 2010 mvyskocil@suse.cz
  - fix bnc#656509 - direct mount of /proc in chroot
* Tue Dec 07 2010 coolo@novell.com
  - prereq init scripts syslog and network
* Thu Dec 02 2010 ug@suse.de
  - fixed VUL-0: bind: Key algorithm rollover bug
    bnc#657102, CVE-2010-3614
  - fixed VUL-0: bind: allow-query processed incorrectly
    bnc#657120, CVE-2010-3615
  - fixed VUL-0: bind: cache incorrectly allows a ncache entry and a rrsig for the same type
    bnc#657129, CVE-2010-3613
* Tue Nov 23 2010 ug@suse.de
  - fixed return code of "rcnamed status"
  - added gssapi support
* Tue Oct 12 2010 ug@suse.de
  - Zones may be dynamically added and removed with the "rndc addzone"
    and "rndc delzone" commands. These dynamically added zones are
    written to a per-view configuration file. Do not rely on the
    configuration file name nor contents as this will change in a
    future release. This is an experimental feature at this time.
  - Added new "filter-aaaa-on-v4" access control list to select which
    IPv4 clients have AAAA record filtering applied.
  - A new command "rndc secroots" was added to dump a combined summary
    of the currently managed keys combined with statically configured
    trust anchors.
  - Added support to load new keys into managed zones without signing
    immediately with "rndc loadkeys". Added support to link keys with
    "dnssec-keygen -S" and "dnssec-settime -S".
  - Documentation improvements
  - ORCHID prefixes were removed from the automatic empty zone list.
  - Improved handling of GSSAPI security contexts. Specifically, better
    memory management of cached contexts, limited lifetime of a context
    to 1 hour, and added a "realm" command to nsupdate to allow
    selection of a non-default realm name.
  - The contributed tool "ztk" was updated to version 1.0.
  - version 9.7.1 to 9.7.2-P2
* Mon Jul 26 2010 ug@suse.de
  - chrooted bind failed to start (bnc#625019)
* Mon Jun 21 2010 ug@suse.de
  - genrandom: add support for the generation of multiple
    files.
  - Update empty-zones list to match
    draft-ietf-dnsop-default-local-zones-13.
  - Incrementally write the master file after performing
    a AXFR.
  - Add AAAA address for L.ROOT-SERVERS.NET.
  - around 50 bugs fixed (see CHANGELOG for details)
  - version 9.7.1
* Thu May 20 2010 ug@suse.de
  - Handle broken DNSSEC trust chains better. [RT #15619]
  - Named could return SERVFAIL for negative responses
    from unsigned zones. [RT #21131
  - version 9.7.0-P2
* Sat May 01 2010 aj@suse.de
  - Handle /var/run on tmpfs.
  - do not use run_ldconfig.
* Wed Feb 24 2010 jengelh@medozas.de
  - Enable DLZ-LDAP (supersedes sdb_ldap) and add a patch
* Wed Feb 17 2010 ug@suse.de
  - Fully automatic signing of zones by "named".
  - Simplified configuration of DNSSEC Lookaside Validation (DLV).
  - Simplified configuration of Dynamic DNS, using the "ddns-confgen"
    command line tool or the "local" update-policy option.  (As a side
    effect, this also makes it easier to configure automatic zone
    re-signing.)
  - New named option "attach-cache" that allows multiple views to
    share a single cache.
  - DNS rebinding attack prevention.
  - New default values for dnssec-keygen parameters.
  - Support for RFC 5011 automated trust anchor maintenance
  - Smart signing: simplified tools for zone signing and key
    maintenance.
  - The "statistics-channels" option is now available on Windows.
  - A new DNSSEC-aware libdns API for use by non-BIND9 applications
  - On some platforms, named and other binaries can now print out
    a stack backtrace on assertion failure, to aid in debugging.
  - A "tools only" installation mode on Windows, which only installs
    dig, host, nslookup and nsupdate.
  - Improved PKCS#11 support, including Keyper support and explicit
    OpenSSL engine selection.
  - version 9.7.0
* Wed Jan 20 2010 ug@suse.de
  - [security]  Do not attempt to validate or cache
      out-of-bailiwick data returned with a secure
      answer; it must be re-fetched from its original
      source and validated in that context. [RT #20819]
  - [security]  Cached CNAME or DNAME RR could be returned to clients
      without DNSSEC validation. [RT #20737]
  - [security]  Bogus NXDOMAIN could be cached as if valid. [RT #20712]
  - version 9.6.1-P3
* Mon Jan 04 2010 ug@suse.de
  - removed the syntax check for include files (bnc#567593)
* Tue Dec 15 2009 jengelh@medozas.de
  - add baselibs.conf as a source
  - enable parallel building
  - add baselibs for SPARC
  - package documentation as noarch
* Wed Nov 25 2009 ug@suse.de
  - Security fix
    When validating, track whether pending data was from
    the additional section or not and only return it if
    validates as secure. [RT #20438]
    CVE-2009-4022
    bnc#558260
  - update from P1 to P2
* Fri Nov 20 2009 ug@suse.de
  - added localhost for ipv6 to default config (bnc#539529)
* Wed Nov 18 2009 ug@suse.de
  - fixed apparmor profile (bnc#544181)
* Tue Nov 03 2009 coolo@novell.com
  - updated patches to apply with fuzz=0
* Wed Sep 30 2009 ug@suse.de
  - using start_daemon instead of startproc (bnc#539532)
* Mon Aug 10 2009 ug@suse.de
  - version update to 9.6.1-P1
    (security fix CVE-2009-0696)
    bnc#526185
* Tue Jun 30 2009 ug@suse.de
  - enabled MySQL DLZ (Dynamically Loadable Zones)
* Tue Jun 16 2009 ug@suse.de
  - around 50 bugfixes against 9.6.0p1
    See changelog for details
  - version 9.6.1
* Thu Apr 09 2009 ug@suse.de
  - not all include files were copied into chroot (bnc#466800)
* Tue Mar 03 2009 ug@suse.de
  - /etc/named.conf does not include /etc/named.d/forwarders.conf
    by default (bnc#480334)

Files

/usr/share/doc/packages/bind
/usr/share/doc/packages/bind/CHANGES
/usr/share/doc/packages/bind/COPYRIGHT
/usr/share/doc/packages/bind/FAQ
/usr/share/doc/packages/bind/INSTALL.ldap
/usr/share/doc/packages/bind/README
/usr/share/doc/packages/bind/arm
/usr/share/doc/packages/bind/arm/Bv9ARM.ch01.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch02.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch03.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch04.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch05.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch06.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch07.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch08.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch09.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch10.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch11.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch12.html
/usr/share/doc/packages/bind/arm/Bv9ARM.ch13.html
/usr/share/doc/packages/bind/arm/Bv9ARM.html
/usr/share/doc/packages/bind/arm/man.arpaname.html
/usr/share/doc/packages/bind/arm/man.ddns-confgen.html
/usr/share/doc/packages/bind/arm/man.dig.html
/usr/share/doc/packages/bind/arm/man.dnssec-checkds.html
/usr/share/doc/packages/bind/arm/man.dnssec-coverage.html
/usr/share/doc/packages/bind/arm/man.dnssec-dsfromkey.html
/usr/share/doc/packages/bind/arm/man.dnssec-importkey.html
/usr/share/doc/packages/bind/arm/man.dnssec-keyfromlabel.html
/usr/share/doc/packages/bind/arm/man.dnssec-keygen.html
/usr/share/doc/packages/bind/arm/man.dnssec-revoke.html
/usr/share/doc/packages/bind/arm/man.dnssec-settime.html
/usr/share/doc/packages/bind/arm/man.dnssec-signzone.html
/usr/share/doc/packages/bind/arm/man.dnssec-verify.html
/usr/share/doc/packages/bind/arm/man.genrandom.html
/usr/share/doc/packages/bind/arm/man.host.html
/usr/share/doc/packages/bind/arm/man.isc-hmac-fixup.html
/usr/share/doc/packages/bind/arm/man.lwresd.html
/usr/share/doc/packages/bind/arm/man.named-checkconf.html
/usr/share/doc/packages/bind/arm/man.named-checkzone.html
/usr/share/doc/packages/bind/arm/man.named-journalprint.html
/usr/share/doc/packages/bind/arm/man.named.conf.html
/usr/share/doc/packages/bind/arm/man.named.html
/usr/share/doc/packages/bind/arm/man.nsec3hash.html
/usr/share/doc/packages/bind/arm/man.nsupdate.html
/usr/share/doc/packages/bind/arm/man.rndc-confgen.html
/usr/share/doc/packages/bind/arm/man.rndc.conf.html
/usr/share/doc/packages/bind/arm/man.rndc.html
/usr/share/doc/packages/bind/arm/notes.html
/usr/share/doc/packages/bind/config
/usr/share/doc/packages/bind/config/ISC-examples
/usr/share/doc/packages/bind/config/ISC-examples/named.conf
/usr/share/doc/packages/bind/config/ISC-examples/ndc.conf
/usr/share/doc/packages/bind/config/ISC-examples/ndc.conf-include
/usr/share/doc/packages/bind/config/ISC-examples/resolv.conf.sample
/usr/share/doc/packages/bind/config/README
/usr/share/doc/packages/bind/config/master
/usr/share/doc/packages/bind/config/master/100.168.192.in-addr.arpa.zone
/usr/share/doc/packages/bind/config/master/50.16.172.in-addr.arpa.zone
/usr/share/doc/packages/bind/config/master/example.net.zone
/usr/share/doc/packages/bind/config/named.d
/usr/share/doc/packages/bind/config/named.d/172.16.50.conf
/usr/share/doc/packages/bind/config/named.d/192.168.100.conf
/usr/share/doc/packages/bind/config/named.d/example.net.conf
/usr/share/doc/packages/bind/contrib
/usr/share/doc/packages/bind/contrib/README
/usr/share/doc/packages/bind/contrib/check-secure-delegation.pl
/usr/share/doc/packages/bind/contrib/check-secure-delegation.pl.in
/usr/share/doc/packages/bind/contrib/check5011.pl
/usr/share/doc/packages/bind/contrib/dane
/usr/share/doc/packages/bind/contrib/dane/mkdane.sh
/usr/share/doc/packages/bind/contrib/dane/tlsa6698.pem
/usr/share/doc/packages/bind/contrib/dlz
/usr/share/doc/packages/bind/contrib/dlz/bin
/usr/share/doc/packages/bind/contrib/dlz/bin/dlzbdb
/usr/share/doc/packages/bind/contrib/dlz/bin/dlzbdb/Makefile.in
/usr/share/doc/packages/bind/contrib/dlz/bin/dlzbdb/dlzbdb.c
/usr/share/doc/packages/bind/contrib/dlz/config.dlz.in
/usr/share/doc/packages/bind/contrib/dlz/drivers
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_bdb_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_bdbhpt_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_dlopen_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_drivers.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_filesystem_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_ldap_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_mysql_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_odbc_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_postgres_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/dlz_stub_driver.c
/usr/share/doc/packages/bind/contrib/dlz/drivers/include
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_bdb_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_bdbhpt_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_dlopen_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_drivers.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_filesystem_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_ldap_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_mysql_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_odbc_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_postgres_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/dlz_stub_driver.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/include/dlz/sdlz_helper.h
/usr/share/doc/packages/bind/contrib/dlz/drivers/rules
/usr/share/doc/packages/bind/contrib/dlz/drivers/rules.in
/usr/share/doc/packages/bind/contrib/dlz/drivers/sdlz_helper.c
/usr/share/doc/packages/bind/contrib/dlz/example
/usr/share/doc/packages/bind/contrib/dlz/example/Makefile
/usr/share/doc/packages/bind/contrib/dlz/example/README
/usr/share/doc/packages/bind/contrib/dlz/example/dlz_example.c
/usr/share/doc/packages/bind/contrib/dlz/example/named.conf
/usr/share/doc/packages/bind/contrib/dlz/example/win32
/usr/share/doc/packages/bind/contrib/dlz/example/win32/DLLMain.c
/usr/share/doc/packages/bind/contrib/dlz/example/win32/dxdriver.def
/usr/share/doc/packages/bind/contrib/dlz/example/win32/dxdriver.dsp
/usr/share/doc/packages/bind/contrib/dlz/example/win32/dxdriver.dsw
/usr/share/doc/packages/bind/contrib/dlz/example/win32/dxdriver.mak
/usr/share/doc/packages/bind/contrib/dlz/modules
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/Makefile
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/README.md
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/dlz_bdbhpt_dynamic.c
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/testing
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/testing/README
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/testing/bdbhpt-populate.pl
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/testing/dns-data.txt
/usr/share/doc/packages/bind/contrib/dlz/modules/bdbhpt/testing/named.conf
/usr/share/doc/packages/bind/contrib/dlz/modules/dlz_minimal.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/Makefile.in
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/README
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/RELEASE_NOTES
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/aclocal.m4
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/acx_pthread.m4
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/config.guess
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/config.sub
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/configure
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/configure.in
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/contrib
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/contrib/queryparse
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/contrib/queryparse/INSTALL
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/contrib/queryparse/USAGE
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/contrib/queryparse/queryparse
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/contrib/queryparse/queryparse.1
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/datafile.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/datafile.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/dns.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/dns.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/dnsperf.1
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/dnsperf.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/doc
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/doc/caching-dns-performance.pdf
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/doc/dnsperf.pdf
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/doc/resperf.pdf
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/install-sh
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/log.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/log.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/net.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/net.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/opt.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/opt.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/os.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/os.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/resperf-report
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/resperf.1
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/resperf.c
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/util.h
/usr/share/doc/packages/bind/contrib/dnsperf-2.1.0.0-1/version.h
/usr/share/doc/packages/bind/contrib/idn
/usr/share/doc/packages/bind/contrib/idn/README.idnkit
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/ChangeLog
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/DISTFILES
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/INSTALL
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/INSTALL.ja
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/LICENSE.txt
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/NEWS
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/README
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/README.ja
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/ltmain.sh
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/util
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/util/Makefile
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/util/SparseMap.pm
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/util/UCD.pm
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/util/generate_nameprep_data.pl
/usr/share/doc/packages/bind/contrib/idn/idnkit-1.0-src/util/generate_normalize_data.pl
/usr/share/doc/packages/bind/contrib/linux
/usr/share/doc/packages/bind/contrib/linux/coredump-patch
/usr/share/doc/packages/bind/contrib/named-bootconf
/usr/share/doc/packages/bind/contrib/named-bootconf/named-bootconf.sh
/usr/share/doc/packages/bind/contrib/nanny
/usr/share/doc/packages/bind/contrib/nanny/nanny.pl
/usr/share/doc/packages/bind/contrib/nslint-2.1a3
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/CHANGES
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/FILES
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/INSTALL
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/Makefile.in
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/README
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/VERSION
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/aclocal.m4
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/config.guess
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/config.sub
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/configure
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/configure.in
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/install-sh
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/lbl
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/lbl/gnuc.h
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/lbl/os-irix5.h
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/lbl/os-osf3.h
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/lbl/os-solaris2.h
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/lbl/os-sunos4.h
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/lbl/os-ultrix4.h
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/mkdep
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/nslint.8
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/nslint.c
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/savestr.c
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/savestr.h
/usr/share/doc/packages/bind/contrib/nslint-2.1a3/strerror.c
/usr/share/doc/packages/bind/contrib/perftcpdns
/usr/share/doc/packages/bind/contrib/perftcpdns/Makefile.in
/usr/share/doc/packages/bind/contrib/perftcpdns/configure
/usr/share/doc/packages/bind/contrib/perftcpdns/configure.in
/usr/share/doc/packages/bind/contrib/perftcpdns/perftcpdns.c
/usr/share/doc/packages/bind/contrib/pkcs11-keygen
/usr/share/doc/packages/bind/contrib/pkcs11-keygen/README
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/ADDRESSES
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/ALGO
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/INSTALL
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/Makefile.in
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/README
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/USAGE
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/config.h.in
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/configure
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/configure.in
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/install-sh
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/loc.c
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/loc.h
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/loc_ntoa.c
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/query-loc.1
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/query-loc.c
/usr/share/doc/packages/bind/contrib/query-loc-0.4.0/reconf
/usr/share/doc/packages/bind/contrib/queryperf
/usr/share/doc/packages/bind/contrib/queryperf/Makefile.in
/usr/share/doc/packages/bind/contrib/queryperf/README
/usr/share/doc/packages/bind/contrib/queryperf/config.h.in
/usr/share/doc/packages/bind/contrib/queryperf/configure
/usr/share/doc/packages/bind/contrib/queryperf/configure.in
/usr/share/doc/packages/bind/contrib/queryperf/input
/usr/share/doc/packages/bind/contrib/queryperf/input/sample.0
/usr/share/doc/packages/bind/contrib/queryperf/input/sample.1
/usr/share/doc/packages/bind/contrib/queryperf/missing
/usr/share/doc/packages/bind/contrib/queryperf/missing/addrinfo.h
/usr/share/doc/packages/bind/contrib/queryperf/missing/getaddrinfo.c
/usr/share/doc/packages/bind/contrib/queryperf/missing/getnameinfo.c
/usr/share/doc/packages/bind/contrib/queryperf/queryperf.c
/usr/share/doc/packages/bind/contrib/queryperf/utils
/usr/share/doc/packages/bind/contrib/queryperf/utils/gen-data-queryperf.py
/usr/share/doc/packages/bind/contrib/scripts
/usr/share/doc/packages/bind/contrib/scripts/dnssec-keyset.sh
/usr/share/doc/packages/bind/contrib/sdb
/usr/share/doc/packages/bind/contrib/sdb/bdb
/usr/share/doc/packages/bind/contrib/sdb/bdb/README
/usr/share/doc/packages/bind/contrib/sdb/bdb/bdb.c
/usr/share/doc/packages/bind/contrib/sdb/bdb/bdb.h
/usr/share/doc/packages/bind/contrib/sdb/bdb/zone2bdb.c
/usr/share/doc/packages/bind/contrib/sdb/dir
/usr/share/doc/packages/bind/contrib/sdb/dir/dirdb.c
/usr/share/doc/packages/bind/contrib/sdb/dir/dirdb.h
/usr/share/doc/packages/bind/contrib/sdb/ldap
/usr/share/doc/packages/bind/contrib/sdb/ldap/INSTALL.ldap
/usr/share/doc/packages/bind/contrib/sdb/ldap/README.ldap
/usr/share/doc/packages/bind/contrib/sdb/ldap/README.zone2ldap
/usr/share/doc/packages/bind/contrib/sdb/ldap/dnszonehowto.html
/usr/share/doc/packages/bind/contrib/sdb/ldap/ldapdb.c
/usr/share/doc/packages/bind/contrib/sdb/ldap/ldapdb.h
/usr/share/doc/packages/bind/contrib/sdb/ldap/zone2ldap.1
/usr/share/doc/packages/bind/contrib/sdb/ldap/zone2ldap.c
/usr/share/doc/packages/bind/contrib/sdb/pgsql
/usr/share/doc/packages/bind/contrib/sdb/pgsql/pgsqldb.c
/usr/share/doc/packages/bind/contrib/sdb/pgsql/pgsqldb.h
/usr/share/doc/packages/bind/contrib/sdb/pgsql/zonetodb.c
/usr/share/doc/packages/bind/contrib/sdb/sqlite
/usr/share/doc/packages/bind/contrib/sdb/sqlite/README.sdb_sqlite
/usr/share/doc/packages/bind/contrib/sdb/sqlite/sqlitedb.c
/usr/share/doc/packages/bind/contrib/sdb/sqlite/sqlitedb.h
/usr/share/doc/packages/bind/contrib/sdb/sqlite/zone2sqlite.c
/usr/share/doc/packages/bind/contrib/sdb/tcl
/usr/share/doc/packages/bind/contrib/sdb/tcl/lookup.tcl
/usr/share/doc/packages/bind/contrib/sdb/tcl/tcldb.c
/usr/share/doc/packages/bind/contrib/sdb/tcl/tcldb.h
/usr/share/doc/packages/bind/contrib/sdb/time
/usr/share/doc/packages/bind/contrib/sdb/time/timedb.c
/usr/share/doc/packages/bind/contrib/sdb/time/timedb.h
/usr/share/doc/packages/bind/contrib/zkt
/usr/share/doc/packages/bind/contrib/zkt/CHANGELOG
/usr/share/doc/packages/bind/contrib/zkt/LICENSE
/usr/share/doc/packages/bind/contrib/zkt/Makefile.in
/usr/share/doc/packages/bind/contrib/zkt/README
/usr/share/doc/packages/bind/contrib/zkt/README.logging
/usr/share/doc/packages/bind/contrib/zkt/TODO
/usr/share/doc/packages/bind/contrib/zkt/config.h.in
/usr/share/doc/packages/bind/contrib/zkt/config_zkt.h
/usr/share/doc/packages/bind/contrib/zkt/configure
/usr/share/doc/packages/bind/contrib/zkt/configure.ac
/usr/share/doc/packages/bind/contrib/zkt/debug.h
/usr/share/doc/packages/bind/contrib/zkt/dki.c
/usr/share/doc/packages/bind/contrib/zkt/dki.h
/usr/share/doc/packages/bind/contrib/zkt/dnssec-zkt.c
/usr/share/doc/packages/bind/contrib/zkt/doc
/usr/share/doc/packages/bind/contrib/zkt/doc/KeyRollover.ms
/usr/share/doc/packages/bind/contrib/zkt/domaincmp.c
/usr/share/doc/packages/bind/contrib/zkt/domaincmp.h
/usr/share/doc/packages/bind/contrib/zkt/examples
/usr/share/doc/packages/bind/contrib/zkt/examples/dnssec.conf
/usr/share/doc/packages/bind/contrib/zkt/examples/flat
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/dyn.example.net
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/dyn.example.net/Kdyn.example.net.+007+30323.key
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/dyn.example.net/Kdyn.example.net.+007+30323.private
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/dyn.example.net/Kdyn.example.net.+007+52935.key
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/dyn.example.net/Kdyn.example.net.+007+52935.private
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/dyn.example.net/zktlog-dyn.example.net.
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net/Kexample.net.+008+08406.key
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net/Kexample.net.+008+08406.private
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net/Kexample.net.+008+36257.key
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net/Kexample.net.+008+36257.private
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net/dnssec.conf
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net/z.db
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/example.net/zktlog-example.net.
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net/Ksub.example.net.+007+02048.key
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net/Ksub.example.net.+007+02048.published
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net/Ksub.example.net.+007+41747.key
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net/Ksub.example.net.+007+41747.private
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net/Ksub.example.net.+007+42834.key
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net/Ksub.example.net.+007+42834.private
/usr/share/doc/packages/bind/contrib/zkt/examples/flat/sub.example.net/zktlog-sub.example.net.
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/Kexample.de.+005+09743.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/Kexample.de.+005+09743.published
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/Kexample.de.+005+39599.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/Kexample.de.+005+39599.private
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+07295.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+07295.private
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+08544.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+08544.private
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+27861.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+27861.private
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+40559.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+40559.published
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+42639.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+42639.private
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+63530.depreciated
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/de/example.de/sub.example.de/Ksub.example.de.+005+63530.key
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/log
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/log/zktlog-example.de.
/usr/share/doc/packages/bind/contrib/zkt/examples/hierarchical/log/zktlog-sub.example.de.
/usr/share/doc/packages/bind/contrib/zkt/examples/zkt-ls.sh
/usr/share/doc/packages/bind/contrib/zkt/examples/zkt-signer.sh
/usr/share/doc/packages/bind/contrib/zkt/log.c
/usr/share/doc/packages/bind/contrib/zkt/log.h
/usr/share/doc/packages/bind/contrib/zkt/man
/usr/share/doc/packages/bind/contrib/zkt/man/dnssec-zkt.8
/usr/share/doc/packages/bind/contrib/zkt/man/dnssec-zkt.8.pdf
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-conf.8
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-conf.8.html
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-conf.8.org
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-conf.8.pdf
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-keyman.8
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-keyman.8.html
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-keyman.8.pdf
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-ls.8
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-ls.8.html
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-ls.8.pdf
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-signer.8
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-signer.8.html
/usr/share/doc/packages/bind/contrib/zkt/man/zkt-signer.8.pdf
/usr/share/doc/packages/bind/contrib/zkt/misc.c
/usr/share/doc/packages/bind/contrib/zkt/misc.h
/usr/share/doc/packages/bind/contrib/zkt/ncparse.c
/usr/share/doc/packages/bind/contrib/zkt/ncparse.h
/usr/share/doc/packages/bind/contrib/zkt/nscomm.c
/usr/share/doc/packages/bind/contrib/zkt/nscomm.h
/usr/share/doc/packages/bind/contrib/zkt/rollover.c
/usr/share/doc/packages/bind/contrib/zkt/rollover.h
/usr/share/doc/packages/bind/contrib/zkt/soaserial.c
/usr/share/doc/packages/bind/contrib/zkt/soaserial.h
/usr/share/doc/packages/bind/contrib/zkt/strlist.c
/usr/share/doc/packages/bind/contrib/zkt/strlist.h
/usr/share/doc/packages/bind/contrib/zkt/tags
/usr/share/doc/packages/bind/contrib/zkt/tcap.c
/usr/share/doc/packages/bind/contrib/zkt/tcap.h
/usr/share/doc/packages/bind/contrib/zkt/zconf.c
/usr/share/doc/packages/bind/contrib/zkt/zconf.h
/usr/share/doc/packages/bind/contrib/zkt/zfparse.c
/usr/share/doc/packages/bind/contrib/zkt/zfparse.h
/usr/share/doc/packages/bind/contrib/zkt/zkt-conf.c
/usr/share/doc/packages/bind/contrib/zkt/zkt-keyman.c
/usr/share/doc/packages/bind/contrib/zkt/zkt-ls.c
/usr/share/doc/packages/bind/contrib/zkt/zkt-signer.c
/usr/share/doc/packages/bind/contrib/zkt/zkt-soaserial.c
/usr/share/doc/packages/bind/contrib/zkt/zkt.c
/usr/share/doc/packages/bind/contrib/zkt/zkt.h
/usr/share/doc/packages/bind/contrib/zkt/zone.c
/usr/share/doc/packages/bind/contrib/zkt/zone.h
/usr/share/doc/packages/bind/contrib/zone-edit.sh
/usr/share/doc/packages/bind/contrib/zone-edit.sh.in
/usr/share/doc/packages/bind/misc
/usr/share/doc/packages/bind/misc/dnssec
/usr/share/doc/packages/bind/misc/format-options.pl
/usr/share/doc/packages/bind/misc/ipv6
/usr/share/doc/packages/bind/misc/migration
/usr/share/doc/packages/bind/misc/migration-4to9
/usr/share/doc/packages/bind/misc/options
/usr/share/doc/packages/bind/misc/rfc-compliance
/usr/share/doc/packages/bind/misc/roadmap
/usr/share/doc/packages/bind/misc/sdb
/usr/share/doc/packages/bind/misc/sort-options.pl
/usr/share/doc/packages/bind/version
/usr/share/susehelp
/usr/share/susehelp/meta
/usr/share/susehelp/meta/Administration
/usr/share/susehelp/meta/Administration/System
/usr/share/susehelp/meta/Administration/System/BIND.desktop


Generated by rpm2html 1.8.1

Fabrice Bellet, Sun Dec 17 23:24:01 2017