bind-chrootenv-9.5.0P2-18.6.1>t  DH`pIָ/=„wJ:euzk @;<6&=D_#` @"\ ֐ :/(,$(akEAS aㅝ c)SR Е6݂@A@$fPz)&N0M-1=Op$)y1x\}./W-:뒅JE4v7‘m ׿Ͳ#߆ BSSZW읍i M,pz*dAn: ? d  M,0<@NWm {`   8    L    h x  ( 48 <%9 %: %=W>_FgG|HI X Y$\4]|^ bc Yd e f k l z Cbind-chrootenv9.5.0P218.6.1Chroot environment for BIND named and lwresdThis package contains all directories and files which are common to the chroot environment of BIND named and lwresd. Most is part of the structure below /var/lib/named. Authors: -------- ISC Software IڪpoincareCopenSUSE 11.1openSUSEBSD 3-Clause; X11/MIThttp://bugs.opensuse.orgProductivity/Networking/DNS/Servershttp://isc.org/sw/bind/linuxi586/usr/sbin/groupadd -g 44 -o -r named 2> /dev/null || : /usr/sbin/useradd -r -o -g named -u 44 -s /bin/false -c "Name server daemon" -d /var/lib/named named 2> /dev/null || : PNAME=named SUBPNAME=-common TEMPLATE_DIR=var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME SD_NAME="" if [ -x bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating etc/sysconfig/$SD_NAME$PNAME..." mkdir -p etc/sysconfig/$SD_NAME touch etc/sysconfig/$SD_NAME$PNAME bin/fillup -q etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi PNAME=syslog SUBPNAME=-named TEMPLATE_DIR=var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME SD_NAME="" if [ -x bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating etc/sysconfig/$SD_NAME$PNAME..." mkdir -p etc/sysconfig/$SD_NAME touch etc/sysconfig/$SD_NAME$PNAME bin/fillup -q etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi8HP0xHH0AA큤!!AA큤AAAAAIڟIڟIڞIڟIڟIڨIڨIڟIڟIڟIژIڟIڟIڟIڟIژIژIڟfa4ffd66cc4cb0e9b9ab10fff659c07ad484442c61fc7b1f1e57388864e1a735d41d8cd98f00b204e9800998ecf8427ed41d8cd98f00b204e9800998ecf8427e../..../log../lib/named/var/run/named@@rootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootbind-9.5.0P2-18.6.1.src.rpmbind-chrootenv@@@@JJJ/usr/sbin/groupadd/usr/sbin/useradd/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.2-14.4.2.3I@IeI>]I-:@IsI Hf@H@H@Hd@HH{@Hc@H}HM@H H@G@G@GW@FFX!@FIF8}@F F @E@E@EEEI@ETiE4E3t@D D@D6D@ug@suse.deug@suse.dero@suse.deug@suse.dero@suse.deolh@suse.deug@suse.demrueckert@suse.desschober@suse.deug@suse.desschober@suse.deug@suse.deaj@suse.deug@suse.deug@suse.deug@suse.dero@suse.deug@suse.deug@suse.demt@suse.dero@suse.deug@suse.deug@suse.deug@suse.derguenther@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.depoeml@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.de- mount /proc into chroot environment to support multi CPU systems (bnc#470828) - key names with spaces are allowed by genDDNSkey now (bnc#459739) - a missing /etc/named.conf.include could lead to an error while "restart" (bnc#455888) - XML stats did not work. (bnc#474571) - /etc/named.conf does not include /etc/named.d/forwarders.conf by default (bnc#480334) - Security Vulnerability: DNSSEC Lookaside Validation problem (bnc#488599)- Security Vulnerability: insecure usage of openssl, not checking return values (bnc#464462)- remove ix86 from ifarch statement obsoleting 32bit package- fix for removed /etc/named.d directory (bnc#448995)- SLE-11 uses PPC64 instead of PPC, adapt baselibs.conf- obsolete old -XXbit packages (bnc#437293)- should start/stop fixed (bnc#430901)- delete the static libraries aswell - added missiong requires to the baselibs.conf- Create and copy /etc/named.conf.include to change root jail. Fix by Frank Hollmann.- "should-stop" in lwresd init script fixed- Copy complete /etc/named.d to change root jail (bnc#408145).- performance improvement over the P1 releases, namely + significantly remedying the port allocation issues + allowing TCP queries and zone transfers while issuing as many outstanding UDP queries as possible + additional security of port randomization at the same level as P1 - also includes fixes for several bugs in the 9.5.0 base code - 9.5.0-P2- Remove .la files, they only introduce more problems and require libxml2.la installation.- BIND 9.5 offers many new features, including many behind-the-scenes improvements. For the most part, the non-visible features help ISC's customers who have run into the upper-end of what BIND 9.4 could handle. See CHANGES for details - Statistics Counters / server - Cache cleaning enhancements - GSS TSIG - DHCID Resource Record (RR) - Handling EDNS timeouts - version 9.5.0- VUL-0: spoofing made easier due to non-random UDP source port VU#800113 (bnc#396963)- capset support fixed (bnc#386653)- added baselibs.conf file to build xxbit packages for multilib support- root.hint file updated (#361094)- version 9.4.2 (more than 50 bugs fixed. See changelog. for details) - root.hint file updated- Bug #294403: updated to security release 9.4.1-P1 fixing: CVE-2007-2926: cryptographically weak query ids [RT #16915]. CVE-2007-2925: allow-query-cache/allow-recursion default acls not set [RT #16987], [RT #16960].- added ldconfig to postinstall script for bind-libs- added apparmor profile- version 9.4.1 - query_addsoa() was being called with a non zone db. [RT #16834]- libidnkitres.la moved to bind-libs for runidn- Package .la files in -devel subpackage. - Do not package useless .la files. - Make -devel package depend on -libs package, not -utils package.- SuSEFirewall service file added (#246920) fate #300687- version 9.3.4 to 9.4.0 - too many changes to list them all here. Please see the CHANGELOG for details - LDAP backend dropped- Bug #238634 - [security] Serialise validation of type ANY responses. [RT #16555] - [security] It was possible to dereference a freed fetch context. [RT #16584] - version 9.3.3 to 9.3.4- version 9.3.2 to 9.3.3 - lots of bugfixes (see changelog for details)- load of bind during boot fails if ip-up starts modify_resolvconf at the same time (#221948)- security fix (#218303) workarounds OpenSSL's recently discovered RSA signature verification issue (CVE-2006-4339) by using the exponent 65537 (0x10001) instead of the widely used 3.- there is no SuSEconfig.syslog script anymore, thus remove the YaST hint from the sysconfig template- typo in sysconfig file fixed (#212337)- security fix Bug #201424 VUL-0: bind: two denial-of-service attacks VU#697164 BIND INSIST failure due to excessive recursive queries VU#915404 BIND assertion failure during SIG query processing- update messages removed- moved the la files to bind-utils (#182448)- fix for the nsupdate man page (#92730) thanx to Werner/bin/sh/bin/shpoincare 1238424234웛?웛A웙웙웛-웙웙웛%웙웙웙웛.웛9웙웙웛;9.5.0P2-18.6.1 sysconfig.named-commonsysconfig.syslog-namednameddevlognullrandometcnamed.drndc.access.conflogvarlibnamedlogrunnamednamed/var/adm/fillup-templates//var/lib//var/lib/named//var/lib/named/dev//var/lib/named/etc//var/lib/named/etc/named.d//var/lib/named/var//var/lib/named/var/lib//var/lib/named/var/run//var/run/-march=i586 -mtune=i686 -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.suse.de/SUSE:openSUSE:11.1:Update:Test/standard/9ad82dc6102f1e400302cde3dfb25ad5-bindcpiolzma2i586i586-suse-linuxʑi2Jo?`] bi8BXmk,NǝQs"jZ}ߍk }Ydi5c&Djb;nIDyI:!bd4g.~mL\::ɉuV.> =fG؈§8w>S{/p^BL_rQTKNjs,bxddom"9y!X0pm:4 _ - |Șt+;$p $4v2ʿNHE5C?v97-x8{Ufh+3SO_ʮyx2v?Zr!kڥ|+uԞ/n^K'}e/P krH ?zoYO3dL_H{'fh2KR[:7/DiO`@ Fy/oX^ ч"ktx;QAsׯ)+f6 0˦uӢHN;)Ņg fO[7ټ*h~EkUr5Ogbxa236\Rt ?ZM[#ӥG\yJ[ƠqbҿzvLochf#]pDaSXYqŻs]Td}Y3,.B҃f麗YY+v,K'"Rncl,rn~܊hE辧-cc"cQ4|nQ?rp6k*`*eη9; _`y3 M sG,b!P[;oc>>!u "8Ԥ\8ݭ?l'4S˻XJi&(@ qw*m7}*@7Gs$H @yKsd`9It>pd`<| &l]ׅ"fv򎖏ʰt2/E--ƾR ljt egj`<=+q+!ֱܬΛLzY0* eT GƿيqubXve/%Q`(9[+fy1z&[ H=c0B-߱'1`v(ުí>nl