bind-utils-9.5.0P2-18.9.1<>,9KX׸/=„2+bj pHM.Phg 5&/n|>YPDa—f9S\ !`2yV%%[`zau:ԔQ~E3@3a*p}8bU-vyB>XlbEcA; =X̹$,}Se{#?.Je}o ˱%Z\)͜zna)\'KU0zvaM:Y AKMm[\|7X6qb>;'?'d   <<@PTbk            (   H       ( ( O8 X(9 (:(>"CB"KF"`G"| H" I#| X#Y#Z#[#\# ]$L ^% b&c'd'pe'uf'zk'|l'z'Cbind-utils9.5.0P218.9.1Utilities to query and test DNSThis package includes the utilities host, dig, and nslookup used to test and query the Domain Name System (DNS). The Berkeley Internet Name Domain (BIND) DNS server is found in the package named bind. Authors: -------- ISC Software KXfripp.suse.deWopenSUSE 11.1openSUSEBSD 3-Clause; X11/MIThttp://bugs.opensuse.orgProductivity/Networking/DNS/Utilitieshttp://isc.org/sw/bind/linuxi586/sbin/ldconfig # Create a key if lwresd is installed. if [ -x usr/sbin/lwresd -a ! -f etc/rndc.key ]; then usr/sbin/rndc-confgen -a -b 512 -r dev/urandom chmod 0640 etc/rndc.key chown root:named etc/rndc.key fi # ---------------------------------------------------------------------------ra !V1 g6/ y  &^A큤AA$A큤A큤KXKXKX?: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-9.5.0P2-18.9.1.src.rpmdns_utilsbindutilbind9-utilsbind-utils@JJ@@@@@@@@@@@@@@@@@@@@@@@@@@J/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)/bin/bash/bin/shlibbind9.so.40libc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.1)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcap.so.2libcrypto.so.0.9.8libdl.so.2libdns.so.43libidnkit.so.1libisc.so.44libisccc.so.40libisccfg.so.40liblwres.so.40libm.so.6libnsl.so.1libpthread.so.0libpthread.so.0(GLIBC_2.0)libxml2.so.2libz.so.1rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.2-14.4.2.3KV@K @Jp9I@IeI>]I-:@IsI Hf@H@H@Hd@HH{@Hc@H}HM@H H@G@G@GW@FFX!@FIF8}@F F @E@E@EEEI@ETiE4E3t@D D@D6D@ug@suse.deug@suse.demt@suse.deug@suse.deug@suse.dero@suse.deug@suse.dero@suse.deolh@suse.deug@suse.demrueckert@suse.desschober@suse.deug@suse.desschober@suse.deug@suse.deaj@suse.deug@suse.deug@suse.deug@suse.dero@suse.deug@suse.deug@suse.demt@suse.dero@suse.deug@suse.deug@suse.deug@suse.derguenther@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.depoeml@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.de- [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] - [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] - [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712] - bnc#570912- Security fix When validating, track whether pending data was from the additional section or not and only return it if validates as secure. [RT #20438] CVE-2009-4022 bnc#558260- Security Vulnerability: Dynamic Update DoS (CVE-2009-0696, VU#725188, bnc#526185)- mount /proc into chroot environment to support multi CPU systems (bnc#470828) - key names with spaces are allowed by genDDNSkey now (bnc#459739) - a missing /etc/named.conf.include could lead to an error while "restart" (bnc#455888) - XML stats did not work. (bnc#474571) - /etc/named.conf does not include /etc/named.d/forwarders.conf by default (bnc#480334) - Security Vulnerability: DNSSEC Lookaside Validation problem (bnc#488599)- Security Vulnerability: insecure usage of openssl, not checking return values (bnc#464462)- remove ix86 from ifarch statement obsoleting 32bit package- fix for removed /etc/named.d directory (bnc#448995)- SLE-11 uses PPC64 instead of PPC, adapt baselibs.conf- obsolete old -XXbit packages (bnc#437293)- should start/stop fixed (bnc#430901)- delete the static libraries aswell - added missiong requires to the baselibs.conf- Create and copy /etc/named.conf.include to change root jail. Fix by Frank Hollmann.- "should-stop" in lwresd init script fixed- Copy complete /etc/named.d to change root jail (bnc#408145).- performance improvement over the P1 releases, namely + significantly remedying the port allocation issues + allowing TCP queries and zone transfers while issuing as many outstanding UDP queries as possible + additional security of port randomization at the same level as P1 - also includes fixes for several bugs in the 9.5.0 base code - 9.5.0-P2- Remove .la files, they only introduce more problems and require libxml2.la installation.- BIND 9.5 offers many new features, including many behind-the-scenes improvements. For the most part, the non-visible features help ISC's customers who have run into the upper-end of what BIND 9.4 could handle. See CHANGES for details - Statistics Counters / server - Cache cleaning enhancements - GSS TSIG - DHCID Resource Record (RR) - Handling EDNS timeouts - version 9.5.0- VUL-0: spoofing made easier due to non-random UDP source port VU#800113 (bnc#396963)- capset support fixed (bnc#386653)- added baselibs.conf file to build xxbit packages for multilib support- root.hint file updated (#361094)- version 9.4.2 (more than 50 bugs fixed. See changelog. for details) - root.hint file updated- Bug #294403: updated to security release 9.4.1-P1 fixing: CVE-2007-2926: cryptographically weak query ids [RT #16915]. CVE-2007-2925: allow-query-cache/allow-recursion default acls not set [RT #16987], [RT #16960].- added ldconfig to postinstall script for bind-libs- added apparmor profile- version 9.4.1 - query_addsoa() was being called with a non zone db. [RT #16834]- libidnkitres.la moved to bind-libs for runidn- Package .la files in -devel subpackage. - Do not package useless .la files. - Make -devel package depend on -libs package, not -utils package.- SuSEFirewall service file added (#246920) fate #300687- version 9.3.4 to 9.4.0 - too many changes to list them all here. Please see the CHANGELOG for details - LDAP backend dropped- Bug #238634 - [security] Serialise validation of type ANY responses. [RT #16555] - [security] It was possible to dereference a freed fetch context. [RT #16584] - version 9.3.3 to 9.3.4- version 9.3.2 to 9.3.3 - lots of bugfixes (see changelog for details)- load of bind during boot fails if ip-up starts modify_resolvconf at the same time (#221948)- security fix (#218303) workarounds OpenSSL's recently discovered RSA signature verification issue (CVE-2006-4339) by using the exponent 65537 (0x10001) instead of the widely used 3.- there is no SuSEconfig.syslog script anymore, thus remove the YaST hint from the sysconfig template- typo in sysconfig file fixed (#212337)- security fix Bug #201424 VUL-0: bind: two denial-of-service attacks VU#697164 BIND INSIST failure due to excessive recursive queries VU#915404 BIND assertion failure during SIG query processing- update messages removed- moved the la files to bind-utils (#182448)- fix for the nsupdate man page (#92730) thanx to Werner/bin/shbindutilbind9-utilsfripp.suse.de 1264093585AA@C@D@EABAyAAAABAA@TA`N`OBAAAAAAAAAAA9.5.0P2-18.9.1 idn.confidnalias.confnamed.drndc-access.confopenldapschemadnszone.schemadiggenDDNSkeyhostidnconvnslookupnsupdaterunidnrndcrndc-confgenbindREADME.SUSEidnkitjp.mapdig.1.gzhost.1.gzidnconv.1.gznslookup.1.gzrunidn.1.gzidn.conf.5.gzidnalias.conf.5.gzidnrc.5.gzrndc.conf.5.gznsupdate.8.gzrndc-confgen.8.gzrndc.8.gz/etc//etc/named.d//etc/openldap//etc/openldap/schema//usr/bin//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/bind//usr/share//usr/share/idnkit//usr/share/man/man1//usr/share/man/man5//usr/share/man/man8/-march=i586 -mtune=i686 -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.suse.de/SUSE:openSUSE:11.1:Update:Test/standard/a07d692574df4c02b7e816dc3e3fce0e-bindcpiolzma2i586i586-suse-linux!XA2a/a?P]"k%rt4L =ԑmHh4}!KA3~+F(IKFTIS!=ćҨeU~ DygzSA!Gގ=31`nWCz8oۂ Jյr΃ 4Pժ"=C`m m>\tv _Z%_ҸMOW]e$ iKr$4R:.uWJ(9ݟJ?omm+ޝ?KDꢰP}hc0Mrqazba܋q AUj77s6IQaRI `EYmstka:E tOP[XQl´MTBUё W b{- Fn;x%@jRZiʴ#E8M.u㦣C8pW86cG*MĄ5a:ꞌSKDh G15p++,KU&#}~gڟ| hdy_uhԮؒן>dy< WTlu/JCbj)M{%I+ EKl: ܊dhL)ʖU|Ą%}Q/%W3MBT]4TI1q(krLNbikO.QLS=^[;HY$B]FX l&eZ!" U/TײE Q{V prA?sN N$N1ܻNBAef Yw''{jxrnpIXN/m^+<7:2uMk009rM=o1uĤS7JQᒐ4:h^`eպ6MQ`eKN y[I}k@dQ?@ͼ.T1( ^7ɞᩑ;F~&ޅDs_!ko6gb=mPCoHe0XƭJ[_x=ĉAe)һg&%L)%_);(- {͏8)MaDqHu$A[ &~e)Rju-~U-l6bZ]ȑNXEk###b$շ7G d 5bnFOyk#\(jC찻L:bV8§€p;I֤^ػ^ F5>—C(F^Hџ}ao["*s"Ppꞷ1G`u)Y딡Ejn*!7?Zr 沟, |߫PRpɼш?ƒZ@5N9î(N83sأ}\>$%X?QhGm4RfE|mctDKF֖73BO4%.V! V_+d_KH+ؙ#[Jb/Lb*i㣬}f9e9$ B4hF94^6,n]Bk ~o`2GM.֭ b}x:T!k~<a\s@#6(d~ws:,'."C1:rdZ%)d~V{OEY ~&h?WUM 0]rNNi}5 +th#+h瑨T4 큨&5K$}kmő\vu=+x'L/3c Eʠ .$ne6 Q$;9-;t2~'!;Ty :8~+uC=VXjGmdHF_@l0txr' ȰE7gd۵Ɖ&0?W>GZr~p! I>`f YL8rcr0}.Y㝬ȁ~հ˖c0MoCTf}rTU879vcB{efN8=aLuq e^+Zkϓy"XuY,QkdWYdI<˕5"8achNK8a IDPRTNw"-f,u>;%Ĕg=W]n/lا7r}e/yVD#e}E=qxgStvH,6X>0?/'8}4S0 *amUD*9>"C>W4/ R1ojv# ȍ.*Jk{\j ʬV"( T b0U;B C+@&(sk;ԧ:a+Q{v:|?Nm_F -6nƓCd+\Ӎ"*1U#@*BܐCO2j0; $PJ_.Vr4M-uχh