bind-chrootenv-9.7.6P2-0.34.1>t  DH`pP"S'/=„*B@ԺjS􋞌cn8ha7ljp#P$xoMnݒt>a/1YDS Gs[F,7[U6W߯04ğ,|cUЊq* `ςV-ʹt"5z/]OA'%4Qe~ӼJTǑ<a#ʑh{ qd6d52e372fa04091117ce71a4c488c3947e58bd50]P"S'/=„HiunhNRl\{0.cEȲQڣ}ٶ?]$I=xE4,X;<?Ȑa0֫km|@| +$a4Q׭x[&(u"J('U AA='5,H!MeAA=BXFj{>9(h?(Xd  M,08<JSf th   @    T   ( p   :( T8 \ 9 : k =$>$F$G$H%I%LX%`Y%h\%]%^&[ b'"c'd(,e(1f(6l(8z(HCbind-chrootenv9.7.6P20.34.1Chroot environment for BIND named and lwresdThis package contains all directories and files which are common to the chroot environment of BIND named and lwresd. Most is part of the structure below /var/lib/named. Authors: -------- ISC Software Pbuild31CopenSUSE 11.4openSUSEBSD-3-Clause ; MIThttp://bugs.opensuse.orgProductivity/Networking/DNS/Servershttp://isc.org/sw/bind/linuxi586/usr/sbin/groupadd -g 44 -o -r named 2> /dev/null || : /usr/sbin/useradd -r -o -g named -u 44 -s /bin/false -c "Name server daemon" -d /var/lib/named named 2> /dev/null || : PNAME=named SUBPNAME=-common TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi PNAME=syslog SUBPNAME=-named TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fiAA큤!!AA큤AAAAAPPPPPPPPPPPPPPPPPPfa4ffd66cc4cb0e9b9ab10fff659c07ad484442c61fc7b1f1e57388864e1a735d41d8cd98f00b204e9800998ecf8427ed41d8cd98f00b204e9800998ecf8427e../..../log../lib/named/var/run/named@@@rootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootrootrootrootrootrootrootrootrootrootrootnamedrootrootrootrootrootnamedrootbind-9.7.6P2-0.34.1.src.rpmbind-chrootenvbind-chrootenv(x86-32)    /usr/sbin/groupadd/usr/sbin/useradd/bin/sh/bin/shrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)4.0-13.0.4-14.4.6-14.8.0Pw@OỌ@N@NM@MfH@M$]@MLs@L@LLMLMxLT@K$@KKK{@KV@KA@K'z@K @KKJ@JH@J JI@J7@I@Iug@suse.deug@suse.deug@suse.deug@suse.deug@suse.demeissner@suse.deug@suse.demeissner@suse.demvyskocil@suse.czcoolo@novell.comug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deaj@suse.dejengelh@medozas.deug@suse.deug@suse.deug@suse.dejengelh@medozas.deug@suse.deug@suse.deug@suse.decoolo@novell.comug@suse.deug@suse.deug@suse.deug@suse.deug@suse.deug@suse.de- Bad-cache data could be used before it was initialized, causing an assert. CVE-2012-3817 bnc#772945 - Change #3314 broke saving of stub zones to disk resulting in excessive cpu usage in some cases. - 9.7.6-P2- VUL-1: deleted domain name resolving flaw CVE-2012-1033 bnc#746074 - more than 40 other bugs fixed (see CHANGES for details) - 9.7.6-P1- VUL-0: bind remote DoS via zero length rdata field CVE-2012-1667 bnc#765315- Cache lookup could return RRSIG data associated with nonexistent records, leading to an assertion failure. (bnc#730995) CVE-2011-4313- Change #2912 (see CHANGES) exposed a latent bug in the DNS message processing code that could allow certain UPDATE requests to crash named. This was fixed by disambiguating internal database representation vs DNS wire format data. [RT #24777] [CVE-2011-2464] (bnc#703907)- Security update to 9.7.3-P1 - fixed a denial of service in RRSIG (CVE-2011-1910 / bnc#696585) - Updated named.root from internic- fixed security issue VUL-0: bind: IXFR or DDNS update combined with high query rate DoS vulnerability (CVE-2011-0414 bnc#674431) - version to 9.7.3- ifdef the sysvinit specific prereqs for openSUSE 11.4 and later- fix bnc#656509 - direct mount of /proc in chroot- prereq init scripts syslog and network- fixed VUL-0: bind: Key algorithm rollover bug bnc#657102, CVE-2010-3614 - fixed VUL-0: bind: allow-query processed incorrectly bnc#657120, CVE-2010-3615 - fixed VUL-0: bind: cache incorrectly allows a ncache entry and a rrsig for the same type bnc#657129, CVE-2010-3613- fixed return code of "rcnamed status" - added gssapi support- Zones may be dynamically added and removed with the "rndc addzone" and "rndc delzone" commands. These dynamically added zones are written to a per-view configuration file. Do not rely on the configuration file name nor contents as this will change in a future release. This is an experimental feature at this time. - Added new "filter-aaaa-on-v4" access control list to select which IPv4 clients have AAAA record filtering applied. - A new command "rndc secroots" was added to dump a combined summary of the currently managed keys combined with statically configured trust anchors. - Added support to load new keys into managed zones without signing immediately with "rndc loadkeys". Added support to link keys with "dnssec-keygen -S" and "dnssec-settime -S". - Documentation improvements - ORCHID prefixes were removed from the automatic empty zone list. - Improved handling of GSSAPI security contexts. Specifically, better memory management of cached contexts, limited lifetime of a context to 1 hour, and added a "realm" command to nsupdate to allow selection of a non-default realm name. - The contributed tool "ztk" was updated to version 1.0. - version 9.7.1 to 9.7.2-P2- chrooted bind failed to start (bnc#625019)- genrandom: add support for the generation of multiple files. - Update empty-zones list to match draft-ietf-dnsop-default-local-zones-13. - Incrementally write the master file after performing a AXFR. - Add AAAA address for L.ROOT-SERVERS.NET. - around 50 bugs fixed (see CHANGELOG for details) - version 9.7.1- Handle broken DNSSEC trust chains better. [RT #15619] - Named could return SERVFAIL for negative responses from unsigned zones. [RT #21131 - version 9.7.0-P2- Handle /var/run on tmpfs. - do not use run_ldconfig.- Enable DLZ-LDAP (supersedes sdb_ldap) and add a patch- Fully automatic signing of zones by "named". - Simplified configuration of DNSSEC Lookaside Validation (DLV). - Simplified configuration of Dynamic DNS, using the "ddns-confgen" command line tool or the "local" update-policy option. (As a side effect, this also makes it easier to configure automatic zone re-signing.) - New named option "attach-cache" that allows multiple views to share a single cache. - DNS rebinding attack prevention. - New default values for dnssec-keygen parameters. - Support for RFC 5011 automated trust anchor maintenance - Smart signing: simplified tools for zone signing and key maintenance. - The "statistics-channels" option is now available on Windows. - A new DNSSEC-aware libdns API for use by non-BIND9 applications - On some platforms, named and other binaries can now print out a stack backtrace on assertion failure, to aid in debugging. - A "tools only" installation mode on Windows, which only installs dig, host, nslookup and nsupdate. - Improved PKCS#11 support, including Keyper support and explicit OpenSSL engine selection. - version 9.7.0- [security] Do not attempt to validate or cache out-of-bailiwick data returned with a secure answer; it must be re-fetched from its original source and validated in that context. [RT #20819] - [security] Cached CNAME or DNAME RR could be returned to clients without DNSSEC validation. [RT #20737] - [security] Bogus NXDOMAIN could be cached as if valid. [RT #20712] - version 9.6.1-P3- removed the syntax check for include files (bnc#567593)- add baselibs.conf as a source - enable parallel building - add baselibs for SPARC - package documentation as noarch- Security fix When validating, track whether pending data was from the additional section or not and only return it if validates as secure. [RT #20438] CVE-2009-4022 bnc#558260 - update from P1 to P2- added localhost for ipv6 to default config (bnc#539529)- fixed apparmor profile (bnc#544181)- updated patches to apply with fuzz=0- using start_daemon instead of startproc (bnc#539532)- version update to 9.6.1-P1 (security fix CVE-2009-0696) bnc#526185- enabled MySQL DLZ (Dynamically Loadable Zones)- around 50 bugfixes against 9.6.0p1 See changelog for details - version 9.6.1- not all include files were copied into chroot (bnc#466800)- /etc/named.conf does not include /etc/named.d/forwarders.conf by default (bnc#480334)/bin/sh/bin/shbuild31 1343652864?A86<=>9.7.6P2-0.34.19.7.6P2-0.34.1 sysconfig.named-commonsysconfig.syslog-namednameddevlognullrandometcnamed.drndc.access.conflogvarlibnamedlogrunnamednamed/var/adm/fillup-templates//var/lib//var/lib/named//var/lib/named/dev//var/lib/named/etc//var/lib/named/etc/named.d//var/lib/named/var//var/lib/named/var/lib//var/lib/named/var/run//var/run/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Maintenance:714/openSUSE_11.4_Update/44a7d6d35a32396b1336caadaad4fddb-bind.openSUSE_11.4_Updatecpiolzma5i586-suse-linuxë&|97?p] cXT־Y̥W5l*rT.0y&=BWb?y6: R0wR[A\WHeBlvÇt_CA,!ܸ jg,5+4#)Ǖ ~7 ;Qϲk%奮$|{Y,S,b+mvv<1c|D w٤62_F'۝c;,M;Y|dѳ{9&qfqlÁLE[|]x:?re}>փ"ݖnݲ\LBѧCN/:58A߃Bgz}`N8a;h9cR$ =h'bydkl&iJoHr|&bj-y(:WU.a˞|A޶v.(Л