Blogs

  • BIND Updates for April, 2017

    One hundred and seventy-eight tickets were resolved with 9.9.10, 9.10.5, 9.10.5-S and 9.11.1. 35 of these were minor features or feature changes and 13 were test items. We incorporated 15 submitted patches, contributed by: Hannes Frederic Sowa (Use IP_PMTUDISC_OMIT if available) Thomas Anderson (fixing a build failure problem) LaMont Jones “This patch has been kicking around in the Debian tree for

    Read more
    0
  • 2016 Accomplishments – Another year of open source networking software

    “ISC is dedicated to developing software and offering services in support of the Internet infrastructure.” Once a year, we attempt to catalog what we did the prior year towards supporting the infrastructure.  We do have a small team who are very busy keeping F Root going, as well as the hosting services we still provide for some non-profits, but they are too busy

    Read more
    0
  • DNS Checker

    We have just released a new utility in the Apple app store. It tests recursive DNS servers for conformance against current DNS protocol specifications, especially with regard to EDNS(0) as specified in RFC 6891. Like our other utility on the app store, Dig, this is a free download, and we do not provide formal support for it. Ray Bellis, ISC’s

    Read more
    0
  • BIND 9 Refactoring

    The first release of BIND 9 was in September 2000. In the intervening 16 years, we have issued 225 more releases, give or take a few.  We have continuously added new additional features and RFCs. BIND 9 is a big project: at last count there were 691,554 lines of code* in BIND.  That is 3 times the size of PowerDNS, 5

    Read more
    0
  • Will IPv6 end address blacklisting?

    The question has risen: “is IPv6 the end of address blacklisting”?

    I think not, but the mechanisms used will likely change.

    Read more
    0
  • 2017 Root Key Rollover – What Does it Mean for BIND Users?

    Executive summary If you manage a DNS resolver, you may need to take action in 2017 due to the upcoming root key rollover. If you use BIND with “managed-keys” for the root zone or “dnssec-validation auto”, there is low risk. If you use BIND with “trusted-keys” for the root zone, you need to update your configuration. Anyone setting up a new BIND instance around the

    Read more
    0
  • Release 9.11 adds provisioning options for DNS authoritative services

    We are proud to bring you another version of BIND, 9.11.0.  We have added many new features, updated our support for DNS standards, improved efficiency in a number of areas, and made provisioning and DNSSEC operations more convenient. BIND users now have three supported versions to choose from: 9.9, 9.10 and now, 9.11. We recommend that administrators run one of

    Read more
    0
  • ISC Receives Mozilla MOSS Award

    We are thankful that Mozilla chose to give a MOSS award to ISC to help fund development of the Kea DHCP server, through the Mozilla Foundational Technology track.  This is a wonderful program, through which Mozilla gives back to the Internet community by sponsoring development of the open source that everyone can use. Kea is modern software that we hope will eventually replace the

    Read more
    0
  • Kea 1.1 Released

    Adds flexible client classification, plus greatly extended support for host reservation storage in MySQL and PostgreSQL backend databases. Includes initial support for Cassandra, sponsored by Deutsche Telekom.

    Ask us about our Forensic Logging library, available with a support subscription.

    Read more
    0
  • 1
  • IETF hackathon in Berlin: Kea and YANG/NETCONF

    Kea engineers went to IETF hackathon in Berlin, teamed up with Sysrepo engineers and developed a prototype interface to Kea that uses YANG/NETCONF for DHCPv6 server configuration.

    Read more
    0
  • The Potential Operational Risks Associated with Untrusted Zone Transfers

    At the DNS Summer Day 2016  held in Tokyo on June 24th it was disclosed that an unbounded zone transfer (AXFR) operation can cause operational issues due to resource exhaustion for the server that is receiving the zone transfer.  On servers running BIND, Knot or PowerDNS the receiving server may run out of memory, and on servers running

    Read more
    1

Last modified: November 1, 2016 at 1:25 pm