From nobody Wed Apr 19 10:25:07 2023 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4Q1cP00r3kz45HZq for ; Wed, 19 Apr 2023 10:25:08 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Q1cNz6Pj6z4Wyt for ; Wed, 19 Apr 2023 10:25:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1681899907; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=IEReWH8prFc5U5+wveMKFeuQ0MG0WcCIstn0KEajShk=; b=Z0o0CH7n0oxhBvwYTATH4zO8ITFgomUCEMP1plW0n0SxagPHsb4kL/Hf5cclzBiSZrihDP 43ZVtYNoPZK75KmVbTIAgmACmKTh5Wa0W1dCKoqiKwB06i0nHWLpoAa8DsT+t0dHkG/lRp 9flx8upo+VR3qk28+ecLsYpAIE2aqPMiDFRzvUGpTHDI60Kw69Ry61uiKtp9abknnpLu5f 0bggM49y0Te32dSP+gChNULwMJOrgua4/vn2ZbXrNTqKUfwE9zqbtagTuVf1FDZcdhO0dY S6YhxwXKZkjxQopA4kjZ4ysbC/7mQi4PEAkCyvi1+cr2GgQlBTmWOsrGvJMZDg== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1681899907; a=rsa-sha256; cv=none; b=H1s5Eyb1uq7Mc9JwYne1OhGM+7i+oqFMb7fcPMQUCmPDsgk23KJ0QQubAzgcBisMs38Sp2 JJuhm/bgscjB4lklV91IdomiUoH1LG2gkSHajhcuYVQh8jeLyieEVOWKA87+1SKFfWfXYd S4cIlIo65BOzAsnYDlKs8//3acMLuEnTJLWgGzTIZRGTxyML2Ic9sx50DFrtP3IXd0m9RL 6axEjBEwtpUNI9KNEw5hnzoGighUMmDe2wi1PCoIGcW5ZyDRRY2pvoYcapEBeMhwZY71PB 7t8mj8cXhVSp0uw+lflweeQafun3p1lqpVrsCrkBVIh+yVjki8gUJ2oNzpBc5Q== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4Q1cNz5Vytzqvk for ; Wed, 19 Apr 2023 10:25:07 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 33JAP7iP043477 for ; Wed, 19 Apr 2023 10:25:07 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 33JAP79k043476 for ports-bugs@FreeBSD.org; Wed, 19 Apr 2023 10:25:07 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 270931] dns/opendnssec2: Update to 2.1.12 Date: Wed, 19 Apr 2023 10:25:07 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: jaap@NLnetLabs.nl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform bug_file_loc op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name attachments.created Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270931 Bug ID: 270931 Summary: dns/opendnssec2: Update to 2.1.12 Product: Ports & Packages Version: Latest Hardware: Any URL: https://www.opendnssec.org/2022/11/opendnssec-2-1-12 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: jaap@NLnetLabs.nl Attachment #241581 maintainer-approval+ Flags: Created attachment 241581 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D241581&action= =3Dedit patch to upgrade Release notes Version 2.1.12 of OpenDNSSEC News This is a maintenance release of OpenDNSSEC addressing additional issues relating to the previous bug-fix release. Both installations that use shared keys or want to use salt lengths of zero must use this release. Other installations will benefit too from better reporting in case of issues. RPM for RHEL/CentOS, deb, and tgz packages will be provided for at the same download location. Issues o Ensure debug symbols on RPM-style builds; o Bug fix that prevented restoring state from when salt length was zero; o Bug fix for enforcer daemon crash after deleting key on some systems. Release notes Version 2.1.11 of OpenDNSSEC News This is a maintenance release of OpenDNSSEC addressing a number of different issues. Installation that uses shared keys should migrate to this version especially. Also, installations that want to migrate to an NSEC3 salt of length 0 will benefit (this applies to migration-to only). RPM for RHEL/CentOS, deb, and tgz packages will be provided for at the same download location. Issues o Fixed improper re-use of already used keys when using as a consequence of previous bug in 2.1.6; o Improved reporting upon aborts of daemon process; o Fix for migration to salt of length 0; o Fix for empty IXFR cases; o Degraded log message key_update_failed because this action is retried. --=20 You are receiving this mail because: You are the assignee for the bug.=