8.2.2 -> 9.1.0 upgrade problems...

Brad Knowles brad.knowles at skynet.be
Tue Apr 3 15:20:57 UTC 2001


At 8:04 AM -0500 4/3/01, Christopher L. Barnard wrote:

>  I prefer to fight one fire at a time.

	That's generally a good philosophy.

>                                         Once I get 9.1.0 working, then I will
>  start looking at 9.1.1.  As I understand it, the move from 9.1.0 to 9.1.1 is
>  just adding features that I don't use anyway.

	Let me re-post the complete list of bug fixes and other changes 
between 9.1.0-REL and 9.1.1-REL:

	--- 9.1.1 released ---

	--- 9.1.1rc7 released ---

  791.	[bug]		The control channel did not work over IPv6.

  790.	[bug]		Wildcards created using dynamic update or IXFR
			could fail to match. [RT #1111]

  787.	[bug]		The DNSSEC tools failed to downcase domain
			names when mapping them into file names.

  786.	[bug]		When DNSSEC signing/verifying data, owner names were
			not properly downcased.

	--- 9.1.1rc6 released ---

  785.	[bug]		A race condition in the resolver could cause
			an assertion failure. [RT #673, #872, #1048]

  784.	[bug]		nsupdate and other programs would not quit properly
			if some signals were blocked by the caller. [RT #1081]

  783.	[bug]		Following CNAMEs could cause an assertion failure
			when either using an sdb database or under very
			rare conditions.

  780.	[bug]		Error handling code dealing with out of memory or
			other rare errors could lead to assertion failures
			by calling functions on unitialized names. [RT #1065]

	--- 9.1.1rc5 released ---

  778.	[bug]		When starting cache cleaning, cleaning_timer_action()
			returned without first pausing the iterator, which
			could cause deadlock. [RT #998]

  777.	[bug]		An empty forwarders list in a zone failed to override
			global forwarders. [RT #995]

  775.   [bug]		Address match lists with invalid netmasks caused
			the configuration parser to abort with an assertion
			failure. [RT #996]

  772.	[bug]		Owner names could be incorrectly omitted from cache
			dumps in the presence of negative caching entries.
			[RT #991]

  686.   [bug]		dig and nslookup can now be properly aborted during
			blocking operations. [RT #568]

	--- 9.1.1rc4 released ---

  767.	[bug]		The configuration parser handled invalid ports badly.
			[RT #961]

  766.	[bug]		A few cases in query_find() could leak fname.
			This would trigger the mpctx->allocated == 0
			assertion when the server exited.
			[RT #739, #776, #798, #812, #818, #821, #845,
			#892, #935, #966]

  759.	[bug]		The resolver didn't turn off "avoid fetches" mode
			when restarting, possibly causing resolution
			to fail when it should not.  This bug only affected
			platforms which support both IPv4 and IPv6. [RT #927]

  758.	[bug]		The "avoid fetches" code did not treat negative
			cache entries correctly, causing fetches that would
			be useful to be avoided.  This bug only affected
			platforms which support both IPv4 and IPv6. [RT #927]

  756.	[bug]		dns_zone_load() could "return" success when no master
			file was configured.

  755.	[bug]		Fix incorrectly formatted log messages in zone.c.

  709.	[bug]		ANY or SIG queries for data with a TTL of 0
			would return SERVFAIL. [RT #620]

	--- 9.1.1rc3 released ---

  754.	[bug]		Certain failure conditions sending UDP packets
			could cause the server to retry the transmission
			indefinitely. [RT #902]

  753.	[bug]		dig, host, and nslookup would fail to contact a
			remote server if getaddrinfo() returned an IPv6
			address on a system that doesn't support IPv6.
			[RT #917]

  750.	[bug]		A query should not match a DNAME whose trust level
			is pending.  [RT #916]

  749.	[bug]		When a query matched a DNAME in a secure zone, the
			server did not return the signature of the DNAME.
			[RT #915]

  747.	[bug]		The code to determine whether an IXFR was possible
			did not properly check for a database that could
			not have a journal. [RT #865, #908]

  746.	[bug]		The sdb didn't clone rdatasets properly, causing
			a crash when the server followed delegations. [RT #905]

  744.	[bug]		When returning DNS_R_CNAME or DNS_R_DNAME as the
			result of an ANY or SIG query, the resolver failed
			to setup the return event's rdatasets, causing an
			assertion failure in the query code.  [RT #881]

  743.	[bug]		Receiving a large number of certain malformed
			answers could cause named to stop responding.
			[RT #861]

  742.	[bug]		dig +domain did not work. [RT #850]

  738.	[bug]		If a non-threadsafe sdb driver supported AXFR and
			received an AXFR request, it would deadlock or die
			with an assertion failure. [RT #852]

  737.	[port]		stdtime.c failed to compile on certain platforms.

  648.	[port]		Add support for pre-RFC2133 IPv6 implementations.

	--- 9.1.1rc2 released ---

  733.	[bug]		Reference counts of dns_acl_t objects need to be
			locked but were not. [RT #801, #821]

  708.	[bug]		When building with --with-openssl, the openssl headers
			included with BIND 9 should not be used. [RT #702]

	--- 9.1.1rc1 released ---

  729.	[port]		pthread_setconcurrency() needs to be called on Solaris.

  727.	[port]		Work around OS bug where accept() succeeds but
			fails to fill in the peer address of the accepted
			connection, by treating it as an error rather than
			an assertion failure. [RT #809]

  723.	[bug]		Referrals whose NS RRs had a 0 TTL caused the resolver
			to return DNS_R_SERVFAIL. [RT #783]

  720.	[bug]		Server could enter infinite loop in
			dispatch.c:do_cancel(). [RT #733]

  719.	[bug]		Rapid reloads could trigger an assertion failure.
			[RT #743, #763]

  717.	[bug]		Certain TKEY processing failure modes could
			reference an uninitialized variable, causing the
			server to crash. [RT #750]

  716.	[bug]		The first line of a $INCLUDE master file was lost if
			an origin was specified. [RT #744]

  715.	[bug]		Resolving some A6 chains could cause an assertion
			failure in adb.c. [RT #738]

  711.	[bug]		The libisc and liblwres implementations of
			inet_ntop contained an off by one error.

  706.	[bug]		Zones with an explicit "allow-update { none; };"
			were considered dynamic and therefore not reloaded
			on SIGHUP or "rndc reload".

  700.	[bug]		$GENERATE range check was wrong. [RT #688]

  698.	[bug]		Aborting nsupdate with ^C would lead to several
			race conditions.

  699.	[bug]		The lexer mishandled empty quoted strings. [RT #694]

  694.	[bug]		$GENERATE did not produce the last entry.
			[RT #682, #683]

  693.   [bug]           An empty lwres statement in named.conf caused
                         the server to crash while loading.

  692.	[bug]		Deal with systems that have getaddrinfo() but not
			gai_strerror(). [RT #679]

  691.	[bug]		Configuring per-view forwarders caused an assertion
			failure. [RT #675, #734]

	--- 9.1.0 released ---


	If you do the math, that's an easy 100 bugs that have been fixed, 
or features that have been introduced.  If you read the various 
descriptions in question, I believe that you will find that you 
probably don't want to waste your time with 9.1.0-REL, and instead 
should go straight to 9.1.1-REL.

>  um, the specifics were in the next paragraph, which you cut out in your
>  response.  To reiterate,

	Show us the complete log entries.  Show us the zones and queries 
that are failing, using more useful tools such as "dig".  Turn on 
query logging, and let us see what the server is receiving.

	Meanwhile, if you haven't already upgraded to BIND 9.1.1-REL, I 
suggest that you do so, and then try everything again.  I'd be 
willing to bet that this will fix the problems you're seeing, but if 
it doesn't and you can show us the kind of information we need, we're 
more likely to be able to help.

-- 
Brad Knowles, <brad.knowles at skynet.be>

/*        efdtt.c  Author:  Charles M. Hannum <root at ihack.net>          */
/*       Represented as 1045 digit prime number by Phil Carmody         */
/*     Prime as DNS cname chain by Roy Arends and Walter Belgers        */
/*                                                                      */
/*     Usage is:  cat title-key scrambled.vob | efdtt >clear.vob        */
/*   where title-key = "153 2 8 105 225" or other similar 5-byte key    */

dig decss.friet.org|perl -ne'if(/^x/){s/[x.]//g;print pack(H124,$_)}'


More information about the bind-users mailing list