NIOS 9.0.4 Release Notes RevB
NIOS 9.0.4 Release Notes RevB
NIOS 9.0.4
June 2024
Table of Contents
Introduction .................................................................................................................................................................................. 2
Release Highlights ...................................................................................................................................................................... 2
Trinzic X6 Series .......................................................................................................................................................................... 2
Supported Platforms .................................................................................................................................................................. 3
Upgrade Paths/Before You Install......................................................................................................................................... 3
Virtual vNIOS Appliances ........................................................................................................................................................ 4
New Features ............................................................................................................................................................................... 7
vNIOS X5 Series and X6 Series Appliance Specifications............................................................................................12
vNIOS for KVM Specifications .............................................................................................................................................16
Changes to Default Behavior ................................................................................................................................................17
Changes to Infoblox API and Restful API (WAPI) ..........................................................................................................29
WAPI Deprecation and Backward Compatibility Policy .............................................................................................30
Upgrade Guidelines ..................................................................................................................................................................33
Technical Support .....................................................................................................................................................................36
Training.........................................................................................................................................................................................37
GUI Requirements ....................................................................................................................................................................37
Addressed Vulnerabilities ......................................................................................................................................................37
Resolved Issues ..........................................................................................................................................................................56
Known General Issues .............................................................................................................................................................83
Please note that the stated numbers and recommendations in this document are for reference only.
They represent the results of lab testing in a controlled environment. To design and size a solution
for a production environment, please contact your Infoblox Solution Architect.
Release Highlights
The NIOS 9.0.4 release contains the following number of feature enhancements, resolved issues, and
addressed vulnerabilities.
Trinzic X6 Series
Infoblox NIOS 9.0.x introduces the new Trinzic X6 series of appliances that are more reliable, higher in
performance, rich in features, and which have a lower carbon footprint than their earlier counterparts.
The Trinzic X6 series comprises the following physical appliances:
● TE-906
● TE-1506
● TE-1606
● TE-2306
● TE-4106
The Trinzic X6 series appliances run only on NIOS 9.0.1 and later versions. The Trinzic X6 series
physical appliances can also host Trinzic X5 series licenses. All the Trinzic X6 series appliances support
the cloud platform. The Trinzic X6 series appliances report a 30% increase in DNS QPS and DHCP LPS
performances.
For detailed information about the hardware and software appliances that comprise the Trinzic X6
series, see the detailed appliance documentation on the Appliances tab at docs.infoblox.com.
● Trinzic Appliances: TE-815, TE-825, TE-1415, TE-1425, TE-2215, TE-2225, TE-4015, TE-4025,
TE-926, TE-1516, TE-1526, TE-2326, TE-4126
● Trinzic Virtual Appliances: IB-V815, IB-V825, IB-V1415, IB-V1425, IB-V2215, IB-V2225, IB-
V4015, IB-V4025, IB-FLEX, IB-V926, IB-V1516, IB-V1526, IB-V2326, IB-V4126
● Network Insight Appliances: ND-805, ND-1405, ND-2205, ND-4005, ND-906, ND-1606, ND-
2306, ND-4106
The following appliances are not supported in NIOS 9.0.x: PT-1405, PT-2205, PT-2205-10GE, IB-
4030-10GE, and all of the X0 Series appliances such as the Infoblox 100 Series, Infoblox 800 Series,
Infoblox 1400 Series, Infoblox 2200 Series, Infoblox 4000 Series, Infoblox 4010 Series, Infoblox 4030
Series.
Even though Infoblox supports the upgrade paths mentioned above, Infoblox has tested and validated
only the following upgrade paths for NIOS 9.0.4. Infoblox recommends that you upgrade to NIOS 9.0.4
from these tested and validated releases:
To ensure that new features and enhancements operate properly and smoothly, Infoblox recommends
that you evaluate the capacity on your Grid and review the upgrade guidelines before you upgrade
from a previous NIOS release.
If there are pending actions such as a restart or a reboot from past hotfix applications, ensure that
these are complete before starting the upgrade process. Failure to do so may cause irreparable harm to
your installation. See the “Upgrade Guidelines” section in these Release Notes for information about
how to gather pending action data and resolve the actions.
Infoblox recommends that administrators planning to perform an upgrade from a previous release
create and archive a backup of the Infoblox appliance configuration and data before upgrading. You
can run an upgrade test before performing the actual upgrade. Infoblox recommends that you run the
upgrade test, so you can resolve any potential data migration issues before the upgrade.
Note: When using vNIOS appliances, ensure that the host system supports synchronous power safe
input output to obtain power redundancy.
The Infoblox vNIOS on VMware software can run on ESX or ESXi servers that have DAS (Direct
Attached Storage), or iSCSI (Internet Small Computer System Interface) or FC (Fibre Channel) SAN
(Storage Area Network) attached. You can install the vNIOS software package on a host with VMware
ESX or ESXi 8.0U2, 8.0b, 7.0.3, 7.0.2, 7.0, 6.7 installed, and then configure it as a virtual appliance.
vSphere vMotion is also supported. You can migrate vNIOS virtual appliances from one ESX or ESXi
server to another without any service outages. The migration preserves the hardware IDs and licenses
of the vNIOS virtual appliances. VMware Tools is automatically installed for each vNIOS virtual
appliance. Infoblox supports the control functions in VMware Tools. For example, through the vSphere
client, you can shut down the virtual appliance. You can deploy certain vNIOS virtual appliances with
different hard disk capacities. Some vNIOS appliances are not supported as Grid Masters or Grid
Master Candidates. For more information about vNIOS on VMware, refer to the Infoblox Installation
Guide for vNIOS Software on VMware.
The Infoblox vNIOS virtual appliance is now available for Windows Server 2019 and Windows Server
2016 that have DAS (Direct Attached Storage). Administrators can install vNIOS virtual appliance on
NOTE: NIOS virtual appliance for Hyper-V is not recommended as a Grid Master or Grid Master
Candidate.
The Infoblox vNIOS for KVM is a virtual appliance designed for KVM (Kernel-based Virtual Machine)
hypervisor and KVM-based OpenStack deployments. The Infoblox vNIOS for KVM functions as a
hardware virtual machine guest on the Linux system. It provides core network services and a
framework for integrating all components of the modular Infoblox solution. You can configure some of
the supported vNIOS for KVM appliances as independent or HA (high availability) Grid Masters, Grid
Master Candidates, and Grid members. For information about vNIOS for KVM hypervisor, refer to the
Infoblox Installation Guide for vNIOS for KVM Hypervisor and KVM-based OpenStack.
NOTE: KVM-based OpenStack deployments are supported on the RHOSP 17.1, 16.0 platforms.
The Infoblox vNIOS for AWS is a virtual Infoblox appliance designed for operation as an AMI (Amazon
Machine Instance) in Amazon VPCs (Virtual Private Clouds). You can deploy large, robust, manageable,
and cost effective Infoblox Grids in your AWS cloud, or extend your existing private Infoblox NIOS
Grid to your virtual private cloud resources in AWS. You can use vNIOS for AWS virtual appliances to
provide carrier-grade DNS and IPAM services across your AWS VPCs. Instead of manually
provisioning IP addresses and DNS name spaces for network devices and interfaces, an Infoblox vNIOS
for AWS instance can act as a standalone Grid appliance to provide DNS services in your Amazon VPC,
as a virtual cloud Grid member tied to an on-premises (non-Cloud) NIOS Grid, or as a Grid Master
synchronizing with other AWS-hosted vNIOS Grid members in your Amazon VPC; and across VPCs or
Availability Zones in different Amazon Regions. For more information about vNIOS for AWS, refer to
the Infoblox Installation Guide for vNIOS for AWS.
vNIOS for Azure is supported on the Microsoft Azure public cloud, Microsoft Azure Government, and
Microsoft Azure Stack Hub flavors. For more information about vNIOS for Azure, refer to the Infoblox
Installation Guide for vNIOS for Microsoft Azure.
Infoblox vNIOS for GCP is an Infoblox virtual appliance that enables you to deploy robust, manageable,
and cost-effective Infoblox appliances in the Google Cloud. Infoblox vNIOS provides core network
services and a framework for integrating all the components of the modular Infoblox solution. It
provides integrated, secure, and easy-to-manage DNS (Domain Name System) and IPAM (IP address
management) services. For more information, see the Infoblox Installation Guide for vNIOS for GCP.
Infoblox vNIOS for Nutanix enables you to deploy large, robust, manageable, and cost-effective Grids.
Infoblox NIOS virtual appliance for Nutanix functions as a hardware virtual machine guest on the Linux
system. It provides integrated, secure, and easy-to-manage DNS, DHCP, and IPAM services and a
framework for integrating all the components of the modular Infoblox solution. For more information,
see the Infoblox Installation Guide vNIOS for Nutanix AHV.
NIOS 9.0.4
High Availability Support on Public Clouds for vNIOS (RFE-12151)
Starting from NIOS 9.0.4, you can deploy vNIOS appliances in high availability (HA) configurations on
public clouds. The following vNIOS instances are supported for HA in public cloud: vNIOS for AWS,
vNIOS for Microsoft Azure, vNIOS for GCP. For more information, see the vNIOS documentation for
the respective appliances at
https://docs.infoblox.com/space/Appliances/35364966/Virtual+Appliances
Turning Off Upstream IPv6 Queries When Dual Mode is Configured (RFE-11941)
From NIOS 9.0.4 onwards, you can restrict upstream queries to either IPv4 or IPv6 addresses without
impacting downstream queries when the configuration allows dual network interfaces for DNS
services. You can do this using the newly introduced Member DNS Configuration > General > Basic >
Upstream Address Family Preference option. This feature works only if the Allow recursion checkbox
is selected at the Grid or member level. For more information, see the “Configuring Upstream Address
Family Preference” topic in the NIOS online documentation.
From NOS 9.0.4 onwards, NIOS will not use static UTC offsets such as (UTC+2:00). Instead, it will only
have time zone names with DST changes. To achieve this, NIOS fetches the time zone list from the
Ubuntu tzdata package and updates the same in the database.
After upgrading to NIOS 9.0.4, certain time zone names are mapped to different names. For the list of
the changed time zone names, see the “General Upgrade Guidelines” topic in the NIOS online
documentation. Note that some of the new time zone formats contain an underscore “_” in the name.
vDiscovery to Support Discovery Across Multiple AWS and GCP Accounts (RFE-8680)
You can now configure a vDiscovery job on NIOS 9.0.4 or later to discover and synchronize data across
multiple AWS or GCP accounts across a single or across multiple regions. For more information, see
the “vDiscovery on AWS VPCs” topic in the vNIOS for AWS and the “Performing GCP vDiscovery”
● show dns-over-tcp-dca-stats
● show dns-over-tcp-dca-status
● show dns-over-tcp-dca-config
● set vdca-tcp-mode
When there is a TCP DNS query load, if you make changes to features that push new configurations to
the virtual DNS Cache Acceleration file (for example, enable/disable TCP support on virtual DNS
Cache Acceleration, toggling Advanced DNS Protection first/DNS Cache Acceleration first, and
toggling single/multi TCP queries in a session), performing a DNS force restart may cause the Grid
member to go offline. To recover from this issue, Infoblox recommends that you perform a product
reboot.
Integrating the Cloud Sync Service for AWS Route 53 DNS Synchronization (NIOS-94340)
From NIOS 9.0.4 onwards when configuring Route 53 integration, you can enable the multi-account
synchronization option on an existing or a new sync group. The option enables NIOS to discover
multiple AWS accounts in an AWS organization and to synchronize the DNS data using the Route 53
service. You can configure the option to synchronize DNS data from all or specific accounts (children)
in an AWS organization (parent). For more information, see the “Configuring Amazon Route 53
Integration” topic in the “vNIOS for AWS” online documentation at
https://docs.infoblox.com/space/Appliances/35364966/Virtual+Appliances
Advanced DNS Protection and DNS Cache Acceleration Support on Mellanox Cards (RFE-
12983)
The Advanced DNS Protection and DNS Cache Acceleration features are now supported on NVIDIA
Mellanox 25 GbE cards.
Splunk Updates
NIOS 9.0.4 supports Splunk version 9.1.3. NIOS 9.0.4 contains a new dashboard called the jQuery
Upgrade dashboard in the Reporting > Administration tab that provides comprehensive instructions
to identify affected dashboards and ensures their compatibility with jQuery 3.5 or higher.
Support for Virtual Advanced DNS Protection and Virtual DNS Cache Acceleration in vNIOS for
AWS (RFE-8736)
vNIOS AWS instances running on NIOS 9.0.1 or later can be configured with virtual Advanced DNS
Protection (vADP) to detect DNS threats and prevent possible network attacks.
vNIOS AWS instances running on 9.0.1 or later also support virtual DNS Cache Acceleration, which
when enabled configure the instances as high-speed DNS caching-only name servers.
For more information on virtual Advanced DNS Protection, see the “About Infoblox Advanced DNS
Protection” topic in the NIOS online documentation and for the list of supported vNIOS for AWS
appliances, see the Installation Guide for vNIOS for AWS at
https://docs.infoblox.com/space/Appliances/35364966/Virtual+Appliances
● dhcp6.subscriber-id(38) string
● dhcp6.remote-id(37) string
● dhcp6.interface-id(18) string
You can use the IPv6 Option Filter option to selectively filter and process specific options sent by the
IPv6 relay agent. You can set the Relay Agent field to a value from 0 to 33.
For more information, see the “Defining Option Filters” topic in the NIOS online documentation.
DNS Type 64/ Type 65 Caching Support on Virtual DNS Cache Acceleration (RFE-12820)
NIOS 9.0.2 introduces the expand argument to the show dns-accel-cache CLI command. The
expand argument displays the expanded DNS type 64/DNS type 65 records stored in the virtual DNS
Cache Acceleration cache. The expand argument is only applicable to DNS type 64/DNS type 65
records. The show dns-accel-cache CLI command is restricted to 255 bytes in size and is
compressed for DNS type 64 and DNS type 65 records.
For more information, see the “show dns-accel-cache” topic in the NIOS online documentation.
NIOS 9.0.1
Trinzic X6 Series Appliances
Infoblox NIOS 9.0.1 introduces the new Trinzic X6 series of appliances. that are more reliable, higher in
performance, rich in features, and which have a lower carbon footprint than their earlier counterparts.
The Trinzic X6 series of hardware appliances comprises the following: TE-906, TE-1506, TE-1606, TE-
2306, TE-4106
For detailed information about the hardware and software appliances that comprise the Trinzic X6
series, see the detailed appliance documentation on the Appliances tab at docs.infoblox.com.
Verifying Licenses
In NIOS 9.0.1, you can check if the licenses are valid, view the comparison between the existing and
newly added licenses, and verify for any license conflicts by clicking Verify License(s) on the Licenses
NOTE:
• Starting from NIOS 9.0.1, the default fixed size for a fresh NIOS installation has changed to 500
GB. However, you can still use resizable images to customize the VM disk size. Infoblox
recommends a minimum disk size of 250 GB.
• The numbers in the tables are based on a broad reference and may vary depending on your
deployment, shape selected, and other parameters. For the exact specifications, please see the
specific vNIOS documentation at
https://docs.infoblox.com/space/Appliances/35364966/Virtual+Appliances
Nutanix AHV
Primary Disk
NIOS Virtual
MS Hyper-V
Grid Master
Appliances
Candidate
OpenShift
VMware
Memory
Red Hat
KVM
(GB)
# of vCPU Cores
Nutanix AHV
MS Hyper-V
Grid Master
AWS, Azure
Appliances
Candidate
VMware
Memory
Virtual
KVM
ND-V805 500 4 32 ✓ ✓ ✓ ✓ û No
ND-V1405 500 8 32 ✓ ✓ ✓ ✓ ✓ No
ND-V2205 500 16 64 ✓ ✓ ✓ ✓ û No
ND-V4005 500 32 128 ✓ ✓ ✓ ✓ û No
NOTE:
• The overall disk space in NIOS reporting virtual appliances is the value mentioned in the
Overall Disk column plus user defined reporting storage.
# of vCPU Cores
Allocation (GB)
Nutanix AHV
Overall Disk
MS Hyper-V
Grid Master
AWS, Azure
Appliances
Candidate
VMware
Memory
Virtual
KVM
(GB)
IB-V805 500 2 32 ✓ ✓ ✓ û û No
IB-V1405 500 4 128 ✓ ✓ ✓ û û No
IB-V2205 500 8 64 ✓ ✓ ✓ û û No
500 (+ 1500
IB-V4005 GB reporting 14 128 ✓ ✓ ✓ û û No
storage
User defined
User User
IB-V5005 reporting ✓ ✓ ✓ ✓ ✓ No
defined defined
storage
Allocation (GB)
Infrastructure
Nutanix AHV
Oracle Cloud
AWS, Azure,
Overall Disk
MS Hyper-V
Grid Master
Appliances
Candidate
VMware
Memory
KVM
GCP
CP-V805 (GB)
500 2 16 ✓ ✓ ✓ ✓ ✓ û No
CP-V1405 500 4 32 ✓ ✓ ✓ ✓ ✓ û No
CP-V2205 500 8 64 ✓ ✓ ✓ ✓ ✓ ✓ No
NOTE:
• When running NIOS in MS Hyper-V with dynamic memory allocation enabled, your system
might experience high memory usage. To avoid this issue, Infoblox recommends that you
disable dynamic memory allocation.
• For optimal performance, vNIOS for Hyper-V is not recommended as a Grid Master or Grid
Master Candidate.
• Specifications of vNIOS for Microsoft Azure Stack Hub are different from the other vNIOS for
Microsoft Azure flavors. For the exact specifications, see the Infoblox Installation Guide vNIOS
for Microsoft Azure at
https://docs.infoblox.com/space/Appliances/35364966/Virtual+Appliances
• vNIOS for AWS is supported on the IB-V4025 appliance from NIOS 8.5.2 onwards and on the
IB-V4015 appliance running NIOS 8.6.2 and NIOS 8.6.3. vNIOS for Azure and vNIOS for GCP
are supported on the IB-V4015 and IB-V4025 appliances running NIOS 8.6.2 and NIOS 8.6.3.
• NIOS for KVM is supported in the following environments: Red Hat OpenStack and Ubuntu.
# of vCPU Cores
Nutanix AHV
Primary Disk
Azure, AWS,
MS Hyper-V
Grid Master
Appliances
Candidate
OpenShift
X6 Series
VMware
Memory
Red Hat
KVM
GCP
(GB)
OCI
IB-V926 500 8 32 ü ü ü ü ü û ü Yes
IB-V1516 500 12 64 ü ü ü ü ü û ü Yes
IB-V1526 500 16 64 ü ü ü ü ü û ü Yes
IB-V2326 500 20 192 ü ü ü ü ü ü ü Yes
IB-V4126 500 32 384 ü ü ü ü ü ü ü Yes
# of vCPU Cores
Nutanix AHV
X6 Series ND
Primary Disk
MS Hyper-V
Grid Master
Azure, AWS
Appliances
Candidate
OpenShift
VMware
Memory
Red Hat
KVM
(GB)
ND-V906 500 8 32 ü ü ü ✓ ü û No
ND-V1606 500 16 64 ü ü ü ✓ ü û No
ND-V2306 500 20 192 ü ü ü ✓ û û No
ND-V4106 500 32 384 ü ü ü ✓ û û No
NOTE:
● NIOS for KVM is supported in the following environments: Red Hat OpenStack and Ubuntu.
NOTE:
If you are running virtual DNS Cache Acceleration on the supported versions of the appliances listed in
the table above, make sure that the appliances match the virtual CPUs provided in the table.
• adaptive tx = off
• adaptive rx = off
• rx-usecs = 50
• tx-usecs = 50
• vf maxrate 2G
• txqueuelen = 10000
• netdev_maxbacklog=300000
NIOS 9.0.4
• With the 8.2 release of OpenSSH, the ssh-rsa algorithm, which relies on the SHA-1 hash, has
been deprecated due to security concerns. NIOS does not support deprecated SHA-1 signature
algorithms.
• In NIOS 9.0.4 and in Splunk the secured webhook uses Python 3.0. If the secured webhook
scripts are written to work on a version lower than 3.0, they will not work as those versions
have been deprecated in Splunk.
• NIOS groups that need to access the reporting server must follow the Splunk naming
convention guidelines such as the characters must be in lowercase and must not contain
spaces, colons, semicolons, forward slashes and commas.
• Earlier than NIOS 9.0.4, all support bundles that were downloaded from multiple Grid
members contained the same file name. From NIOS 9.0.4 onwards, downloaded support
bundles will have the file names in the following format:
sb_<member_name/host_name>_[virtual_node_id]_<GM | GM-HA | GMC | GMC-HA | MEM |
MEM-HA>_<YYYYMMDD_HHMMSS>
If the length of the Grid member name or host name is greater than 25 characters, the virtual
node ID is appended to the file name.
• In Splunk, all Simple XML dashboards require the version attribute to be set to 1.1 to certify
that they are compatible with jQuery 3.5 or higher. The default Infoblox reporting dashboards
have been updated with the version="1.1" attribute. But custom dashboards that have
been created before the NIOS 9.0.4 upgrade will not have the version attribute specified.
Therefore, post upgrade a warning message is displayed for such custom dashboards.
• From NIOS 9.0.4 onwards, in the Grid DNS Properties or Member DNS Properties editor, Security
tab > Bogus-query alerting and mitigation section, the Deprioritize caching of NXDOMAIN
responses option has been removed.
• From NIOS 9.0.4 onwards, in a cloud HA setup, if you want to join a cloud HA Grid member to a
Grid Master, the passive node of the Grid member waits for 2 minutes before joining the Grid
Master.
• From NIOS 9.0.4 onwards, to start the vDCA service, you must enable recursion at the Grid
level or at the member level or at the view level.
• From NIOS 9.0.4 onwards, the size of the resizable image is 150 GB. You can increase the size
but do not reduce it.
• In newer versions of NIOS, database pages swing from available memory to used memory thus
providing for a more accurate accounting of memory. Therefore, situations in which huge
• In NIOS 9.0.4, the default value of the show ssl_security_level CLI command is 0
instead of 1. With upgraded OpenSSL, older protocols such as TLS versions 1.0 and 1.1 are
pushed down to SECLEVEL=0.
• After a NIOS 9.0.4 upgrade, a banner message is displayed in Grid Manager if certain time zone
names were present before the upgrade. For the list of these time zone names, see the
“General Upgrade Guidelines” topic in the NIOS online documentation. Note that some of the
new time zone formats contain an underscore “_” in the name.
• After the ability to generate reports for hardware appliances, three alerts are generated
instead of one. The 'Flex Grid Activation' and 'Flex Grid Activation for Managed Services'
licenses now have their own set of alerts. The alerts filter members based on ReportingSPLA
extensible attribute value and therefore, the ib-dns-usage-report-per-month alert may not
generate data.
• If virtual Advanced DNS Protection is enabled on IB-906, then after an upgrade to NIOS 9.0.4,
acceleration is automatically enabled by an additional reboot.
• If the Cloud Platform banner is displayed and you close it, the banner will be closed
permanently.
• The following are the changes to behavior in the CSP Configuration screen:
o In the Grid Properties Editor/Grid Member Properties Editor, the CSP Config tab has been
renamed to the CSP Configuration tab, and the CSP Config screen is now called the
CSP Configuration screen. The UI labels in this screen have also changed.
o Even though the Inherit/Override button has been removed, the override and inherit
functionalities continue to work as is.
o The Test Settings button is applicable only to the HTTP Proxy field.
o You can save the value in the HTTP Proxy field only if you test the proxy setting by
clicking the Test Settings button and the test is successful.
• The following are the changes in behavior related to TLS protocols from NIOS 9.0.4 onwards:
o Splunk does not support TLS version 1.3 and therefore NIOS reporting will not work if
you disable all other TLS versions and enable only TLS version 1.3. A warning to this
effect is displayed if you enable only TLS version 1.3.
o The Apache/SAML service is not affected by enabling or disabling the TLS cipher suites
of a disabled TLS protocol.
o Disabling the last cipher suite of an enabled TLS protocol is not allowed.
• The following are the changes in behavior related to the Cloud Sync service from NIOS 9.0.4
onwards:
o The “Cloud DNS Sync” service name has been changed to “Cloud Sync” service (even in
WAPI).
o The Cloud Sync service must be started before starting a vDiscovery job.
o It is not mandatory to have the Cloud Network Automation (CNA) license on the Grid
Master to run the Cloud Sync service.
o In the Grid Manager, the Amazon tab under Grid > Grid Manager has been changed to
Cloud DNS.
NIOS 9.0.2
● There is a change in behavior in the ADP ruleset for type64/65 rules. They have been changed
from the default value of DROP to the value of PASS. However, note the following behavior:
o On the upgrade of the node running ADP to 9.0.2 and later, these rules continue to DROP
type64/65 queries because the setting of these rules in the earlier releases is inherited in the
new ruleset that gets downloaded or uploaded. In this case, you must manually change the
action to PASS to allow DNS type 64/65 queries. If the rules were manually changed to PASS
in the old ruleset, then PASS action is inherited in the new ruleset and the queries are
allowed.
o Note: If you configure a new node in NIOS 9.0.2 or a later release and then download or
upload the ADP ruleset, the type64/65 rules will be PASS by default. Because of this, you will
see changes in the DNS query statistics.
● When you upgrade from NIOS 8.6.3 to 9.0.2, an additional product restart occurs to support
Trinzic X6 Series appliances post upgrade. This holds good only when you have installed a
hotfix to support Trinzic X6 licenses on an 8.6.3 version.
● If you upload a certificate to a NIOS 9.0.2 or later Grid, the checks are performed in compliance
with RFC-5280. Therefore, the upload of invalid certificates will fail and the following error
message is displayed: “Certificate violates RFC 5280. See the log for details. This strict check
may be disabled.”
● If you close the CP license banner message that is displayed when you first log in to NIOS, the
banner will be permanently disabled.
• You cannot downgrade any Trinzic X6 appliances to a NIOS version below 9.0.1.
• You cannot install a NIOS license type from the Grid Manager on Trinzic X6 series hardware
appliances. You must use the CLI to install the licenses.
• In the Trinzic X6 series of appliances, you can install the Cloud Network Automation and the
Cloud Platform licenses together on a Grid member.
• If you install a Multi-Grid Management license, you have to manually perform a product restart
using either the CLI or the Grid Manager to set up Multi-Grid Management.
• In NIOS 9.0.1, you cannot upload CA certificates that contain the md5WithRSAEncryption and
sha1WithRSAEncryption ciphers.
• From NIOS 9.0.1 onwards, fetching threat details using the API displays the “Authorization
Failure” error message if the dynamic token fetch fails and error messages are logged in the
infoblox.log and syslog files.
• When you enable the threat indicator caching feature, you must configure the credentials to
access the Cloud Services Portal for NIOS to interact with the Cloud Services Portal. For more
information, see Configuring Integration with BloxOne Threat Defense Cloud in the BloxOne
Threat Defense online documentation.
• In NIOS 9.0.1, the default image disk size has been changed from 250 GB to 500 GB. For public
cloud deployments (such as Microsoft Azure, GCP, and so on), you must provision the minimum
disk size as 250 GB if you are using the resizable image.
• In NIOS 9.0.1, discovery is part of the NIOS image. You must install the ND appliance license to
be able to use the discovery feature.
• From NIOS 9.0.1 onwards, the value in the License String column in the Verifying License(s)
screen is decoded from the actual license string and not from what you upload in the CSV file or
from what you paste as the license type.
• You must first install a NIOS license type before installing any dependent license for the NIOS
license type. For example, you must install NIOS license type IB-1526 before installing a Multi-
Grid-Management license.
• The sequence of licenses must be maintained for dependent licenses. For example, if you are
installing both the Threat Protection (Software add-on) license and the Threat Protection
• The license type and other data related to licenses are decoded from the license key and
displayed when you install the licenses.
• Grid Manager restarts immediately in the background when you install licenses that require UI
restarts.
NIOS 9.0.0
• ISC has modified the dnssec-dsfromkey tool behavior for DS (Delegation Signer) record
generation when no algorithm is passed. When no algorithm is passed:
o In BIND 9.11, both SHA1 and SHA256 digests are generated when converting
DNSKEY records to DS records.
o In BIND 9.16, only SHA256 digest is generated when converting a DNSKEY record to a
DS record.
• BIND 9.16 introduces a change in behavior for forwarders (for a particular fetch context) when
an upstream query directed to the forwarder times out. The behavior is applicable in a
“forward-first” configuration. The change marks a forwarder which does not respond to an
query (for a particular fetch) sent by a resolver as a “bad server”. The forwarder is no longer
contacted for the rest of the delegation points for the fetch.
• In NIOS 9.0.0, LDAP requests to the LDAP server and Active Directory server cannot be sent
using the MGMT IP address, because OpenLDAP version 2.4.49 (Ubuntu) removed the options
of binding the source IP address on the client. Therefore, an LDAP request or an Active
Directory authentication request is always sent through the LAN IP address, even though you
have enabled the Connect through Management Interface option.
• From NIOS 9.0.0 onwards, in the Administration > Administrators > Authentication Policy >
Authenticate users against these services in this order area, if the Authentication Server
Groups is the authority for option is set to Passwords of Local users, the up and down arrows at
the right will be disabled if you select the Local Admin checkbox. That is, you will not be able to
change the order of the local admin user.
• Due to new validation checks introduced in BIND 9.16, a few resource records that were valid
in BIND 9.11 are considered invalid in BIND 9.16. If you add such invalid resource records to a
zone, the zone fails to load after an upgrade or a Grid restore. An error message is displayed if
you add invalid resource records resource records with invalid RDATA under a zone.
• NIOS 9.0.0 introduces the set rpz_add_soa command that allows a local admin with
superuser permission to add an SOA record to an RPZ response at a view level. If this command
is togged to YES, any RPZ policy rule matches and results in a modified answer, then the
modified answer will include in its additional section the SOA record of the policy zone whose
rule was used to generate the modified answer. The SOA record includes the name of the DNS
RPZ and the serial number of the policy data which was connected to the DNS control plane
• In NIOS 9.0.0, the additional-from-auth option has been made obsolete by ISC. BIND
does not follow CNAMEs and DNAMEs to zones other than the target zone. Hence, record
chains do not work as expected.
• In NIOS 9.0.x, the Cisco ISE endpoint (Cisco pxGrid 1.0) has been deprecated.
• In NIOS 8.6.2, when you log on to FTP using as an anonymous user, the default path was
/storage/tftpboot. In NIOS 9.0.x, the default path is /storage/tftpboot_anon with permission
0755.
• NIOS 9.0.0 introduces two new CLI commands to set the DDNS update quota and the DDNS
update forwarding quota versions. For more information about these commands, see the “set
dns_update_quota” and the “set dns_update_forwarding_quota” topics in the NIOS 9.0 online
documentation.
• In NIOS 9.0.x, distribution fails when an Infoblox-generated Apache certificate is uploaded for
keys lower than 2048 bits or if the certificate has expired.
• NIOS 9.0.0 supports the discovery resizable image with a minimum disk size of 100 GB.
• In NIOS 9.0.x, integration with BIND 9.16 increases the RPZs from 32 to 64. That is, subscriber
services support an subscriber secure policy (SSP) of 64 bits. Only rules within the particular
RPZs will be enforced by subscriber services. The first 5 RPZs are used as default and enforced
on subscribers without an SSP. The number of default RPZs remains at 5. In a parental control
configuration, the rules in RPZ 31 have a special use case as a proxy allow list. All rules
(domains) are passthru to allow them to never proxy.
There are no changes to the proxy allow list with the addition of 64 RPZ zones. Rules in the
thirty first RPZ zone will be passthru rules as existing in earlier NIOS releases. The remaining
RPZ zones (32 - 63) can be used just like other RPZ zones. All RPZ responses (modified or
otherwise, including NXDOMAIN/NODATA) will not have the SOA record in the ADDITIONAL
SECTION of the RPZ query response.
• In NIOS 9.0.x, when rotating log files, only the syslog rotated files are maintained.
• In NIOS 9.0.x, the cipher list order has changed compared to earlier NIOS versions.
• In NIOS 9.0.x the weak and vulnerable ciphers named RC4 and 3DES have been deprecated.
Additionally, the SAML library also deprecates the DHE ciphers. Infoblox recommends that you
• Upgrading a NIOS 8.x Grid that is configured with Thales HSM to NIOS 9.0 is not supported.
Also, configuring Thales HSM in a new NIOS 9.0 Grid is not supported. Infoblox recommends
that you unsign zones that were signed using Thales and that you disable HSM signing before
disabling Thales modules.
• From NIOS 9.0.0 onwards, the following appliances have been deprecated: PT-1405, PT-2205,
PT-2205-10GE, IB-4030-10GE.
• From NIOS 9.0.0 onwards, the Unbound resolver has been deprecated and all the references to
Unbound will be destroyed after a NIOS upgrade.
• From NIOS 9.0.0 onwards, during a restore operation or a CSV import, Unbound-related
configurations (using the Grid DNS Properties screen), Unbound-related licenses, and DNS
Unbound under external syslog categories will be removed.
• In NIOS 9.0.x, support for the DNSSEC algorithm 1 (RSAMD5), algorithm 3 (DSA), and
algorithm 6 (DSA-NSEC3-SHA1) has been removed.
NOTE: The Perl API (PAPI) has been deprecated. The PAPI functionality is still supported. However,
API calls enhancements after version 8.3 will only be introduced through the RESTful API (WAPI). The
latest available WAPI version is 2.13.4.
This NIOS release supports the following WAPI versions: 1.0, 1.1, 1.2, 1.2.1, 1.3, 1.4, 1.4.1, 1.4.2, 1.5,
1.6, 1.6.1, 1.7, 1.7.1, 1.7.2, 1.7.3, 1.7.4, 1.7.5, 2.0, 2.1, 2.1.1, 2.1.2, 2.2, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4, 2.5,
2.6, 2.6.1, 2.7, 2.7.1, 2.7.2, 2.7.3, 2.8, 2.9, 2.9.1, 2.9.5, 2.9.7, 2.10, 2.10.1, 2.10.2, 2.10.3, 2.10.5, 2.11, 2.12,
2.12.1, 2.12.2, 2.13, 2.13.1, and 2.13.4.
Unless explicitly stated in the release notes, previously available WAPI versions are intended to remain
accessible and operative with later versions.
The planned deprecation of a given version of the WAPI will normally be announced in the release
notes at least one year in advance. Upon deprecation, the announced WAPI version and all prior
versions will no longer be supported in subsequent releases. For example, if the current WAPI release
is v3.4 and the release notes contain an announcement of the v1.5 deprecation, v1.4, and v1.5 API
requests would continue to work with later releases for one year from the announcement date. After
that, some or all requests for these deprecated versions may not work with versions later than v1.5.
API requests adherent to versions later than v1.5 (v2.0 for example) would continue to work with
subsequent releases. Infoblox seeks to avoid any deprecation that has not been announced in advance,
however product modifications and enhancements may affect specific API requests without a prior
announcement; Infoblox does not warrant that all API requests will be unaffected by future releases.
This policy applies to both major and minor versions of the WAPI. Infoblox reserves the right to change
this policy.
NIOS 9.0.4
New Structures:
• lanhaportsetting:ha_cloud_attribute
• setting:network:lan_gateway
• setting:network:lan_subnet_mask
• azurednstaskgroup
New Objects:
• member:ha_cloud_platform
• member:ha_on_cloud
• query_fqdn_on_member: source_ip
• vdiscoverytask:selected_regions
• vdiscoverytask:accounts_list
• vdiscoverytask:cdiscovery_file_token
• vdiscoverytask:govcloud_enabled
• vdiscoverytask:multiple_accounts_sync_policy
• vdiscoverytask:role_arn
• vdiscoverytask:selected_regions
• vdiscoverytask:sync_child_accounts
• azurednstaskgroup:multiple_subscriptions_sync_policy
• azurednstaskgroup:azure_subscription_ids_file_token
• azurednstaskgroup:sync_child_subscriptions
• azurednstaskgroup:comment
• azurednstaskgroup:consolidate_zones
• azurednstaskgroup:consolidated_view
• azurednstaskgroup:disabled
• azurednstaskgroup:grid_member
• azurednstaskgroup:name
• azurednstaskgroup:network_view
• azurednstaskgroup:network_view_mapping_policy
• azurednstaskgroup:subscriptions_list
• azurednstaskgroup:sync_status
• azurednstaskgroup:task_list
• azurednstaskgroup:tenant_id
NIOS 9.0.1
New Structures:
● memberclouddnssync
● gmcgroup
● gmcshedule
● hsm:thaleslunagroup:thalesluna
● hsm:entrustnshieldgroup:entrustnshield_hsm
● validatecertificates.complete_verification_result
● validatecertificates.complete_verification_result.file_or_serial
● validatecertificates.complete_verification_result.verify_result
New Objects:
● parentalcontrol:subscriber:zvelo_update_failure_in_days
● parentalcontrol:subscribersite:enable_global_allow_list_rpz
● parentalcontrol:subscribersite:enable_rpz_filtering_bypass
● parentalcontrol:subscribersite:global_allow_list_rpz
● memberclouddnssync:cloud_dns_sync_enabled
● memberclouddnssync:host_name
● awsrte53taskgroup:role_arn
● awsrte53taskgroup:sync_child_accounts
● gmcgroup:member
● grid:ntp_setting:ntp_keys:type:SHA1_ASCII
● member:ntp_setting:ntp_keys:type:SHA1_ASCII
● hsm:thaleslunagroup
● hsm:entrustnshieldgroup
Upgrade Guidelines
NIOS 9.0.4 Upgrade Guidelines
• Splunk does not support TLS version 1.3 and therefore NIOS reporting will not work if you
disable all other TLS versions and enable only TLS version 1.3. A warning to this effect is
displayed if you enable only TLS version 1.3.
• Accelerated Networking must be disabled in Microsoft Azure for NIOS members before
upgrading to 9.0.x as it is not compatible with NIOS 9.0.x and may cause the member to not
rejoin the Grid after upgrading. The VM or, if applicable, all VMs within the availability set may
need to be stopped or deallocated before Accelerated Networking is disabled.
• After an upgrade to NIOS 9.0.4, the Cloud Sync service starts automatically on members that
have AWS and GCP vDiscovery jobs configured.
• After an upgrade to NIOS 9.0.4, the Cloud Sync service will not start automatically on members
that have VMWare, Azure, and Openstack vDiscovery jobs configured.
o Run the show upgrade_history CLI command. The command lists down the latest
hotfixes applied on Grid members.
o If you have applied a hotfix, verify the actions based on the hotfix form. For example, if the
hotfix requires a reboot post the hotfix application, run the show log debug /REBOOT/
CLI command. If a reboot has not taken place after the hotfix applied time displayed in the
command’s output, Infoblox strongly recommends that you reboot the Grid member.
● When certificates present in the Grid are not in accordance with RFC-5280, the test upgrade
will fail, and errors are captured in the syslog file. Infoblox recommends that you fix the
certificates before upgrading to NIOS 9.0.2 (the upgrade does not fail but you must make the
recommended changes).
● If you try to upgrade to NIOS 9.0.1, distribution fails if CA certificates with the
md5WithRSAEncryption or sha1WithRSAEncryption ciphers are present. Infoblox
recommends that you delete the certificates before upgrading.
o OpenVPN certificates. If you have old OpenVPN certificates, contact Infoblox Support
before proceeding with the distribution.
● If the Dual Engine DNS license is present in your Grid in the deleted or expired state (can be
validated by running the show license CLI command on the node), contact Infoblox Support to
have it removed. The NIOS upgrade fails if the license is not deleted.
o If an Unbound license is present in the Grid, then upgrading to 9.0.1 will fail. You must
manually remove the Unbound license and then proceed with the upgrade.
o If you have offline Grid members and are not able to delete the Unbound license, then
you must bring the Grid members online, remove the license, and then proceed with
the upgrade. You can also contact Infoblox Support about creating a hotfix to clean up
the Unbound licenses for the offline members.
o If you had a temporary Unbound license that you deleted from Grid Manager, the
license will still be present in the database and the upgrade will fail. Please contact
Infoblox Support to completely remove the temporary license.
o If Unbound is configured, the upgrade test fails to indicate that references to Unbound
are being completely destroyed during the upgrade process.
● Upgrading a NIOS 8.x Grid that is configured with Thales HSM to NIOS 9.0 is not supported.
Also, configuring Thales HSM in a new NIOS 9.0.0 Grid is not supported. Using an unsupported
algorithm such as, RSAMD5(1), DSA (3), DSA-NSEC3-SHA1(6).
● Using invalid key size for RSASHA1(5), RSA-NSEC3-SHA1(7), RSASHA256(8) (should be within
range [1024 to 4096]).
● Manually creating (through the import keyset) a DS record with an unsupported algorithm or
digest type SHA-1.
● If you are using Ubuntu and a CA certificate of key length 1024 and some unsupported ciphers,
after a NIOS upgrade, services that depend on the unsupported ciphers cease to work.
● In NIOS 9.0, the Cisco ISE endpoint (Cisco pxGrid 1.0) has been deprecated.
● Infoblox recommends that you use a minimum size of 100 GB when using discovery resizable
images. This applies even when upgrading a resizable discovery image whose size is lower than
100 GB.
● Infoblox recommends using a minimum size of 70 GB for any of the files that has resizable as
part of the file name and you can resize them depending on your requirement and deployment.
● If you are logging on to NIOS using SSO, in IDP Configuration you must enter the following URL
in the SP Entity ID field: <grid_virtual IP address>:8765/metadata. If you are using Okta, the SP
Entity ID field is also called the Audience URI field.
● The shared secret that you enter when adding a RADIUS authentication server in the Add
RADIUS Authentication Service wizard > RADIUS Servers > Shared Secret field must be
between 4 and 64 characters (inclusive) in length. Otherwise, the upgrade will fail.
● Before you upgrade to NIOS 9.0.x, check the validity of the CA certificates uploaded. If the
certificate is invalid, install a new certificate that is in compliance with RFCs (for example RFC
5280). Failure to do so may result in the Grid Manager UI/WAPI not being accessible after the
upgrade. However, NIOS will continue to be functional. To check the validity of the certificate,
contact Infoblox Support.
● A downgrade from NIOS 9.0.x to NIOS 8.4.x is not supported. Auto-synchronization from NIOS
9.0.x to NIOS 8.4.x is not supported.
● If there are Threat Protection members in your Grid for the 8.3 and later features (Grid Master
Candidate test promotion, forwarding recursive queries to BloxOne Threat Defense Cloud,
and CAA records), ensure that you upload the latest Threat Protection ruleset for these
features to function properly.
● Infoblox recommends that you enable DNS Fault Tolerant Caching right after you upgrade to
NIOS 8.2.x and later and keep this feature enabled to handle unreachable authoritative
● During a scheduled full upgrade to NIOS 8.1.0 and later versions, you can use only IPv4
addresses for NXDOMAIN redirection. You cannot use IPv6 addresses for NXDOMAIN
redirection while the upgrade is in progress.
● If you set up your Grid to use Infoblox Threat Insight but have not enabled automatic updates
for Threat Analytics module sets, you must manually upload the latest module set to your Grid
or enable automatic updates before upgrading. Otherwise, your upgrade will fail.
● After a scheduled upgrade to NIOS 8.6.3 and later is complete, you must run the
update_rabbitmq_password command on the Grid Master to get the Cloud DNS Sync
service to be functional. Until that time, Route 53 synchronization does not start because the
service has not been started.
● After an upgrade to NIOS 8.6.3 and later, the Cloud DNS Sync service starts automatically on
the Grid member that is assigned to the Route 53 synchronization groups.
● After an upgrade to NIOS 8.6.3 and later, the Disable Default Search Path and the Additional
Search Paths fields will no longer be displayed in the Add Active Directory Authentication Service
> Step 1 of 1 wizard.
● If you upgrade to NIOS 8.6.3 or later, all IB-FLEX appliances or Grids that have the FLEX Grid
Activation license or the MSP license will have the ReportingSPLA external attribute assigned
automatically for supported Grid members.
● After an upgrade to NIOS 8.6.3 and later, only 5% of allowed blocklist subscribers is supported
for virtual DNS Cache Acceleration (vDCA).
● The shared secret that you enter when adding a RADIUS authentication server in the Add
RADIUS Authentication Service wizard > RADIUS Servers > Shared Secret field must be
between 4 and 64 characters (inclusive) in length. Otherwise, the upgrade will fail.
● If you are using threat analytics, you must have installed the minimum module set version
(20210620) before upgrading to NIOS 8.6.1 or to NIOS 8.5.3 or later versions.
Technical Support
Infoblox technical support contact information:
Email: [email protected]
Web: https://support.infoblox.com
GUI Requirements
Grid Manager supports the following operating systems and browsers. You must install and enable
JavaScript for Grid Manager to function properly. Grid Manager supports TLS version 1 and later
connections. Infoblox recommends that you use a computer that has a 2 GHz CPU and at least 1 GB of
RAM.
Infoblox has tested and validated the following browsers for Grid Manager:
OS Browser
Microsoft Windows 11® Microsoft Edge version 115.0.1901.203, Google Chrome
115.0.5790.102
Microsoft Windows 10® Microsoft Internet Explorer® 11, Microsoft Edge
113.0.1774.57
Microsoft Windows 8® Google Chrome 109.0.5414.75
Microsoft Windows 7® Mozilla Firefox 101.0
Red Hat® Enterprise Linux® 7.4 Google Chrome 115.0.5790.170
Red Hat® Enterprise Linux® 7.3 Mozilla Firefox 114.0.1
When viewing Grid Manager, set the screen resolution of your monitor as follows:
Minimum resolution: 1280 x 768
Recommended resolution: 1280 x 1024 or better
Addressed Vulnerabilities
This section lists security vulnerabilities that were addressed in the past 12 months. For vulnerabilities
that are not listed in this section, refer to Infoblox KB #2899. For additional information about these
vulnerabilities, including their severities, please refer to the National Vulnerability Database (NVD) at
http://nvd.nist.gov/. The Infoblox Support website at https://support.infoblox.com also provides more
information, including vulnerabilities that do not affect Infoblox appliances.
The following table lists the addressed vulnerabilities along with the NIOS versions that contain the
fixes.
CVE-2023-50868
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is
skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1
computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC
5155 specification implies that an algorithm must perform thousands of iterations of a hash function in
certain situations.
CVE-2023-48795
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other
products, allows remote attackers to bypass integrity checks such that some packets are omitted (from
the extension negotiation message), and a client and server may consequently end up with a
connection for which some security features have been downgraded or disabled, aka a Terrapin attack.
This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions,
mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an
effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC).
CVE-2023-5680
If a resolver cache has a very large number of ECS records stored for the same name, the process of
cleaning the cache database node for this name can significantly impair query performance. This issue
affects BIND 9 versions 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.45-S1, and 9.18.11-S1
through 9.18.21-S1.
CVE-2023-5679
A bad interaction between DNS64 and serve-stale may cause `named` to crash with an assertion
failure during recursive resolution, when both of these features are enabled. This issue affects BIND 9
versions 9.16.12 through 9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.16.12-S1 through
9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
CVE-2023-4408
A] The DNS message parsing code in `named` includes a section whose computational complexity is
overly high. It does not cause problems for typical DNS traffic, but crafted queries and responses may
cause excessive CPU load on the affected `named` instance by exploiting this flaw. This issue affects
both authoritative servers and recursive resolvers. This issue affects BIND 9 versions 9.0.0 through
9.16.45, 9.18.0 through 9.18.21, 9.19.0 through 9.19.19, 9.9.3-S1 through 9.11.37-S1, 9.16.8-S1
through 9.16.45-S1, and 9.18.11-S1 through 9.18.21-S1.
CVE-2023-3341
A flaw was found in the Bind package. The code that processes control channel messages sent to
named calls certain functions recursively during packet parsing. Recursion depth is only limited by the
CVE-2023-2828
It has been discovered that the effectiveness of the cache-cleaning algorithm used in named can be
severely diminished by querying the resolver for specific RRsets in a certain order, effectively enabling
the configured max-cache-size limit to be significantly exceeded. By exploiting this flaw, an attacker
can cause the amount of memory used by a named resolver to significantly exceed the configured max-
cache-size limit. The effectiveness of the attack depends on a number of factors (e.g. query load, query
patterns), but since the default value of the max-cache-size statement is 90%, in the worst case the
attacker can exhaust all available memory on the host running named, leading to a denial-of-service
condition.
CVE-2023-0466
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate
policy check when doing certificate verification. However the implementation of the function does not
enable the check which allows certificates with invalid or incorrect policies to pass the certificate
verification. As suddenly enabling the policy check could break existing deployments it was decided to
keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the
applications that require OpenSSL to perform certificate policy check need to use
X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling
X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate
policy checks are disabled by default in OpenSSL and are not commonly used by applications.
CVE-2023-0465
Applications that use a non-default option when verifying certificates may be vulnerable to an attack
from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are
silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A
malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent
policy checking on the certificate altogether. Policy processing is disabled by default but can be
enabled by passing the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0464
A security vulnerability has been identified in all supported versions of OpenSSL related to the
verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit
this vulnerability by creating a malicious certificate chain that triggers exponential use of
computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy
processing is disabled by default but can be enabled by passing the `-policy' argument to the command
line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.
CVE-2023-0215
The public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It
is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities,
but may also be called directly by end user applications. The function receives a BIO from the caller,
prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new
head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key
is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure.
However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still
retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop()
on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs
directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and
will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API
functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream,
SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that
may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7,
i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line
applications are similarly affected.
CVE-2022-38178, CVE-2022-38177
By spoofing the target resolver with responses that have a malformed ECDSA signature, an attacker
can trigger a small memory leak. It is possible to gradually erode available memory to the point where
named crashes for lack of resources.
CVE-2022-23943
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite
heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version
2.4.52 and prior versions.
CVE-2022-22720
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered
discarding the request body, exposing the server to HTTP Request Smuggling.
CVE-2022-22719
A carefully crafted request body can cause a read to a random memory area which could cause the
process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
CVE-2022-4450
The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the "name" (e.g.
"CERTIFICATE"), any header data and the payload data. If the function succeeds then the "name_out",
"header" and "data" arguments are populated with pointers to buffers containing the relevant decoded
data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results
in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate
the header argument with a pointer to a buffer that has already been freed. If the caller also frees this
buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an
attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service
attack.
CVE-2022-4304
A timing-based side channel exists in the OpenSSL RSA Decryption implementation which could be
sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a
successful decryption an attacker would have to be able to send a very large number of trial messages
for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and
RSASVE.
CVE-2022-3924
This issue can affect BIND 9 resolvers with `stale-answer-enable yes;` that also make use of the option
`stale-answer-client-timeout`, configured with a value greater than zero. If the resolver receives many
queries that require recursion, there will be a corresponding increase in the number of clients that are
waiting for recursion to complete. If there are sufficient clients already waiting when a new client
query is received so that it is necessary to SERVFAIL the longest waiting client (see BIND 9 ARM
`recursive-clients` limit and soft quota), then it is possible for a race to occur between providing a stale
CVE-2022-3736
BIND 9 resolver can crash when stale cache and stale answers are enabled, option `stale-answer-
client-timeout` is set to a positive integer, and the resolver receives an RRSIG query. This issue affects
BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-
S1 through 9.16.36-S1.
CVE-2022-3488
Processing of repeated responses to the same query, where both responses contain ECS pseudo-
options, but where the first is broken in some way, can cause BIND to exit with an assertion failure.
'Broken' in this context is anything that would cause the resolver to reject the query response, such as
a mismatch between query and answer name. This issue affects BIND 9 versions 9.11.4-S1 through
9.11.37-S1 and 9.16.8-S1 through 9.16.36-S1.
CVE-2022-3094
Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. This,
in turn, may cause `named` to exit due to a lack of free memory. We are not aware of any cases where
this has been exploited. Memory is allocated prior to the checking of access permissions (ACLs) and is
retained during the processing of a dynamic update from a client whose access credentials are
accepted. Memory allocated to clients that are not permitted to send updates is released immediately
upon rejection. The scope of this vulnerability is limited therefore to trusted clients who are permitted
to make dynamic zone changes. If a dynamic update is REFUSED, memory will be released again very
quickly. Therefore it is only likely to be possible to degrade or stop `named` by sending a flood of
unaccepted dynamic updates comparable in magnitude to a query flood intended to achieve the same
detrimental outcome. BIND 9.11 and earlier branches are also affected, but through exhaustion of
internal resources rather than memory constraints. This may reduce performance but should not be a
significant problem for most servers. Therefore we don't intend to address this for BIND versions prior
to BIND 9.16. This issue affects BIND 9 versions 9.16.0 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0
through 9.19.8, and 9.16.8-S1 through 9.16.36-S1.
CVE-2022-2929
In ISC DHCP 1.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1 a system with access to a DHCP
server, sending DHCP packets crafted to include fqdn labels longer than 63 bytes, could eventually
cause the server to run out of memory.
CVE-2022-2928
In ISC DHCP 4.4.0 -> 4.4.3, ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16-P1, when the function
option_code_hash_lookup() is called from add_option(), it increases the option's refcount field.
CVE-2022-2795
By flooding the target resolver with queries exploiting this flaw an attacker can significantly impair the
resolver's performance, effectively denying legitimate clients access to the DNS resolution service.
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to
loop forever for non-prime moduli. Internally this function is used when parsing certificates that
contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base
point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that
has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the
certificate signature, any process that parses an externally supplied certificate may thus be subject to a
denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they
can contain explicit elliptic curve parameters. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.
It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2
(Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd
(Affected 1.0.2-1.0.2zc).
CVE-2021-43527
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow
when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling
signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted.
Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be
impacted, depending on how they configure NSS.
CVE-2021-25220
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1
-> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0,
including Supported Preview Editions - are also believed to be affected but have not been tested as
they are EOL. The cache could become poisoned with incorrect records leading to queries being made
to the wrong servers, which might also result in false information being returned to clients.
CVE-2021-25219
In BIND 9.3.0 -> 9.11.35, 9.12.0 -> 9.16.21, and versions 9.9.3-S1 -> 9.11.35-S1 and 9.16.8-S1 ->
9.16.21-S1 of BIND Supported Preview Edition, as well as release versions 9.17.0 -> 9.17.18 of the
BIND 9.17 development branch, exploitation of broken authoritative servers using a flaw in response
processing can cause degradation in BIND resolver performance. The way the lame cache is currently
CVE-2021-25215
A flaw was found in BIND. The way DNAME records are processed may trigger the same RRset to the
ANSWER section to be added more than once which causes an assertion check to fail. The highest
threat from this flaw is to system availability.
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to
identify a practical example.
CVE-2021-25214
Incremental zone transfers (IXFR) provide a way of transferring changed portion(s) of a zone between
servers. An IXFR stream containing SOA records with an owner name other than the transferred
zone's apex may cause the receiving named server to inadvertently remove the SOA record for the
zone in question from the zone database. This leads to an assertion failure during the next SOA refresh
query for that zone.
The mitigation is to disable incremental zone transfers (IXFR) by setting "request-ixfr no;" in the
desired configuration block (options, zone, or server) to prevent the failing assertion from being
evaluated.
CVE-2020-25705
Dubbed "SAD DNS attack" (short for Side-channel AttackeD DNS), the technique makes it possible for
a malicious actor to carry out an off-path attack, rerouting any traffic originally destined to a specific
domain to a server under their control, thereby allowing them to eavesdrop and tamper with the
communications.
CVE-2020-13817
ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of
service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed
packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path
attacker who can query time from the victim's ntpd instance.
CVE-2020-8622
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the
BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or
operating the server receiving the TSIG-signed request, could send a truncated response to that
request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker
would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of
CVE-2020-8617
Using a specially-crafted message, an attacker may potentially cause a BIND server to reach an
inconsistent state if the attacker knows (or successfully guesses) the name of a TSIG key used by the
server. Since BIND, by default, configures a local session key even on servers whose configuration does
not otherwise make use of it, almost all current BIND servers are vulnerable. In releases of BIND
dating from March 2018 and after, an assertion check in tsig.c detects this inconsistent state and
deliberately exits. Prior to the introduction of the check the server would continue operating in an
inconsistent state, with potentially harmful results.
This vulnerability has been modified since it was last analyzed. It is awaiting reanalysis which may
result in further changes to the information provided.
CVE-2020-8616
A flaw was found in BIND, where it does not sufficiently limit the number of fetches that can be
performed while processing a referral response. This flaw allows an attacker to cause a denial of
service attack. The attacker can also exploit this behavior to use the recursing server as a reflector in a
reflection attack with a high amplification factor.
CVE-2019-11477
The TCP_SKB_CB(skb)->tcp_gso_segs value was subject to an integer overflow in the Linux kernel
when handling TCP Selective Acknowledgments (SACKs). A remote attacker could use this to cause a
denial of service. This has been fixed in stable kernel releases 4.4.182, 4.9.182, 4.14.127, 4.19.52,
5.1.11.
CVE-2019-11043
In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations
of FPM setup, it is possible to cause FPM module to write past allocated buffers into the space
reserved for FCGI protocol data, thus opening the possibility of remote code execution.
CVE-2019-6477
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time.
The update to this functionality introduced by CVE-2018-5743 changed how BIND calculates the
number of concurrent TCP clients from counting the outstanding TCP queries to counting the TCP
client connections. On a server with TCP-pipelining capability, it is possible for one TCP client to send a
large number of DNS requests over a single connection. Each outstanding query is handled internally
as an independent client request, thus bypassing the new TCP clients limit.
CVE-2019-6471
A rare condition leading to denial of service was found in the way BIND handled certain malformed
packets. A remote attacker who could cause the BIND resolver to perform queries on a server could
cause the DNS service to exit.
CVE-2019-6469
An error in the EDNS Client Subnet (ECS) feature for recursive resolvers could cause BIND to exit with
an assertion failure when processing a response that contained malformed RRSIGs.
CVE-2019-1551
There is an overflow bug in the x64_64 Montgomery squaring procedure used in exponentiation with
512-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against 2-prime
RSA1024, 3-prime RSA1536, and DSA1024 as a result of this defect would be very difficult to perform
and are not believed likely. Attacks against DH512 are considered just feasible. However, for an attack
the target would have to re-use the DH512 private key, which is not recommended anyway. Also
applications directly using the low level API BN_mod_exp may be affected if they use
BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e (Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u
(Affected 1.0.2-1.0.2t).
CVE-2018-10239
A vulnerability in the “support access” password generation algorithm on NIOS could allow a locally
authenticated administrator to temporarily gain additional privileges on an affected device and
perform actions within the super user scope. A locally authenticated administrative user may be able to
exploit this vulnerability if the “support access” feature is enabled. This is because the administrator
knows the support access code for the current session and the algorithm to generate the support
access password from the support access code. “Support access” is disabled by default. When enabled,
the access is automatically disabled (and support access code will expire) after 24 hours.
CVE-2018-5743
The named DNS service fails to properly enforce limits on the number of simultaneous TCP
connections.
CVE-2018-0732
During a key agreement in a TLS handshake using a DH(E) based ciphersuite, a malicious server can
send a very large prime value to the client. This will cause the client to spend an unreasonably long
CVE-2018-15473
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an
invalid authenticating user until after the packet containing the request has been fully parsed, related
to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
CVE-2018-5732
A specially constructed response from a malicious server could cause a buffer overflow in the DHCP
client.
CVE-2018-5733
A malicious client that was allowed to send very large amounts of traffic (billions of packets) to a DHCP
server could eventually overflow a 32-bit reference counter, potentially causing the DHCP daemon to
crash.
CVE-2018-5391
The Linux kernel versions 3.9+, is vulnerable to a denial of service attack with low rates of specially
modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service
condition by sending specially crafted IP fragments. This vulnerability became exploitable in the Linux
kernel with the increase of the IP fragment reassembly queue size.
CVE-2018-5390
A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP
packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to
tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets
within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the
system.
CVE-2018-0739
Constructed ASN.1 type with a recursive definition (such as can be found in PKCS7) could eventually
exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service
attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is
considered safe.
CVE-2018-0733
Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to
only comparing the least significant bit of each byte. This allows an attacker to forge messages that
CVE-2018-8781
The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to
and including 4.15 had an integer-overflow vulnerability allowing local users with access to the
udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code
execution in kernel space.
CVE-2017-3738
There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation
with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and
DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks
against DH1024 are considered just feasible, because most of the work necessary to deduce
information about a private key may be performed offline. The amount of resources required for such
an attack would be significant. However, for an attack on TLS to be meaningful, the server would have
to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-
0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell
(4th generation).
CVE-2017-3737
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was
that if a fatal error occurred during a handshake then OpenSSL would move into the error state and
would immediately fail if you attempted to continue the handshake. This works as designed for the
explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a
bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the
handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is
subsequently called by the application for the same SSL object then it will succeed and the data is
passed without being decrypted/encrypted directly from the SSL/TLS record layer.
CVE-2017-3735
If an X.509 certificate had a malformed IPAddressFamily extension, OpenSSL could do a one-byte
buffer overread, resulting in an erroneous display of the certificate in text format.
CVE-2016-10229
udp.c in the Linux kernel before 4.5 allowed remote attackers to execute arbitrary code via UDP traffic
that triggered an unsafe second checksum calculation during execution of a recv system call with the
MSG_PEEK flag.
CVE-2017-3142
An attacker who was able to send and receive messages to an authoritative DNS server might be able
to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet.
CVE-2017-3140
RPZ policy handling could affect servers using RPZ policies that included NSIP or NSDNAME triggers,
resulting in additional recursions that consumed DNS resources indefinitely and caused performance
issues or DNS outage.
CVE-2017-3137
Processing a response containing CNAME or DNAME records in an unusual order could cause a DNS
resolver to terminate.
CVE-2017-3136
Using DNS64 with 'break-dnssec yes' could cause the DNS service to exit with an assertion failure.
CVE-2017-3135
Under some conditions when using both DNS64 and RPZ to rewrite query responses, the querying
process could resume in an inconsistent state, resulting in either an INSIST assertion failure or an
attempt to read through a NULL pointer.
CVE-2016-10126
Splunk Web in Splunk Enterprise 5.0.x before 5.0.17, 6.0.x before 6.0.13, 6.1.x before 6.1.12, 6.2.x
before 6.2.12, 6.3.x before 6.3.8, and 6.4.x before 6.4.4 allowed remote attackers to conduct HTTP
request injection attacks and obtain sensitive REST API authentication-token information via
unspecified vectors, aka SPL-128840.
CVE-2016-9444
An unusually-formed answer containing a DS resource record could trigger an assertion failure and
cause the DNS service to stop, resulting in a denial of service to clients.
CVE-2016-9131
A malformed response to an ANY query can trigger an assertion failure during recursion and cause the
DNS service to stop, resulting in a denial of service to clients.
CVE-2016-8864
While processing a recursive response that contained a DNAME record in the answer section, “named”
could stop execution after encountering an assertion error in resolver.c.
CVE-2016-6306
The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to
cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and
s3_srvr.c.
CVE-2016-6304
Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a
allowed remote attackers to cause a denial of service (memory consumption) via large OCSP Status
Request extensions.
CVE-2016-5696
The net/ipv4/tcp_input.c in the Linux kernel before 4.7 did not properly determine the rate of
challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions
via a blind in-window attack.
CVE-2016-1285
A defect in the control channel input handling could cause the DNS service to fail due to an assertion
failure in sexpr.c or alist.c when a malformed packet was sent to the control channel.
CVE-2016-1286
An attacker who controlled a server to make a deliberately chosen query to generate a response that
contained RRSIGs for DNAME records could cause the DNS service to fail due to an assertion failure in
resolver .c or db.c, resulting in a denial of service to clients.
CVE-2015-8705
In some versions of BIND, an error could occur when data that had been received in a resource record
was formatted to text during debug logging. Depending on the BIND version in which this occurred, the
error could cause either a REQUIRE assertion failure in buffer.c or an unpredictable crash (e.g.
CVE-2015-8704
A DNS server could exit due to an INSIST failure in apl_42.c when performing certain string formatting
operations. Examples included, but might not be limited to, the following:
Secondary servers using text-format db files could be vulnerable if receiving a malformed record in a
zone transfer from their masters.
Primary servers using text-format db files could be vulnerable if they accepted a malformed record in a
DDNS update message.
Recursive resolvers were potentially vulnerable when logging, if they were fed a deliberately
malformed record by a malicious server.
A server which had cached a specially constructed record could encounter this condition while
performing 'rndc dumpdb'.
CVE-2015-8605
A badly formed packet with an invalid IPv4 UDP length field could cause a DHCP server, client, or relay
program to terminate abnormally, causing a denial of service.
CVE-2015-8000
If responses from upstream servers contained an invalid class parameter for certain record types, DNS
service might terminate with an assertion failure.
CVE-2015-7547
The glibc DNS client side resolver was vulnerable to a stack-based buffer overflow when the
getaddrinfo() library function was used. Software using this function might be exploited with attacker-
controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack.
CVE-2015-6564
Fixed a use-after-free bug related to PAM support that was reachable by attackers who could
compromise the pre-authentication process for remote code execution
CVE-2015-6563
Fixed a privilege separation weakness related to PAM support. Attackers who could successfully
compromise the pre-authentication process for remote code execution and who had valid credentials
on the host could impersonate other users.
CVE-2015-5722
Parsing a malformed DNSSEC key could cause a validating resolver to exit due to a failed assertion. A
remote attacker could deliberately trigger this condition by using a query that required a response
from a zone containing a deliberately malformed key.
CVE-2015-5477
A remotely exploitable denial-of-service vulnerability that exists in all versions of BIND 9 currently
supported. It was introduced in the changes between BIND 9.0.0 and BIND 9.0.1.
CVE-2015-1789
The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before
1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allowed remote attackers to cause a denial of
service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as
demonstrated by an attack against a server that supported client authentication with a custom
verification callback.
CVE-2015-1790
The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before
1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allowed remote attackers to cause a denial of
service (NULL pointer dereference and application crash) via a PKCS#7 blob that used ASN.1 encoding
and lacks inner EncryptedContent data.
CVE-2015-1792
The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s,
1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allowed remote attackers to cause a denial of service
(infinite loop) via vectors that triggered a NULL value of a BIO data structure, as demonstrated by an
unrecognized X.660 OID for a hash function.
CVE-2015-4620
A recursive resolver configured to perform DNSSEC validation, with a root trust anchor defined, could
be deliberately crashed by an attacker who could cause a query to be performed against a maliciously
constructed zone.
CVE-2015-0235
Addressed an internal issue in C library (GNU C Library gethostbyname*). Although it was not possible
to exploit this as a security issue in NIOS, it could cause some incorrect error conditions and messages
while administering the product.
CVE-2014-9298
An attacker could bypass source IP restrictions and send malicious control and configuration packets
by spoofing ::1 addresses because NTP's access control was based on a source IP address.
CVE-2014-8500
Failure to place limits on delegation chaining could allow an attacker to crash named or cause memory
exhaustion by causing the name server to issue unlimited queries in an attempt to follow the
delegation.
CVE-2014-8104
The OpenVPN community issued a patch to address a vulnerability in which remote authenticated
users could cause a critical denial of service on Open VPN servers through a small control channel
packet.
CVE-2014-3566
SSL3 is vulnerable to man-in-the-middle-attacks. SSL3 is disabled in NIOS, and connections must use
TLSv1 (which is already used by all supported browsers). Note that SSL3 is still used for transmission of
reporting data, but you can disable SSL3 on your reporting server to protect it from the vulnerability.
CVE-2014-3567
A denial of service vulnerability that is related to session tickets memory leaks.
CVE-2014-7186
The redirection implementation in parse.y in GNU BASH through v. 4.3 allowed remote attackers to
cause a denial of service (out-of-bounds array access and application crash) or possibly an unspecified
impact through the "redir_stack" issue.
CVE-2014-3470
Enabling anonymous ECDH cipher suites on TLS clients could cause a denial of service.
CVE-2014-0224
A specially crafted handshake packet could force the use of weak keying material in the SSL/TLS
clients, allowing a man-in-the-middle (MITM) attack to decrypt and modify traffic between a client and
a server.
CVE-2014-0221
Remote attackers could utilize DTLS hello message in an invalid DTLS handshake to cause a denial of
service.
CVE-2014-0198
Enabling SSL_MODE_RELEASE_BUFFERS failed to manage buffer pointer during certain recursive calls
that could cause a denial of service.
CVE-2014-0195
Remote attackers could trigger a buffer overrun attack through invalid DTLS fragments to an OpenSSL
DTLS client or server, resulting in a denial of service.
CVE-2014-0591
A crafted query against an NSEC3-signed zone could cause the named process to terminate.
Severity Levels
Severity Description
Critical Core network services are significantly impacted.
Major Network services are impacted, but there is an available workaround.
Moderate Some loss of secondary services or configuration abilities.
Minor Minor functional or UI issue.
Enhance An enhancement to the product.
# ID Severity Summary
1 NIOS-101106 Major After a NIOS upgrade, Grid Manager was slow when DNS Traffic Control objects were
loaded because of additional checks introduced to improve performance.
2 NIOS-100787 Major The NIOS documentation was missing the Audience URI/ SP Entity ID details needed
for SAML configuration.
3 NIOS-100440 Major The X6 Series appliances answered DNS Anycast servers either on LAN1 or LAN2
interfaces but not both.
4 NIOS-100388 Major In the Grid Properties Editor, the fields in the CSP Config > Advanced tab needed to be
moved to the CSP Config > Basic tab.z
5 NIOS-100345 Major The ib-dns-usage-report-per-month alert did not generate data.
6 NIOS-100258 Major The NIOS Release Notes contained an incorrect description regarding a known issue
about DDNS updates bypassing the infoblox-last-queried-denylist ACLs.
7 NIOS-99989 Major After a NIOS upgrade, swap usage increased and memory alerts were triggered.
# ID Severity Summary
1 NIOS-99724 Minor Certain MySQL and Apache parameters were lost after the Network Insight container
was deleted or recreated.
2 NIOS-98812 Minor The Test Connection option failed when the proxy server password contained certain
special characters.
3 NIOS-98126 Minor The WAPI command to fetch PTOP logs from the Grid member using WAPI version
2.9.7 did not work.
4 NIOS-98087 Minor The CSV import and export for the number of records in subscriber sites needed to be
limited.
5 NIOS-98004 Minor The NIOS documentation contained an incorrect example of the DNS syslog message
format.
6 NIOS-97959 Minor CSV import did not work and the “EA update aborted due to ‘ipv6_addresses’” error
message was displayed.
7 NIOS-96845 Minor The HTTPS_PROXY Docker restart took place silently, without any indication.
8 NIOS-95995 Minor The follyd process consumed 100% CPU for extended periods of time during DHCP
testing.
# ID Severity Summary
1 NIOS-96730 Major The LBDN returned the IP address of a DNS server whose status was “Down”.
2 NIOS-96731 Major The NIOS documentation did not mention that the output of the show ntp CLI
command for the offset argument has a limit of only 6 digits.
3 NIOS-96446 Major The MAC Address, OS, and NETBIOS NAME fields needed to be added to the
Infoblox Reporting and Analytics screen.
4 NIOS-96431 Major Under certain circumstances, the passive node of a Grid Master disconnected
frequently.
5 NIOS-96159 Major After a NIOS upgrade, Active Directory users were not able to log on to Grid Manager.
6 NIOS-95970 Major When attempting to convert numerous unmanaged subnets into managed subnets, an
error message was displayed.
7 NIOS-95835 Major Under certain circumstances, the Infoblox.log file exceeded its limit.
8 NIOS-95779 Major The NIOS documentation did not mention that configuring the AWS Member
Management (MGMT) network and the Grid Master’s LAN1 network on the same
subnet is not supported and may cause connectivity issues.
9 NIOS-95663 Major The NIOS documentation did not mention that the vDiscovery feature is not
supported on ND appliances.
10 NIOS-95559 Major After a NIOS upgrade, when vDiscovery jobs completed, warning messages were
displayed.
11 NIOS-95509 Major After a NIOS upgrade, AD authentication with nested groups failed.
12 NIOS-95459 Major The NIOS documentation did not contain a statement on NTP RFC compliance.
13 NIOS-95102 Major When DNS records were deleted using the Reclaim option on the IPAM tab, Grid
Member Candidates lost connection to the Grid Master.
14 NIOS-94995 Major On the Global Smart Folders tab, group results set to group by Assigned VLAN ID did
not display data.
# ID Severity Summary
1 NIOS-95022 Major A database synchronization issue occurred with Grid members after a set of IP
addresses was reclaimed.
2 NIOS-94756 Major After a NIOS upgrade, unable to view and export alias records.
3 NIOS-94601 Major If a client system queried multiple patterns associated with the same zone within
the persistence period, the client system got a valid RRSIG for only the first queried
pattern.
4 NIOS-94470 Major After a NIOS upgrade, high CPU consumption occurred and several core files were
generated.
5 NIOS-94136 Major The NIOS documentation did not state that Grid members may restart all the
services when the Grid Master recovers from the dual active state.
6 NIOS-94061 Major The Device Inventory report did not display any data.
7 NIOS-93954 Major Super host DHCP records associated with a subnet was not available in the drop-
down list used to select a network.
8 NIOS-93933 Major NIOS was vulnerable to stored cross-site scripting.
9 NIOS-93829 Major Grid Manager stopped responding and an HA failover occurred when the RPZ tab
was accessed.
10 NIOS-93285 Major The Cloud Services Portal was sending trigger alerts regarding high memory usage
and the memory computation in NIOS needed to be corrected.
11 NIOS-93252 Major The total object count exported in the CSV export for A records was incorrect.
12 NIOS-93046 Major A NIOS test upgrade failed and the “Existing IPv6 network template has two or
more FA templates associated test upgrade failure” error message was displayed.
13 NIOS-93001 Major The DNS service kept restarting after a NIOS hotfix was applied.
14 NIOS-92983 Major The NIOS documentation required information about DNS exfiltration to be
updated.
15 NIOS-92795 Major The passive node of a Grid Master was restarting every few hours and email alerts
were triggered.
16 NIOS-92663 Major DDNS updates generated by domain controllers were not accepted by the Infoblox
DNS members serving the relevant zone and no error messages were generated.
# ID Severity Summary
1 NIOS-93566 Minor Discovered devices were not added to the IPAM IP tables.
2 NIOS-93127 Minor When Treat Protection was enabled, some syslog messages were not displayed in
the syslog file.
3 NIOS-92332 Minor The SERVFAIL cache entries needed to be updated to include an "ms" suffix next to
the TTL values to explicitly indicate that the values are in milliseconds.
4 NIOS-92084, Minor NIOS was vulnerable to OpenSSL vulnerabilities CVE-2023-0464, CVE2023-0465,
NIOS-92082, and CVE-2023-0466.
5 NIOS-91022 Minor The Use DHCP Routers as Seed Routers option triggered discovery service restarts
during attempts to apply new the configuration.
6 NIOS-90577 Minor After a NIOS upgrade, RADIUS authentication failed.
7 NIOS-90166 Minor TCP “ANY” type queries were dropped most of the time.
8 NIOS-89652 Minor IPAM IP synchronization from Network Insight to the Grid IPAM was slow.
9 NIOS-88697 Minor NIOS was susceptible to certain vulnerabilities.
10 NIOS-88135 Minor Alias A records did not move to the newly created sub-domain until the TTL of the
record was updated.
11 NIOS-87262 Minor The syslog backup feature did not work on a specific HA node.
12 NIOS-86886 Minor The syslog for DHCP messages displayed an incorrect transaction ID.
13 NIOS-86387 Minor After a NIOS upgrade, search report files sent to the external FTP/SCP server
contained additional quotes.
14 NIOS-84457 Minor A CSV import did not work as expected.
15 NIOS-84226 Minor Microsoft synchronization erroneously generated the “Resolved by deleting the
value from NIOS” message in the log files.
16 NIOS-83171 Minor The syslog files were flooded with GSS-TISG secure update log messages.
# ID Severity Summary
1 NIOS-89434 Major The DNS service crashed after recursive lookups exceeded the threshold value.
219 NIOS-79686 Major The reset database command did not work in the emergency prompt and IB-FLEX
appliances experienced database issues.
220 NIOS-79662 Major Under certain circumstances, nothing was being logged in the syslog file.
221 NIOS-79628 Major Certain devices took time to resolve queries assigned to a public IP address and
related to a domain requested by a subscriber for whom proxy-all is enabled.
222 NIOS-79624 Major Forwarder members were not validating DNSSEC when Grid members in the same
Grid were sending queries to it.
223 NIOS-79606 Major After a NIOS upgrade, the “All fields for transfer settings are required if the transfer
type is not 'NONE'” error message was displayed in the Member DNS Properties
screen.
224 NIOS-79604 Major "iftab.IB-FLEX" needed to be a part of the support bundle.
225 NIOS-79602 Major The NIOS documentation did not contain information about the Customer
Experience Improvement Program.
226 NIOS-79579 Major After a NIOS upgrade, an Azure vDiscovery job ran and then deleted all the records
it had discovered in the past.
227 NIOS-79471 Major Splunk REST API login failed after a reboot of the reporting search head until a Grid
Manager login to reporting takes place.
228 NIOS-79464 Major AWS vDiscovery from a Cloud Platform member with an instance profile failed.
# ID Severity Summary
1 NIOS-89556 Minor The authentication.c file contained a typo.
2 NIOS-88304 Minor Unable to click the center part of the + icon to add nameservers under a forward
zone.
3 NIOS-87692 Minor The WAPI documentation contained incorrect information about search using
regular expressions.
4 NIOS-87644 Minor After a NIOS upgrade, discovery setting entries were getting duplicated.
5 NIOS-87303 Minor The NIOS appliance on-prem host was unable to connect to the Cloud Services
Portal.
6 NIOS-87279 Minor Changing the discovery VPN server port configuration of probe nodes displayed
the “Discovery probe unit did not respond” error message.
7 NIOS-87249 Minor MAC-based CLI commands needed to be added to forward collection from certain
devices.
8 NIOS-87069 Minor The NIOS documentation did not state that SAN (Subject Alternative Name) was
mandatory was Google Chrome and some other browsers.
9 NIOS-86856 Minor A progress log based on a rough estimate of the object count needed to be added in
the log files.
10 NIOS-85962 Minor The CPU temperature value for an IB-4030 appliance was displayed incorrectly.
11 NIOS-85748 Minor Under certain circumstances, directly connected routes were not pushed to IPAM
for certain devices.
12 NIOS-85279 Minor Certain Cisco devices did not return interface data, yet the Data
Management > Devices > Interfaces tab displayed data for such devices.
13 NIOS-84795 Minor IPv4 addresses with /32 mask for certain devices were discarded.
14 NIOS-84404 Minor The discovery engine did not take the comma into consideration while matching the
fingerprint output, thus resulting in an inaccurate output.
15 NIOS-84287 Minor The NIOS documentation did not contain clear information about file distribution.
16 NIOS-84056 Minor After a NIOS upgrade, SCP backup failed because of an authentication error.
17 NIOS-83997 Minor The NIOS documentation did not contain information about the sgm_admin user
account.
18 NIOS-83995 Minor The NIOS Release Notes did not contain information about the change in behavior
regarding DNS scavenging.
19 NIOS-83835 Minor The IPAM > Action icon > Show Device View screen did not display the devices
correctly.
20 NIOS-83476 Minor The term "ATC" was displayed on Grid Manager.
21 NIOS-83352 Minor A best practice of when configuring NTP servers using the FQDN, an external DNS
name resolver that is reachable by NIOS appliance must also be configured was not
documented.
Workaround: Remove the node from the Grid, downgrade it and re-join to the
Grid.
NIOS-96885 The NIOS upgrade is successful even if an invalid certificate is present in the
Grid.
Workaround: Disable strict checks for certificates using the CLI or remove the
invalid certificates from the system.
NIOS-95199 On a Trinzic X6 series appliance that is a Grid member, the Grid member must
leave the Grid Master in order to reshape, otherwise the reshape fails.
Workaround: Run the reset all licenses CLI command on the Grid
member, reshape, and join the Grid Master once again.
NIOS-95115 If the Dual Engine DNS license is present in your Grid in the deleted or expired
state (can be validated by running the show license CLI command on the
node), contact Infoblox Support to have it removed. The NIOS upgrade fails if
the license is not deleted.
NIOS-94739 There may be a drop in QPS in the vNIOS for AWS r6i instances for the X5
series of appliances.
NIOS-94554 The show upgrade_history CLI command does not capture and display
the downgrade failure logs.
NIOS-94171 The QPS value drops to zero if you run both UDP and TCP at the same time.
NIOS-93818 If you run the set license CLI command to install the Reporting subscription
license on a standalone system, the license is installed even though the
Reporting subscription license cannot be installed on a standalone system.
NIOS-93142 Under certain circumstances, you may be unable to add values to the Site_ID
external attribute and the Site_ID values that are already present may take a
long time to load.
NIOS-92747 Enabling certificate-based authentication using WAPI commands throws an
error and does not work.
NIOS-92181 If you add an invalid license using the set license CLI command, the
“License is installed” message is displayed even though the license is not
applied.
NIOS-90291 There may be a drop in performance when DHCP lease expiry is in process for
the Trinzic X6 series of appliances.
NIOS-89651 DNS Traffic Control objects that were disabled on an HA node are
automatically enabled after a Grid Master Candidate promotion.
NIOS-89619 The maximum allowed blocklist string length in NIOS does not match the
maximum allowed blocklist string length in the Harmony database.
NIOS-89599 When upgrading NIOS from version 8.4.6 to version 9.0.0, the Upload in
progress bar in the Grid > Upgrade screen shows an abnormally high
percentage number.
NIOS-89243 A vNIOS for Hyper-V deployment takes a long time to boot and sometimes
hangs during the ““KASLR disabled: nokaslr” step of the deployment process.
Infoblox VMs handle such issues better if the host system or host computer
supports synchronous PowerSafe input/output.
NIOS-88982 When the number of subscribers in subscriber cache reaches the maximum
limit, the “LRU 0 empty after get" message is logged for each query.
NIOS-88479 DNS Traffic Control objects that were enabled after an upgrade from NIOS
8.6.2 will be automatically disabled after a Grid revert operation. Database
entries for the disabled objects will be present only for Grid Master and not for
the Grid members.
Enable the disabled DNS Traffic Control objects. After enabling, disabled
objects of the Grid member will be retained in the Grid Master.
To remove the stale database entries of the disabled objects, run the touch
/infoblox/var/cleanup_dtc_disabled_objects command in the root session of
Grid Master.
NIOS-88447 When you shut down a NIOS VM running on Oracle Cloud Infrastructure, even
though NIOS shuts down, the Oracle Cloud Infrastructure console displays the
VM state as RUNNING. To avoid this, Infoblox recommends that you shut down
the NIOS VM from the Oracle Cloud Infrastructure console instead of using
the NIOS CLI or Grid Manager.
NIOS-87394 Under certain circumstances, the snmpwalk CLI command does not work as
expected on DNS services.
NIOS-87391 A NIOS deployment on a Hyper-V platform takes a long time to start.
NIOS-86966 Running the snmpwalk command displays an SNMP timeout error.
NIOS-86772 While enabling certificate-based authentication using WAPI commands, a 401
Authorization error and an OpenSSL read error occur.
NIOS-86596 A major drop in DNS performance is observed on IB-1415 appliances.
NIOS-86602 A major drop in recursion numbers is observed on IB-v1425 appliances on the
GCP platform.
NIOS-86558 Queries per second drops occur on large deployment IB-FLEX appliances.
NIOS-85912 The cipher list order has changed in NIOS 9.0.0.
NIOS-85869 The NIOS container image needs to be installed at build time.
“You must provision the reporting disk before adding a license to the Reporting
server".
Workaround: Scrape the containers and restart csp_control manually for the
value of the HTTP proxy field to be updated.
NIOS-78335 If you have configured SAML after a Grid Master Candidate promotion, you
have to manually get into the appliance to make certain changes on the
configurations to make it work.
If you have configured SAML prior to a Grid Master Candidate promotion, you
have to change the IDP settings to use a new Grid Master IP address or FQDN
for SAML to work.
NIOS-78228 Use IB-FLEX small appliance (10 vCPUs and 20 GB memory) only for small
recursion (with acceleration). Authoritative DNS zones are not supported on
this configuration.
NIOS-78177 Under rare circumstances, the reporting service may fail on a newly added Grid
member and the “SSL certificate generation failed” message is displayed in the
Infoblox.log file.
To fix this issue, disable and enable the threat indicator caching feature.
NIOS-73648 For generating RPZ hits in syslog, you must configure RPZ feed zones before or
after enabling the threat indicator caching feature for the downloading of
threat category information to start.
NIOS-73647 If you reset the reporting data on any reporting members or replace the
reporting hardware, then for the downloading and indexing of threat indicator
data to start on new members, perform the following:
If the threat indicator feature is already enabled, disable the feature and
enable it again.
Log in to the Grid as a user with the delete permission so that the user details
are pushed to the Splunk database.
NIOS-73088 After a NIOS upgrade, sometimes certain devices are displayed as duplicates
on the Devices tab.
NIOS-70953 After enabling DNS Cache Acceleration, Grid Manager interfaces are not
reachable on IBFLEX instances deployed on VMware ESXi 6.5.0 with SR-IOV
enabled.
NIOS-64802 On the Data Management > DNS > Zones > Records tab, the Record Source
column for a host record may change from Static to Dynamic if you add the
host record with an existing name that is already added by DDNS.
NIOS-61565 Object Change Tracking: In situations that involve a large database, performing
a full synchronization from the Grid Master Candidate while the previous file is
still being synchronized to the Grid Master might cause the deletion of the
original synchronization file.
Workaround: Ensure that you enter a value for the Destination Path field.
NIOS-60352 Under certain circumstances, the Data Management > DNS > Query
Monitoring tab displays a blank screen if you navigate and toggle between the
next and previous pages.
N/A Infoblox has upgraded the software for our user community
(community.infoblox.com), which will offer users enhanced features and a more
robust experience. This new community software, however, is not compatible
with our community dashboard widget. As a result, the functionality of the
Community Dashboard widget is inconsistent. The
Community Dashboard widget will subsequently be removed in the next NIOS
maintenance release.
ISE-249 Cisco ISE: Unable to create a network active user if the user is configured with
Cisco ISE server using the standby server address.