You can now use ping-timeout-ms to specify the ping
timeout value in milliseconds.
includes/dhcpd.h
new defines: SV_PING_TIMEOUT_MS and DEFAULT_PING_TIMEOUT_MS
server/dhcp.c
do_ping_check() - modified to calculate ping time from
ping-timeout-ms when its > 0, otherwise use ping-timeout
Added timeout value to debug log message
server/dhcpd.conf.5
Added discussion of ping-timeout-ms
server/stables.c
Added entry for ping-timeout-ms
If a lease is reused as part of dhcp-cache-threshold processing
the hostname (if it exists) needs to be copied from the temporary
lease back to the permanent lease.
Also add additional checks to see if the lease can be reused.
The host pointer, client ID and hardware address shouldn't have
changed.
Add support for manipluating the queues holding leaes for time
based events (free, backup, active, expired, abandoned and reserved)
via a binary search instead of walking through the linked list.
Add support to set high and low thresholds for pools for
v4 and v6. A message will be emitted when the usage of
the pool first exceeds the high threshold. More messages
will be skipped until the usage has gone below the low
threshold and then back above the high threshold.
[rt27912]
Add code to suppor on {commit expiry release} statements for DHCPv6.
There are several pieces to this change
1) Add space in the iasubopt structure to hold the statement pointers
2) Update the execute code to fill in the structures as necessary
3) Execute the statements when appropriate
Many of the changes in the non-v6 code are to pass the v6 structures
around to the execute code.
[rt26311]
Fix the issue with DDNS by checking to see if we have added a pointer
to the ddns_cb and skipping the cache threshold check if we did. Also
expand and correct the cache threshold check into the delayed ack code.
+- Add support for a simple check that the server id in a request message
+ to a failover peer matches the server id of the server. This support
+ is enabled by editing the file includes/site.h and uncommenting the
+ definition for SERVER_ID_CHECK. The option has several restrictions
+ and issues - please read the comment in the site.h file before
+ enabling it.
+ [ISC-Bugs #31463]
has been updated to properly process or reject the packets as
appropriate. Thanks to David Zych at University of Illinois
for reporting this issue. [ISC-Bugs #24960]
One CVE number for each class of packet.
CVE-2011-2748
CVE-2011-2749