]>
git.ipfire.org Git - thirdparty/pdns.git/log
Otto Moerbeek [Fri, 28 Jan 2022 07:39:54 +0000 (08:39 +0100)]
Clarify docs as suggested by @Habbie
Otto Moerbeek [Fri, 28 Jan 2022 06:30:02 +0000 (07:30 +0100)]
typo
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Otto Moerbeek [Wed, 26 Jan 2022 09:32:08 +0000 (10:32 +0100)]
If no supported algo was found, we still can have ZONEMD records
This fixes:
Jan 26 09:57:19 msg="No ZONEMD record, but NSEC(3) record does not deny it" subsystem="ztc" level=0 ts="
1643187439 .807" zone="."
Otto Moerbeek [Tue, 25 Jan 2022 07:55:01 +0000 (08:55 +0100)]
Tweaks and typos
Otto Moerbeek [Tue, 25 Jan 2022 07:25:20 +0000 (08:25 +0100)]
Apply suggestions from code review
Co-authored-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
Otto Moerbeek [Mon, 24 Jan 2022 16:00:41 +0000 (17:00 +0100)]
Init two bools, as they may be used uninitialized if parsing fails
Otto Moerbeek [Mon, 24 Jan 2022 15:27:22 +0000 (16:27 +0100)]
Improved storage of nsec3 info and a few tweaks
Otto Moerbeek [Mon, 24 Jan 2022 12:44:05 +0000 (13:44 +0100)]
Process review comments: check pointer conversions, unify record processing plus assorted small fixes
Otto Moerbeek [Mon, 24 Jan 2022 12:18:17 +0000 (13:18 +0100)]
Process denial of ZONEMD in the NSEC3 case
Otto Moerbeek [Mon, 24 Jan 2022 10:32:19 +0000 (11:32 +0100)]
Docs and small tweaks
Otto Moerbeek [Mon, 24 Jan 2022 09:19:51 +0000 (10:19 +0100)]
If we do not find ZONEMD record(s) and the zone is DNSSEC validated, validate the denial of existence of ZONEMD
Otto Moerbeek [Mon, 24 Jan 2022 07:40:00 +0000 (08:40 +0100)]
Rename config keywords to be more consistent and add ZONEMD to ZoneToCache unit tests
Otto Moerbeek [Fri, 21 Jan 2022 10:11:15 +0000 (11:11 +0100)]
Proper ZTC state maintainance on Lua config change
Otto Moerbeek [Wed, 19 Jan 2022 14:07:57 +0000 (15:07 +0100)]
Rework config to be better understandable: two separate config values for zonemd and zonemdDNSSEC validation,
both having values: "ignore", "process", "required"
Otto Moerbeek [Wed, 19 Jan 2022 12:34:09 +0000 (13:34 +0100)]
Move ZoneToCache from a separate thread to the handler, so that we can resolve e.g. DS records.
Config and logic of ZoneMD wrt DNSSEC is too complex, needs more thought.
Otto Moerbeek [Tue, 18 Jan 2022 11:36:42 +0000 (12:36 +0100)]
Add Lua config and do DNSSEC validation of ZONEMD record
Missing:
- TA/NTA/DS processing (we assume it's in the record cache for the moment)
- Valdition of of absense of ZONEMD records by proof of non-existence
- Details of processing of DNSSEC validation result (depending on config)
Solving the first part likely involes running the zone-to-cache tasks in a recursorThread
context.
Otto Moerbeek [Tue, 18 Jan 2022 10:12:16 +0000 (11:12 +0100)]
Add ZONEMD config processing in Lua config
Otto Moerbeek [Tue, 18 Jan 2022 09:25:53 +0000 (10:25 +0100)]
Factor out ZONEMD procesing of single DNSRecord, saves having to save a vector of them
Otto Moerbeek [Fri, 14 Jan 2022 13:56:50 +0000 (14:56 +0100)]
Also add ZONEMD processing for url and file method
Otto Moerbeek [Fri, 14 Jan 2022 13:46:29 +0000 (14:46 +0100)]
Implement ZONEMD when processing zone-to-cache via AXFR
Otto Moerbeek [Fri, 14 Jan 2022 11:55:02 +0000 (12:55 +0100)]
ZONEMD: Refactor reading of records out of verification of records
Peter van Dijk [Fri, 21 Jan 2022 09:31:08 +0000 (10:31 +0100)]
Merge pull request #11213 from Habbie/auth-4.5.3-secpoll-docs
auth-4.5.3: changelog and secpoll
Remi Gacogne [Fri, 21 Jan 2022 08:26:55 +0000 (09:26 +0100)]
Merge pull request #11197 from rgacogne/remove-binary_function
Stop using the now deprecated and useless std::binary_function
Peter van Dijk [Thu, 20 Jan 2022 15:42:32 +0000 (16:42 +0100)]
Merge pull request #11219 from mind04/pdns-cds
auth: fix multiple CDS records in an AXFR
Peter van Dijk [Wed, 19 Jan 2022 10:32:34 +0000 (11:32 +0100)]
auth-4.5.3: changelog and secpoll
Peter van Dijk [Thu, 20 Jan 2022 12:45:18 +0000 (13:45 +0100)]
Merge pull request #11217 from rgacogne/rec-doc-typo-policy-event-filter
rec: Fix a typo in the 'semantics' section of the hooks documentation
Kees Monshouwer [Thu, 20 Jan 2022 11:00:21 +0000 (12:00 +0100)]
auth: test CDS multi digest and removal
Kees Monshouwer [Thu, 20 Jan 2022 10:43:23 +0000 (11:43 +0100)]
auth: test CDS with multiple keys
Kees Monshouwer [Thu, 20 Jan 2022 10:13:21 +0000 (11:13 +0100)]
auth: fix multiple CDS records in an AXFR
Remi Gacogne [Thu, 20 Jan 2022 09:40:21 +0000 (10:40 +0100)]
rec: Fix a typo in the 'semantics' section of the hooks documentation
Otto Moerbeek [Wed, 19 Jan 2022 14:11:11 +0000 (15:11 +0100)]
Merge pull request #11212 from omoerbeek/fix-zonemd-test-files
Add missing dir in the zonemd test file paths
Otto Moerbeek [Wed, 19 Jan 2022 08:47:42 +0000 (09:47 +0100)]
Add missing dir in the zonemd test file paths
Otto Moerbeek [Tue, 18 Jan 2022 16:20:17 +0000 (17:20 +0100)]
Merge pull request #11207 from omoerbeek/rec-kill-no-prev-decl-warning
rec: Kill a "no previous declaration" warning
Peter van Dijk [Tue, 18 Jan 2022 16:19:44 +0000 (17:19 +0100)]
Merge pull request #11208 from Habbie/dnspython-2.1.0
CI: dnspython 2.2.0 breaks auth and ixfrdist testing, pin to 2.1.0
Peter van Dijk [Tue, 18 Jan 2022 15:48:24 +0000 (16:48 +0100)]
Merge pull request #11183 from Habbie/auth-2022
bump ws-auth.cc copyright year
Peter van Dijk [Tue, 18 Jan 2022 15:40:52 +0000 (16:40 +0100)]
CI: dnspython 2.2.0 breaks auth and ixfrdist testing, pin to 2.1.0
Peter van Dijk [Tue, 18 Jan 2022 14:07:06 +0000 (15:07 +0100)]
Merge pull request #11199 from Habbie/ubuntu-jammy
builder: add Ubuntu jammy target
Otto Moerbeek [Tue, 18 Jan 2022 13:54:22 +0000 (14:54 +0100)]
Kill a "no previous declaration" warning
Peter van Dijk [Fri, 14 Jan 2022 11:12:09 +0000 (12:12 +0100)]
test ubuntu jammy build target
Otto Moerbeek [Tue, 18 Jan 2022 12:32:15 +0000 (13:32 +0100)]
Merge pull request #11203 from omoerbeek/rec-fix-logging-include
rec: Fix #include "logging.hh", it should not be conditional
Peter van Dijk [Tue, 18 Jan 2022 11:58:53 +0000 (12:58 +0100)]
Merge pull request #11200 from omoerbeek/zonemd-build-issues
Zonemd and sha.hh build issues
Otto Moerbeek [Tue, 18 Jan 2022 11:41:05 +0000 (12:41 +0100)]
Fix #include "logging.hh", it should not be conditional
Peter van Dijk [Tue, 18 Jan 2022 10:48:46 +0000 (11:48 +0100)]
Merge pull request #11202 from Habbie/swagger-ci
CI: add forgotten collect target
Peter van Dijk [Tue, 18 Jan 2022 09:48:20 +0000 (10:48 +0100)]
CI: add forgotten collect target
Otto Moerbeek [Tue, 18 Jan 2022 08:56:30 +0000 (09:56 +0100)]
whitespace
Co-authored-by: Remi Gacogne <github@coredump.fr>
Otto Moerbeek [Tue, 18 Jan 2022 07:17:28 +0000 (08:17 +0100)]
evp_md_ctx_new/free was called evp_md_ctx_create/destroy in OpenSSL < 1.1
Remi Gacogne [Tue, 18 Jan 2022 08:27:09 +0000 (09:27 +0100)]
Merge pull request #11196 from rgacogne/ddist-openssl3
auth, dnsdist, rec: Fix build with OpenSSL 3.0.0
Otto Moerbeek [Tue, 18 Jan 2022 06:55:04 +0000 (07:55 +0100)]
Add ZONEMD test files to distr
Peter van Dijk [Fri, 14 Jan 2022 11:12:04 +0000 (12:12 +0100)]
add ubuntu jammy build target
Peter van Dijk [Mon, 17 Jan 2022 20:05:36 +0000 (21:05 +0100)]
Merge pull request #11194 from Habbie/swagger-syntax
auth swagger: add a syntax test and fix a few things
Peter van Dijk [Mon, 17 Jan 2022 14:02:04 +0000 (15:02 +0100)]
auth CI: do swagger syntax check
Remi Gacogne [Mon, 17 Jan 2022 15:56:13 +0000 (16:56 +0100)]
Stop using the now deprecated and useless std::binary_function
It is no longer needed since the types can now be automatically
deduced, has been deprecated in C++11 and removed in C++17.
Remi Gacogne [Mon, 17 Jan 2022 15:13:09 +0000 (16:13 +0100)]
dnsdist: Fix build with OpenSSL 3.0.0
Peter van Dijk [Mon, 17 Jan 2022 14:24:02 +0000 (15:24 +0100)]
auth swagger: fix some texts in the autoprimary bits
Peter van Dijk [Mon, 17 Jan 2022 14:21:40 +0000 (15:21 +0100)]
auth swagger: fix autoprimary format
Remi Gacogne [Mon, 17 Jan 2022 12:40:57 +0000 (13:40 +0100)]
Merge pull request #11188 from rgacogne/ddist-170-changelog-secpoll
dnsdist: ChangeLog and secpoll update for 1.7.0
Otto Moerbeek [Fri, 14 Jan 2022 15:39:53 +0000 (16:39 +0100)]
Merge pull request #11190 from omoerbeek/dnswasher-no-ipcipher
dnswasher: Fix compilation with !HAVE_IPCIPHER
Otto Moerbeek [Fri, 14 Jan 2022 14:11:48 +0000 (15:11 +0100)]
Fix compilation with !HAVE_IPCIPHER
Remi Gacogne [Fri, 14 Jan 2022 13:16:22 +0000 (14:16 +0100)]
Merge pull request #11171 from rgacogne/ddist-defer-rings-creation
dnsdist: Defer the actual allocation of the ring buffer entries
Remi Gacogne [Fri, 14 Jan 2022 13:12:37 +0000 (14:12 +0100)]
dnsdist: ChangeLog and secpoll update for 1.7.0
Peter van Dijk [Fri, 14 Jan 2022 13:08:07 +0000 (14:08 +0100)]
Merge pull request #11181 from Habbie/auth-4.6.0-rc1-docs-secpoll
auth-4.6.0-rc1: docs+secpoll
Peter van Dijk [Thu, 13 Jan 2022 13:19:41 +0000 (14:19 +0100)]
auth-4.6.0-rc1: docs+secpoll
Otto Moerbeek [Fri, 14 Jan 2022 10:48:33 +0000 (11:48 +0100)]
Merge pull request #11100 from omoerbeek/zonemd
First part of ZONEMD support
Remi Gacogne [Fri, 14 Jan 2022 10:00:40 +0000 (11:00 +0100)]
Merge pull request #11166 from rgacogne/ddist-load-tls-algos-only
libssl: Load only the ciphers and digests needed for TLS, not all of them
Otto Moerbeek [Fri, 14 Jan 2022 09:58:25 +0000 (10:58 +0100)]
Process review comments on comments
Otto Moerbeek [Fri, 14 Jan 2022 09:43:23 +0000 (10:43 +0100)]
Merge pull request #11186 from omoerbeek/rec-visibility
rec: Build with -fvisibility=hidden by default
Otto Moerbeek [Fri, 14 Jan 2022 09:43:02 +0000 (10:43 +0100)]
Merge pull request #11175 from omoerbeek/rec-var-names
rec: Rename static, global and thread_local vars to follow naming conventions
Remi Gacogne [Wed, 12 Jan 2022 15:39:30 +0000 (16:39 +0100)]
dnsdist: Avoid a race if one is careless enough to call Rings::init() from two threads at once
Remi Gacogne [Fri, 11 Mar 2022 15:27:56 +0000 (16:27 +0100)]
dnsdist: Defer the actual allocation of the ring buffer entries
It is a bit cumbersome to have to call `Rings::init()` when we are
ready, but it prevents allocating the default number of entries,
10k, which is quite a lot for small setups. Of course the memory
was released once the configuration had been parsed, but it might
be too late in some cases, and we would end up with a bigger reported
memory usage than our actual one since heap shrinkage seldom happens.
Remi Gacogne [Fri, 14 Jan 2022 08:51:17 +0000 (09:51 +0100)]
Merge pull request #11184 from chbruyand/dnsdist-mac-ring-buffers
dnsdist: add support to store mac address in query rings
Otto Moerbeek [Fri, 14 Jan 2022 07:13:19 +0000 (08:13 +0100)]
rec: Build with -fvisibility=hidden by default
Same as #11178, but now for rec.
Remi Gacogne [Thu, 13 Jan 2022 21:10:41 +0000 (22:10 +0100)]
Merge pull request #11178 from rgacogne/ddist-visibility-hidden
dnsdist: Build with `-fvisibility=hidden` by default
Remi Gacogne [Thu, 13 Jan 2022 21:09:54 +0000 (22:09 +0100)]
Merge pull request #11164 from rgacogne/protozero-171
Update protozero to 1.7.1
Charles-Henri Bruyand [Thu, 13 Jan 2022 14:58:39 +0000 (15:58 +0100)]
dnsdist: adds possibilty to store mac address in query rings
Peter van Dijk [Thu, 13 Jan 2022 15:18:34 +0000 (16:18 +0100)]
bump ws-auth.cc copyright year
Peter van Dijk [Thu, 13 Jan 2022 12:57:15 +0000 (13:57 +0100)]
Merge pull request #11167 from Habbie/various-pieter
remove a few lieter dependencies, plus a doc rendering fix
Remi Gacogne [Thu, 13 Jan 2022 12:00:30 +0000 (13:00 +0100)]
dnsdist: Build with -fvisibility=hidden by default
Not marking our symbols visible by default allows the compiler to do
better optimizations, especially with Link-Time Optimizations that
several distributions are now enabling by default.
The most obvious optimization comes from dead code removal because
the compiler now knows that it cannot be used by an external shared
object, but better inlining might also occur.
Even without LTO, it reduces the final size of stripped binaries and
might improve loading times a bit.
Note that we already mark the symbols that we want to export with the
'default' visibilty, for example for Lua FFI.
Peter van Dijk [Thu, 13 Jan 2022 11:26:41 +0000 (12:26 +0100)]
Merge pull request #11157 from mind04/pdns-zonecache
Auth: add zone removal to the zone cache
Remi Gacogne [Thu, 13 Jan 2022 11:04:56 +0000 (12:04 +0100)]
Merge pull request #11172 from rgacogne/ddist-temporary-files-unit-tests
dnsdist: Remove temporary files used in the KVS unit tests
Remi Gacogne [Thu, 13 Jan 2022 11:03:53 +0000 (12:03 +0100)]
Merge pull request #11155 from rgacogne/ddist-doc-removed-17
dnsdist: Document webserver and actions removals in 1.7.0
Otto Moerbeek [Thu, 13 Jan 2022 08:20:24 +0000 (09:20 +0100)]
Merge pull request #11177 from jsoref/doc-remove-auth-can-lower-ttl
doc: remove auth-can-lower-ttl
Josh Soref [Wed, 12 Jan 2022 20:51:07 +0000 (15:51 -0500)]
doc: remove auth-can-lower-ttl
This wasn't around as of 4.0 - it landed in this file in
223bb49ef87feee34af9d1076b55bee81a38b8bc
but the removal notice was already included at that time.
Remi Gacogne [Wed, 12 Jan 2022 15:43:56 +0000 (16:43 +0100)]
protozero: Update the CHANGELOG.md file as well
Otto Moerbeek [Wed, 12 Jan 2022 14:34:50 +0000 (15:34 +0100)]
Merge pull request #11176 from omoerbeek/dnsdist-workaround-openbsd-compiler-bug
dnsdist: Work around a compiler bug seen on OpenBSD/amd64 using clang-13
Otto Moerbeek [Wed, 12 Jan 2022 12:49:53 +0000 (13:49 +0100)]
Work around a compiler bug seen on OpenBSD/amd64 using clang-13 and make the code a tiny bit more pretty.
Fixes #11113.
Otto Moerbeek [Wed, 12 Jan 2022 10:43:58 +0000 (11:43 +0100)]
As suggested, rename a few types and vars to make them more friendly to the reader
Otto Moerbeek [Wed, 12 Jan 2022 08:25:24 +0000 (09:25 +0100)]
Rename static, global and thread_local vars to follow naming conventions
The thread_local vars in houseKeeping() should be reviewed, as some of them are only relevant for the handler thread,
so they do not need to be thread_local.
Remi Gacogne [Mon, 29 Nov 2021 15:54:28 +0000 (16:54 +0100)]
dnsdist: Remove temporary files used in the KVS unit tests
Otto Moerbeek [Tue, 11 Jan 2022 16:12:18 +0000 (17:12 +0100)]
Merge pull request #10998 from omoerbeek/rec-split-pdns-recursor
Rec: split pdns_recursor.cc
Otto Moerbeek [Tue, 11 Jan 2022 15:44:24 +0000 (16:44 +0100)]
Merge pull request #11168 from omoerbeek/rec-validate-edns-dnskey-missing
rec: servfail.nl changed setup
Otto Moerbeek [Tue, 11 Jan 2022 15:23:03 +0000 (16:23 +0100)]
servfail.nl changed theuir setup.
I think in an ideal world we should return 9 (DNSSEC key missing) but I don't see a
easy way to do that at the moment.
Kees Monshouwer [Sun, 9 Jan 2022 13:25:41 +0000 (14:25 +0100)]
auth: the zonecache ueberbackend test are broken
Kees Monshouwer [Sun, 9 Jan 2022 13:24:23 +0000 (14:24 +0100)]
auth: add zone removal to the zonecache
Peter van Dijk [Tue, 11 Jan 2022 13:19:07 +0000 (14:19 +0100)]
secpoll: change SOA contact
Peter van Dijk [Tue, 11 Jan 2022 13:18:08 +0000 (14:18 +0100)]
docs: move dependencies from pieterlexis to PowerDNS
Peter van Dijk [Tue, 11 Jan 2022 13:17:57 +0000 (14:17 +0100)]
docs: fix rendering of DNSZoneRecord
Remi Gacogne [Fri, 11 Mar 2022 13:08:05 +0000 (14:08 +0100)]
libssl: Load only the ciphers and digests needed for TLS, not all of them
OPENSSL_init_crypto(), added in 1.1.0, loads all available ciphers
and digests by default. Since we only need the TLS-related ones,
that only increases the startup time and the memory usage.
Before:
```
OPENSSL_INIT: ossl_init_base: Setting up stop handlers
OPENSSL_INIT: ossl_init_register_atexit()
OPENSSL_INIT: ossl_init_load_crypto_nodelete()
OPENSSL_INIT: openssl_config_int((null), (null), 50)
OPENSSL_INIT: ossl_init_engine_rdrand: engine_load_rdrand_int()
OPENSSL_INIT: ossl_init_thread_start: marking thread for err_state
OPENSSL_INIT: ossl_init_load_crypto_strings: err_load_crypto_strings_int()
OPENSSL_INIT: ossl_init_engine_dynamic: engine_load_dynamic_int()
OPENSSL_INIT: ossl_init_add_all_ciphers: openssl_add_all_ciphers_int()
OPENSSL_INIT: ossl_init_add_all_digests: openssl_add_all_digests()
OPENSSL_INIT: ossl_init_ssl_base: Adding SSL ciphers and digests
OPENSSL_INIT: ossl_init_ssl_base: SSL_COMP_get_compression_methods()
OPENSSL_INIT: ossl_init_ssl_base: SSL_add_ssl_module()
OPENSSL_INIT: ossl_init_load_ssl_strings: ERR_load_SSL_strings()
OPENSSL_INIT: ossl_init_thread_start: marking thread for rand
OPENSSL_INIT: ossl_init_thread_start: marking thread for rand
```
After:
```
OPENSSL_INIT: ossl_init_base: Setting up stop handlers
OPENSSL_INIT: ossl_init_register_atexit()
OPENSSL_INIT: ossl_init_load_crypto_nodelete()
OPENSSL_INIT: openssl_config_int((null), (null), 50)
OPENSSL_INIT: ossl_init_engine_rdrand: engine_load_rdrand_int()
OPENSSL_INIT: ossl_init_thread_start: marking thread for err_state
OPENSSL_INIT: ossl_init_load_crypto_strings: err_load_crypto_strings_int()
OPENSSL_INIT: ossl_init_engine_dynamic: engine_load_dynamic_int()
OPENSSL_INIT: ossl_init_ssl_base: Adding SSL ciphers and digests
OPENSSL_INIT: ossl_init_ssl_base: SSL_COMP_get_compression_methods()
OPENSSL_INIT: ossl_init_ssl_base: SSL_add_ssl_module()
OPENSSL_INIT: ossl_init_load_ssl_strings: ERR_load_SSL_strings()
OPENSSL_INIT: ossl_init_thread_start: marking thread for rand
OPENSSL_INIT: ossl_init_thread_start: marking thread for rand
```
Otto Moerbeek [Tue, 11 Jan 2022 10:39:46 +0000 (11:39 +0100)]
Reformat with clang-format
Otto Moerbeek [Tue, 11 Jan 2022 10:37:17 +0000 (11:37 +0100)]
Split out rec-main.cc
Otto Moerbeek [Tue, 11 Jan 2022 09:01:45 +0000 (10:01 +0100)]
Introduce rec-main.hh and split out TCP code to rec-tcp.cc