]>
git.ipfire.org Git - thirdparty/pdns.git/log
Otto Moerbeek [Fri, 4 Feb 2022 10:00:48 +0000 (11:00 +0100)]
The on the same line with if, whitespace issues
Otto Moerbeek [Fri, 4 Feb 2022 09:56:17 +0000 (10:56 +0100)]
Apply suggestions from code review
Co-authored-by: Remi Gacogne <github@coredump.fr>
Otto Moerbeek [Fri, 4 Feb 2022 09:05:44 +0000 (10:05 +0100)]
Now use the moderen method in the example script
Otto Moerbeek [Fri, 4 Feb 2022 09:03:04 +0000 (10:03 +0100)]
Log an error if pdns.DROP is used as rcode in Lua callbacks
Otto Moerbeek [Fri, 4 Feb 2022 08:30:56 +0000 (09:30 +0100)]
Mention pdns.DROP is old in all places relevant and add refs to make the callback semantics
section easier to find. Also add upgrade note.
Otto Moerbeek [Fri, 4 Feb 2022 08:12:31 +0000 (09:12 +0100)]
Use an existing name for CANME chasing
Otto Moerbeek [Fri, 4 Feb 2022 08:10:35 +0000 (09:10 +0100)]
Fix most runtime issues, the script suffered bit-rot
Otto Moerbeek [Fri, 4 Feb 2022 07:59:22 +0000 (08:59 +0100)]
Reformat to make the style more consistent
Peter van Dijk [Thu, 3 Feb 2022 11:16:45 +0000 (12:16 +0100)]
Merge pull request #11062 from Habbie/docs-filterforward-4.5
auth docs: clarify that filterForward is new in 4.5.0 and fix example
Otto Moerbeek [Wed, 2 Feb 2022 16:52:31 +0000 (17:52 +0100)]
Merge pull request #11269 from omoerbeek/rec-syncres-threadlocal
rec: move two maps from thread_local to shared
Otto Moerbeek [Wed, 2 Feb 2022 15:41:32 +0000 (16:41 +0100)]
Fix SNMP MIB conformance entries and a title
Remi Gacogne [Wed, 2 Feb 2022 15:33:17 +0000 (16:33 +0100)]
Merge pull request #11251 from rgacogne/ddist-outgoing-tls-sni
dnsdist: Set Server Name Indication on outgoing TLS connections (DoT, DoH)
Remi Gacogne [Wed, 2 Feb 2022 15:32:54 +0000 (16:32 +0100)]
Merge pull request #11258 from rgacogne/ddist-fix-race-in-testlua
dnsdist: Do not execute 'newThread' in client or config check modes
Otto Moerbeek [Wed, 2 Feb 2022 13:34:32 +0000 (14:34 +0100)]
Merge pull request #11240 from omoerbeek/rec-tcp-ooo-docs
rec: Elaborate on TCP and OOO
Otto Moerbeek [Wed, 2 Feb 2022 12:41:38 +0000 (13:41 +0100)]
Add links to relevant metrics
Otto Moerbeek [Wed, 2 Feb 2022 08:06:42 +0000 (09:06 +0100)]
Move the pruning of the two now shared maps (failed servers and non-resolving ns) to the handler thread
Peter van Dijk [Tue, 1 Feb 2022 18:48:45 +0000 (19:48 +0100)]
Merge pull request #11227 from Habbie/lua-ifurlhcup
auth LUA: add ifurlextup function
Otto Moerbeek [Tue, 1 Feb 2022 15:36:30 +0000 (16:36 +0100)]
rename metric name, promtool says:
pdns_recursor_non_resolving_ns_entries metric names should not contain abbreviated units
Remi Gacogne [Tue, 1 Mar 2022 13:36:41 +0000 (14:36 +0100)]
dnsdist: Do not execute 'newThread' in client and config check modes
Peter van Dijk [Tue, 1 Feb 2022 13:22:29 +0000 (14:22 +0100)]
Merge pull request #11270 from Habbie/auth-dnsdist-eol
auth/dnsdist: update EOL docs
Peter van Dijk [Tue, 1 Feb 2022 13:11:50 +0000 (14:11 +0100)]
Merge pull request #11271 from Habbie/dnsdist-doc-newthread
dnsdist: docs for newThread&friends
Remi Gacogne [Tue, 1 Feb 2022 11:32:22 +0000 (12:32 +0100)]
Merge pull request #11174 from rgacogne/ddist-poolaction-continue
dnsdist: Add a parameter to PoolAction to keep processing rules
Peter van Dijk [Tue, 1 Feb 2022 10:29:20 +0000 (11:29 +0100)]
dnsdist: docs for newThread&friends
Remi Gacogne [Tue, 1 Feb 2022 10:50:51 +0000 (11:50 +0100)]
dnsdist: Add regression tests for outgoing SNI
Remi Gacogne [Tue, 1 Feb 2022 10:40:33 +0000 (11:40 +0100)]
Merge pull request #11173 from rgacogne/ddist-proxy-proto-ffi
dnsdist: Add Lua FFI helpers for protocol and MAC address access, proxy protocol payload generation
Remi Gacogne [Tue, 1 Feb 2022 10:29:09 +0000 (11:29 +0100)]
dnsdist: Add a regression test for PoolAction's second option
Remi Gacogne [Tue, 1 Feb 2022 10:23:45 +0000 (11:23 +0100)]
dnsdist: Unbreak 'ContinueAction' regression tests
Peter van Dijk [Fri, 21 Jan 2022 14:58:46 +0000 (15:58 +0100)]
auth LUA: add ifurlextup function
Peter van Dijk [Tue, 1 Feb 2022 09:48:43 +0000 (10:48 +0100)]
Merge pull request #11267 from omoerbeek/auth-doc-ifurlup
Rewrite the section defining the behaviour of urlup.
Peter van Dijk [Tue, 1 Feb 2022 09:33:31 +0000 (10:33 +0100)]
fix formatting
Peter van Dijk [Tue, 1 Feb 2022 09:25:36 +0000 (10:25 +0100)]
dnsdist EOL docs: correct after 1.7 release
Peter van Dijk [Tue, 1 Feb 2022 09:21:24 +0000 (10:21 +0100)]
auth EOL docs: correct after 4.6 release
Otto Moerbeek [Mon, 31 Jan 2022 11:36:07 +0000 (12:36 +0100)]
Fix stats for failed servers (named hosts for some historic reaon) and add non-resolving metrics.
Also, use a safe copy to dump the maps.
Otto Moerbeek [Tue, 1 Feb 2022 08:36:21 +0000 (09:36 +0100)]
Merge pull request #11266 from omoerbeek/rec-fix-zonemd-test
rec: Fix zone-to-cache test by properly initing trust anchors and dnssec mode
Otto Moerbeek [Tue, 1 Feb 2022 08:20:21 +0000 (09:20 +0100)]
Merge pull request #11257 from omoerbeek/rec-fix-lwres-isnew
Rec: fix lwres isnew
Otto Moerbeek [Tue, 1 Feb 2022 07:19:18 +0000 (08:19 +0100)]
Rewrite the section defining the behaviour of urlup.
I could not figure out the behaviour from reading the existing text,
so it needed a rewrite.
Otto Moerbeek [Tue, 1 Feb 2022 06:49:03 +0000 (07:49 +0100)]
Fix zone-to-cache test by properly initing trust anchors and dnssec mode
Peter van Dijk [Mon, 31 Jan 2022 23:48:56 +0000 (00:48 +0100)]
Merge pull request #11089 from pieterlexis/remote-dnssec-docs
Update remote docs based on experience
Peter van Dijk [Mon, 31 Jan 2022 19:18:00 +0000 (20:18 +0100)]
Merge pull request #11262 from Habbie/el8-builds
builder: migrate EL8 builds to oraclelinux, rename centos8 to el8 where possible
Peter van Dijk [Mon, 31 Jan 2022 17:15:14 +0000 (18:15 +0100)]
builder: add el-7 alias for centos-7
Peter van Dijk [Mon, 31 Jan 2022 15:43:54 +0000 (16:43 +0100)]
take centos 8-stream from quay
Peter van Dijk [Mon, 31 Jan 2022 15:28:34 +0000 (16:28 +0100)]
builder CI: switch oraclelinux-8 to el-8
cleanup
Peter van Dijk [Mon, 31 Jan 2022 15:28:04 +0000 (16:28 +0100)]
builder: archs for oraclelinux-8; el-8 symlinks
Remi Gacogne [Mon, 31 Jan 2022 13:17:48 +0000 (14:17 +0100)]
Merge pull request #11256 from rgacogne/rec-regression-test-returncode
rec: Fix the exit code when the recursor fails to start in our tests
Peter van Dijk [Fri, 21 Jan 2022 13:25:47 +0000 (14:25 +0100)]
auth LUA docs: fix ifurlup example
Otto Moerbeek [Mon, 31 Jan 2022 13:02:28 +0000 (14:02 +0100)]
Merge pull request #11225 from rgacogne/rec-soa-and-ns-in-ds-denial
rec: Reject non-apex NSEC(3)s that have both the NS and SOA bits set
Otto Moerbeek [Mon, 31 Jan 2022 13:01:28 +0000 (14:01 +0100)]
Merge pull request #11245 from omoerbeek/rec-ds-cname-insecure
rec: a CNAME answer on DS query should abort DS retrieval
Remi Gacogne [Mon, 31 Jan 2022 12:31:39 +0000 (13:31 +0100)]
Merge pull request #11253 from rgacogne/ddist-outgoing-doh-check-timeout
dnsdist: Fix the health-check timeout for outgoing DoH connections
Remi Gacogne [Mon, 31 Jan 2022 12:31:22 +0000 (13:31 +0100)]
Merge pull request #11255 from rgacogne/ddist-config-check
dnsdist: Fix 'inConfigCheck()'
Remi Gacogne [Mon, 31 Jan 2022 11:45:36 +0000 (12:45 +0100)]
rec: Fix the exit code when the recursor fails to start in our tests
Otto Moerbeek [Mon, 31 Jan 2022 11:44:39 +0000 (12:44 +0100)]
Initialize isNew before calling a exception throwing function
Otto Moerbeek [Mon, 31 Jan 2022 11:43:23 +0000 (12:43 +0100)]
Fix indent
Remi Gacogne [Mon, 31 Jan 2022 11:24:29 +0000 (12:24 +0100)]
TCPIOHandler: Handle empty TLS hostname in outgoing connections
Remi Gacogne [Mon, 31 Jan 2022 11:11:36 +0000 (12:11 +0100)]
dnsdist: Fix 'inConfigCheck()'
Otto Moerbeek [Mon, 31 Jan 2022 10:40:16 +0000 (11:40 +0100)]
Move fail_t maps to global shared instead of thread local
These maps are only used or modified when we're going out on the
net, so the performance impact of the locking should be relatively
low, while other threads could benefit greatly from information
learned by other threads.
Also, pruning of these data structure is cheap, so holding the lock
while pruning should be a short period of time.
Remi Gacogne [Mon, 31 Jan 2022 09:53:10 +0000 (10:53 +0100)]
dnsdist: Fix the health-check timeout for outgoing DoH connections
The health-check timeout is in milliseconds, contrary to the other
ones that are in seconds.
Remi Gacogne [Mon, 31 Jan 2022 09:33:46 +0000 (10:33 +0100)]
dnsdist: Set Server Name Indication on outgoing TLS connections (DoT, DoH)
Remi Gacogne [Mon, 31 Jan 2022 08:44:15 +0000 (09:44 +0100)]
NSEC -> NSEC3
Co-authored-by: Otto Moerbeek <otto.moerbeek@open-xchange.com>
Remi Gacogne [Mon, 31 Jan 2022 08:44:07 +0000 (09:44 +0100)]
NSEC -> NSEC3
Co-authored-by: Otto Moerbeek <otto.moerbeek@open-xchange.com>
Otto Moerbeek [Fri, 28 Jan 2022 13:27:35 +0000 (14:27 +0100)]
Add a test for the case where an (Insecure) domain fails to get a DS
record because of a CNAME loop, avoiding a SERVFAIL.
Otto Moerbeek [Fri, 28 Jan 2022 13:26:36 +0000 (14:26 +0100)]
If we get a CNAME when asking for a DS, we should give up and return vState::BogusUnableToGetDSs
Otto Moerbeek [Fri, 28 Jan 2022 08:45:30 +0000 (09:45 +0100)]
Merge pull request #11189 from omoerbeek/zonemd-rec
rec: ZONEMD validation for Zone to Cache function
Otto Moerbeek [Fri, 28 Jan 2022 08:11:16 +0000 (09:11 +0100)]
Merge pull request #11226 from omoerbeek/zonemd-tests
auth: pdnsutil zonemd-verify-file tests from github.com/verisign/zonemd-test-cases
Otto Moerbeek [Fri, 28 Jan 2022 07:39:54 +0000 (08:39 +0100)]
Clarify docs as suggested by @Habbie
Otto Moerbeek [Fri, 28 Jan 2022 07:19:50 +0000 (08:19 +0100)]
Fix the remaining test cases: our parser does not like a known type followed by a generic blob
Otto Moerbeek [Fri, 21 Jan 2022 13:21:59 +0000 (14:21 +0100)]
Add pdnsutil script and do not ignore *.sh
Otto Moerbeek [Fri, 21 Jan 2022 12:46:23 +0000 (13:46 +0100)]
No colors blasting to terminal; create logs dir
Otto Moerbeek [Fri, 21 Jan 2022 12:41:57 +0000 (13:41 +0100)]
Mark as succeeding. pdnsutil does not validate RRSIGs
Otto Moerbeek [Fri, 21 Jan 2022 12:41:08 +0000 (13:41 +0100)]
Mark as failing: we do not handle mixed TTLs
Otto Moerbeek [Fri, 21 Jan 2022 12:39:42 +0000 (13:39 +0100)]
MArk as failing, unknown record type SIG
Otto Moerbeek [Fri, 28 Jan 2022 06:30:02 +0000 (07:30 +0100)]
typo
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Peter van Dijk [Thu, 27 Jan 2022 13:37:48 +0000 (14:37 +0100)]
Merge pull request #11242 from Habbie/dnsdist-upgrade-docs-1.7.1-dockercaps
dnsdist upgrade guide: move docker note to 1.7.1
Peter van Dijk [Thu, 27 Jan 2022 13:31:52 +0000 (14:31 +0100)]
Merge pull request #11241 from Habbie/lmdb-uuid
auth lmdb: add a UUID to newly created databases
Peter van Dijk [Thu, 27 Jan 2022 13:03:54 +0000 (14:03 +0100)]
dnsdist upgrade guide: move docker note to 1.7.1
Peter van Dijk [Wed, 26 Jan 2022 12:24:25 +0000 (13:24 +0100)]
auth lmdb: add a UUID to newly created databases
Otto Moerbeek [Wed, 26 Jan 2022 11:55:36 +0000 (12:55 +0100)]
Elaborate on TCP and OOO
Fixes the rec part of #11238
Otto Moerbeek [Wed, 26 Jan 2022 09:32:08 +0000 (10:32 +0100)]
If no supported algo was found, we still can have ZONEMD records
This fixes:
Jan 26 09:57:19 msg="No ZONEMD record, but NSEC(3) record does not deny it" subsystem="ztc" level=0 ts="
1643187439 .807" zone="."
Peter van Dijk [Tue, 25 Jan 2022 10:40:04 +0000 (11:40 +0100)]
auth docs: fix rendering
Peter van Dijk [Tue, 25 Jan 2022 10:15:27 +0000 (11:15 +0100)]
Merge pull request #11232 from Habbie/auth-4.6.0-docs-secpoll
auth-4.6.0: secpoll&docs
Peter van Dijk [Tue, 25 Jan 2022 09:37:25 +0000 (10:37 +0100)]
auth-4.6.0: secpoll&docs
Otto Moerbeek [Tue, 25 Jan 2022 07:55:01 +0000 (08:55 +0100)]
Tweaks and typos
Otto Moerbeek [Tue, 25 Jan 2022 07:25:20 +0000 (08:25 +0100)]
Apply suggestions from code review
Co-authored-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
Peter van Dijk [Mon, 24 Jan 2022 21:02:33 +0000 (22:02 +0100)]
Merge pull request #11231 from Habbie/ci-socat
auth: install test deps during unit tests, so we get socat
Peter van Dijk [Mon, 24 Jan 2022 16:19:21 +0000 (17:19 +0100)]
auth: install test deps during unit tests, so we get socat
Otto Moerbeek [Mon, 24 Jan 2022 16:00:41 +0000 (17:00 +0100)]
Init two bools, as they may be used uninitialized if parsing fails
Otto Moerbeek [Mon, 24 Jan 2022 15:27:22 +0000 (16:27 +0100)]
Improved storage of nsec3 info and a few tweaks
Otto Moerbeek [Mon, 24 Jan 2022 12:44:05 +0000 (13:44 +0100)]
Process review comments: check pointer conversions, unify record processing plus assorted small fixes
Otto Moerbeek [Mon, 24 Jan 2022 12:18:17 +0000 (13:18 +0100)]
Process denial of ZONEMD in the NSEC3 case
Otto Moerbeek [Mon, 24 Jan 2022 10:32:19 +0000 (11:32 +0100)]
Docs and small tweaks
Otto Moerbeek [Mon, 24 Jan 2022 09:19:51 +0000 (10:19 +0100)]
If we do not find ZONEMD record(s) and the zone is DNSSEC validated, validate the denial of existence of ZONEMD
Otto Moerbeek [Mon, 24 Jan 2022 07:40:00 +0000 (08:40 +0100)]
Rename config keywords to be more consistent and add ZONEMD to ZoneToCache unit tests
Remi Gacogne [Fri, 21 Jan 2022 13:42:18 +0000 (14:42 +0100)]
rec: The NSEC3 ancestor check must be done against the original owner name
Remi Gacogne [Fri, 21 Jan 2022 12:15:54 +0000 (13:15 +0100)]
rec: Reject non-apex NSEC(3)s that have both the NS and SOA bits set
Ancestor NSEC(3)s have the SOA bit clear (delegation), and the remaining
non-apex ones should not have the NS set.
Otto Moerbeek [Fri, 21 Jan 2022 12:04:19 +0000 (13:04 +0100)]
Import of https://github.com/verisign/zonemd-test-cases
Otto Moerbeek [Fri, 21 Jan 2022 10:11:15 +0000 (11:11 +0100)]
Proper ZTC state maintainance on Lua config change
Otto Moerbeek [Wed, 19 Jan 2022 14:07:57 +0000 (15:07 +0100)]
Rework config to be better understandable: two separate config values for zonemd and zonemdDNSSEC validation,
both having values: "ignore", "process", "required"
Otto Moerbeek [Wed, 19 Jan 2022 12:34:09 +0000 (13:34 +0100)]
Move ZoneToCache from a separate thread to the handler, so that we can resolve e.g. DS records.
Config and logic of ZoneMD wrt DNSSEC is too complex, needs more thought.
Otto Moerbeek [Tue, 18 Jan 2022 11:36:42 +0000 (12:36 +0100)]
Add Lua config and do DNSSEC validation of ZONEMD record
Missing:
- TA/NTA/DS processing (we assume it's in the record cache for the moment)
- Valdition of of absense of ZONEMD records by proof of non-existence
- Details of processing of DNSSEC validation result (depending on config)
Solving the first part likely involes running the zone-to-cache tasks in a recursorThread
context.
Otto Moerbeek [Tue, 18 Jan 2022 10:12:16 +0000 (11:12 +0100)]
Add ZONEMD config processing in Lua config
Otto Moerbeek [Tue, 18 Jan 2022 09:25:53 +0000 (10:25 +0100)]
Factor out ZONEMD procesing of single DNSRecord, saves having to save a vector of them