]>
git.ipfire.org Git - thirdparty/pdns.git/log
Peter van Dijk [Tue, 11 Aug 2020 13:24:37 +0000 (15:24 +0200)]
clarify quoting/escaping upgrade note, thanks @jsoref
Peter van Dijk [Fri, 17 Apr 2020 13:24:56 +0000 (15:24 +0200)]
quote/escape PG connection parameters
Peter van Dijk [Thu, 24 Sep 2020 08:27:11 +0000 (10:27 +0200)]
Merge pull request #9427 from mind04/pdns-2136-metadata
auth: improve metadata caching
Peter van Dijk [Thu, 24 Sep 2020 07:46:25 +0000 (09:46 +0200)]
Merge pull request #9517 from jsoref/spelling
Spelling
Remi Gacogne [Thu, 24 Sep 2020 07:28:04 +0000 (09:28 +0200)]
Merge pull request #9495 from rgacogne/rec-rearm-after-ooor-timeout
rec: Watch the descriptor again after an out-of-order read timeout
Remi Gacogne [Thu, 24 Sep 2020 07:26:56 +0000 (09:26 +0200)]
Merge pull request #9504 from rgacogne/rec-time-constness
rec: Better const-ness when dealing with timestamps
Remi Gacogne [Thu, 24 Sep 2020 07:26:46 +0000 (09:26 +0200)]
Merge pull request #9505 from rgacogne/rec-unused-sign-tags
rec: Remove unused vector of tags in validateDNSKeysAgainstDS()
Remi Gacogne [Thu, 24 Sep 2020 07:21:47 +0000 (09:21 +0200)]
Merge pull request #9513 from rgacogne/ddist-fix-parse-edns-options
dnsdist: Fix getEDNSOptions() for {AN,NS}COUNT != 0 and ARCOUNT = 0
Remi Gacogne [Wed, 23 Sep 2020 12:02:21 +0000 (14:02 +0200)]
Merge pull request #9510 from azadi/dnsdist-prioritize-chacha
dnsdist: prioritize ChaCha20-Poly1305 when client does
Sukhbir Singh [Tue, 22 Sep 2020 14:52:00 +0000 (10:52 -0400)]
dnsdist: prioritize ChaCha20-Poly1305 when client does
The OpenSSL option SSL_OP_PRIORITIZE_CHACHA prioritizes
ChaCha20-Poly1305 if the client does by temporarily re-prioritizing it
to the top of the server cipher list. Since dnsdist already sets
SSL_OP_CIPHER_SERVER_PREFERENCE by default (preferServerCiphers is set
to true), setting this option enables clients that prefer ChaCha20 due
to a lack of AES-NI (such as mobile devices) to override the server
specified list. This option requires SSL_OP_CIPHER_SERVER_PREFERENCE to
be set and was introduced in OpenSSL 1.1.1.
Note that this change neither affects clients that prefer AES or other
ciphers, nor dnsdist's default options, unless the client explicitly
prioritizes ChaCha20.
Remi Gacogne [Wed, 23 Sep 2020 08:31:36 +0000 (10:31 +0200)]
rec: Fix a typo in a comment
Co-authored-by: Otto Moerbeek <otto.moerbeek@open-xchange.com>
Remi Gacogne [Wed, 23 Sep 2020 08:29:26 +0000 (10:29 +0200)]
More DTime cleanups, as suggested by Otto during review
Remi Gacogne [Wed, 23 Sep 2020 08:02:15 +0000 (10:02 +0200)]
dnsdist: Fix getEDNSOptions() for {AN,NS}COUNT != 0 and ARCOUNT = 0
Since 1.5.0, calling getEDNSOptions() from Lua would result in a
ServFail for queries that had no records in additional but at least
one record in either the answer or authority section, such as a
NOTIFY, because of a bug in parseEDNSOptions(). That last function
incorrectly called slowParseEDNSOptions() in that case, triggering
an exception to be raised because slowParseEDNSOptions() does not
expect to be called for a packet with no record in the additional
section.
parseEDNSOptions() now returns `false` for packets that have no
record in the additional section.
Remi Gacogne [Wed, 23 Sep 2020 07:05:55 +0000 (09:05 +0200)]
Merge pull request #9509 from franklouwers/master
Point to reserved values for setProxyProtocolValues() + funky quotes replacements
aerique [Tue, 22 Sep 2020 21:32:08 +0000 (23:32 +0200)]
Merge pull request #9512 from Habbie/repofiles-ubuntu-focal
generate-repo-files: various updates
Peter van Dijk [Tue, 22 Sep 2020 20:26:32 +0000 (22:26 +0200)]
Merge pull request #9488 from rgacogne/lmdb-safe-views
Sync string_view definition in lmdb-safe
Peter van Dijk [Tue, 22 Sep 2020 19:30:45 +0000 (21:30 +0200)]
generate-repo-files: remove all ubuntu trusty
Peter van Dijk [Tue, 22 Sep 2020 19:28:48 +0000 (21:28 +0200)]
generate-repo-files: remove all debian jessie
Peter van Dijk [Tue, 22 Sep 2020 19:09:32 +0000 (21:09 +0200)]
generate-repo-files: add auth-43 and dnsdist-15 ubuntu focal
Peter van Dijk [Tue, 22 Sep 2020 18:55:07 +0000 (20:55 +0200)]
doc typo, thanks @jsoref
Peter van Dijk [Tue, 22 Sep 2020 18:44:40 +0000 (20:44 +0200)]
Merge pull request #9511 from Habbie/auth-advisories-2020
auth 22 sept 2020: advisories, changelogs, docs
Peter van Dijk [Thu, 3 Sep 2020 13:46:51 +0000 (15:46 +0200)]
auth 22 sept 2020: advisories, changelogs, docs
Otto Moerbeek [Tue, 22 Sep 2020 16:16:49 +0000 (18:16 +0200)]
Merge pull request #9490 from omoerbeek/rec-coverity-check-fd
rec: Check return value of dup(2) as noted by coverity.
Frank Louwers [Tue, 22 Sep 2020 15:18:41 +0000 (17:18 +0200)]
Point to reserved values for setProxyProtocolValues() + funky quotes
replacements
Otto Moerbeek [Tue, 22 Sep 2020 12:17:41 +0000 (14:17 +0200)]
Merge pull request #9494 from omoerbeek/rec-incomplete-ifdef
rec: incomplete ifdef
Remi Gacogne [Tue, 22 Sep 2020 10:02:30 +0000 (12:02 +0200)]
rec: Remove unused vector of tags in validateDNSKeysAgainstDS()
Remi Gacogne [Tue, 22 Sep 2020 09:58:09 +0000 (11:58 +0200)]
rec: Better const-ness when dealing with timestamps
Otto Moerbeek [Mon, 21 Sep 2020 08:22:55 +0000 (10:22 +0200)]
Check return value of dup(2) as noted by coverity.
Peter van Dijk [Tue, 22 Sep 2020 08:39:57 +0000 (10:39 +0200)]
Merge pull request #9497 from Habbie/unknown-record-invalid-hex
auth: raise an exception on invalid content in unknown records
Otto Moerbeek [Mon, 21 Sep 2020 16:01:59 +0000 (18:01 +0200)]
Merge pull request #9493 from omoerbeek/rec-log-rec_control
Log the line received fomr rec_control
Remi Gacogne [Mon, 21 Sep 2020 15:24:55 +0000 (17:24 +0200)]
rec: Watch the descriptor again after an out-of-order read timeout
It might be that there was no other incoming query on that connection
and we timed out while the response had not been sent yet, but the
client might want to re-use the connection after receving the response.
We try to reset the TTD, but that might fail when the socket descriptor
has already been removed.
Otto Moerbeek [Mon, 21 Sep 2020 15:01:50 +0000 (17:01 +0200)]
Merge pull request #9492 from omoerbeek/rec-detach-snmp-thread
rec: Detach snmp thread to avoid trouble when trying to quit nicely.
Otto Moerbeek [Mon, 21 Sep 2020 14:32:57 +0000 (16:32 +0200)]
Merge pull request #9491 from omoerbeek/rec-fix-wipe-cache-typed
rec: Fix rec_control wipe-cache-typed
Otto Moerbeek [Mon, 21 Sep 2020 13:34:12 +0000 (15:34 +0200)]
Incomplete ifdef
Otto Moerbeek [Mon, 21 Sep 2020 13:22:08 +0000 (15:22 +0200)]
Detach snmp thread to avoid trouble when trying to quit nicely.
This avoids a case where the thread object and the RecursorSNMPAgent
object get destroyed in the wrong order.
Otto Moerbeek [Mon, 21 Sep 2020 13:20:35 +0000 (15:20 +0200)]
Log the line received fomr rec_control
This can be handy to see what commands were issued to the recursor
when reviewing logs.
aerique [Mon, 21 Sep 2020 12:41:11 +0000 (14:41 +0200)]
Merge pull request #9481 from omoerbeek/rec-prep-4.4.0-rc1
rec: prep for rec-4.4.0-rc1
Otto Moerbeek [Mon, 21 Sep 2020 12:37:36 +0000 (14:37 +0200)]
Fix rec_control wipe-cache-typed (likely a merge error)
Peter van Dijk [Mon, 21 Sep 2020 11:31:05 +0000 (13:31 +0200)]
Merge pull request #9478 from mind04/pdns-fixme400
Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding
Remi Gacogne [Mon, 21 Sep 2020 08:50:43 +0000 (10:50 +0200)]
We don't use string_view::at() in lmdb-safe
Remi Gacogne [Mon, 21 Sep 2020 08:49:16 +0000 (10:49 +0200)]
Switch to the pdns_string_view alias to prevent collisions
Remi Gacogne [Mon, 21 Sep 2020 07:11:07 +0000 (09:11 +0200)]
Sync string_view definition in lmdb-safe
While we do not actually care about string_view::at() in lmdb-safe,
we need to keep the two in sync so the type aliases do not collide.
Perhaps we should consider using pdns_string_view as an alias instead?
bert hubert [Sun, 20 Sep 2020 19:31:43 +0000 (21:31 +0200)]
Merge pull request #9487 from PowerDNS/pdnsutil-ipdecrypt-typo
Update pdnsutil.cc ipencrypt/ipdecrypt typo
bert hubert [Sun, 20 Sep 2020 17:41:09 +0000 (19:41 +0200)]
Update pdnsutil.cc
Peter van Dijk [Sat, 19 Sep 2020 17:07:21 +0000 (19:07 +0200)]
Merge pull request #9486 from phonedph1/patch-25
Update dnsdist-console.cc
phonedph1 [Sat, 19 Sep 2020 16:13:21 +0000 (10:13 -0600)]
Update dnsdist-console.cc
Otto Moerbeek [Fri, 18 Sep 2020 11:19:43 +0000 (13:19 +0200)]
Merge pull request #9482 from omoerbeek/rec-docs-rst-warnings
rec: Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 11:19:24 +0000 (13:19 +0200)]
Merge pull request #9479 from rgacogne/fix-views
Fix our string_view usage on older distributions
Otto Moerbeek [Fri, 18 Sep 2020 10:51:44 +0000 (12:51 +0200)]
Merge pull request #9475 from omoerbeek/rec-shared-negcache
Rec: shared and sharded negcache
Otto Moerbeek [Fri, 18 Sep 2020 10:51:16 +0000 (12:51 +0200)]
Merge pull request #9477 from pieterlexis/dnstap-needs-protobuf
dnsdist, rec: dnstap requires protobuf
Otto Moerbeek [Fri, 18 Sep 2020 09:14:57 +0000 (11:14 +0200)]
Prep for rec-4.4.0-rc1
Otto Moerbeek [Fri, 18 Sep 2020 09:21:55 +0000 (11:21 +0200)]
Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 08:45:50 +0000 (10:45 +0200)]
rename s_RC and s_negcache to g_recCache and g_negCache to make
clear they are global
Remi Gacogne [Fri, 18 Sep 2020 08:30:54 +0000 (10:30 +0200)]
dnsdist: views.hh should be a symbolic link to one in the pdns/ directory
Otto Moerbeek [Fri, 18 Sep 2020 08:04:22 +0000 (10:04 +0200)]
Apply suggestions from code review
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Remi Gacogne [Fri, 18 Sep 2020 07:42:04 +0000 (09:42 +0200)]
Fix our string_view usage on older distributions
- boost::string_ref requires Boost >= 1.53.0, which we don't have
in EL6, fall back to a plain std::string (alloc + copy) there ;
- boost::string_view::at() is broken for modern compilers before
1.64.0, so let's use boost::string_ref instead in that case.
Peter van Dijk [Thu, 17 Sep 2020 13:50:56 +0000 (15:50 +0200)]
Merge pull request #9385 from rgacogne/rip-out-gss
auth: Remove GSS/TSIG support
Remi Gacogne [Thu, 17 Sep 2020 12:22:21 +0000 (14:22 +0200)]
Merge pull request #8993 from rgacogne/packetcache-cookies
Skip EDNS Cookies in the packet cache
Remi Gacogne [Thu, 17 Sep 2020 12:21:39 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:21:32 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:20:14 +0000 (14:20 +0200)]
Merge pull request #8969 from rgacogne/systemd-more-sandboxing
Use more of systemd's sandboxing options when available
Pieter Lexis [Thu, 17 Sep 2020 08:05:53 +0000 (10:05 +0200)]
Update m4/pdns_check_dnstap.m4
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Pieter Lexis [Thu, 17 Sep 2020 07:53:33 +0000 (09:53 +0200)]
dnsdist, rec: dnstap requires protobuf
Fail the configure when protobuf is disabled or not found but dnstap was
enabled.
Kees Monshouwer [Mon, 14 Sep 2020 21:56:44 +0000 (23:56 +0200)]
Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding
- LMDB backend was not handling out of zone additionals well.
- doAdditionalProcessingAndDropAA() was wasting backend queries for out of zone records.
- Remove the 'do-ipv6-additional-processing' setting, processing is now always on.
- Some cleanup in zone2sql.
Otto Moerbeek [Wed, 16 Sep 2020 09:44:59 +0000 (11:44 +0200)]
Introduce an invalidate() method instead of assigning directly
Remi Gacogne [Wed, 16 Sep 2020 09:01:33 +0000 (11:01 +0200)]
Merge pull request #9471 from rgacogne/rec-log-missing-negindic
rec: Log when going Bogus because of a missing SOA in authority
Otto Moerbeek [Tue, 15 Sep 2020 14:29:35 +0000 (16:29 +0200)]
Nasty interaction between security-poll and shared negcache:
if security pool is run, in the RPZ test we have a neg entry for .com
which makes the TTL of the NXDOMAIN unexpected.
Remi Gacogne [Tue, 15 Sep 2020 13:03:34 +0000 (15:03 +0200)]
rec: Log when going Bogus because of a missing SOA in authority
A missing SOA in the authority section of negative (NXDOMAIN, NODATA)
answers in a DNSSEC-secure zone currently leads to a Bogus result,
because the needed NSEC/NSEC3 could not be validated.
Otto Moerbeek [Tue, 15 Sep 2020 11:23:51 +0000 (13:23 +0200)]
Reformat
Otto Moerbeek [Tue, 15 Sep 2020 11:21:09 +0000 (13:21 +0200)]
Include <mutex>; constify a few methods
Otto Moerbeek [Tue, 15 Sep 2020 10:17:49 +0000 (12:17 +0200)]
Shared & sharded NegCache
Peter van Dijk [Mon, 14 Sep 2020 18:59:46 +0000 (20:59 +0200)]
Merge pull request #9403 from jsoref/gemfile-ruby-crash
xenial: fix ruby crash
Peter van Dijk [Mon, 14 Sep 2020 18:58:34 +0000 (20:58 +0200)]
Merge pull request #9437 from jsoref/issue-9436
Add pdnsutil to see also for pdns_control
Peter van Dijk [Mon, 14 Sep 2020 18:58:01 +0000 (20:58 +0200)]
Merge pull request #9466 from Habbie/dnsdist-dnsname-toraw
dnsdist dnsname: add toDNSString convenience function
Peter van Dijk [Mon, 14 Sep 2020 18:57:51 +0000 (20:57 +0200)]
Merge pull request #9469 from rgacogne/dnsbulk-rnd
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
Remi Gacogne [Mon, 14 Sep 2020 14:56:58 +0000 (16:56 +0200)]
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
They are required to use dns_random(), which is used by our DNS
packet generation code.
Peter van Dijk [Mon, 14 Sep 2020 14:03:42 +0000 (16:03 +0200)]
Merge pull request #9461 from franklouwers/master
Add youtube and duckduckgo
Peter van Dijk [Mon, 14 Sep 2020 12:24:14 +0000 (14:24 +0200)]
dnsdist dnsname: add toDNSString convenience function
Otto Moerbeek [Mon, 14 Sep 2020 12:09:10 +0000 (14:09 +0200)]
Merge pull request #9448 from omoerbeek/qname-min-vs-forward
rec: We only want to do QName Minimization for the names in a forwarded domain.
Peter van Dijk [Mon, 14 Sep 2020 10:43:35 +0000 (12:43 +0200)]
Merge pull request #9463 from spirillen/patch-1
Small rewrite of `addMasks(dofile`
spirillen [Mon, 14 Sep 2020 09:45:26 +0000 (11:45 +0200)]
Update pdns/recursordist/docs/lua-scripting/netmask.rst
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
spirillen [Mon, 14 Sep 2020 09:41:10 +0000 (11:41 +0200)]
Small rewrite of `addMasks(dofile`
I have made this little rewrite to avoid other from pit falling into the same mistake I made myself, and read the existent code as a list of IP's inside `bad.ips`, and not a script returning pre-formatted IPs.
Otto Moerbeek [Mon, 14 Sep 2020 09:30:42 +0000 (11:30 +0200)]
Use boost::optional to pass optional cutoff point. This way the
proper cutoff point can be specified for forwarded zones only,
making it possible to change it meaning witjout regular nameserver
lookups.
Otto Moerbeek [Mon, 14 Sep 2020 08:56:40 +0000 (10:56 +0200)]
Make code more clear by eliminating the "ancestor" as suggested by @rgacogne
Otto Moerbeek [Fri, 11 Sep 2020 08:06:24 +0000 (10:06 +0200)]
If we're looking in the cache for NS for a forwarded name, we
can cut off the search at the forwarding domain.
I'm not sure if I like the added complexity...
Otto Moerbeek [Fri, 11 Sep 2020 06:32:55 +0000 (08:32 +0200)]
Merge pull request #9462 from phonedph1/patch-24
Update comboaddress.rst
phonedph1 [Fri, 11 Sep 2020 02:33:55 +0000 (20:33 -0600)]
Update comboaddress.rst
Frank Louwers [Thu, 10 Sep 2020 12:10:59 +0000 (14:10 +0200)]
add www.duckduckgo
Frank Louwers [Thu, 10 Sep 2020 11:31:04 +0000 (13:31 +0200)]
Add youtube and duckduckgo
Otto Moerbeek [Wed, 9 Sep 2020 13:13:39 +0000 (15:13 +0200)]
Merge pull request #9454 from omoerbeek/rec-clear-parts
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Wed, 9 Sep 2020 13:11:26 +0000 (15:11 +0200)]
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Tue, 8 Sep 2020 09:59:32 +0000 (11:59 +0200)]
Take into account a potentially more specific NS we might
have in cache.
Also, do the forward lookup only once before the loop.
Otto Moerbeek [Tue, 8 Sep 2020 08:13:23 +0000 (10:13 +0200)]
Merge pull request #9447 from omoerbeek/rec-prep-4.3.4
rec: Changelog and secpoll rec-4.3.4
Otto Moerbeek [Mon, 7 Sep 2020 10:17:30 +0000 (12:17 +0200)]
We only want to do QName Minimization for the names in a forwarded
domain.
E.g. if foo.bar.com is forwarded and the qname is x.foo.bar.com,
start the QM process with ancestor foo.bar.com, so the query is
directed to the forwarder. But if the qname is baz.bar.com, we do
regular QM, starting with the regular ancestor.
Should fix #9438 without breaking having forward for .
Otto Moerbeek [Mon, 7 Sep 2020 07:39:10 +0000 (09:39 +0200)]
Prep rec-4.3.4
Remi Gacogne [Mon, 7 Sep 2020 07:19:55 +0000 (09:19 +0200)]
Merge pull request #9446 from pieterlexis/gcc10-fix
Fix building remote backend on GCC 10
Pieter Lexis [Fri, 4 Sep 2020 15:20:15 +0000 (17:20 +0200)]
Fix building remote backend on GCC 10
Otto Moerbeek [Fri, 4 Sep 2020 09:53:07 +0000 (11:53 +0200)]
Merge pull request #9434 from omoerbeek/rec-forward-who-is-auth-for-ds
rec: When deciding if we are auth in the local auth or forwarding case, DS is special
Remi Gacogne [Fri, 4 Sep 2020 09:35:24 +0000 (11:35 +0200)]
Merge pull request #9445 from Habbie/docs-tcprule
dnsdist docs: TCPRule argument is not optional
Peter van Dijk [Fri, 4 Sep 2020 09:31:59 +0000 (11:31 +0200)]
dnsdist docs: TCPRule argument is not optional