]>
git.ipfire.org Git - thirdparty/pdns.git/log
phonedph1 [Sat, 19 Sep 2020 16:13:21 +0000 (10:13 -0600)]
Update dnsdist-console.cc
Otto Moerbeek [Fri, 18 Sep 2020 11:19:43 +0000 (13:19 +0200)]
Merge pull request #9482 from omoerbeek/rec-docs-rst-warnings
rec: Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 11:19:24 +0000 (13:19 +0200)]
Merge pull request #9479 from rgacogne/fix-views
Fix our string_view usage on older distributions
Otto Moerbeek [Fri, 18 Sep 2020 10:51:44 +0000 (12:51 +0200)]
Merge pull request #9475 from omoerbeek/rec-shared-negcache
Rec: shared and sharded negcache
Otto Moerbeek [Fri, 18 Sep 2020 10:51:16 +0000 (12:51 +0200)]
Merge pull request #9477 from pieterlexis/dnstap-needs-protobuf
dnsdist, rec: dnstap requires protobuf
Otto Moerbeek [Fri, 18 Sep 2020 09:21:55 +0000 (11:21 +0200)]
Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 08:45:50 +0000 (10:45 +0200)]
rename s_RC and s_negcache to g_recCache and g_negCache to make
clear they are global
Remi Gacogne [Fri, 18 Sep 2020 08:30:54 +0000 (10:30 +0200)]
dnsdist: views.hh should be a symbolic link to one in the pdns/ directory
Otto Moerbeek [Fri, 18 Sep 2020 08:04:22 +0000 (10:04 +0200)]
Apply suggestions from code review
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Remi Gacogne [Fri, 18 Sep 2020 07:42:04 +0000 (09:42 +0200)]
Fix our string_view usage on older distributions
- boost::string_ref requires Boost >= 1.53.0, which we don't have
in EL6, fall back to a plain std::string (alloc + copy) there ;
- boost::string_view::at() is broken for modern compilers before
1.64.0, so let's use boost::string_ref instead in that case.
Peter van Dijk [Thu, 17 Sep 2020 13:50:56 +0000 (15:50 +0200)]
Merge pull request #9385 from rgacogne/rip-out-gss
auth: Remove GSS/TSIG support
Remi Gacogne [Thu, 17 Sep 2020 12:22:21 +0000 (14:22 +0200)]
Merge pull request #8993 from rgacogne/packetcache-cookies
Skip EDNS Cookies in the packet cache
Remi Gacogne [Thu, 17 Sep 2020 12:21:39 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:21:32 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:20:14 +0000 (14:20 +0200)]
Merge pull request #8969 from rgacogne/systemd-more-sandboxing
Use more of systemd's sandboxing options when available
Pieter Lexis [Thu, 17 Sep 2020 08:05:53 +0000 (10:05 +0200)]
Update m4/pdns_check_dnstap.m4
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Pieter Lexis [Thu, 17 Sep 2020 07:53:33 +0000 (09:53 +0200)]
dnsdist, rec: dnstap requires protobuf
Fail the configure when protobuf is disabled or not found but dnstap was
enabled.
Otto Moerbeek [Wed, 16 Sep 2020 09:44:59 +0000 (11:44 +0200)]
Introduce an invalidate() method instead of assigning directly
Remi Gacogne [Wed, 16 Sep 2020 09:01:33 +0000 (11:01 +0200)]
Merge pull request #9471 from rgacogne/rec-log-missing-negindic
rec: Log when going Bogus because of a missing SOA in authority
Otto Moerbeek [Tue, 15 Sep 2020 14:29:35 +0000 (16:29 +0200)]
Nasty interaction between security-poll and shared negcache:
if security pool is run, in the RPZ test we have a neg entry for .com
which makes the TTL of the NXDOMAIN unexpected.
Remi Gacogne [Tue, 15 Sep 2020 13:03:34 +0000 (15:03 +0200)]
rec: Log when going Bogus because of a missing SOA in authority
A missing SOA in the authority section of negative (NXDOMAIN, NODATA)
answers in a DNSSEC-secure zone currently leads to a Bogus result,
because the needed NSEC/NSEC3 could not be validated.
Otto Moerbeek [Tue, 15 Sep 2020 11:23:51 +0000 (13:23 +0200)]
Reformat
Otto Moerbeek [Tue, 15 Sep 2020 11:21:09 +0000 (13:21 +0200)]
Include <mutex>; constify a few methods
Otto Moerbeek [Tue, 15 Sep 2020 10:17:49 +0000 (12:17 +0200)]
Shared & sharded NegCache
Peter van Dijk [Mon, 14 Sep 2020 18:59:46 +0000 (20:59 +0200)]
Merge pull request #9403 from jsoref/gemfile-ruby-crash
xenial: fix ruby crash
Peter van Dijk [Mon, 14 Sep 2020 18:58:34 +0000 (20:58 +0200)]
Merge pull request #9437 from jsoref/issue-9436
Add pdnsutil to see also for pdns_control
Peter van Dijk [Mon, 14 Sep 2020 18:58:01 +0000 (20:58 +0200)]
Merge pull request #9466 from Habbie/dnsdist-dnsname-toraw
dnsdist dnsname: add toDNSString convenience function
Peter van Dijk [Mon, 14 Sep 2020 18:57:51 +0000 (20:57 +0200)]
Merge pull request #9469 from rgacogne/dnsbulk-rnd
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
Remi Gacogne [Mon, 14 Sep 2020 14:56:58 +0000 (16:56 +0200)]
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
They are required to use dns_random(), which is used by our DNS
packet generation code.
Peter van Dijk [Mon, 14 Sep 2020 14:03:42 +0000 (16:03 +0200)]
Merge pull request #9461 from franklouwers/master
Add youtube and duckduckgo
Peter van Dijk [Mon, 14 Sep 2020 12:24:14 +0000 (14:24 +0200)]
dnsdist dnsname: add toDNSString convenience function
Otto Moerbeek [Mon, 14 Sep 2020 12:09:10 +0000 (14:09 +0200)]
Merge pull request #9448 from omoerbeek/qname-min-vs-forward
rec: We only want to do QName Minimization for the names in a forwarded domain.
Peter van Dijk [Mon, 14 Sep 2020 10:43:35 +0000 (12:43 +0200)]
Merge pull request #9463 from spirillen/patch-1
Small rewrite of `addMasks(dofile`
spirillen [Mon, 14 Sep 2020 09:45:26 +0000 (11:45 +0200)]
Update pdns/recursordist/docs/lua-scripting/netmask.rst
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
spirillen [Mon, 14 Sep 2020 09:41:10 +0000 (11:41 +0200)]
Small rewrite of `addMasks(dofile`
I have made this little rewrite to avoid other from pit falling into the same mistake I made myself, and read the existent code as a list of IP's inside `bad.ips`, and not a script returning pre-formatted IPs.
Otto Moerbeek [Mon, 14 Sep 2020 09:30:42 +0000 (11:30 +0200)]
Use boost::optional to pass optional cutoff point. This way the
proper cutoff point can be specified for forwarded zones only,
making it possible to change it meaning witjout regular nameserver
lookups.
Otto Moerbeek [Mon, 14 Sep 2020 08:56:40 +0000 (10:56 +0200)]
Make code more clear by eliminating the "ancestor" as suggested by @rgacogne
Otto Moerbeek [Fri, 11 Sep 2020 08:06:24 +0000 (10:06 +0200)]
If we're looking in the cache for NS for a forwarded name, we
can cut off the search at the forwarding domain.
I'm not sure if I like the added complexity...
Otto Moerbeek [Fri, 11 Sep 2020 06:32:55 +0000 (08:32 +0200)]
Merge pull request #9462 from phonedph1/patch-24
Update comboaddress.rst
phonedph1 [Fri, 11 Sep 2020 02:33:55 +0000 (20:33 -0600)]
Update comboaddress.rst
Frank Louwers [Thu, 10 Sep 2020 12:10:59 +0000 (14:10 +0200)]
add www.duckduckgo
Frank Louwers [Thu, 10 Sep 2020 11:31:04 +0000 (13:31 +0200)]
Add youtube and duckduckgo
Otto Moerbeek [Wed, 9 Sep 2020 13:13:39 +0000 (15:13 +0200)]
Merge pull request #9454 from omoerbeek/rec-clear-parts
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Wed, 9 Sep 2020 13:11:26 +0000 (15:11 +0200)]
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Tue, 8 Sep 2020 09:59:32 +0000 (11:59 +0200)]
Take into account a potentially more specific NS we might
have in cache.
Also, do the forward lookup only once before the loop.
Otto Moerbeek [Tue, 8 Sep 2020 08:13:23 +0000 (10:13 +0200)]
Merge pull request #9447 from omoerbeek/rec-prep-4.3.4
rec: Changelog and secpoll rec-4.3.4
Otto Moerbeek [Mon, 7 Sep 2020 10:17:30 +0000 (12:17 +0200)]
We only want to do QName Minimization for the names in a forwarded
domain.
E.g. if foo.bar.com is forwarded and the qname is x.foo.bar.com,
start the QM process with ancestor foo.bar.com, so the query is
directed to the forwarder. But if the qname is baz.bar.com, we do
regular QM, starting with the regular ancestor.
Should fix #9438 without breaking having forward for .
Otto Moerbeek [Mon, 7 Sep 2020 07:39:10 +0000 (09:39 +0200)]
Prep rec-4.3.4
Remi Gacogne [Mon, 7 Sep 2020 07:19:55 +0000 (09:19 +0200)]
Merge pull request #9446 from pieterlexis/gcc10-fix
Fix building remote backend on GCC 10
Pieter Lexis [Fri, 4 Sep 2020 15:20:15 +0000 (17:20 +0200)]
Fix building remote backend on GCC 10
Otto Moerbeek [Fri, 4 Sep 2020 09:53:07 +0000 (11:53 +0200)]
Merge pull request #9434 from omoerbeek/rec-forward-who-is-auth-for-ds
rec: When deciding if we are auth in the local auth or forwarding case, DS is special
Remi Gacogne [Fri, 4 Sep 2020 09:35:24 +0000 (11:35 +0200)]
Merge pull request #9445 from Habbie/docs-tcprule
dnsdist docs: TCPRule argument is not optional
Peter van Dijk [Fri, 4 Sep 2020 09:31:59 +0000 (11:31 +0200)]
dnsdist docs: TCPRule argument is not optional
Otto Moerbeek [Fri, 4 Sep 2020 09:13:17 +0000 (11:13 +0200)]
Fix test
Peter van Dijk [Fri, 4 Sep 2020 08:07:52 +0000 (10:07 +0200)]
Merge pull request #9387 from zeha/notify-level
auth slave: log successful NOTIFY
Peter van Dijk [Fri, 4 Sep 2020 08:01:52 +0000 (10:01 +0200)]
Merge pull request #9442 from zeha/doxyconfig
Update doxygen config
Remi Gacogne [Fri, 4 Sep 2020 06:09:37 +0000 (08:09 +0200)]
Merge pull request #9439 from rgacogne/auth-fix-geoip-sample-config
auth: Fix the sample 'geoip.conf' for Debian-based packages
Remi Gacogne [Fri, 4 Sep 2020 06:08:06 +0000 (08:08 +0200)]
auth: Use https://doc.powerdns.com instead of https://docs.powerdns.com
Remi Gacogne [Fri, 4 Sep 2020 06:05:07 +0000 (08:05 +0200)]
Merge pull request #9441 from Habbie/rec-docs-dns64-multiprefix
rec docs: link to multi-prefix dns64 example on our wiki
Chris Hofstaedtler [Thu, 3 Sep 2020 16:19:00 +0000 (18:19 +0200)]
Update doxygen config
Peter van Dijk [Thu, 3 Sep 2020 12:19:37 +0000 (14:19 +0200)]
rec docs: link to multi-prefix dns64 example on our wiki
Remi Gacogne [Thu, 3 Sep 2020 08:27:01 +0000 (10:27 +0200)]
auth: Fix the sample 'geoip.conf' for Debian-based packages
- The documentation of the backend has moved to a new URL ;
- 'geoip-database-file' has been renamed to 'geoip-database-files' ;
- 'geoip-database-file6' does not exist anymore.
Josh Soref [Thu, 3 Sep 2020 04:50:19 +0000 (00:50 -0400)]
Add pdnsutil to see also for pdns_control
Otto Moerbeek [Wed, 2 Sep 2020 13:57:40 +0000 (15:57 +0200)]
Test for the reported issue wrt doing an spurious DS queries
I'm trying to setup a valid a.test and b.test, using a non-recursive forward
but somehow my DNSSEC setup is not right. Cannot spot the issue atm.
Otto Moerbeek [Wed, 2 Sep 2020 12:03:44 +0000 (14:03 +0200)]
When deciding if we are auth in the local auth or forwarding case,
for DS records we need to look at the parent of the particular name.
Seems to fix #9433
Remi Gacogne [Wed, 2 Sep 2020 08:09:52 +0000 (10:09 +0200)]
Merge pull request #9175 from rgacogne/ddist-per-thread-lb-pol
dnsdist: Add per-thread Lua FFI load-balancing policies
Chris Hofstaedtler [Mon, 17 Aug 2020 13:14:24 +0000 (15:14 +0200)]
auth slave: log successful NOTIFY
Remi Gacogne [Mon, 10 Aug 2020 09:37:37 +0000 (11:37 +0200)]
dnsdist: Whitelist "luaffiroundrobin"
Remi Gacogne [Thu, 27 Aug 2020 09:00:06 +0000 (11:00 +0200)]
dnsdist: Add per-thread Lua FFI load-balancing policies
This allows Lua FFI load-balancing policies that don't need access
to the global, shared Lua state to be lock-less, avoiding lock contention.
Peter van Dijk [Tue, 1 Sep 2020 12:33:10 +0000 (14:33 +0200)]
Merge pull request #9429 from Habbie/auth-4.3.1-docs-maria
auth 4.3.1 upgrade note for the mysql client lib
Remi Gacogne [Tue, 1 Sep 2020 12:31:13 +0000 (14:31 +0200)]
Merge pull request #9430 from rgacogne/sdig-dns-message-ids
sdig: Increment the DNS message IDs when pipelining
Remi Gacogne [Tue, 1 Sep 2020 12:29:37 +0000 (14:29 +0200)]
Merge pull request #9431 from rgacogne/ddist-grepq-empty-names
dnsdist: Handle empty DNSNames in grepq()
Remi Gacogne [Wed, 8 Apr 2020 08:25:10 +0000 (10:25 +0200)]
Make conversion to uint16_t explicit, as suggested by Otto
Remi Gacogne [Thu, 2 Apr 2020 14:49:44 +0000 (16:49 +0200)]
Fix an out-of-bounds read (up to 4 bytes) in the packet cache
Detected by OSS-Fuzz. Also make sure that we don't try to parse
packets smaller than 12 bytes in the fuzzing target, those are
usually dropped earlier.
Remi Gacogne [Thu, 2 Apr 2020 12:33:01 +0000 (14:33 +0200)]
Skip EDNS Cookies in the packet cache
Remi Gacogne [Tue, 1 Sep 2020 08:14:40 +0000 (10:14 +0200)]
dnsdist: Handle empty DNSNames in grepq()
We should not get an empty DNSName into the ring buffer, but let's
handle it gracefully if it does happen so we can investigate, instead
of getting:
Caught exception: empty dnsnames aren't part of anything
Remi Gacogne [Tue, 1 Sep 2020 07:53:49 +0000 (09:53 +0200)]
sdig: Increment the DNS message IDs when pipelining
As stated in section 6.2.1 of rfc7766:
"When sending multiple queries over a TCP connection, clients MUST NOT
reuse the DNS Message ID of an in-flight query on that connection in
order to avoid Message ID collisions. This is especially important
if the server could be performing out-of-order processing"
Peter van Dijk [Tue, 1 Sep 2020 07:27:57 +0000 (09:27 +0200)]
auth 4.3.1 upgrade note for the mysql client lib
Peter van Dijk [Tue, 1 Sep 2020 06:54:32 +0000 (08:54 +0200)]
Merge pull request #9402 from jsoref/rst
RST cleanup
Peter van Dijk [Tue, 1 Sep 2020 06:51:03 +0000 (08:51 +0200)]
Merge pull request #9422 from zeha/mysql-sp
auth: add mysql stored procedure code test
Peter van Dijk [Tue, 1 Sep 2020 06:50:34 +0000 (08:50 +0200)]
Merge pull request #9423 from rgacogne/mysql-stored-procedures
auth: Handle the extra single-row result set of MySQL stored procedures
Remi Gacogne [Mon, 31 Aug 2020 14:17:55 +0000 (16:17 +0200)]
Merge pull request #9428 from pieterlexis/ddist-accept-string-cache-expungeByName
dnsdist: Accept string in DNSDistPacketCache:expungeByName
Remi Gacogne [Mon, 31 Aug 2020 14:13:14 +0000 (16:13 +0200)]
Merge pull request #9420 from rgacogne/ddist-pc-no-allocs
dnsdist: Get rid of allocations in the packet cache's fast path
Remi Gacogne [Mon, 31 Aug 2020 14:12:50 +0000 (16:12 +0200)]
Merge pull request #9424 from rgacogne/to-dnsstring-copy
Avoid unnecessary allocations and copies with DNSName::toDNSString()
Pieter Lexis [Mon, 31 Aug 2020 12:44:19 +0000 (14:44 +0200)]
dnsdist: Accept string in DNSDistPacketCache:expungeByName
Chris Hofstaedtler [Sat, 29 Aug 2020 23:55:44 +0000 (01:55 +0200)]
auth: add test for gmysql with stored procedures
Otto Moerbeek [Mon, 31 Aug 2020 12:07:38 +0000 (14:07 +0200)]
Merge pull request #9425 from omoerbeek/rec-prep-4.4.0-beta1
Prep for rec-4.4.0-beta1 release
Remi Gacogne [Mon, 31 Aug 2020 11:10:50 +0000 (13:10 +0200)]
Merge pull request #9426 from rgacogne/ddist-install-patch
dnsdist: Install 'patch' in Circle CI, required to install py-lmdb
Remi Gacogne [Mon, 31 Aug 2020 10:04:42 +0000 (12:04 +0200)]
dnsdist: Install 'patch', required to install py-lmdb
Remi Gacogne [Mon, 31 Aug 2020 10:00:11 +0000 (12:00 +0200)]
Use a size_t instead of an unsigned int in toLowerInPlace
Co-authored-by: Otto Moerbeek <otto.moerbeek@open-xchange.com>
Otto Moerbeek [Mon, 31 Aug 2020 08:44:23 +0000 (10:44 +0200)]
Prep for rec-4.4.0-beta1 release
Remi Gacogne [Mon, 31 Aug 2020 08:25:04 +0000 (10:25 +0200)]
auth: Handle the extra single-row result set of MySQL stored procedures
Remi Gacogne [Fri, 28 Aug 2020 14:28:40 +0000 (16:28 +0200)]
Avoid unnecessary allocations and copies with DNSName::toDNSString()
Otto Moerbeek [Fri, 28 Aug 2020 11:19:53 +0000 (13:19 +0200)]
Merge pull request #9376 from omoerbeek/rec-rpz-store-trigger
Rec: rpz store trigger in appliedPolicy and protobuf message
Otto Moerbeek [Fri, 28 Aug 2020 09:36:50 +0000 (11:36 +0200)]
Add new field `AppliedPolicyHit` to regress test.
Otto Moerbeek [Fri, 28 Aug 2020 09:29:33 +0000 (11:29 +0200)]
Document new Lua dq fields and centralize logging in handle olicyHit functions.
Plus corrections from review.
Otto Moerbeek [Mon, 17 Aug 2020 12:44:42 +0000 (14:44 +0200)]
Define a log string method for a Policy and use it in appropriate places
to log what is going on wrt RPZ processing.
Otto Moerbeek [Fri, 14 Aug 2020 08:51:28 +0000 (10:51 +0200)]
Also record the value that caused a hit.
For triggers fomr rpz zones it makes sense to store them as listed there.
For hit values (names or IPs) it makes more sense to store them
in the regular string value and not list them as rpz trigger format.
e.g.: a trigger is listed
24.0.2.0.192.rpz-ip.rpz.local.
A corresponding hit as
192.0.2.1
Otto Moerbeek [Fri, 14 Aug 2020 08:24:17 +0000 (10:24 +0200)]
Use static constr string instead of string literals for some well-known names.
Otto Moerbeek [Mon, 10 Aug 2020 12:41:07 +0000 (14:41 +0200)]
Appease spell check