]>
git.ipfire.org Git - thirdparty/pdns.git/log
Sukhbir Singh [Tue, 22 Sep 2020 14:52:00 +0000 (10:52 -0400)]
dnsdist: prioritize ChaCha20-Poly1305 when client does
The OpenSSL option SSL_OP_PRIORITIZE_CHACHA prioritizes
ChaCha20-Poly1305 if the client does by temporarily re-prioritizing it
to the top of the server cipher list. Since dnsdist already sets
SSL_OP_CIPHER_SERVER_PREFERENCE by default (preferServerCiphers is set
to true), setting this option enables clients that prefer ChaCha20 due
to a lack of AES-NI (such as mobile devices) to override the server
specified list. This option requires SSL_OP_CIPHER_SERVER_PREFERENCE to
be set and was introduced in OpenSSL 1.1.1.
Note that this change neither affects clients that prefer AES or other
ciphers, nor dnsdist's default options, unless the client explicitly
prioritizes ChaCha20.
Remi Gacogne [Wed, 23 Sep 2020 07:05:55 +0000 (09:05 +0200)]
Merge pull request #9509 from franklouwers/master
Point to reserved values for setProxyProtocolValues() + funky quotes replacements
aerique [Tue, 22 Sep 2020 21:32:08 +0000 (23:32 +0200)]
Merge pull request #9512 from Habbie/repofiles-ubuntu-focal
generate-repo-files: various updates
Peter van Dijk [Tue, 22 Sep 2020 20:26:32 +0000 (22:26 +0200)]
Merge pull request #9488 from rgacogne/lmdb-safe-views
Sync string_view definition in lmdb-safe
Peter van Dijk [Tue, 22 Sep 2020 19:30:45 +0000 (21:30 +0200)]
generate-repo-files: remove all ubuntu trusty
Peter van Dijk [Tue, 22 Sep 2020 19:28:48 +0000 (21:28 +0200)]
generate-repo-files: remove all debian jessie
Peter van Dijk [Tue, 22 Sep 2020 19:09:32 +0000 (21:09 +0200)]
generate-repo-files: add auth-43 and dnsdist-15 ubuntu focal
Peter van Dijk [Tue, 22 Sep 2020 18:55:07 +0000 (20:55 +0200)]
doc typo, thanks @jsoref
Peter van Dijk [Tue, 22 Sep 2020 18:44:40 +0000 (20:44 +0200)]
Merge pull request #9511 from Habbie/auth-advisories-2020
auth 22 sept 2020: advisories, changelogs, docs
Peter van Dijk [Thu, 3 Sep 2020 13:46:51 +0000 (15:46 +0200)]
auth 22 sept 2020: advisories, changelogs, docs
Otto Moerbeek [Tue, 22 Sep 2020 16:16:49 +0000 (18:16 +0200)]
Merge pull request #9490 from omoerbeek/rec-coverity-check-fd
rec: Check return value of dup(2) as noted by coverity.
Frank Louwers [Tue, 22 Sep 2020 15:18:41 +0000 (17:18 +0200)]
Point to reserved values for setProxyProtocolValues() + funky quotes
replacements
Otto Moerbeek [Tue, 22 Sep 2020 12:17:41 +0000 (14:17 +0200)]
Merge pull request #9494 from omoerbeek/rec-incomplete-ifdef
rec: incomplete ifdef
Otto Moerbeek [Mon, 21 Sep 2020 08:22:55 +0000 (10:22 +0200)]
Check return value of dup(2) as noted by coverity.
Peter van Dijk [Tue, 22 Sep 2020 08:39:57 +0000 (10:39 +0200)]
Merge pull request #9497 from Habbie/unknown-record-invalid-hex
auth: raise an exception on invalid content in unknown records
Otto Moerbeek [Mon, 21 Sep 2020 16:01:59 +0000 (18:01 +0200)]
Merge pull request #9493 from omoerbeek/rec-log-rec_control
Log the line received fomr rec_control
Otto Moerbeek [Mon, 21 Sep 2020 15:01:50 +0000 (17:01 +0200)]
Merge pull request #9492 from omoerbeek/rec-detach-snmp-thread
rec: Detach snmp thread to avoid trouble when trying to quit nicely.
Otto Moerbeek [Mon, 21 Sep 2020 14:32:57 +0000 (16:32 +0200)]
Merge pull request #9491 from omoerbeek/rec-fix-wipe-cache-typed
rec: Fix rec_control wipe-cache-typed
Otto Moerbeek [Mon, 21 Sep 2020 13:34:12 +0000 (15:34 +0200)]
Incomplete ifdef
Otto Moerbeek [Mon, 21 Sep 2020 13:22:08 +0000 (15:22 +0200)]
Detach snmp thread to avoid trouble when trying to quit nicely.
This avoids a case where the thread object and the RecursorSNMPAgent
object get destroyed in the wrong order.
Otto Moerbeek [Mon, 21 Sep 2020 13:20:35 +0000 (15:20 +0200)]
Log the line received fomr rec_control
This can be handy to see what commands were issued to the recursor
when reviewing logs.
aerique [Mon, 21 Sep 2020 12:41:11 +0000 (14:41 +0200)]
Merge pull request #9481 from omoerbeek/rec-prep-4.4.0-rc1
rec: prep for rec-4.4.0-rc1
Otto Moerbeek [Mon, 21 Sep 2020 12:37:36 +0000 (14:37 +0200)]
Fix rec_control wipe-cache-typed (likely a merge error)
Peter van Dijk [Mon, 21 Sep 2020 11:31:05 +0000 (13:31 +0200)]
Merge pull request #9478 from mind04/pdns-fixme400
Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding
Remi Gacogne [Mon, 21 Sep 2020 08:50:43 +0000 (10:50 +0200)]
We don't use string_view::at() in lmdb-safe
Remi Gacogne [Mon, 21 Sep 2020 08:49:16 +0000 (10:49 +0200)]
Switch to the pdns_string_view alias to prevent collisions
Remi Gacogne [Mon, 21 Sep 2020 07:11:07 +0000 (09:11 +0200)]
Sync string_view definition in lmdb-safe
While we do not actually care about string_view::at() in lmdb-safe,
we need to keep the two in sync so the type aliases do not collide.
Perhaps we should consider using pdns_string_view as an alias instead?
bert hubert [Sun, 20 Sep 2020 19:31:43 +0000 (21:31 +0200)]
Merge pull request #9487 from PowerDNS/pdnsutil-ipdecrypt-typo
Update pdnsutil.cc ipencrypt/ipdecrypt typo
bert hubert [Sun, 20 Sep 2020 17:41:09 +0000 (19:41 +0200)]
Update pdnsutil.cc
Peter van Dijk [Sat, 19 Sep 2020 17:07:21 +0000 (19:07 +0200)]
Merge pull request #9486 from phonedph1/patch-25
Update dnsdist-console.cc
phonedph1 [Sat, 19 Sep 2020 16:13:21 +0000 (10:13 -0600)]
Update dnsdist-console.cc
Otto Moerbeek [Fri, 18 Sep 2020 11:19:43 +0000 (13:19 +0200)]
Merge pull request #9482 from omoerbeek/rec-docs-rst-warnings
rec: Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 11:19:24 +0000 (13:19 +0200)]
Merge pull request #9479 from rgacogne/fix-views
Fix our string_view usage on older distributions
Otto Moerbeek [Fri, 18 Sep 2020 10:51:44 +0000 (12:51 +0200)]
Merge pull request #9475 from omoerbeek/rec-shared-negcache
Rec: shared and sharded negcache
Otto Moerbeek [Fri, 18 Sep 2020 10:51:16 +0000 (12:51 +0200)]
Merge pull request #9477 from pieterlexis/dnstap-needs-protobuf
dnsdist, rec: dnstap requires protobuf
Otto Moerbeek [Fri, 18 Sep 2020 09:14:57 +0000 (11:14 +0200)]
Prep for rec-4.4.0-rc1
Otto Moerbeek [Fri, 18 Sep 2020 09:21:55 +0000 (11:21 +0200)]
Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 08:45:50 +0000 (10:45 +0200)]
rename s_RC and s_negcache to g_recCache and g_negCache to make
clear they are global
Remi Gacogne [Fri, 18 Sep 2020 08:30:54 +0000 (10:30 +0200)]
dnsdist: views.hh should be a symbolic link to one in the pdns/ directory
Otto Moerbeek [Fri, 18 Sep 2020 08:04:22 +0000 (10:04 +0200)]
Apply suggestions from code review
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Remi Gacogne [Fri, 18 Sep 2020 07:42:04 +0000 (09:42 +0200)]
Fix our string_view usage on older distributions
- boost::string_ref requires Boost >= 1.53.0, which we don't have
in EL6, fall back to a plain std::string (alloc + copy) there ;
- boost::string_view::at() is broken for modern compilers before
1.64.0, so let's use boost::string_ref instead in that case.
Peter van Dijk [Thu, 17 Sep 2020 13:50:56 +0000 (15:50 +0200)]
Merge pull request #9385 from rgacogne/rip-out-gss
auth: Remove GSS/TSIG support
Remi Gacogne [Thu, 17 Sep 2020 12:22:21 +0000 (14:22 +0200)]
Merge pull request #8993 from rgacogne/packetcache-cookies
Skip EDNS Cookies in the packet cache
Remi Gacogne [Thu, 17 Sep 2020 12:21:39 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:21:32 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:20:14 +0000 (14:20 +0200)]
Merge pull request #8969 from rgacogne/systemd-more-sandboxing
Use more of systemd's sandboxing options when available
Pieter Lexis [Thu, 17 Sep 2020 08:05:53 +0000 (10:05 +0200)]
Update m4/pdns_check_dnstap.m4
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Pieter Lexis [Thu, 17 Sep 2020 07:53:33 +0000 (09:53 +0200)]
dnsdist, rec: dnstap requires protobuf
Fail the configure when protobuf is disabled or not found but dnstap was
enabled.
Kees Monshouwer [Mon, 14 Sep 2020 21:56:44 +0000 (23:56 +0200)]
Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding
- LMDB backend was not handling out of zone additionals well.
- doAdditionalProcessingAndDropAA() was wasting backend queries for out of zone records.
- Remove the 'do-ipv6-additional-processing' setting, processing is now always on.
- Some cleanup in zone2sql.
Otto Moerbeek [Wed, 16 Sep 2020 09:44:59 +0000 (11:44 +0200)]
Introduce an invalidate() method instead of assigning directly
Remi Gacogne [Wed, 16 Sep 2020 09:01:33 +0000 (11:01 +0200)]
Merge pull request #9471 from rgacogne/rec-log-missing-negindic
rec: Log when going Bogus because of a missing SOA in authority
Otto Moerbeek [Tue, 15 Sep 2020 14:29:35 +0000 (16:29 +0200)]
Nasty interaction between security-poll and shared negcache:
if security pool is run, in the RPZ test we have a neg entry for .com
which makes the TTL of the NXDOMAIN unexpected.
Remi Gacogne [Tue, 15 Sep 2020 13:03:34 +0000 (15:03 +0200)]
rec: Log when going Bogus because of a missing SOA in authority
A missing SOA in the authority section of negative (NXDOMAIN, NODATA)
answers in a DNSSEC-secure zone currently leads to a Bogus result,
because the needed NSEC/NSEC3 could not be validated.
Otto Moerbeek [Tue, 15 Sep 2020 11:23:51 +0000 (13:23 +0200)]
Reformat
Otto Moerbeek [Tue, 15 Sep 2020 11:21:09 +0000 (13:21 +0200)]
Include <mutex>; constify a few methods
Otto Moerbeek [Tue, 15 Sep 2020 10:17:49 +0000 (12:17 +0200)]
Shared & sharded NegCache
Peter van Dijk [Mon, 14 Sep 2020 18:59:46 +0000 (20:59 +0200)]
Merge pull request #9403 from jsoref/gemfile-ruby-crash
xenial: fix ruby crash
Peter van Dijk [Mon, 14 Sep 2020 18:58:34 +0000 (20:58 +0200)]
Merge pull request #9437 from jsoref/issue-9436
Add pdnsutil to see also for pdns_control
Peter van Dijk [Mon, 14 Sep 2020 18:58:01 +0000 (20:58 +0200)]
Merge pull request #9466 from Habbie/dnsdist-dnsname-toraw
dnsdist dnsname: add toDNSString convenience function
Peter van Dijk [Mon, 14 Sep 2020 18:57:51 +0000 (20:57 +0200)]
Merge pull request #9469 from rgacogne/dnsbulk-rnd
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
Remi Gacogne [Mon, 14 Sep 2020 14:56:58 +0000 (16:56 +0200)]
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
They are required to use dns_random(), which is used by our DNS
packet generation code.
Peter van Dijk [Mon, 14 Sep 2020 14:03:42 +0000 (16:03 +0200)]
Merge pull request #9461 from franklouwers/master
Add youtube and duckduckgo
Peter van Dijk [Mon, 14 Sep 2020 12:24:14 +0000 (14:24 +0200)]
dnsdist dnsname: add toDNSString convenience function
Otto Moerbeek [Mon, 14 Sep 2020 12:09:10 +0000 (14:09 +0200)]
Merge pull request #9448 from omoerbeek/qname-min-vs-forward
rec: We only want to do QName Minimization for the names in a forwarded domain.
Peter van Dijk [Mon, 14 Sep 2020 10:43:35 +0000 (12:43 +0200)]
Merge pull request #9463 from spirillen/patch-1
Small rewrite of `addMasks(dofile`
spirillen [Mon, 14 Sep 2020 09:45:26 +0000 (11:45 +0200)]
Update pdns/recursordist/docs/lua-scripting/netmask.rst
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
spirillen [Mon, 14 Sep 2020 09:41:10 +0000 (11:41 +0200)]
Small rewrite of `addMasks(dofile`
I have made this little rewrite to avoid other from pit falling into the same mistake I made myself, and read the existent code as a list of IP's inside `bad.ips`, and not a script returning pre-formatted IPs.
Otto Moerbeek [Mon, 14 Sep 2020 09:30:42 +0000 (11:30 +0200)]
Use boost::optional to pass optional cutoff point. This way the
proper cutoff point can be specified for forwarded zones only,
making it possible to change it meaning witjout regular nameserver
lookups.
Otto Moerbeek [Mon, 14 Sep 2020 08:56:40 +0000 (10:56 +0200)]
Make code more clear by eliminating the "ancestor" as suggested by @rgacogne
Otto Moerbeek [Fri, 11 Sep 2020 08:06:24 +0000 (10:06 +0200)]
If we're looking in the cache for NS for a forwarded name, we
can cut off the search at the forwarding domain.
I'm not sure if I like the added complexity...
Otto Moerbeek [Fri, 11 Sep 2020 06:32:55 +0000 (08:32 +0200)]
Merge pull request #9462 from phonedph1/patch-24
Update comboaddress.rst
phonedph1 [Fri, 11 Sep 2020 02:33:55 +0000 (20:33 -0600)]
Update comboaddress.rst
Frank Louwers [Thu, 10 Sep 2020 12:10:59 +0000 (14:10 +0200)]
add www.duckduckgo
Frank Louwers [Thu, 10 Sep 2020 11:31:04 +0000 (13:31 +0200)]
Add youtube and duckduckgo
Otto Moerbeek [Wed, 9 Sep 2020 13:13:39 +0000 (15:13 +0200)]
Merge pull request #9454 from omoerbeek/rec-clear-parts
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Wed, 9 Sep 2020 13:11:26 +0000 (15:11 +0200)]
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Tue, 8 Sep 2020 09:59:32 +0000 (11:59 +0200)]
Take into account a potentially more specific NS we might
have in cache.
Also, do the forward lookup only once before the loop.
Otto Moerbeek [Tue, 8 Sep 2020 08:13:23 +0000 (10:13 +0200)]
Merge pull request #9447 from omoerbeek/rec-prep-4.3.4
rec: Changelog and secpoll rec-4.3.4
Otto Moerbeek [Mon, 7 Sep 2020 10:17:30 +0000 (12:17 +0200)]
We only want to do QName Minimization for the names in a forwarded
domain.
E.g. if foo.bar.com is forwarded and the qname is x.foo.bar.com,
start the QM process with ancestor foo.bar.com, so the query is
directed to the forwarder. But if the qname is baz.bar.com, we do
regular QM, starting with the regular ancestor.
Should fix #9438 without breaking having forward for .
Otto Moerbeek [Mon, 7 Sep 2020 07:39:10 +0000 (09:39 +0200)]
Prep rec-4.3.4
Remi Gacogne [Mon, 7 Sep 2020 07:19:55 +0000 (09:19 +0200)]
Merge pull request #9446 from pieterlexis/gcc10-fix
Fix building remote backend on GCC 10
Pieter Lexis [Fri, 4 Sep 2020 15:20:15 +0000 (17:20 +0200)]
Fix building remote backend on GCC 10
Otto Moerbeek [Fri, 4 Sep 2020 09:53:07 +0000 (11:53 +0200)]
Merge pull request #9434 from omoerbeek/rec-forward-who-is-auth-for-ds
rec: When deciding if we are auth in the local auth or forwarding case, DS is special
Remi Gacogne [Fri, 4 Sep 2020 09:35:24 +0000 (11:35 +0200)]
Merge pull request #9445 from Habbie/docs-tcprule
dnsdist docs: TCPRule argument is not optional
Peter van Dijk [Fri, 4 Sep 2020 09:31:59 +0000 (11:31 +0200)]
dnsdist docs: TCPRule argument is not optional
Otto Moerbeek [Fri, 4 Sep 2020 09:13:17 +0000 (11:13 +0200)]
Fix test
Peter van Dijk [Fri, 4 Sep 2020 08:07:52 +0000 (10:07 +0200)]
Merge pull request #9387 from zeha/notify-level
auth slave: log successful NOTIFY
Peter van Dijk [Fri, 4 Sep 2020 08:01:52 +0000 (10:01 +0200)]
Merge pull request #9442 from zeha/doxyconfig
Update doxygen config
Remi Gacogne [Fri, 4 Sep 2020 06:09:37 +0000 (08:09 +0200)]
Merge pull request #9439 from rgacogne/auth-fix-geoip-sample-config
auth: Fix the sample 'geoip.conf' for Debian-based packages
Remi Gacogne [Fri, 4 Sep 2020 06:08:06 +0000 (08:08 +0200)]
auth: Use https://doc.powerdns.com instead of https://docs.powerdns.com
Remi Gacogne [Fri, 4 Sep 2020 06:05:07 +0000 (08:05 +0200)]
Merge pull request #9441 from Habbie/rec-docs-dns64-multiprefix
rec docs: link to multi-prefix dns64 example on our wiki
Chris Hofstaedtler [Thu, 3 Sep 2020 16:19:00 +0000 (18:19 +0200)]
Update doxygen config
Peter van Dijk [Thu, 3 Sep 2020 12:19:37 +0000 (14:19 +0200)]
rec docs: link to multi-prefix dns64 example on our wiki
Remi Gacogne [Thu, 3 Sep 2020 08:27:01 +0000 (10:27 +0200)]
auth: Fix the sample 'geoip.conf' for Debian-based packages
- The documentation of the backend has moved to a new URL ;
- 'geoip-database-file' has been renamed to 'geoip-database-files' ;
- 'geoip-database-file6' does not exist anymore.
Josh Soref [Thu, 3 Sep 2020 04:50:19 +0000 (00:50 -0400)]
Add pdnsutil to see also for pdns_control
Otto Moerbeek [Wed, 2 Sep 2020 13:57:40 +0000 (15:57 +0200)]
Test for the reported issue wrt doing an spurious DS queries
I'm trying to setup a valid a.test and b.test, using a non-recursive forward
but somehow my DNSSEC setup is not right. Cannot spot the issue atm.
Otto Moerbeek [Wed, 2 Sep 2020 12:03:44 +0000 (14:03 +0200)]
When deciding if we are auth in the local auth or forwarding case,
for DS records we need to look at the parent of the particular name.
Seems to fix #9433
Remi Gacogne [Wed, 2 Sep 2020 08:09:52 +0000 (10:09 +0200)]
Merge pull request #9175 from rgacogne/ddist-per-thread-lb-pol
dnsdist: Add per-thread Lua FFI load-balancing policies
Chris Hofstaedtler [Mon, 17 Aug 2020 13:14:24 +0000 (15:14 +0200)]
auth slave: log successful NOTIFY
Remi Gacogne [Mon, 10 Aug 2020 09:37:37 +0000 (11:37 +0200)]
dnsdist: Whitelist "luaffiroundrobin"