]>
git.ipfire.org Git - thirdparty/pdns.git/log
Peter van Dijk [Thu, 3 Sep 2020 13:46:51 +0000 (15:46 +0200)]
auth 22 sept 2020: advisories, changelogs, docs
Otto Moerbeek [Tue, 22 Sep 2020 16:16:49 +0000 (18:16 +0200)]
Merge pull request #9490 from omoerbeek/rec-coverity-check-fd
rec: Check return value of dup(2) as noted by coverity.
Otto Moerbeek [Tue, 22 Sep 2020 12:17:41 +0000 (14:17 +0200)]
Merge pull request #9494 from omoerbeek/rec-incomplete-ifdef
rec: incomplete ifdef
Otto Moerbeek [Mon, 21 Sep 2020 08:22:55 +0000 (10:22 +0200)]
Check return value of dup(2) as noted by coverity.
Peter van Dijk [Tue, 22 Sep 2020 08:39:57 +0000 (10:39 +0200)]
Merge pull request #9497 from Habbie/unknown-record-invalid-hex
auth: raise an exception on invalid content in unknown records
Otto Moerbeek [Mon, 21 Sep 2020 16:01:59 +0000 (18:01 +0200)]
Merge pull request #9493 from omoerbeek/rec-log-rec_control
Log the line received fomr rec_control
Otto Moerbeek [Mon, 21 Sep 2020 15:01:50 +0000 (17:01 +0200)]
Merge pull request #9492 from omoerbeek/rec-detach-snmp-thread
rec: Detach snmp thread to avoid trouble when trying to quit nicely.
Otto Moerbeek [Mon, 21 Sep 2020 14:32:57 +0000 (16:32 +0200)]
Merge pull request #9491 from omoerbeek/rec-fix-wipe-cache-typed
rec: Fix rec_control wipe-cache-typed
Otto Moerbeek [Mon, 21 Sep 2020 13:34:12 +0000 (15:34 +0200)]
Incomplete ifdef
Otto Moerbeek [Mon, 21 Sep 2020 13:22:08 +0000 (15:22 +0200)]
Detach snmp thread to avoid trouble when trying to quit nicely.
This avoids a case where the thread object and the RecursorSNMPAgent
object get destroyed in the wrong order.
Otto Moerbeek [Mon, 21 Sep 2020 13:20:35 +0000 (15:20 +0200)]
Log the line received fomr rec_control
This can be handy to see what commands were issued to the recursor
when reviewing logs.
aerique [Mon, 21 Sep 2020 12:41:11 +0000 (14:41 +0200)]
Merge pull request #9481 from omoerbeek/rec-prep-4.4.0-rc1
rec: prep for rec-4.4.0-rc1
Otto Moerbeek [Mon, 21 Sep 2020 12:37:36 +0000 (14:37 +0200)]
Fix rec_control wipe-cache-typed (likely a merge error)
Peter van Dijk [Mon, 21 Sep 2020 11:31:05 +0000 (13:31 +0200)]
Merge pull request #9478 from mind04/pdns-fixme400
Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding
bert hubert [Sun, 20 Sep 2020 19:31:43 +0000 (21:31 +0200)]
Merge pull request #9487 from PowerDNS/pdnsutil-ipdecrypt-typo
Update pdnsutil.cc ipencrypt/ipdecrypt typo
bert hubert [Sun, 20 Sep 2020 17:41:09 +0000 (19:41 +0200)]
Update pdnsutil.cc
Peter van Dijk [Sat, 19 Sep 2020 17:07:21 +0000 (19:07 +0200)]
Merge pull request #9486 from phonedph1/patch-25
Update dnsdist-console.cc
phonedph1 [Sat, 19 Sep 2020 16:13:21 +0000 (10:13 -0600)]
Update dnsdist-console.cc
Otto Moerbeek [Fri, 18 Sep 2020 11:19:43 +0000 (13:19 +0200)]
Merge pull request #9482 from omoerbeek/rec-docs-rst-warnings
rec: Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 11:19:24 +0000 (13:19 +0200)]
Merge pull request #9479 from rgacogne/fix-views
Fix our string_view usage on older distributions
Otto Moerbeek [Fri, 18 Sep 2020 10:51:44 +0000 (12:51 +0200)]
Merge pull request #9475 from omoerbeek/rec-shared-negcache
Rec: shared and sharded negcache
Otto Moerbeek [Fri, 18 Sep 2020 10:51:16 +0000 (12:51 +0200)]
Merge pull request #9477 from pieterlexis/dnstap-needs-protobuf
dnsdist, rec: dnstap requires protobuf
Otto Moerbeek [Fri, 18 Sep 2020 09:14:57 +0000 (11:14 +0200)]
Prep for rec-4.4.0-rc1
Otto Moerbeek [Fri, 18 Sep 2020 09:21:55 +0000 (11:21 +0200)]
Fix a few .rst warnings
Otto Moerbeek [Fri, 18 Sep 2020 08:45:50 +0000 (10:45 +0200)]
rename s_RC and s_negcache to g_recCache and g_negCache to make
clear they are global
Remi Gacogne [Fri, 18 Sep 2020 08:30:54 +0000 (10:30 +0200)]
dnsdist: views.hh should be a symbolic link to one in the pdns/ directory
Otto Moerbeek [Fri, 18 Sep 2020 08:04:22 +0000 (10:04 +0200)]
Apply suggestions from code review
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Remi Gacogne [Fri, 18 Sep 2020 07:42:04 +0000 (09:42 +0200)]
Fix our string_view usage on older distributions
- boost::string_ref requires Boost >= 1.53.0, which we don't have
in EL6, fall back to a plain std::string (alloc + copy) there ;
- boost::string_view::at() is broken for modern compilers before
1.64.0, so let's use boost::string_ref instead in that case.
Peter van Dijk [Thu, 17 Sep 2020 13:50:56 +0000 (15:50 +0200)]
Merge pull request #9385 from rgacogne/rip-out-gss
auth: Remove GSS/TSIG support
Remi Gacogne [Thu, 17 Sep 2020 12:22:21 +0000 (14:22 +0200)]
Merge pull request #8993 from rgacogne/packetcache-cookies
Skip EDNS Cookies in the packet cache
Remi Gacogne [Thu, 17 Sep 2020 12:21:39 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:21:32 +0000 (14:21 +0200)]
docs: GSS/TSIG will be removed in 4.4.0, not 4.3.1
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
Remi Gacogne [Thu, 17 Sep 2020 12:20:14 +0000 (14:20 +0200)]
Merge pull request #8969 from rgacogne/systemd-more-sandboxing
Use more of systemd's sandboxing options when available
Pieter Lexis [Thu, 17 Sep 2020 08:05:53 +0000 (10:05 +0200)]
Update m4/pdns_check_dnstap.m4
Co-authored-by: Remi Gacogne <rgacogne+github@valombre.net>
Pieter Lexis [Thu, 17 Sep 2020 07:53:33 +0000 (09:53 +0200)]
dnsdist, rec: dnstap requires protobuf
Fail the configure when protobuf is disabled or not found but dnstap was
enabled.
Kees Monshouwer [Mon, 14 Sep 2020 21:56:44 +0000 (23:56 +0200)]
Auth: remove a '// HACK FIXME400' and fix the bugs it was hiding
- LMDB backend was not handling out of zone additionals well.
- doAdditionalProcessingAndDropAA() was wasting backend queries for out of zone records.
- Remove the 'do-ipv6-additional-processing' setting, processing is now always on.
- Some cleanup in zone2sql.
Otto Moerbeek [Wed, 16 Sep 2020 09:44:59 +0000 (11:44 +0200)]
Introduce an invalidate() method instead of assigning directly
Remi Gacogne [Wed, 16 Sep 2020 09:01:33 +0000 (11:01 +0200)]
Merge pull request #9471 from rgacogne/rec-log-missing-negindic
rec: Log when going Bogus because of a missing SOA in authority
Otto Moerbeek [Tue, 15 Sep 2020 14:29:35 +0000 (16:29 +0200)]
Nasty interaction between security-poll and shared negcache:
if security pool is run, in the RPZ test we have a neg entry for .com
which makes the TTL of the NXDOMAIN unexpected.
Remi Gacogne [Tue, 15 Sep 2020 13:03:34 +0000 (15:03 +0200)]
rec: Log when going Bogus because of a missing SOA in authority
A missing SOA in the authority section of negative (NXDOMAIN, NODATA)
answers in a DNSSEC-secure zone currently leads to a Bogus result,
because the needed NSEC/NSEC3 could not be validated.
Otto Moerbeek [Tue, 15 Sep 2020 11:23:51 +0000 (13:23 +0200)]
Reformat
Otto Moerbeek [Tue, 15 Sep 2020 11:21:09 +0000 (13:21 +0200)]
Include <mutex>; constify a few methods
Otto Moerbeek [Tue, 15 Sep 2020 10:17:49 +0000 (12:17 +0200)]
Shared & sharded NegCache
Peter van Dijk [Mon, 14 Sep 2020 18:59:46 +0000 (20:59 +0200)]
Merge pull request #9403 from jsoref/gemfile-ruby-crash
xenial: fix ruby crash
Peter van Dijk [Mon, 14 Sep 2020 18:58:34 +0000 (20:58 +0200)]
Merge pull request #9437 from jsoref/issue-9436
Add pdnsutil to see also for pdns_control
Peter van Dijk [Mon, 14 Sep 2020 18:58:01 +0000 (20:58 +0200)]
Merge pull request #9466 from Habbie/dnsdist-dnsname-toraw
dnsdist dnsname: add toDNSString convenience function
Peter van Dijk [Mon, 14 Sep 2020 18:57:51 +0000 (20:57 +0200)]
Merge pull request #9469 from rgacogne/dnsbulk-rnd
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
Remi Gacogne [Mon, 14 Sep 2020 14:56:58 +0000 (16:56 +0200)]
dnsbulktest: Initialize the 'rng' and 'entropy-source' arguments
They are required to use dns_random(), which is used by our DNS
packet generation code.
Peter van Dijk [Mon, 14 Sep 2020 14:03:42 +0000 (16:03 +0200)]
Merge pull request #9461 from franklouwers/master
Add youtube and duckduckgo
Peter van Dijk [Mon, 14 Sep 2020 12:24:14 +0000 (14:24 +0200)]
dnsdist dnsname: add toDNSString convenience function
Otto Moerbeek [Mon, 14 Sep 2020 12:09:10 +0000 (14:09 +0200)]
Merge pull request #9448 from omoerbeek/qname-min-vs-forward
rec: We only want to do QName Minimization for the names in a forwarded domain.
Peter van Dijk [Mon, 14 Sep 2020 10:43:35 +0000 (12:43 +0200)]
Merge pull request #9463 from spirillen/patch-1
Small rewrite of `addMasks(dofile`
spirillen [Mon, 14 Sep 2020 09:45:26 +0000 (11:45 +0200)]
Update pdns/recursordist/docs/lua-scripting/netmask.rst
Co-authored-by: Peter van Dijk <peter.van.dijk@powerdns.com>
spirillen [Mon, 14 Sep 2020 09:41:10 +0000 (11:41 +0200)]
Small rewrite of `addMasks(dofile`
I have made this little rewrite to avoid other from pit falling into the same mistake I made myself, and read the existent code as a list of IP's inside `bad.ips`, and not a script returning pre-formatted IPs.
Otto Moerbeek [Mon, 14 Sep 2020 09:30:42 +0000 (11:30 +0200)]
Use boost::optional to pass optional cutoff point. This way the
proper cutoff point can be specified for forwarded zones only,
making it possible to change it meaning witjout regular nameserver
lookups.
Otto Moerbeek [Mon, 14 Sep 2020 08:56:40 +0000 (10:56 +0200)]
Make code more clear by eliminating the "ancestor" as suggested by @rgacogne
Otto Moerbeek [Fri, 11 Sep 2020 08:06:24 +0000 (10:06 +0200)]
If we're looking in the cache for NS for a forwarded name, we
can cut off the search at the forwarding domain.
I'm not sure if I like the added complexity...
Otto Moerbeek [Fri, 11 Sep 2020 06:32:55 +0000 (08:32 +0200)]
Merge pull request #9462 from phonedph1/patch-24
Update comboaddress.rst
phonedph1 [Fri, 11 Sep 2020 02:33:55 +0000 (20:33 -0600)]
Update comboaddress.rst
Frank Louwers [Thu, 10 Sep 2020 12:10:59 +0000 (14:10 +0200)]
add www.duckduckgo
Frank Louwers [Thu, 10 Sep 2020 11:31:04 +0000 (13:31 +0200)]
Add youtube and duckduckgo
Otto Moerbeek [Wed, 9 Sep 2020 13:13:39 +0000 (15:13 +0200)]
Merge pull request #9454 from omoerbeek/rec-clear-parts
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Wed, 9 Sep 2020 13:11:26 +0000 (15:11 +0200)]
Parts is reused, so clear the names it might contain.
Otto Moerbeek [Tue, 8 Sep 2020 09:59:32 +0000 (11:59 +0200)]
Take into account a potentially more specific NS we might
have in cache.
Also, do the forward lookup only once before the loop.
Otto Moerbeek [Tue, 8 Sep 2020 08:13:23 +0000 (10:13 +0200)]
Merge pull request #9447 from omoerbeek/rec-prep-4.3.4
rec: Changelog and secpoll rec-4.3.4
Otto Moerbeek [Mon, 7 Sep 2020 10:17:30 +0000 (12:17 +0200)]
We only want to do QName Minimization for the names in a forwarded
domain.
E.g. if foo.bar.com is forwarded and the qname is x.foo.bar.com,
start the QM process with ancestor foo.bar.com, so the query is
directed to the forwarder. But if the qname is baz.bar.com, we do
regular QM, starting with the regular ancestor.
Should fix #9438 without breaking having forward for .
Otto Moerbeek [Mon, 7 Sep 2020 07:39:10 +0000 (09:39 +0200)]
Prep rec-4.3.4
Remi Gacogne [Mon, 7 Sep 2020 07:19:55 +0000 (09:19 +0200)]
Merge pull request #9446 from pieterlexis/gcc10-fix
Fix building remote backend on GCC 10
Pieter Lexis [Fri, 4 Sep 2020 15:20:15 +0000 (17:20 +0200)]
Fix building remote backend on GCC 10
Otto Moerbeek [Fri, 4 Sep 2020 09:53:07 +0000 (11:53 +0200)]
Merge pull request #9434 from omoerbeek/rec-forward-who-is-auth-for-ds
rec: When deciding if we are auth in the local auth or forwarding case, DS is special
Remi Gacogne [Fri, 4 Sep 2020 09:35:24 +0000 (11:35 +0200)]
Merge pull request #9445 from Habbie/docs-tcprule
dnsdist docs: TCPRule argument is not optional
Peter van Dijk [Fri, 4 Sep 2020 09:31:59 +0000 (11:31 +0200)]
dnsdist docs: TCPRule argument is not optional
Otto Moerbeek [Fri, 4 Sep 2020 09:13:17 +0000 (11:13 +0200)]
Fix test
Peter van Dijk [Fri, 4 Sep 2020 08:07:52 +0000 (10:07 +0200)]
Merge pull request #9387 from zeha/notify-level
auth slave: log successful NOTIFY
Peter van Dijk [Fri, 4 Sep 2020 08:01:52 +0000 (10:01 +0200)]
Merge pull request #9442 from zeha/doxyconfig
Update doxygen config
Remi Gacogne [Fri, 4 Sep 2020 06:09:37 +0000 (08:09 +0200)]
Merge pull request #9439 from rgacogne/auth-fix-geoip-sample-config
auth: Fix the sample 'geoip.conf' for Debian-based packages
Remi Gacogne [Fri, 4 Sep 2020 06:08:06 +0000 (08:08 +0200)]
auth: Use https://doc.powerdns.com instead of https://docs.powerdns.com
Remi Gacogne [Fri, 4 Sep 2020 06:05:07 +0000 (08:05 +0200)]
Merge pull request #9441 from Habbie/rec-docs-dns64-multiprefix
rec docs: link to multi-prefix dns64 example on our wiki
Chris Hofstaedtler [Thu, 3 Sep 2020 16:19:00 +0000 (18:19 +0200)]
Update doxygen config
Peter van Dijk [Thu, 3 Sep 2020 12:19:37 +0000 (14:19 +0200)]
rec docs: link to multi-prefix dns64 example on our wiki
Remi Gacogne [Thu, 3 Sep 2020 08:27:01 +0000 (10:27 +0200)]
auth: Fix the sample 'geoip.conf' for Debian-based packages
- The documentation of the backend has moved to a new URL ;
- 'geoip-database-file' has been renamed to 'geoip-database-files' ;
- 'geoip-database-file6' does not exist anymore.
Josh Soref [Thu, 3 Sep 2020 04:50:19 +0000 (00:50 -0400)]
Add pdnsutil to see also for pdns_control
Otto Moerbeek [Wed, 2 Sep 2020 13:57:40 +0000 (15:57 +0200)]
Test for the reported issue wrt doing an spurious DS queries
I'm trying to setup a valid a.test and b.test, using a non-recursive forward
but somehow my DNSSEC setup is not right. Cannot spot the issue atm.
Otto Moerbeek [Wed, 2 Sep 2020 12:03:44 +0000 (14:03 +0200)]
When deciding if we are auth in the local auth or forwarding case,
for DS records we need to look at the parent of the particular name.
Seems to fix #9433
Remi Gacogne [Wed, 2 Sep 2020 08:09:52 +0000 (10:09 +0200)]
Merge pull request #9175 from rgacogne/ddist-per-thread-lb-pol
dnsdist: Add per-thread Lua FFI load-balancing policies
Chris Hofstaedtler [Mon, 17 Aug 2020 13:14:24 +0000 (15:14 +0200)]
auth slave: log successful NOTIFY
Remi Gacogne [Mon, 10 Aug 2020 09:37:37 +0000 (11:37 +0200)]
dnsdist: Whitelist "luaffiroundrobin"
Remi Gacogne [Thu, 27 Aug 2020 09:00:06 +0000 (11:00 +0200)]
dnsdist: Add per-thread Lua FFI load-balancing policies
This allows Lua FFI load-balancing policies that don't need access
to the global, shared Lua state to be lock-less, avoiding lock contention.
Peter van Dijk [Tue, 1 Sep 2020 12:33:10 +0000 (14:33 +0200)]
Merge pull request #9429 from Habbie/auth-4.3.1-docs-maria
auth 4.3.1 upgrade note for the mysql client lib
Remi Gacogne [Tue, 1 Sep 2020 12:31:13 +0000 (14:31 +0200)]
Merge pull request #9430 from rgacogne/sdig-dns-message-ids
sdig: Increment the DNS message IDs when pipelining
Remi Gacogne [Tue, 1 Sep 2020 12:29:37 +0000 (14:29 +0200)]
Merge pull request #9431 from rgacogne/ddist-grepq-empty-names
dnsdist: Handle empty DNSNames in grepq()
Remi Gacogne [Wed, 8 Apr 2020 08:25:10 +0000 (10:25 +0200)]
Make conversion to uint16_t explicit, as suggested by Otto
Remi Gacogne [Thu, 2 Apr 2020 14:49:44 +0000 (16:49 +0200)]
Fix an out-of-bounds read (up to 4 bytes) in the packet cache
Detected by OSS-Fuzz. Also make sure that we don't try to parse
packets smaller than 12 bytes in the fuzzing target, those are
usually dropped earlier.
Remi Gacogne [Thu, 2 Apr 2020 12:33:01 +0000 (14:33 +0200)]
Skip EDNS Cookies in the packet cache
Remi Gacogne [Tue, 1 Sep 2020 08:14:40 +0000 (10:14 +0200)]
dnsdist: Handle empty DNSNames in grepq()
We should not get an empty DNSName into the ring buffer, but let's
handle it gracefully if it does happen so we can investigate, instead
of getting:
Caught exception: empty dnsnames aren't part of anything
Remi Gacogne [Tue, 1 Sep 2020 07:53:49 +0000 (09:53 +0200)]
sdig: Increment the DNS message IDs when pipelining
As stated in section 6.2.1 of rfc7766:
"When sending multiple queries over a TCP connection, clients MUST NOT
reuse the DNS Message ID of an in-flight query on that connection in
order to avoid Message ID collisions. This is especially important
if the server could be performing out-of-order processing"
Peter van Dijk [Tue, 1 Sep 2020 07:27:57 +0000 (09:27 +0200)]
auth 4.3.1 upgrade note for the mysql client lib
Peter van Dijk [Tue, 1 Sep 2020 06:54:32 +0000 (08:54 +0200)]
Merge pull request #9402 from jsoref/rst
RST cleanup
Peter van Dijk [Tue, 1 Sep 2020 06:51:03 +0000 (08:51 +0200)]
Merge pull request #9422 from zeha/mysql-sp
auth: add mysql stored procedure code test
Peter van Dijk [Tue, 1 Sep 2020 06:50:34 +0000 (08:50 +0200)]
Merge pull request #9423 from rgacogne/mysql-stored-procedures
auth: Handle the extra single-row result set of MySQL stored procedures