]>
git.ipfire.org Git - thirdparty/unbound.git/log
tcarpay [Mon, 15 Nov 2021 14:14:51 +0000 (15:14 +0100)]
Merge pull request #563 from NLnetLabs/bugfix/general-edns-options3
Better positioning of general EDNS option handling: revisited V2
Tom Carpay [Mon, 15 Nov 2021 14:00:31 +0000 (14:00 +0000)]
Clarify KEEPALIVE EDNS0 option operation
Tom Carpay [Mon, 15 Nov 2021 13:40:51 +0000 (13:40 +0000)]
Make explicit whether edns options are parsed from queries or responses
Tom Carpay [Mon, 15 Nov 2021 12:33:08 +0000 (12:33 +0000)]
add missing return code
tcarpay [Mon, 15 Nov 2021 12:03:26 +0000 (13:03 +0100)]
Remove wrongly added EDE comments
Co-authored-by: Wouter Wijngaards <wcawijngaards@users.noreply.github.com>
Dimitris Apostolou [Sat, 13 Nov 2021 14:56:15 +0000 (16:56 +0200)]
Fix typos
JINMEI Tatuya [Mon, 8 Nov 2021 21:39:13 +0000 (13:39 -0800)]
add keep-cache option to unbound-control reload to keep caches
tcarpay [Mon, 8 Nov 2021 11:28:03 +0000 (12:28 +0100)]
Update util/data/msgparse.c
Co-authored-by: gthess <george@nlnetlabs.nl>
TCY16 [Mon, 8 Nov 2021 10:50:57 +0000 (11:50 +0100)]
add potential EDE spots
TCY16 [Mon, 8 Nov 2021 10:50:29 +0000 (11:50 +0100)]
complete renaming of the modules edns list
tcarpay [Mon, 8 Nov 2021 10:02:54 +0000 (11:02 +0100)]
Apply suggestions from code review
Co-authored-by: Willem Toorop <willem@nlnetlabs.nl>
W.C.A. Wijngaards [Fri, 5 Nov 2021 12:22:27 +0000 (13:22 +0100)]
Changelog note for #565
- Merge #565: unbound.service.in: Disable ProtectKernelTunables again.
Wouter Wijngaards [Fri, 5 Nov 2021 12:21:00 +0000 (13:21 +0100)]
Merge pull request #565 from Maryse47/patch-1
unbound.service.in: Disable ProtectKernelTunables again
W.C.A. Wijngaards [Fri, 5 Nov 2021 11:13:38 +0000 (12:13 +0100)]
- Fix to remove unused code from rpz resolve client and action
function.
W.C.A. Wijngaards [Fri, 5 Nov 2021 11:02:50 +0000 (12:02 +0100)]
- Fix analyzer review failure in rpz action override code to not
crash on unlocking the local zone lock.
George Thessalonikefs [Fri, 5 Nov 2021 10:21:30 +0000 (11:21 +0100)]
- Fix for #558: clear the UB_EV_TIMEOUT bit before adding an event.
George Thessalonikefs [Fri, 5 Nov 2021 10:15:19 +0000 (11:15 +0100)]
- Fix for #558: fix loop in comm_point->tcp_free when a comm_point is reclaimed
more than once during callbacks.
W.C.A. Wijngaards [Fri, 5 Nov 2021 09:16:27 +0000 (10:16 +0100)]
- Fix that forward-zone name is documented as the full name of the
zone. It is not relative but a fully qualified domain name.
Maryse47 [Wed, 3 Nov 2021 13:05:11 +0000 (13:05 +0000)]
Disable ProtectKernelTunables again
This option was removed in https://github.com/NLnetLabs/unbound/commit/
ff8fd0be5c529e7a1b84e8c74426e9c531c0a8f8 but reintroduced in https://github.com/NLnetLabs/unbound/commit/
c32b9e4ba95983146eac805719db720f02a64358
Disable it with commentary in hope to prevent slipping it in again.
W.C.A. Wijngaards [Tue, 2 Nov 2021 15:45:02 +0000 (16:45 +0100)]
- Fix #552: Unbound assumes index.html exists on RPZ host.
Willem Toorop [Mon, 1 Nov 2021 20:06:07 +0000 (21:06 +0100)]
Reset keepalive per new tcp session
Tom Carpay [Mon, 1 Nov 2021 15:01:07 +0000 (15:01 +0000)]
Fix keepalive logic
Tom Carpay [Mon, 1 Nov 2021 13:48:31 +0000 (13:48 +0000)]
Move option handling to parse-time
Tom Carpay [Mon, 1 Nov 2021 12:48:40 +0000 (12:48 +0000)]
split edns_data.opt_list in opt_list_in and opt_list_out
opt_list_in for parsed (incoming) edns options, and
opt_list_out for outgoing (to be encoded) edns options
Tom Carpay [Mon, 1 Nov 2021 10:44:55 +0000 (10:44 +0000)]
Remove apply_edns_options from worker and mesh...
to be returned in message encoding later...
Tom Carpay [Wed, 27 Oct 2021 14:01:56 +0000 (14:01 +0000)]
Outgoing module options go to opt_list_modules_out
And opt_list_modules_out is reset in case of failure
BEWARE! No options from modules will be encoded in the responses now!
Tom Carpay [Wed, 27 Oct 2021 13:48:49 +0000 (13:48 +0000)]
Modules have their own outgoing ends options list
But nothing happens with it yet
Florian Obser [Sun, 24 Oct 2021 13:55:17 +0000 (15:55 +0200)]
Allow interface names as scope-id in IPv6 link-local addresses.
For example, this makes
forward-zone:
name: "."
forward-addr: fe80::20d:b9ff:fe46:c7f4%vio0
forward-first: yes
work instead of fe80::20d:b9ff:fe46:c7f4%1.
W.C.A. Wijngaards [Mon, 11 Oct 2021 15:23:30 +0000 (17:23 +0200)]
- Fix to protect custom regional create against small values.
W.C.A. Wijngaards [Mon, 11 Oct 2021 15:00:20 +0000 (17:00 +0200)]
- Fix chaos replies to have truncation for short message lengths,
or long reply strings.
W.C.A. Wijngaards [Mon, 4 Oct 2021 07:19:27 +0000 (09:19 +0200)]
- Fix to add example.conf note for outbound-msg-retry.
W.C.A. Wijngaards [Mon, 27 Sep 2021 13:09:01 +0000 (15:09 +0200)]
- Implement RFC8375: Special-Use Domain 'home.arpa.'.
W.C.A. Wijngaards [Tue, 21 Sep 2021 12:34:56 +0000 (14:34 +0200)]
- Fix crosscompile script for the shared build flags.
W.C.A. Wijngaards [Tue, 21 Sep 2021 11:51:34 +0000 (13:51 +0200)]
- Fix crosscompile windows to use libssp when it exists.
- For the windows compile script disable gost.
- Fix that on windows, use BIO_set_callback_ex instead of deprecated
W.C.A. Wijngaards [Tue, 21 Sep 2021 07:23:38 +0000 (09:23 +0200)]
- Fix crosscompile shell syntax.
W.C.A. Wijngaards [Tue, 21 Sep 2021 07:20:56 +0000 (09:20 +0200)]
- For crosscompile on windows, detect 64bit stackprotector library.
W.C.A. Wijngaards [Mon, 20 Sep 2021 15:52:34 +0000 (17:52 +0200)]
- Fix crosscompile on windows to work with openssl 3.0.0 the
link with ws2_32 needs -l:libssp.a for __strcpy_chk.
Also copy results from lib64 directory if needed.
W.C.A. Wijngaards [Fri, 10 Sep 2021 13:27:05 +0000 (15:27 +0200)]
- Fix more initialisation errors reported by gcc sanitizer.
W.C.A. Wijngaards [Fri, 10 Sep 2021 13:11:30 +0000 (15:11 +0200)]
- Fix lock debug code for gcc sanitizer reports.
W.C.A. Wijngaards [Fri, 10 Sep 2021 12:30:57 +0000 (14:30 +0200)]
- Fix initialisation errors reported by gcc sanitizer.
W.C.A. Wijngaards [Wed, 8 Sep 2021 15:26:30 +0000 (17:26 +0200)]
- Fix root_anchor test to check with new icannbundle date.
W.C.A. Wijngaards [Wed, 8 Sep 2021 13:07:11 +0000 (15:07 +0200)]
- Fix for #41: change outbound retry to int to fix signed comparison
warnings.
W.C.A. Wijngaards [Wed, 8 Sep 2021 12:52:56 +0000 (14:52 +0200)]
- Small fixes for #41: changelog, conflicts resolved,
processQueryResponse takes an iterator env argument like other
functions in the iterator, no colon in string for set_option,
and some whitespace style, to make it similar to the rest.
W.C.A. Wijngaards [Wed, 8 Sep 2021 12:38:58 +0000 (14:38 +0200)]
Merge branch 'countsudoku-feature/configure-outbound_msg_retry'
W.C.A. Wijngaards [Wed, 8 Sep 2021 12:38:36 +0000 (14:38 +0200)]
Merge branch 'feature/configure-outbound_msg_retry' of git://github.com/countsudoku/unbound into countsudoku-feature/configure-outbound_msg_retry
W.C.A. Wijngaards [Fri, 3 Sep 2021 14:41:21 +0000 (16:41 +0200)]
Changelog entry for #538
- Fix #538: Fix subnetcache statistics.
Wouter Wijngaards [Fri, 3 Sep 2021 14:41:07 +0000 (16:41 +0200)]
Merge pull request #538 from tduboys/fix_subnetcache_statistics
Fix subnetcache statistics
Thomas du Boÿs [Fri, 3 Sep 2021 07:59:15 +0000 (09:59 +0200)]
Fix subnetcache statistics
W.C.A. Wijngaards [Wed, 1 Sep 2021 14:21:10 +0000 (16:21 +0200)]
- Fix tcp fastopen failure when disabled, try normal connect instead.
W.C.A. Wijngaards [Fri, 27 Aug 2021 08:33:21 +0000 (10:33 +0200)]
- Fix #533: Negative responses get cached even when setting
cache-max-negative-ttl: 1
W.C.A. Wijngaards [Wed, 25 Aug 2021 14:19:12 +0000 (16:19 +0200)]
- Fix asynclook unit test for setup of lockchecks before log.
W.C.A. Wijngaards [Wed, 25 Aug 2021 12:51:59 +0000 (14:51 +0200)]
- Fix compile warning in libunbound for listen desetup routine.
W.C.A. Wijngaards [Wed, 25 Aug 2021 12:18:29 +0000 (14:18 +0200)]
- Fix RPZ locks. Do not unlock zones lock if requested and rpz find
zone does not find the zone. Readlock the clientip that is found
for ipbased triggers. Unlock the nsdname zone lock when done.
Unlock zone and ip in rpz nsip and nsdname callback. Unlock
authzone and localzone if clientip found in rpz worker call.
W.C.A. Wijngaards [Wed, 25 Aug 2021 11:37:50 +0000 (13:37 +0200)]
- Fix the stream wait stream_wait_count_lock and http2 buffer locks
setup and desetup from race condition.
W.C.A. Wijngaards [Wed, 25 Aug 2021 11:14:53 +0000 (13:14 +0200)]
- Fix #536: error: RPZ: name of record (drop.spamhaus.org.rpz.local.)
to insert into RPZ.
W.C.A. Wijngaards [Wed, 25 Aug 2021 08:19:48 +0000 (10:19 +0200)]
Changelog note for #401
- Merge #401: RPZ triggers. This add additional RPZ triggers,
unbound supports a full set of rpz triggers, and this now
includes nsdname, nsip and clientip triggers. Also actions
are fully supported, and this now includes the tcp-only action.
Wouter Wijngaards [Wed, 25 Aug 2021 08:14:12 +0000 (10:14 +0200)]
Merge pull request #401 from NLnetLabs/rpz-triggers
RPZ triggers
Shchelkunov Artem [Fri, 20 Aug 2021 14:45:54 +0000 (19:45 +0500)]
Fix: buffer overflow bug
Found by static analyzer svace
Static analyzer message: Array 'token' of size 65536 bytes passed to
function 'rrinternal_parse_rdata' at str2wire.c:679 by passing as 2nd
parameter to function 'rrinternal_parse_rdata' at str2wire.c:775, where
it is accessed by unacceptable index. This may lead to buffer overflow.
on-behalf-of: @ideco-team <github@ideco.ru>
W.C.A. Wijngaards [Fri, 20 Aug 2021 13:18:39 +0000 (15:18 +0200)]
Changelog entry for #531
- Fix #531: Fix: passed to proc after free.
Wouter Wijngaards [Fri, 20 Aug 2021 13:15:41 +0000 (15:15 +0200)]
Merge pull request #531 from Shchelk/ptpaf
Fix: passed to proc after free
Shchelkunov Artem [Fri, 20 Aug 2021 13:06:12 +0000 (18:06 +0500)]
Fix: passed to proc after free
Found by static analyzer svace
Static analyzer message: Pointer 'dp' is passed to a function at
iter_hints.c:401 after the referenced memory was deallocated at
iter_hints.c:174 by passing as 3rd parameter to function 'hints_insert'
at iter_hints.c:398.
on-behalf-of: @ideco-team <github@ideco.ru>
Shchelkunov Artem [Fri, 20 Aug 2021 12:52:14 +0000 (17:52 +0500)]
Fix: dereferencing a null pointer
Found by static analyzer svace
Static analyzer message: Return value of a function 'reply_info_copy'
is dereferenced at dns64.c:923 without checking, but it is usually
checked for this function (4/5).
on-behalf-of: @ideco-team <github@ideco.ru>
W.C.A. Wijngaards [Fri, 20 Aug 2021 12:32:13 +0000 (14:32 +0200)]
Changelog note for #529 and nicer layout.
- Fix #529: Fix: log_assert does nothing if UNBOUND_DEBUG is
undefined.
Wouter Wijngaards [Fri, 20 Aug 2021 12:29:18 +0000 (14:29 +0200)]
Merge pull request #529 from Shchelk/next
Fix: log_assert does nothing if UNBOUND_DEBUG is undefined
Shchelkunov Artem [Fri, 20 Aug 2021 12:12:43 +0000 (17:12 +0500)]
Fix: log_assert does nothing if UNBOUND_DEBUG is undefined
Found by static analyzer svace
Static analyzer message: Integer value 'len' obtained from untrusted
source at tube.c:374 by passing as 2nd parameter to function 'read'
at tube.c:340 without checking its higher bound is used as a loop bound
at tube.c:374.
on-behalf-of: @ideco-team <github@ideco.ru>
W.C.A. Wijngaards [Wed, 18 Aug 2021 07:53:35 +0000 (09:53 +0200)]
Merge branch 'master' into rpz-triggers
W.C.A. Wijngaards [Tue, 17 Aug 2021 11:15:20 +0000 (13:15 +0200)]
- Fix sed script in ssldir split handling.
W.C.A. Wijngaards [Tue, 17 Aug 2021 11:03:33 +0000 (13:03 +0200)]
- Fix #527: not sending quad9 cert to syslog (and may be more).
W.C.A. Wijngaards [Tue, 17 Aug 2021 08:32:12 +0000 (10:32 +0200)]
- Fix that --with-ssl can use "/usr/include/openssl11" to pass the
location of a different openssl version.
W.C.A. Wijngaards [Mon, 16 Aug 2021 14:14:32 +0000 (16:14 +0200)]
- Fix to support harden-algo-downgrade for ZONEMD dnssec checks.
George Thessalonikefs [Mon, 16 Aug 2021 12:14:32 +0000 (14:14 +0200)]
Changelog note for #528:
- Merge PR #528 from fobser: Make sldns_str2wire_svcparam_buf() static.
gthess [Mon, 16 Aug 2021 12:12:50 +0000 (14:12 +0200)]
Merge pull request #528 from fobser/svcparam_static
Make sldns_str2wire_svcparam_buf() static.
Florian Obser [Mon, 16 Aug 2021 09:27:40 +0000 (11:27 +0200)]
Make sldns_str2wire_svcparam_buf() static.
The function is only used in this translation unit and prevents a "no
previous prototype" warning.
W.C.A. Wijngaards [Fri, 13 Aug 2021 13:24:53 +0000 (15:24 +0200)]
- zonemd, fix order of bogus printout string manipulation.
W.C.A. Wijngaards [Fri, 13 Aug 2021 12:43:11 +0000 (14:43 +0200)]
- Fix zonemd verification of key that is not in DNS but in the zone
and needs a chain of trust.
W.C.A. Wijngaards [Fri, 13 Aug 2021 07:27:58 +0000 (09:27 +0200)]
- Fix for #431: Squelch permission denied errors for udp connect,
and udp send, they are visible at higher verbosity settings.
W.C.A. Wijngaards [Fri, 13 Aug 2021 07:21:47 +0000 (09:21 +0200)]
- Support using system-wide crypto policies.
George Thessalonikefs [Thu, 12 Aug 2021 19:46:30 +0000 (21:46 +0200)]
- For #514: generate configure.
George Thessalonikefs [Thu, 12 Aug 2021 19:43:18 +0000 (21:43 +0200)]
Changelog note for #514:
- Merge PR #514, from ziollek: Docker environment for run tests.
gthess [Thu, 12 Aug 2021 19:30:36 +0000 (21:30 +0200)]
Merge pull request #514 from ziollek/docker_for_run_test
Docker environment for run tests
W.C.A. Wijngaards [Thu, 12 Aug 2021 14:06:02 +0000 (16:06 +0200)]
- Fix to print error from unbound-anchor for writing to the key
file, also when not verbose.
W.C.A. Wijngaards [Thu, 12 Aug 2021 13:14:22 +0000 (15:14 +0200)]
- For #519: fix comments for doxygen.
W.C.A. Wijngaards [Thu, 12 Aug 2021 13:12:55 +0000 (15:12 +0200)]
- For #519: yacc and lex. And fix python bindings, and test program
unbound-dnstap-socket.
W.C.A. Wijngaards [Thu, 12 Aug 2021 13:05:51 +0000 (15:05 +0200)]
Changelog note for #519 and example.conf edit
- Merge #519: Support for selective enabling tcp-upstream for
stub/forward zones.
- For #519: note stub-tcp-upstream and forward-tcp-upstream in
the example configuration file.
Wouter Wijngaards [Thu, 12 Aug 2021 13:03:57 +0000 (15:03 +0200)]
Merge pull request #519 from ziollek/tcp_upstream_option
Support for selective enabling tcp-upstream for stub/forward zones
W.C.A. Wijngaards [Thu, 12 Aug 2021 11:45:18 +0000 (13:45 +0200)]
Changelog note for #523
- Merge #523: fix: free() call more than once with the same pointer.
Wouter Wijngaards [Thu, 12 Aug 2021 11:45:00 +0000 (13:45 +0200)]
Merge pull request #523 from Shchelk/bugfix
fix: free() call more than once with the same pointer
W.C.A. Wijngaards [Thu, 12 Aug 2021 11:24:15 +0000 (13:24 +0200)]
Changelog note for #521
- Merge #521: Update mini_event.c.
Wouter Wijngaards [Thu, 12 Aug 2021 11:24:03 +0000 (13:24 +0200)]
Merge pull request #521 from liheng562653799/master
Update mini_event.c
W.C.A. Wijngaards [Thu, 12 Aug 2021 11:17:29 +0000 (13:17 +0200)]
- Add test tool readzone to .gitignore.
W.C.A. Wijngaards [Thu, 12 Aug 2021 08:04:20 +0000 (10:04 +0200)]
- And 1.13.2rc1 became the 1.13.2 with the fix for the python module
build. The current code repository continues with version 1.13.3.
Shchelkunov Artem [Wed, 11 Aug 2021 10:14:43 +0000 (15:14 +0500)]
fix: free() call more than once with the same pointer
Chih-Hsuan Yen [Fri, 23 Jul 2021 05:23:05 +0000 (13:23 +0800)]
- Reduce unnecessary linking
- Link to libpython only when needed, fixes #242
When pyunbound is enabled while pythonmodule is not (i.e., ./configure
--without-pythonmodule --with-pyunbound), only the Python library
_unbound.so uses Python functions, and main programs (unbound,
unbound-anchor, ...) and libunbound.so do not. This patch removes
unneeded linking.
- Link the Python library _unbound.so to Python only. _unbound.so does
not directly use libraries used by libunbound. This patch removes
unneeded linking mentioned in [1]
[1] https://github.com/NLnetLabs/unbound/pull/511#issuecomment-
886072003
Artem Egorenkov [Fri, 6 Aug 2021 12:03:23 +0000 (14:03 +0200)]
- memory management violations fixed
liheng562653799 [Fri, 6 Aug 2021 04:00:56 +0000 (12:00 +0800)]
Update mini_event.c
When in heavy load, unbound opens many outside_network sockets for out going queries to delegation servers, which may result in a big fd(maxfd) value(for thread A 65500, for thread B 65501, for thread C ...).
There are situations when thread A has a max fd num 65500 where maxfd is of course 65500, thread B has max fd num 20 for now but maxfd is still 65501. Though linux kernel checks whether maxfd+1 passed by select syscall is really the process' maxfd+1. Linux kernel can not tell maxfd+1 passed by thread B select syscall is much bigger(65501+1 or 65500+1 after trimed by kerne) than it should be (20+1).
In this situation, when kernel do_select() for thread B, much work is wasted.
W.C.A. Wijngaards [Thu, 5 Aug 2021 15:10:56 +0000 (17:10 +0200)]
- Fix #520: Unbound 1.13.2rc1 fails to build python module.
W.C.A. Wijngaards [Thu, 5 Aug 2021 11:37:22 +0000 (13:37 +0200)]
Merge branch 'master' into rpz-triggers
Tomasz Ziolkowski [Thu, 5 Aug 2021 06:44:18 +0000 (08:44 +0200)]
Add (stub|forward)-tcp-upstream options which enable using tcp transport only for specified stub/forward zones
W.C.A. Wijngaards [Thu, 5 Aug 2021 06:37:20 +0000 (08:37 +0200)]
For 1.13.2rc1.
W.C.A. Wijngaards [Thu, 5 Aug 2021 06:36:24 +0000 (08:36 +0200)]
- Tag for 1.13.2 release.