]>
git.ipfire.org Git - thirdparty/unbound.git/log
Yorgos Thessalonikefs [Tue, 12 Mar 2024 10:20:44 +0000 (11:20 +0100)]
- Introduce 'cache-min-negative-ttl' option to bound the minimum TTL for
negative answers overriding 'cache-min-ttl'.
W.C.A. Wijngaards [Mon, 11 Mar 2024 15:31:58 +0000 (16:31 +0100)]
- Fix #1021 Inconsistent Behavior with Changing rpz-cname-override
and doing a unbound-control reload.
W.C.A. Wijngaards [Mon, 11 Mar 2024 11:30:24 +0000 (12:30 +0100)]
Update doc/Changelog to note the fixes included in 1.19.3rc2.
W.C.A. Wijngaards [Fri, 8 Mar 2024 16:18:05 +0000 (17:18 +0100)]
- Fix unbound-control-setup.cmd to have CA v3 basicConstraints,
like unbound-control-setup.sh has.
W.C.A. Wijngaards [Fri, 8 Mar 2024 15:43:24 +0000 (16:43 +0100)]
- Fix doc test so it ignores but outputs unsupported doxygen options.
W.C.A. Wijngaards [Fri, 8 Mar 2024 15:33:17 +0000 (16:33 +0100)]
- Fix qname minimisation for reply with a DNAME for qtype CNAME that
answers it.
Yorgos Thessalonikefs [Fri, 8 Mar 2024 15:13:36 +0000 (16:13 +0100)]
- Update doc/unbound.doxygen with 'doxygen -u'. Fixes option
deprecation warnings and updates with newer defaults.
W.C.A. Wijngaards [Fri, 8 Mar 2024 13:10:06 +0000 (14:10 +0100)]
- Fix validator classification of qtype DNAME for positive and
redirection answers, and fix validator signature routine for dealing
with the synthesized CNAME for a DNAME without previously
encountering it and also for when the qtype is DNAME.
W.C.A. Wijngaards [Fri, 8 Mar 2024 08:51:37 +0000 (09:51 +0100)]
- Remove unused portion from iter_dname_ttl unit test.
W.C.A. Wijngaards [Fri, 8 Mar 2024 08:47:59 +0000 (09:47 +0100)]
- Fix TTL of synthesized CNAME when a DNAME is used from cache.
W.C.A. Wijngaards [Fri, 8 Mar 2024 08:07:36 +0000 (09:07 +0100)]
- Fix unbound-control-setup.cmd to use 3072 bits so that certificates
are long enough for newer OpenSSL versions.
W.C.A. Wijngaards [Thu, 7 Mar 2024 10:06:42 +0000 (11:06 +0100)]
- Version set to 1.19.3 for release. After 1.19.2 point release with
security fix for CVE-2024-1931, Denial of service when trimming
EDE text on positive replies. The code repo includes the fix and
is for version 1.19.3.
W.C.A. Wijngaards [Tue, 5 Mar 2024 12:39:29 +0000 (13:39 +0100)]
- Fix for #1022: Fix ede prohibited in access control refused answers.
W.C.A. Wijngaards [Mon, 4 Mar 2024 12:20:13 +0000 (13:20 +0100)]
- Fix edns subnet replies for scope zero answers to not get stored
in the global cache, and in cachedb, when the upstream replies
without an EDNS record.
W.C.A. Wijngaards [Wed, 28 Feb 2024 10:44:52 +0000 (11:44 +0100)]
- Move github workflows to use checkoutv4.
Yorgos Thessalonikefs [Fri, 23 Feb 2024 13:34:33 +0000 (14:34 +0100)]
- Document the suspend argument for process_ds_response().
W.C.A. Wijngaards [Thu, 22 Feb 2024 15:22:31 +0000 (16:22 +0100)]
- Fix trim of EDE text from large udp responses from spinning cpu.
Yorgos Thessalonikefs [Tue, 20 Feb 2024 14:33:18 +0000 (15:33 +0100)]
Changelog entry for #1010:
- Merge #1010: Mention REFUSED has the TC bit set with unmatched
allow_cookie acl in the manpage. It also fixes the code to match the
documentation about clients with a valid cookie that bypass the
ratelimit regardless of the allow_cookie acl.
Willem Toorop [Tue, 20 Feb 2024 14:29:34 +0000 (15:29 +0100)]
Mention REFUSED has the TC bit set with unmatched allow_cookie acl in the manpage (#1010)
* Mention REFUSED with TC with unmatched allow_cookie acl in manpage
Also moved the part about bypassing ip-ratelimit to the ip-ratelimit
description as it will be bypassed with a valid DNS-Cookie regardless of the
allow_cookie acl.
* Apply suggestions from code review
* Update doc/unbound.conf.5.in
* DNS-Cookies should bypass ip-ratelimit setting
W.C.A. Wijngaards [Tue, 13 Feb 2024 13:03:30 +0000 (14:03 +0100)]
- These fixes are part of the 1.19.1 release, that is a security
point release on 1.19.0, the code repository continues with these
fixes, with version number 1.19.2.
W.C.A. Wijngaards [Tue, 13 Feb 2024 12:58:09 +0000 (13:58 +0100)]
W.C.A. Wijngaards [Tue, 13 Feb 2024 12:57:56 +0000 (13:57 +0100)]
W.C.A. Wijngaards [Tue, 13 Feb 2024 12:02:43 +0000 (13:02 +0100)]
- Fix CVE-2023-50868, NSEC3 closest encloser proof can exhaust CPU.
W.C.A. Wijngaards [Tue, 13 Feb 2024 12:02:08 +0000 (13:02 +0100)]
- Fix CVE-2023-50387, DNSSEC verification complexity can be exploited to
exhaust CPU resources and stall DNS resolvers.
W.C.A. Wijngaards [Thu, 8 Feb 2024 13:36:18 +0000 (14:36 +0100)]
- Fix documentation for access-control in the unbound.conf man page.
Yorgos Thessalonikefs [Wed, 7 Feb 2024 09:51:16 +0000 (10:51 +0100)]
- autoconf.
Yorgos Thessalonikefs [Wed, 7 Feb 2024 09:49:28 +0000 (10:49 +0100)]
- For #1006: fix logic error introduced by previous fix.
Yorgos Thessalonikefs [Wed, 7 Feb 2024 09:42:39 +0000 (10:42 +0100)]
- autoheader, autoconf.
Yorgos Thessalonikefs [Wed, 7 Feb 2024 09:38:52 +0000 (10:38 +0100)]
- Fix #1006: Can't find protobuf-c package since #999.
W.C.A. Wijngaards [Tue, 30 Jan 2024 15:24:41 +0000 (16:24 +0100)]
Autoconf and changelog note for #999
- Merge #999: Search for protobuf-c with pkg-config.
Wouter Wijngaards [Tue, 30 Jan 2024 15:23:43 +0000 (16:23 +0100)]
Merge pull request #999 from NickCao/master
Search for protobuf-c with pkg-config
Nick Cao [Fri, 26 Jan 2024 22:52:24 +0000 (17:52 -0500)]
Search for protobuf-c with pkg-config
Yorgos Thessalonikefs [Tue, 23 Jan 2024 09:10:37 +0000 (10:10 +0100)]
- Update message TTL when using cached RRSETs. It could result in
non-expired messages with expired RRSETs (non-usable messages by
Unbound).
Yorgos Thessalonikefs [Mon, 22 Jan 2024 14:53:36 +0000 (15:53 +0100)]
- Update error printout for duplicate trust anchors to include the
trust anchor name (relates to #920).
W.C.A. Wijngaards [Mon, 22 Jan 2024 08:40:36 +0000 (09:40 +0100)]
- Fix for #997: Print details for SSL certificate failure.
W.C.A. Wijngaards [Wed, 17 Jan 2024 15:23:18 +0000 (16:23 +0100)]
For analysis workflow, clean up the script to use OpenSSL Configure
without change.
W.C.A. Wijngaards [Wed, 17 Jan 2024 15:20:22 +0000 (16:20 +0100)]
- workflow for analysis, cleanup of windows compile with msys2 perl.
W.C.A. Wijngaards [Wed, 17 Jan 2024 15:19:56 +0000 (16:19 +0100)]
- Fix warning for windres on resource files due to redefinition.
W.C.A. Wijngaards [Wed, 17 Jan 2024 14:08:56 +0000 (15:08 +0100)]
For workflow, set perl interpreter for build.
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:58:44 +0000 (14:58 +0100)]
- Fix for workflow
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:56:10 +0000 (14:56 +0100)]
For workflow, look for pacman.
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:53:23 +0000 (14:53 +0100)]
For workflow, use msys2 perl.
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:40:57 +0000 (14:40 +0100)]
In workflow, use strawberry perl to run configure script.
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:36:35 +0000 (14:36 +0100)]
For workflow, change path separator.
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:30:48 +0000 (14:30 +0100)]
For windows runner, look at perl contents.
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:07:57 +0000 (14:07 +0100)]
Fix to install with cpanmin a missing perl module for the windows workflow.
W.C.A. Wijngaards [Wed, 17 Jan 2024 13:03:30 +0000 (14:03 +0100)]
Fix for workflow to install perl module.
W.C.A. Wijngaards [Wed, 17 Jan 2024 12:45:59 +0000 (13:45 +0100)]
- Update workflow for ports to use newer openssl on windows compile.
W.C.A. Wijngaards [Tue, 16 Jan 2024 15:44:15 +0000 (16:44 +0100)]
Changelog note for #993
- Merge #993: Update b.root-servers.net also in example config file.
Wouter Wijngaards [Tue, 16 Jan 2024 15:44:02 +0000 (16:44 +0100)]
Merge pull request #993 from InfrastructureServices/b.root-servers.net-conf
Update b.root-servers.net also in example config file
W.C.A. Wijngaards [Tue, 16 Jan 2024 15:40:14 +0000 (16:40 +0100)]
- Fix to link with libssp for libcrypto and getaddrinfo check for
only header. Also update crosscompile to remove ssp for 32bit.
Petr Mensik [Tue, 16 Jan 2024 15:13:29 +0000 (16:13 +0100)]
Update b.root-servers.net also in example config file
Addition to commit
a8739bad76d4d179290627e989c7ef236345bda6 , which
updated only address specified in code. But addresses provided in
example configuration were not updated, I think they should be updated
too.
W.C.A. Wijngaards [Mon, 15 Jan 2024 15:44:27 +0000 (16:44 +0100)]
- Fix to link with -lcrypt32 for OpenSSL 3.2.0 on Windows.
W.C.A. Wijngaards [Tue, 9 Jan 2024 07:41:52 +0000 (08:41 +0100)]
Changelog note for #988.
- Merge #988: Fix NLnetLabs#981: dump_cache truncates large records.
Wouter Wijngaards [Tue, 9 Jan 2024 07:41:30 +0000 (08:41 +0100)]
Merge pull request #988 from dyunwei/master
Fix NLnetLabs#981: dump_cache truncates large records.
dyunwei [Tue, 9 Jan 2024 06:17:31 +0000 (14:17 +0800)]
Fix NLnetLabs#981: dump_cache truncates large records.
W.C.A. Wijngaards [Fri, 5 Jan 2024 13:11:55 +0000 (14:11 +0100)]
- Fix unit test for #987 change in udp1xxx retry packet send.
W.C.A. Wijngaards [Fri, 5 Jan 2024 12:47:30 +0000 (13:47 +0100)]
Changelog note for #987
- Merge #987: skip edns frag retry if advertised udp payload size is
not smaller.
Wouter Wijngaards [Fri, 5 Jan 2024 12:47:15 +0000 (13:47 +0100)]
Merge pull request #987 from borisVanhoof/skip_edns_frag_retry
skip edns frag retry if advertised udp payload size is not smaller
sahnalys12 [Fri, 5 Jan 2024 11:16:23 +0000 (12:16 +0100)]
skip edns frag retry if advertised udp payload size is not smaller
If serviced query is in UDP_EDNS_FRAG mode, and EDNS_ADVERTISED_SIZE
is 1232 (the default) or more, then the retry will have the same edns
udp payload size with the same result.
W.C.A. Wijngaards [Thu, 4 Jan 2024 16:06:15 +0000 (17:06 +0100)]
- Remove unneeded newlines and improve indentation in remote control
code.
W.C.A. Wijngaards [Wed, 3 Jan 2024 12:33:43 +0000 (13:33 +0100)]
- Fix #983: Sha1 runtime insecure change was incomplete.
W.C.A. Wijngaards [Wed, 3 Jan 2024 09:37:44 +0000 (10:37 +0100)]
Changelog note for #985.
- Merge #985: Add DoH and DoT to dnstap message.
Wouter Wijngaards [Wed, 3 Jan 2024 09:36:38 +0000 (10:36 +0100)]
Merge pull request #985 from k-akashi/dnstap_dot_doh
Add DoH and DoT to dnstap message
W.C.A. Wijngaards [Wed, 3 Jan 2024 09:04:06 +0000 (10:04 +0100)]
Changelog note for #979 and #980.
- Merge #980: DoH: reject non-h2 early. To fix #979: Improve errors
for non-HTTP/2 DoH clients.
Wouter Wijngaards [Wed, 3 Jan 2024 08:59:15 +0000 (09:59 +0100)]
Merge pull request #980 from jsha/reject-non-h2
DoH: reject non-h2 early
k-akashi [Tue, 26 Dec 2023 22:26:21 +0000 (07:26 +0900)]
Add DoH and DoT to dnstap message
Yorgos Thessalonikefs [Fri, 22 Dec 2023 10:42:20 +0000 (11:42 +0100)]
- Update example.conf with cookie options.
Jacob Hoffman-Andrews [Thu, 14 Dec 2023 00:58:44 +0000 (16:58 -0800)]
DoH: reject non-h2 early
Previously, non-h2 connections would be accepted, and then error out
with a verbose message "http2: session_recv from ____ failed,
error: Received bad client magic byte string". Instead, we can detect
absence of h2 support at connection time and reject with a clearer
verbose message.
W.C.A. Wijngaards [Fri, 8 Dec 2023 16:17:23 +0000 (17:17 +0100)]
Fixup doc/Changelog.
W.C.A. Wijngaards [Fri, 8 Dec 2023 16:15:35 +0000 (17:15 +0100)]
- Fix root_zonemd unit test, it checks that the root ZONEMD verifies,
now that the root has a valid ZONEMD.
Yorgos Thessalonikefs [Fri, 8 Dec 2023 08:20:33 +0000 (09:20 +0100)]
- Merge PR #973: Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672.
W.C.A. Wijngaards [Thu, 7 Dec 2023 11:11:03 +0000 (12:11 +0100)]
Changelog note for #975
- Merge #975: Fixed some syntax errors in rpl files.
Wouter Wijngaards [Thu, 7 Dec 2023 11:10:40 +0000 (12:10 +0100)]
Merge pull request #975 from NLnetLabs/testdata-syntax
Fixed some syntax errors in rpl files.
Philip Homburg [Thu, 7 Dec 2023 10:38:01 +0000 (11:38 +0100)]
Fixed some syntax errors in rpl files.
W.C.A. Wijngaards [Thu, 7 Dec 2023 08:41:03 +0000 (09:41 +0100)]
- Fix #974: doc: default number of outgoing ports without libevent.
Yorgos Thessalonikefs [Wed, 6 Dec 2023 22:40:01 +0000 (23:40 +0100)]
- Use the origin (DNAME) TTL for syntesized CNAMEs as per RFC 6672.
W.C.A. Wijngaards [Wed, 6 Dec 2023 15:32:06 +0000 (16:32 +0100)]
- Fix tests to use new common.sh functions, wait_logfile and
kill_from_pidfile.
W.C.A. Wijngaards [Wed, 6 Dec 2023 15:14:24 +0000 (16:14 +0100)]
- Update test script file common.sh.
W.C.A. Wijngaards [Wed, 6 Dec 2023 12:25:58 +0000 (13:25 +0100)]
- Updated IPv4 and IPv6 address for b.root-servers.net in root hints.
W.C.A. Wijngaards [Wed, 6 Dec 2023 12:22:35 +0000 (13:22 +0100)]
- iana portlist update.
W.C.A. Wijngaards [Wed, 6 Dec 2023 10:58:14 +0000 (11:58 +0100)]
- Fix to sync the tests script file common.sh.
W.C.A. Wijngaards [Tue, 5 Dec 2023 12:14:08 +0000 (13:14 +0100)]
- Fix dnstap that assertion failed on logging other than UDP and TCP
traffic. It lists it as TCP traffic.
W.C.A. Wijngaards [Tue, 5 Dec 2023 09:05:51 +0000 (10:05 +0100)]
- Fix #969: [FR] distinguish Do53, DoT and DoH in the logs.
W.C.A. Wijngaards [Tue, 5 Dec 2023 08:09:42 +0000 (09:09 +0100)]
Changelog note for #971
- Merge #971: fix 'WARNING: Message has 41 extra bytes at end'.
Wouter Wijngaards [Tue, 5 Dec 2023 08:09:23 +0000 (09:09 +0100)]
Merge pull request #971 from dukeartem/master
fix 'WARNING: Message has 41 extra bytes at end'
Artem [Tue, 5 Dec 2023 06:43:15 +0000 (09:43 +0300)]
fix 'WARNING: Message has 41 extra bytes at end'
Yorgos Thessalonikefs [Mon, 27 Nov 2023 15:43:59 +0000 (16:43 +0100)]
- Merge #968: Replace the obsolescent fgrep with grep -F in tests.
W.C.A. Wijngaards [Mon, 27 Nov 2023 15:04:33 +0000 (16:04 +0100)]
- Fix #964: config.h.in~ backup file in release tar balls.
Yorgos Thessalonikefs [Fri, 24 Nov 2023 14:51:17 +0000 (15:51 +0100)]
- Replace the obsolescent fgrep with grep -F in tests.
Yorgos Thessalonikefs [Fri, 24 Nov 2023 14:26:35 +0000 (15:26 +0100)]
- Use 127.0.0.1 explicitly in tests to avoid delays and errors on newer
systems.
W.C.A. Wijngaards [Thu, 9 Nov 2023 14:26:46 +0000 (15:26 +0100)]
- Fix unit test parse of origin syntax.
W.C.A. Wijngaards [Wed, 8 Nov 2023 09:59:25 +0000 (10:59 +0100)]
- The repository continues with 1.19.1.
W.C.A. Wijngaards [Thu, 2 Nov 2023 07:40:20 +0000 (08:40 +0100)]
- Set version number to 1.19.0.
- Tag for 1.19.0rc1 release.
W.C.A. Wijngaards [Wed, 1 Nov 2023 16:09:37 +0000 (17:09 +0100)]
- Fix compilation without openssl, remove unused function warning.
W.C.A. Wijngaards [Wed, 1 Nov 2023 13:20:52 +0000 (14:20 +0100)]
- Fix SSL compile failure for other missing definitions in
log_crypto_err_io_code_arg.
W.C.A. Wijngaards [Wed, 1 Nov 2023 13:14:02 +0000 (14:14 +0100)]
- Fix SSL compile failure for definition in log_crypto_err_io_code_arg.
George Thessalonikefs [Wed, 1 Nov 2023 12:57:06 +0000 (13:57 +0100)]
- Mention flex and bison in README.md when building from repository
source.
George Thessalonikefs [Tue, 31 Oct 2023 21:41:06 +0000 (22:41 +0100)]
- Fix #941: dnscrypt doesn't work after upgrade to 1.18 with
suggestion by dukeartem to also fix the udp_ancil with dnscrypt.
George Thessalonikefs [Mon, 30 Oct 2023 11:18:01 +0000 (12:18 +0100)]
Changelog entry for #930
- Merge #930 from Stuart Henderson: add void to
log_ident_revert_to_default declaration.