]> git.ipfire.org Git - thirdparty/unbound.git/log
thirdparty/unbound.git
2 days ago- Fix unused variable warning. master
Yorgos Thessalonikefs [Tue, 7 Apr 2026 16:03:20 +0000 (18:03 +0200)] 
- Fix unused variable warning.

10 days agoChangelog comment for #1408
W.C.A. Wijngaards [Mon, 30 Mar 2026 14:15:32 +0000 (16:15 +0200)] 
Changelog comment for #1408
- Merge #1408: Fix shared memory stats with threads.

10 days agoFix shared memory stats with threads (#1408)
Wouter Wijngaards [Mon, 30 Mar 2026 14:13:11 +0000 (16:13 +0200)] 
Fix shared memory stats with threads (#1408)

* - stats-shm-volley, with mesh_time_median the additions add up to the correct
  average that is used.

* - stats-shm-volley, the stat interval is selected with offset.

* - stats-shm-volley, stat totals in separate struct. The first thread zeroes
  it, and the last thread copies it.

* - stats-shm-volley, the array is inited for a new round if one or more

* - stats-shm-volley, the array is inited for a new round if one or more
  threads are not responsive for stat collection.

* - stats-shm-volley review, typos and slightly more detailed text for comments.

---------

Co-authored-by: Yorgos Thessalonikefs <yorgos@nlnetlabs.nl>
13 days ago- Fix defense in depth for service callback with empty packet.
W.C.A. Wijngaards [Fri, 27 Mar 2026 14:42:45 +0000 (15:42 +0100)] 
- Fix defense in depth for service callback with empty packet.

13 days ago- Fix test code to allow empty hex answer packets from testbound.
W.C.A. Wijngaards [Fri, 27 Mar 2026 14:39:27 +0000 (15:39 +0100)] 
- Fix test code to allow empty hex answer packets from testbound.

13 days ago- Fix to allow the control-interface config to use ip@port notation.
W.C.A. Wijngaards [Fri, 27 Mar 2026 13:29:15 +0000 (14:29 +0100)] 
- Fix to allow the control-interface config to use ip@port notation.

2 weeks ago- Fix to check for invalid http content length and chunk size,
W.C.A. Wijngaards [Tue, 24 Mar 2026 07:45:52 +0000 (08:45 +0100)] 
- Fix to check for invalid http content length and chunk size,
  and to check the RR rdata field lengths when decompressing and
  inserting RRs from an authority zone transfer. This stops
  large memory use and heap buffer-overflow read errors. Thanks
  to Haruto Kimura (Stella) for the report.

2 weeks ago- Fix for testcode pktview to check buffer size and log errors.
W.C.A. Wijngaards [Fri, 20 Mar 2026 14:57:46 +0000 (15:57 +0100)] 
- Fix for testcode pktview to check buffer size and log errors.

3 weeks ago- Fix to add tls-service-key to memory printout for fast_reload.
W.C.A. Wijngaards [Fri, 13 Mar 2026 15:49:34 +0000 (16:49 +0100)] 
- Fix to add tls-service-key to memory printout for fast_reload.

3 weeks ago- Fix detection of http listening port in fast_reload.
W.C.A. Wijngaards [Fri, 13 Mar 2026 15:37:41 +0000 (16:37 +0100)] 
- Fix detection of http listening port in fast_reload.

3 weeks ago- For #278: fast_reload can reload tls-service-key, tls-service-pem
W.C.A. Wijngaards [Fri, 13 Mar 2026 15:25:42 +0000 (16:25 +0100)] 
- For #278: fast_reload can reload tls-service-key, tls-service-pem
  and tls-cert-bundle changes. It checks the modification time of
  the tls-service-key and tls-service-pem files for update.

4 weeks ago- iana portlist updated.
W.C.A. Wijngaards [Fri, 13 Mar 2026 11:05:33 +0000 (12:05 +0100)] 
- iana portlist updated.

4 weeks ago- Fix #278: DoT: complete unbound restart required on certificate
W.C.A. Wijngaards [Fri, 13 Mar 2026 10:42:34 +0000 (11:42 +0100)] 
- Fix #278: DoT: complete unbound restart required on certificate
  renew. Fix so that a reload checks if the files have changed, and
  if so, reload the contexts. Also for DoH, DoQ and outgoing DoT.

4 weeks ago- Fix to ignore out-of-zone DNAME records for CNAME synthesis. Thanks
Yorgos Thessalonikefs [Fri, 13 Mar 2026 10:28:32 +0000 (11:28 +0100)] 
- Fix to ignore out-of-zone DNAME records for CNAME synthesis. Thanks
  to Yuxiao Wu, Yiyi Wang, Zhang Chao, Baojun Liu, and Haixin Duan from
  Tsinghua University.

4 weeks agoChangelog comment for #1418
W.C.A. Wijngaards [Mon, 9 Mar 2026 12:54:37 +0000 (13:54 +0100)] 
Changelog comment for #1418
- Merge #1418: Apply cache TTL policy to DNAME and synthesized
  CNAME on wire path.

4 weeks agoApply cache TTL policy to DNAME and synthesized CNAME on wire path (#1418)
Arunabha Das [Mon, 9 Mar 2026 12:53:52 +0000 (18:23 +0530)] 
Apply cache TTL policy to DNAME and synthesized CNAME on wire path (#1418)

When the scrubber synthesizes a CNAME from a DNAME (authority omits CNAME),
apply cache-min-ttl/cache-max-ttl to both DNAME and synthesized CNAME in
msg_parse so they stay equal and respect config (RFC 6672).

- iterator/iter_scrub.c: In synth_cname_rrset(), clamp TTL to [MIN_TTL,
  MAX_TTL] when !SERVE_ORIGINAL_TTL and write back to both synth CNAME
  and DNAME rrset. Removes FIXME.

4 weeks ago- Fix compile failure in unbound-checkconf for older gcc compiler.
W.C.A. Wijngaards [Mon, 9 Mar 2026 08:18:43 +0000 (09:18 +0100)] 
- Fix compile failure in unbound-checkconf for older gcc compiler.

4 weeks ago- Constrain the explicit macros for remote.c:fr_atomic_copy_cfg().
Yorgos Thessalonikefs [Fri, 6 Mar 2026 16:27:21 +0000 (17:27 +0100)] 
- Constrain the explicit macros for remote.c:fr_atomic_copy_cfg().

4 weeks ago- Warn for unused 'nodefault' local-zone configuration in
Yorgos Thessalonikefs [Fri, 6 Mar 2026 16:05:57 +0000 (17:05 +0100)] 
- Warn for unused 'nodefault' local-zone configuration in
  unbound-checkconf (related to #1416).

4 weeks ago- Document the suggestion for a higher value for 'outgoing-range';
Yorgos Thessalonikefs [Fri, 6 Mar 2026 16:01:41 +0000 (17:01 +0100)] 
- Document the suggestion for a higher value for 'outgoing-range';
  helps when the request list is full.

5 weeks agoChangelog entry for #1415
W.C.A. Wijngaards [Fri, 6 Mar 2026 07:58:33 +0000 (08:58 +0100)] 
Changelog entry for #1415
- Merge #1415: Add lock unlock for view in memory error handling.

5 weeks agoAdd lock unlock for view in memory error handling (#1415)
Andy Warner [Fri, 6 Mar 2026 07:57:54 +0000 (00:57 -0700)] 
Add lock unlock for view in memory error handling (#1415)

view->lock would be skipped during an out of memory error bailout.

5 weeks ago- Update generated man pages.
W.C.A. Wijngaards [Thu, 5 Mar 2026 11:15:54 +0000 (12:15 +0100)] 
- Update generated man pages.

5 weeks ago- Fix for DNS Rebinding Bypass via SVCB/HTTPS Records in Unbound.
W.C.A. Wijngaards [Thu, 5 Mar 2026 08:47:13 +0000 (09:47 +0100)] 
- Fix for DNS Rebinding Bypass via SVCB/HTTPS Records in Unbound.
  Thanks to Kunta Chu, School of Software, Tsinghua University,
  Taofei Guo, Peking University, and Jianjun Chen, Institute for
  Network Sciences and Cyberspace, Tsinghua University for the
  report. The private-address option is fixed to also elide
  SVCB and HTTPS records that match the filter.

5 weeks ago- For #1411: Introduce a failing case in the rpl test so that it only
Yorgos Thessalonikefs [Wed, 4 Mar 2026 12:22:42 +0000 (13:22 +0100)] 
- For #1411: Introduce a failing case in the rpl test so that it only
  passes with the fix in place.

5 weeks ago- For #1411: Fix that the lookup for DNAME uses flag. Fix assertion
W.C.A. Wijngaards [Tue, 3 Mar 2026 16:44:31 +0000 (17:44 +0100)] 
- For #1411: Fix that the lookup for DNAME uses flag. Fix assertion
  in expired calc debug routine.

5 weeks agoFor #1411, fix up doc/Changelog.
W.C.A. Wijngaards [Tue, 3 Mar 2026 07:55:56 +0000 (08:55 +0100)] 
For #1411, fix up doc/Changelog.

5 weeks agoAllow synthesized DNAME TTL=0 to be served from cache within grace period (#1411)
Arunabha Das [Tue, 3 Mar 2026 07:51:31 +0000 (13:21 +0530)] 
Allow synthesized DNAME TTL=0 to be served from cache within grace period (#1411)

* Allow synthesized DNAME TTL=0 to be served from cache within grace period

Addresses doc/TODO: cache TTL=0 packets properly for synthesis.
- rrset_cache_lookup: allow TTL=0 DNAME within 1s grace for synthesis
- synth_dname_msg: support PACKED_RRSET_UPSTREAM_0TTL, return TTL=0 to client

Reduces recursion when authoritative servers return DNAME with TTL=0 (RFC 2308).
Client response still correctly returns TTL=0.

Note: Test with proper TTL=0 DNSSEC RRSIGs omitted - requires ldns-signzone
to generate valid signatures for TTL=0 RRsets.

* Add iter_dname_ttl0.rpl replay test for DNAME TTL=0
Tests signed DNAME with TTL=0 and RRSIG Original TTL=0 (RFC 4034).
Verifies end-to-end handling of TTL=0 DNAME responses.

5 weeks ago- Update generated man pages.
W.C.A. Wijngaards [Fri, 27 Feb 2026 13:33:55 +0000 (14:33 +0100)] 
- Update generated man pages.

5 weeks agoFor #1409: Changelog entry and more text.
W.C.A. Wijngaards [Fri, 27 Feb 2026 12:55:25 +0000 (13:55 +0100)] 
For #1409: Changelog entry and more text.

5 weeks agoDocumentation CNAME in redirect-type local-zone (#1409)
Daisuke HIGASHI [Fri, 27 Feb 2026 12:37:56 +0000 (21:37 +0900)] 
Documentation CNAME in redirect-type local-zone (#1409)

6 weeks ago- Fix validator to set unchecked when validation recursion
W.C.A. Wijngaards [Wed, 25 Feb 2026 09:59:33 +0000 (10:59 +0100)] 
- Fix validator to set unchecked when validation recursion
  requests are passed. The edns subnet module checks if validation
  is needed for a cache response, and set the validator to protect
  the cache with validation for non-subnet lookups.

6 weeks ago- Fixed some typos reported in #1395 by rezky_nightky.
Yorgos Thessalonikefs [Mon, 23 Feb 2026 15:17:40 +0000 (16:17 +0100)] 
- Fixed some typos reported in #1395 by rezky_nightky.

6 weeks ago- Fix to disallow cache lookup/store in external cachedb when a
Yorgos Thessalonikefs [Mon, 23 Feb 2026 13:35:50 +0000 (14:35 +0100)] 
- Fix to disallow cache lookup/store in external cachedb when a
  forwarder/stub forbids it with the no-cache option.

6 weeks ago- Fix to make the cachedb_val_expired.crpl succeed.
W.C.A. Wijngaards [Mon, 23 Feb 2026 11:52:10 +0000 (12:52 +0100)] 
- Fix to make the cachedb_val_expired.crpl succeed.

6 weeks ago- Fix to have cachedb not return expired bogus data as non-bogus.
W.C.A. Wijngaards [Mon, 23 Feb 2026 11:45:14 +0000 (12:45 +0100)] 
- Fix to have cachedb not return expired bogus data as non-bogus.

7 weeks ago- For #1405: local-zone always_refuse also blocks queries of type DS.
W.C.A. Wijngaards [Tue, 17 Feb 2026 14:36:08 +0000 (15:36 +0100)] 
- For #1405: local-zone always_refuse also blocks queries of type DS.

7 weeks ago- Fix to remove unused conditional from cookie timestamp at
W.C.A. Wijngaards [Tue, 17 Feb 2026 10:15:15 +0000 (11:15 +0100)] 
- Fix to remove unused conditional from cookie timestamp at
  worker env.

7 weeks ago- Fix that cachedb aggressive negative responses have the RA flag set.
W.C.A. Wijngaards [Mon, 16 Feb 2026 15:35:37 +0000 (16:35 +0100)] 
- Fix that cachedb aggressive negative responses have the RA flag set.

7 weeks ago- Fix #1404: Priming the root key fails after loading ipfire.org RPZ
Yorgos Thessalonikefs [Mon, 16 Feb 2026 12:37:19 +0000 (13:37 +0100)] 
- Fix #1404: Priming the root key fails after loading ipfire.org RPZ
  zones. Fixed by including the ZONEMD RRtype in the list of types to
  ignore for RPZ zones. Analysis and patch provided by ummeegge.

8 weeks ago- Fix #1403: Inconsistency between do-nat64 and do-not-query-address
W.C.A. Wijngaards [Wed, 11 Feb 2026 15:01:30 +0000 (16:01 +0100)] 
- Fix #1403: Inconsistency between do-nat64 and do-not-query-address
  during retries.

8 weeks ago- Update generated man pages.
W.C.A. Wijngaards [Mon, 9 Feb 2026 15:11:17 +0000 (16:11 +0100)] 
- Update generated man pages.

8 weeks agoChangelog note and documentation for #1401.
W.C.A. Wijngaards [Mon, 9 Feb 2026 15:05:28 +0000 (16:05 +0100)] 
Changelog note and documentation for #1401.
- Merge #1401: Add a new build-time option for system TLS.
  The --enable-system-tls flag enables the
  tls-use-system-policy-versions setting by default.

8 weeks agoAdd a new build-time option for system TLS (#1401)
Petr Menšík [Mon, 9 Feb 2026 14:57:16 +0000 (15:57 +0100)] 
Add a new build-time option for system TLS (#1401)

We want to use crypto-policy provided configuration always in our
builds. Allow changing the default of tls-use-system-policy-versions at
build time by a simple configure parameter.

2 months ago- Fix #1389: [FR] replacement with ECC-GOST12 according to RFC9558.
Yorgos Thessalonikefs [Fri, 6 Feb 2026 13:39:23 +0000 (14:39 +0100)] 
- Fix #1389: [FR] replacement with ECC-GOST12 according to RFC9558.
  Patch contributed by Igor V. Ruzanov, available in
  contrib/gost12.patch.

2 months agoFix attribution of fix.
W.C.A. Wijngaards [Wed, 4 Feb 2026 13:17:56 +0000 (14:17 +0100)] 
Fix attribution of fix.

2 months ago- Fix local privilege escalation on Windows. Thanks to Hao Huang
W.C.A. Wijngaards [Wed, 4 Feb 2026 10:54:11 +0000 (11:54 +0100)] 
- Fix local privilege escalation on Windows. Thanks to Hao Huang
  for the report. The OpenSSL init calls are set to not load
  the openssl.cnf file when compiled for Windows.

2 months ago- Eagerly remove .skip mark files in between mini_tdir.sh runs in case
Yorgos Thessalonikefs [Tue, 3 Feb 2026 14:07:37 +0000 (15:07 +0100)] 
- Eagerly remove .skip mark files in between mini_tdir.sh runs in case
  there has been a change on the environment.

2 months ago- Add test for allow-notify with a host name.
W.C.A. Wijngaards [Tue, 27 Jan 2026 12:49:33 +0000 (13:49 +0100)] 
- Add test for allow-notify with a host name.

2 months ago- Fix to not skip allow-notify hostname lookups when there are only
W.C.A. Wijngaards [Mon, 26 Jan 2026 15:16:38 +0000 (16:16 +0100)] 
- Fix to not skip allow-notify hostname lookups when there are only
  urls.

2 months agoMerge branch 'master' of github.com:NLnetLabs/unbound
W.C.A. Wijngaards [Mon, 26 Jan 2026 14:17:26 +0000 (15:17 +0100)] 
Merge branch 'master' of github.com:NLnetLabs/unbound

2 months ago- Fix that allow-notify entries with hostnames are copied after IPv4
W.C.A. Wijngaards [Mon, 26 Jan 2026 14:16:43 +0000 (15:16 +0100)] 
- Fix that allow-notify entries with hostnames are copied after IPv4
  and IPv6 lookup.

2 months ago- Update generated man pages.
Yorgos Thessalonikefs [Fri, 23 Jan 2026 17:04:25 +0000 (18:04 +0100)] 
- Update generated man pages.

2 months agoChangelog entry for #1396:
Yorgos Thessalonikefs [Fri, 23 Jan 2026 16:46:14 +0000 (17:46 +0100)] 
Changelog entry for #1396:
- Merge #1396: Log Linux thread ID.
- On Linux systems log the system-wide unique thread ID instead of
  Unbound's internal thread counter.
- Introduce the 'log-thread-id' configuration option to manage logging
  the system-wide Linux thread ID for easier debugging with system
  tools.

2 months agoMerge pull request #1396 from NLnetLabs/features/thread-id
Yorgos Thessalonikefs [Fri, 23 Jan 2026 16:42:30 +0000 (17:42 +0100)] 
Merge pull request #1396 from NLnetLabs/features/thread-id

2 months ago- Introduce the 'log-thread-id' configuration option to manage logging 1396/head
Yorgos Thessalonikefs [Fri, 23 Jan 2026 16:15:14 +0000 (17:15 +0100)] 
- Introduce the 'log-thread-id' configuration option to manage logging
  the system-wide Linux thread ID for easier debugging with system
  tools.

2 months ago- On Linux systems log the system-wide unique thread ID instead of
Yorgos Thessalonikefs [Fri, 23 Jan 2026 16:08:55 +0000 (17:08 +0100)] 
- On Linux systems log the system-wide unique thread ID instead of
  Unbound's internal thread counter.

2 months ago- Fix http test tool petal to not print errors when there is no
W.C.A. Wijngaards [Thu, 22 Jan 2026 13:19:35 +0000 (14:19 +0100)] 
- Fix http test tool petal to not print errors when there is no
  error.

2 months ago- Fix that fast reload copies the iter_scrub_ns, iter_scrub_cname
W.C.A. Wijngaards [Thu, 22 Jan 2026 08:42:56 +0000 (09:42 +0100)] 
- Fix that fast reload copies the iter_scrub_ns, iter_scrub_cname
  and max_global_quota options.

2 months ago- Merge #1388: QNX Porting support for unbound.
W.C.A. Wijngaards [Wed, 21 Jan 2026 12:13:01 +0000 (13:13 +0100)] 
- Merge #1388: QNX Porting support for unbound.

2 months agoQNX Porting support for unbound branch-1.24.1 (#1388)
nnarayanamurthy [Wed, 21 Jan 2026 12:12:13 +0000 (17:42 +0530)] 
QNX Porting support for unbound branch-1.24.1 (#1388)

* qnx Porting support for version release-1.24.1

* updating __QNXNTO__ with __QNX__

2 months ago- Merge #1392: Include "V" (version) option in synopsis.
W.C.A. Wijngaards [Mon, 19 Jan 2026 08:09:47 +0000 (09:09 +0100)] 
- Merge #1392: Include "V" (version) option in synopsis.

2 months agoInclude "V" (version) option in synopsis (#1392)
David H. Gutteridge [Mon, 19 Jan 2026 08:09:12 +0000 (03:09 -0500)] 
Include "V" (version) option in synopsis (#1392)

2 months ago- Fix documentation for requestlist.overwritten and
W.C.A. Wijngaards [Thu, 15 Jan 2026 08:35:04 +0000 (09:35 +0100)] 
- Fix documentation for requestlist.overwritten and
  requestlist.exceeded, it explains which query was dropped.

3 months agoCompile fixup for #1381.
W.C.A. Wijngaards [Thu, 8 Jan 2026 13:19:06 +0000 (14:19 +0100)] 
Compile fixup for #1381.

3 months agoChangelog note for #1381, and man page explanation.
W.C.A. Wijngaards [Thu, 8 Jan 2026 13:16:54 +0000 (14:16 +0100)] 
Changelog note for #1381, and man page explanation.
- Merge #1381: Do not initialize quic_table unless it is enabled.

3 months agoDo not initialize quic_table unless it is enabled (#1381)
Petr Menšík [Thu, 8 Jan 2026 13:12:32 +0000 (14:12 +0100)] 
Do not initialize quic_table unless it is enabled (#1381)

* Do not initialize quic_table unless it is enabled

Fedora in FIPS mode might fail to initialize ngtcp2 library, because
some ciphers desired are not available.

Make it possible to skip initialization by setting explicitly quic_port
to 0. Unless we have some listeners for port 853 configured, skip its
initialization as well.

Related: https://pagure.io/freeipa/issue/9877

* Fix typo in logged function name

3 months agoChangelog entry for #1391:
Yorgos Thessalonikefs [Tue, 6 Jan 2026 17:21:34 +0000 (18:21 +0100)] 
Changelog entry for #1391:
- Merge #1391 from Götz Görisch: Fix documentation to adhere to
  RFC5952.

3 months agoMerge pull request #1391 from GoetzGoerisch/docs
Yorgos Thessalonikefs [Tue, 6 Jan 2026 17:19:47 +0000 (18:19 +0100)] 
Merge pull request #1391 from GoetzGoerisch/docs

Fix documentation to adhere to RFC 5952

3 months agoFix documentation to adhere to RFC 5952 1391/head
Goetz Goerisch [Tue, 6 Jan 2026 15:10:37 +0000 (16:10 +0100)] 
Fix documentation to adhere to RFC 5952

Update the text representations of IPv6 addresses.

3 months ago- Fix edns subnet, that scope zero queries, when there is a
W.C.A. Wijngaards [Tue, 6 Jan 2026 08:33:00 +0000 (09:33 +0100)] 
- Fix edns subnet, that scope zero queries, when there is a
  subquery without subnet, and the forward-no-cache or
  stub-no-cache option is set, it is not stored in cache due to
  the forward or stub option.
This has the changelog entry and test.

3 months ago- Fix edns subnet, that scope zero queries, when there is a
W.C.A. Wijngaards [Tue, 6 Jan 2026 08:32:21 +0000 (09:32 +0100)] 
- Fix edns subnet, that scope zero queries, when there is a
  subquery without subnet, and the forward-no-cache or
  stub-no-cache option is set, it is not stored in cache due to
  the forward or stub option.

3 months ago- Use the same EDE removal logic when encoding errors as when encoding
Yorgos Thessalonikefs [Wed, 31 Dec 2025 15:22:15 +0000 (16:22 +0100)] 
- Use the same EDE removal logic when encoding errors as when encoding
  replies.

3 months ago- Update the unbound-anchor man page to note write permissions of the
Yorgos Thessalonikefs [Wed, 31 Dec 2025 13:05:42 +0000 (14:05 +0100)] 
- Update the unbound-anchor man page to note write permissions of the
  generated file if it is to be used with Unbound's
  auto-trust-anchor-file option.

3 months ago- Mark "THROWAWAY" and "(DNSSEC) LAME" responses clearly as Unbound's
Yorgos Thessalonikefs [Tue, 30 Dec 2025 12:15:37 +0000 (13:15 +0100)] 
- Mark "THROWAWAY" and "(DNSSEC) LAME" responses clearly as Unbound's
  categorization in the log output.

3 months ago- More specific wording in the unbound.conf man page for stub-first
Yorgos Thessalonikefs [Wed, 24 Dec 2025 13:57:44 +0000 (14:57 +0100)] 
- More specific wording in the unbound.conf man page for stub-first
  and forward-first options.

4 months ago- Fix http2 drop handling to clear the postpone_drop state so that
W.C.A. Wijngaards [Wed, 3 Dec 2025 13:41:10 +0000 (14:41 +0100)] 
- Fix http2 drop handling to clear the postpone_drop state so that
  other streams on the http2 session are not affected by a drop,
  and can clean up properly if also dropped. Fix http2 send reply
  so that when there is a send failure is does not recurse into
  the mesh functions and also does not drop the connection due to
  the condition of one stream.

4 months ago- Fix to remove http2 stream mesh state when mesh new request is
W.C.A. Wijngaards [Tue, 2 Dec 2025 14:31:53 +0000 (15:31 +0100)] 
- Fix to remove http2 stream mesh state when mesh new request is
  dropping the new request.

4 months ago- Fix header comment about EDE reference in validator/val_sigcrypt.h.
W.C.A. Wijngaards [Mon, 1 Dec 2025 15:04:41 +0000 (16:04 +0100)] 
- Fix header comment about EDE reference in validator/val_sigcrypt.h.

4 months ago- Fix to add EDNS CO flag to testbound and debug message log.
W.C.A. Wijngaards [Mon, 1 Dec 2025 14:29:41 +0000 (15:29 +0100)] 
- Fix to add EDNS CO flag to testbound and debug message log.

4 months ago- For #1375, there is no DNSTAP environment if it wasn't configured.
Yorgos Thessalonikefs [Fri, 28 Nov 2025 14:20:21 +0000 (15:20 +0100)] 
- For #1375, there is no DNSTAP environment if it wasn't configured.

4 months ago- Tag for 1.24.2 release.
Yorgos Thessalonikefs [Wed, 26 Nov 2025 12:54:25 +0000 (13:54 +0100)] 
- Tag for 1.24.2 release.
  The repository continues with version 1.24.3.

4 months agoMerge branch 'branch-1.24.2'
Yorgos Thessalonikefs [Wed, 26 Nov 2025 12:50:49 +0000 (13:50 +0100)] 
Merge branch 'branch-1.24.2'

4 months ago- Additional fix for CVE-2025-11411 (possible domain hijacking attack), branch-1.24.2 release-1.24.2
Yorgos Thessalonikefs [Wed, 26 Nov 2025 10:09:40 +0000 (11:09 +0100)] 
- Additional fix for CVE-2025-11411 (possible domain hijacking attack),
  to include YXDOMAIN and non-referral nodata answers in the mitigation as
  well, reported by TaoFei Guo from Peking University, Yang Luo and JianJun
  Chen from Tsinghua University.

4 months ago- Set version to 1.24.2.
Yorgos Thessalonikefs [Wed, 26 Nov 2025 09:58:06 +0000 (10:58 +0100)] 
- Set version to 1.24.2.

4 months agoChangelog note for #1375, and lock for lockchecks and ifdef for compile fix.
W.C.A. Wijngaards [Thu, 13 Nov 2025 14:45:27 +0000 (15:45 +0100)] 
Changelog note for #1375, and lock for lockchecks and ifdef for compile fix.
- Merge #1375: Copy DNSTAP changes from daemon to workers after
  fast_reload.

4 months agoCopy DNSTAP changes from daemon to workers after fast_reload (#1375)
smeddlep [Thu, 13 Nov 2025 14:42:44 +0000 (14:42 +0000)] 
Copy DNSTAP changes from daemon to workers after fast_reload (#1375)

- On fast_reload, the identity and version strings are always freed and
  reallocated as part of dt_apply_cfg(). Add fr_worker_pickup_dnstap_changes()
  to copy any changes from daemon to workers.

4 months agoChangelog note for #1374
W.C.A. Wijngaards [Thu, 13 Nov 2025 08:34:45 +0000 (09:34 +0100)] 
Changelog note for #1374
- Merge #1374: Mesh reply counters.
  This adds the statistics num.queries.replyaddr_limit and
  requestlist.current.replies.

4 months agoMesh reply counters (#1374)
Robert Edmonds [Thu, 13 Nov 2025 08:33:05 +0000 (03:33 -0500)] 
Mesh reply counters (#1374)

* Statistics counter for number of queries dropped by limit on reply addresses

Request list entries can be associated with multiple pending "reply
addresses". Basically each request list entry keeps its own list of
clients that should receive the response once the recursion is finished.
This requires keeping allocations around for each client, and there is
a global limit on the number of *additional* reply addresses that can
be allocated. (Each new request list entry seems to get its own initial
reply address which is not counted against the limit.)

This commit adds a statistics counter "num_queries_replyaddr_limit" that
counts the number of incoming client queries that have been dropped due
to the restriction on allocating additional reply addresses. This allows
distinguishing these drops from other kinds of drops.

* Statistics counter for number of mesh reply entries

Request list entries can be associated with multiple pending "reply
addresses". Since there is a limit on the number of additional reply
addresses that can be allocated which can cause incoming queries to be
dropped if exceeded, it would be nice to be able to track this number.

This commit basically exports the mesh_area's internal counter
`num_reply_addrs` as "threadX.requestlist.current.replies" /
"total.requestlist.current.replies".

4 months ago- iana portlist updated.
W.C.A. Wijngaards [Wed, 12 Nov 2025 10:49:21 +0000 (11:49 +0100)] 
- iana portlist updated.

4 months ago- Fix that when discard timeout drops packet, they are accounted as
W.C.A. Wijngaards [Wed, 12 Nov 2025 10:49:04 +0000 (11:49 +0100)] 
- Fix that when discard timeout drops packet, they are accounted as
  less reply addresses in use in the mesh area.

5 months ago- Fix configure test for nonstring attribute so that it does not
W.C.A. Wijngaards [Thu, 6 Nov 2025 14:03:17 +0000 (15:03 +0100)] 
- Fix configure test for nonstring attribute so that it does not
  accept when the compiler prints a warning about an unknown
  attribute.

5 months ago- Fix configure test for noreturn attribute so it compiles without
W.C.A. Wijngaards [Thu, 6 Nov 2025 14:00:08 +0000 (15:00 +0100)] 
- Fix configure test for noreturn attribute so it compiles without
  warning.

5 months ago- Fix add comment to worker_handle_request function that explain it.
W.C.A. Wijngaards [Thu, 6 Nov 2025 13:32:56 +0000 (14:32 +0100)] 
- Fix add comment to worker_handle_request function that explain it.

5 months ago- Fix dns64 log output to log the default instead of a null string.
W.C.A. Wijngaards [Tue, 4 Nov 2025 09:19:03 +0000 (10:19 +0100)] 
- Fix dns64 log output to log the default instead of a null string.

5 months ago- Fix #1366: Infra cache does not work correctly for NAT64, by 1394/head
Yorgos Thessalonikefs [Sat, 1 Nov 2025 14:10:27 +0000 (15:10 +0100)] 
- Fix #1366: Infra cache does not work correctly for NAT64, by
  moving the NAT64 synthesis from the iterator when selecting a target
  address, to the delegation point itself when adding target
  addresses.

5 months ago- Fix typo; spotted by T3rm1.
Yorgos Thessalonikefs [Tue, 28 Oct 2025 13:42:20 +0000 (14:42 +0100)] 
- Fix typo; spotted by T3rm1.

5 months ago- Fix #1165, document the possible circular dependency when using
Yorgos Thessalonikefs [Mon, 27 Oct 2025 13:00:15 +0000 (14:00 +0100)] 
- Fix #1165, document the possible circular dependency when using
  host names instead of IP addresses for name servers in stub/forward
  zones and log a warning when spotted in the configuration.

5 months agoChangelog entry for #1331:
Yorgos Thessalonikefs [Mon, 27 Oct 2025 08:59:35 +0000 (09:59 +0100)] 
Changelog entry for #1331:
- Merge #1331 from Jitka Plesníková: Replace deprecated $function by
  new $action, for SWIG.

5 months agoMerge pull request #1331 from jplesnik/master
Yorgos Thessalonikefs [Mon, 27 Oct 2025 08:57:59 +0000 (09:57 +0100)] 
Merge pull request #1331 from jplesnik/master

Replace deprecated $function by new $action