]>
granicus.if.org Git - pdns/log
Peter van Dijk [Mon, 26 Mar 2018 18:52:57 +0000 (20:52 +0200)]
improve out of range reporting
(cherry picked from commit
cccfa59b37d7b4dbe4e2429e495b2196e4244dc3 )
Peter van Dijk [Mon, 26 Mar 2018 18:37:50 +0000 (20:37 +0200)]
report unparseable data in stoul invalid_argument exception
(cherry picked from commit
2f975181d5d660e25cc4cd41f1e30788da56df96 )
Pieter Lexis [Fri, 13 Apr 2018 12:52:57 +0000 (14:52 +0200)]
Merge pull request #6490 from Habbie/backport-6484
Backport: recheck serial when AXFR is done
Peter van Dijk [Fri, 13 Apr 2018 11:31:59 +0000 (13:31 +0200)]
g_log used to be L
Peter van Dijk [Thu, 12 Apr 2018 18:33:41 +0000 (20:33 +0200)]
requeue serial check if NOTIFY comes in while incoming AXFR is ongoing
(cherry picked from commit
7d4ac70c97fffe7916ef8b8585dd9552c9a59517 )
Peter van Dijk [Thu, 12 Apr 2018 17:58:02 +0000 (19:58 +0200)]
improve slave NOTIFY logging
(cherry picked from commit
1793df78171989a93dde65506fff5d37b8223957 )
Remi Gacogne [Fri, 30 Mar 2018 08:41:49 +0000 (10:41 +0200)]
Merge pull request #6416 from Habbie/auth-4.1.x-mirror-dnsperf
backport #6360: use mirror for dnsperf
Peter van Dijk [Fri, 16 Mar 2018 13:33:58 +0000 (14:33 +0100)]
backport #6360: use mirror for dnsperf
(cherry picked from commit
0e62797ed1cc33cbc44cbbc58d69da400cec85b1 )
Pieter Lexis [Wed, 28 Mar 2018 13:38:49 +0000 (15:38 +0200)]
Merge pull request #6337 from Habbie/alias-tcp-4.1.x
Backport: add TCP support for ALIAS
Peter van Dijk [Mon, 26 Mar 2018 08:47:26 +0000 (10:47 +0200)]
remove useless lines
(cherry picked from commit
468403b0354bfda691bfeee0bf1419f549c728a0 )
Pieter Lexis [Wed, 21 Mar 2018 13:41:34 +0000 (14:41 +0100)]
Remove leftover logging invocation
(cherry picked from commit
c92c0cbc214cd54f59ae28b759063bc100f1f290 )
Peter van Dijk [Fri, 9 Mar 2018 14:45:58 +0000 (15:45 +0100)]
add TCP support for ALIAS. Closes #6328
(cherry picked from commit
c4e084f20f0cfd995e3f4aa75d534cf3b7ea89fd )
Peter van Dijk [Fri, 9 Mar 2018 13:34:12 +0000 (14:34 +0100)]
remove recursor= leftovers
(cherry picked from commit
7d338903e25cc9c3301a7bc9b323d1a739fc5107 )
Pieter Lexis [Thu, 1 Mar 2018 08:39:07 +0000 (09:39 +0100)]
Merge pull request #6314 from pieterlexis/auth-41-backport-6276
Backport #6276 (auth 4.1.x): Prevent CNAME + other data with DNSUpdate
Pieter Lexis [Fri, 16 Feb 2018 16:16:54 +0000 (17:16 +0100)]
dyndns: Add tests for the CNAME-with-other-data issue
(cherry picked from commit
e07c665fba49183eafafffc493c6c0e7c36fd4ab )
Pieter Lexis [Fri, 16 Feb 2018 15:24:14 +0000 (16:24 +0100)]
dnsupdate: Refuse updates for records with CNAMEs
Also, refuse updates for CNAMES when other records exist and send
FORMERR to queries that add a CNAME and other data in the same update.
(cherry picked from commit
6f604952dcd8f4bbd9e884c9029039ef915cac24 )
Peter van Dijk [Fri, 16 Feb 2018 08:45:25 +0000 (09:45 +0100)]
Merge pull request #6261 from Habbie/auth-4.1.x-backports
backports for auth 4.1.1
Peter van Dijk [Fri, 16 Feb 2018 08:43:20 +0000 (09:43 +0100)]
Merge pull request #6260 from Habbie/4.1.x-6029
backport: forbid label compression in ALIAS wire format
Florian Obser [Fri, 8 Dec 2017 16:07:49 +0000 (17:07 +0100)]
Backport #6077: Include unistd.h for chroot(2) et al.
(cherry picked from commit
17d38f8d2c8ee7cd5964387812a20809c2ba3c37 )
Grégory Oestreicher [Mon, 4 Dec 2017 23:56:08 +0000 (00:56 +0100)]
Backport #6048
LDAP: fix getDomainInfo() to set this as di.backend
(cherry picked from commit
0e9159f29550c9f7bc67940a89ee3626f3d462c2 )
Remove unused variable.
(cherry picked from commit
defa22801923b441cbc2b4c9e52ab65991b818d3 )
Leon Xu [Thu, 11 Jan 2018 09:49:25 +0000 (17:49 +0800)]
Backport bugfix from #6172: IXFR shouldn't remove RRs which aren't in deleted list
(cherry picked from commit
668624c8c617a40482a28b3c168701abed55aef0 )
Remi Gacogne [Tue, 2 Jan 2018 16:03:47 +0000 (17:03 +0100)]
backport #6134: auth: Always bind the results array after executing a statement
We will reuse the same array most of the time, but it turns out that
calling mysql_stmt_next_result() followed by mysql_stmt_store_result()
invalidates the existing binding (the first one sets stmt->bind_result_done
to false, causing the second to reset the existing binding).
(cherry picked from commit
4fd90e75d47d6ec43d10c94ea260b08e50806442 )
Remi Gacogne [Mon, 1 Jan 2018 22:43:51 +0000 (23:43 +0100)]
backport #6129: auth: Init openssl and libsodium before chrooting in pdnsutil
(cherry picked from commit
7c3ee3dcfed2d0a9700d0cc8c064e031262e6279 )
Chris Hofstaedtler [Thu, 28 Dec 2017 17:52:02 +0000 (18:52 +0100)]
backport #6122: ldapbackend: fix listing zones incl. AXFR
list() did not initialise m_qtype, but get() looks at it.
(cherry picked from commit
1ed4e23928bff126ae7adfe9da2476a7319ad3f5 )
Peter van Dijk [Mon, 18 Dec 2017 13:21:13 +0000 (14:21 +0100)]
backport #6103: auth: fix out of bounds exception in CAA processing, fixes #6089
(cherry picked from commit
a94e55806c018f568ffd45ad75400b6b69bd18ae )
Remi Gacogne [Mon, 4 Dec 2017 08:41:49 +0000 (09:41 +0100)]
Backport #6041: Add the missing <sys/time.h> include to mplexer.hh for struct timeval
(cherry picked from commit
f1d51ff73fe0cf9d370e51a2aef7ba38c990e17f )
Peter van Dijk [Thu, 30 Nov 2017 18:20:41 +0000 (19:20 +0100)]
forbid label compression in ALIAS wire format
fixes #6028
(cherry picked from commit
85c6d90e8776d08c7edfb916c272d5a7c0b04d2c )
Remi Gacogne [Fri, 5 Jan 2018 09:12:57 +0000 (10:12 +0100)]
Merge pull request #6142 from Habbie/auth-4.1.x-travis
auth 4.1.x: limit travis builds to auth only
Peter van Dijk [Thu, 4 Jan 2018 14:46:29 +0000 (15:46 +0100)]
limit builds to auth only
aerique [Thu, 30 Nov 2017 09:33:09 +0000 (10:33 +0100)]
Merge pull request #6016 from aerique:feature/update-auth-4.1.0-changelog.
Update changelog and secpoll for 4.1.0.
aerique [Tue, 28 Nov 2017 20:21:28 +0000 (21:21 +0100)]
Merge pull request #6006 from rgacogne/nixu-5.3.4
rec: Sanitize values received from the API before writing them to the conf
aerique [Tue, 28 Nov 2017 15:53:22 +0000 (16:53 +0100)]
Merge pull request #6011 from ahupowerdns/quote-server-id
quote server-id to hosts with - or . in their name get reported again
aerique [Tue, 28 Nov 2017 15:53:08 +0000 (16:53 +0100)]
Merge pull request #6015 from Habbie/id.server
it's id.server, not server.id
Peter van Dijk [Tue, 28 Nov 2017 13:18:44 +0000 (14:18 +0100)]
nit
Pieter Lexis [Tue, 28 Nov 2017 12:33:18 +0000 (13:33 +0100)]
Merge pull request #6000 from rgacogne/rec-authzone-validation
rec: Skip validation (including cached entries) for auth zones
Pieter Lexis [Tue, 28 Nov 2017 12:33:03 +0000 (13:33 +0100)]
Merge pull request #6001 from zeha/secpoll-servfail
recursor secpoll: improve message on timeout
Pieter Lexis [Tue, 28 Nov 2017 12:32:39 +0000 (13:32 +0100)]
Merge pull request #6009 from rgacogne/rec-zone-part-signer
rec: When validating DNSKeys, the zone should be part of the signer
Pieter Lexis [Tue, 28 Nov 2017 12:32:26 +0000 (13:32 +0100)]
Merge pull request #6008 from rgacogne/ecdsa-error-leak
rec: Don't leak when the loading a public ECDSA key fails
aerique [Tue, 28 Nov 2017 12:26:56 +0000 (13:26 +0100)]
Merge pull request #6007 from rgacogne/auth-web-readonly-ops
auth: Deny cache flush, zone retrieve and notify if the API is RO
bert hubert [Tue, 28 Nov 2017 10:44:51 +0000 (11:44 +0100)]
fix tab & {}
bert hubert [Tue, 28 Nov 2017 09:50:24 +0000 (10:50 +0100)]
quote server-id. This stops us from breaking serving chaos txt id.server if your server has a dash or a dot or an underscore in its name.
Peter van Dijk [Tue, 28 Nov 2017 09:28:17 +0000 (10:28 +0100)]
Merge pull request #5997 from rgacogne/rec-additional-val
rec: Store additional records as non-auth, even on AA=1 answers
Peter van Dijk [Tue, 28 Nov 2017 08:54:22 +0000 (09:54 +0100)]
Merge pull request #6004 from pieterlexis/rm-old-soa-edit
Remove deprecated SOA-EDIT values
Peter van Dijk [Tue, 28 Nov 2017 08:52:49 +0000 (09:52 +0100)]
Merge pull request #5617 from Habbie/ednsflags
fix reading of ednsflags in recursor testing
Remi Gacogne [Tue, 28 Nov 2017 08:15:45 +0000 (09:15 +0100)]
doc: Fix a typo in PowerDNS Advisory 2017-04
Remi Gacogne [Mon, 17 Jul 2017 17:21:01 +0000 (19:21 +0200)]
rec: Sanitize values received from the API before writing them to the conf
Remi Gacogne [Tue, 22 Aug 2017 09:48:07 +0000 (11:48 +0200)]
auth: Deny cache flush, zone retrieve and notify if the API is RO
Remi Gacogne [Wed, 11 Oct 2017 13:28:04 +0000 (15:28 +0200)]
Fix a memory leak when loading an RSA key with an invalid modulus
Remi Gacogne [Thu, 13 Jul 2017 14:22:30 +0000 (16:22 +0200)]
Don't leak when the loading a public ECDSA key fails
Remi Gacogne [Thu, 17 Aug 2017 16:05:54 +0000 (18:05 +0200)]
rec: When validating DNSKeys, the zone should be part of the signer
Peter van Dijk [Wed, 16 Aug 2017 12:08:13 +0000 (14:08 +0200)]
do not demand a DO reply to a non-DO query
Pieter Lexis [Mon, 27 Nov 2017 12:24:51 +0000 (13:24 +0100)]
Remove deprecated SOA-EDIT values
Pieter Lexis [Mon, 27 Nov 2017 16:58:49 +0000 (17:58 +0100)]
Merge pull request #5916 from pieterlexis/rm-wiki
Documentation additions so we can rid of the wiki
Pieter Lexis [Mon, 27 Nov 2017 16:58:32 +0000 (17:58 +0100)]
Merge pull request #5990 from jannyg/patch-2
Adds description of add-record
Chris Hofstaedtler [Mon, 27 Nov 2017 16:48:45 +0000 (17:48 +0100)]
recursor secpoll: improve message on timeout
Pieter Lexis [Mon, 27 Nov 2017 16:01:41 +0000 (17:01 +0100)]
Fix secpoll
Pieter Lexis [Mon, 27 Nov 2017 15:48:04 +0000 (16:48 +0100)]
Fix changelog syntax
aerique [Mon, 27 Nov 2017 15:35:39 +0000 (16:35 +0100)]
Merge pull request #5999 from aerique/advisories-2017
Add advisories 2017-03, 2017-04, 2017-05, 2017-06 and 2017-07.
Remi Gacogne [Fri, 24 Nov 2017 16:48:19 +0000 (17:48 +0100)]
rec: Skip validation (including cached entries) for auth zones
Pieter Lexis [Mon, 27 Nov 2017 11:56:06 +0000 (12:56 +0100)]
Update security advisory links in secpoll
Peter van Dijk [Wed, 16 Aug 2017 11:44:54 +0000 (13:44 +0200)]
read ednsflags instead of flags
Remi Gacogne [Mon, 27 Nov 2017 10:21:21 +0000 (11:21 +0100)]
rec: Store additional records as non-auth, even on AA=1 answers
We used to store additional records in AA=1 answers as auth. In addition
to being wrong, it also broke DNSSEC validation if the record was stored
as Indeterminate because while we take care of not validating additional
records when processing an answer, we have no way of knowing in which
section a record was originally located when we retrieve it from the cache.
When an answer becomes too big to fit in the requester UDP payload,
rfc4035 allows the sender to keep records in the additional section
while omitting the corresponding RRSIGs, without setting the TC bit.
Remi Gacogne [Mon, 27 Nov 2017 07:15:46 +0000 (08:15 +0100)]
Add release date, security advisories to the changelogs
Jan-Arve Nygård [Fri, 24 Nov 2017 12:47:04 +0000 (13:47 +0100)]
Added description of add-record
Added description of add-record with options to man-pages
Remi Gacogne [Fri, 24 Nov 2017 10:10:28 +0000 (11:10 +0100)]
Update secpoll
Remi Gacogne [Tue, 24 Oct 2017 09:02:57 +0000 (11:02 +0200)]
Add advisories 2017-03, 2017-04, 2017-05, 2017-06 and 2017-07
bert hubert [Thu, 23 Nov 2017 12:54:49 +0000 (13:54 +0100)]
make notify.cc compile again
aerique [Thu, 23 Nov 2017 11:24:15 +0000 (12:24 +0100)]
Merge pull request #5953 from pieterlexis/auth-405-rec-407-changelog
Add Authoritative Server 4.0.5 and Recursor 4.0.7 changelogs + secpoll
bert hubert [Wed, 22 Nov 2017 13:24:39 +0000 (14:24 +0100)]
clarify that dnsdist latency averages are in microseconds
Remi Gacogne [Wed, 22 Nov 2017 11:38:55 +0000 (12:38 +0100)]
Merge pull request #5970 from 42wim/burst
dnsdist: Add burst option to MaxQPSIPRule
Remi Gacogne [Wed, 22 Nov 2017 11:17:45 +0000 (12:17 +0100)]
Update auth 4.0.5 and rec 4.0.7 changelogs with recent backports
Pieter Lexis [Tue, 14 Nov 2017 08:45:26 +0000 (09:45 +0100)]
Add secpoll for auth 4.0.5 and rec 4.0.7
Pieter Lexis [Tue, 14 Nov 2017 08:44:09 +0000 (09:44 +0100)]
Add Recursor 4.0.7 changelog
Pieter Lexis [Fri, 3 Nov 2017 15:18:19 +0000 (16:18 +0100)]
Add Authoritative Server 4.0.5 changelog
Remi Gacogne [Wed, 22 Nov 2017 11:02:17 +0000 (12:02 +0100)]
Merge pull request #5978 from rgacogne/rec-negcache-referral-to-unsigned
rec: Fix DNSSEC validation of DS denial from the negative cache
aerique [Wed, 22 Nov 2017 10:11:01 +0000 (11:11 +0100)]
Merge pull request #5980 from rgacogne/rec-denial-validation-caching
rec: Cache Secure validation state when inserting negcache entries
aerique [Wed, 22 Nov 2017 09:15:26 +0000 (10:15 +0100)]
Merge pull request #5964 from pieterlexis/api-crypto-key-consistency
API: Make the /cryptokeys endpoint consistently use CryptoKey objects
aerique [Wed, 22 Nov 2017 08:34:39 +0000 (09:34 +0100)]
Merge pull request #5976 from Habbie/soa-unsetdnsname
report remote IP when SOA query comes back with empty question section
Pieter Lexis [Tue, 21 Nov 2017 16:31:42 +0000 (17:31 +0100)]
Merge pull request #5954 from pieterlexis/cherry-pick-script
Add two scripts: one to backport PRs and one to generate changelogs
Pieter Lexis [Tue, 21 Nov 2017 16:31:21 +0000 (17:31 +0100)]
Merge pull request #5972 from rgacogne/rec-dump-neg-status
rec: Dump the validation status of negcache entries, fix DNSSEC type
Pieter Lexis [Tue, 21 Nov 2017 16:30:34 +0000 (17:30 +0100)]
Merge pull request #5968 from pieterlexis/api-rectify-transaction
Fix hang when PATCHing zone during rectify
Pieter Lexis [Tue, 21 Nov 2017 16:29:32 +0000 (17:29 +0100)]
Merge pull request #5958 from pieterlexis/centos-7-ship-dnsdist-multi-instance
Packages: Ship dnsdist multi-instance files
Wim [Tue, 21 Nov 2017 13:17:58 +0000 (14:17 +0100)]
Fix typo
Remi Gacogne [Tue, 21 Nov 2017 09:42:43 +0000 (10:42 +0100)]
rec: Cache Secure validation state when inserting negcache entries
Fix a bug that prevented Secure negative cache entries to be marked
as such when they were first inserted, marking them as Indeterminate
instead. This would require us to validate them a second time for no
valid reason.
Remi Gacogne [Mon, 20 Nov 2017 17:12:48 +0000 (18:12 +0100)]
rec: Fix DNSSEC validation of DS denial from the negative cache
There is two reasons you can get a proper DS denial:
* Secure to insecure cut, and if we are getting a referral with a
DS denial, we know that we have to check that the NS bit is set
as described in section 8.9 of rfc5155
* No zone cut inside a secure zone, and then of course the NS is
not set
When we retrieve the DS denial from the negative cache with a
validation status of Indeterminate, most likely because validation
was not enabled during the query that landed it in the cache, we
don't have enough data to know which case we are looking at, so
let's just skip the NS check.
Peter van Dijk [Mon, 20 Nov 2017 13:32:23 +0000 (14:32 +0100)]
report remote IP when SOA query comes back with empty question section
this improves the #5974 situation a bit
bert hubert [Mon, 20 Nov 2017 11:23:45 +0000 (12:23 +0100)]
Merge pull request #5971 from rgacogne/rec-getdsrecords-erased-it
rec: Fix the use of a deleted iterator in SyncRes::getDSRecords()
Remi Gacogne [Mon, 20 Nov 2017 10:01:48 +0000 (11:01 +0100)]
rec: Fix the use of a deleted iterator in SyncRes::getDSRecords()
Remi Gacogne [Mon, 20 Nov 2017 08:56:34 +0000 (09:56 +0100)]
rec: Update the negcache's unit tests (validation status, DNSSEC type)
Remi Gacogne [Mon, 20 Nov 2017 08:55:50 +0000 (09:55 +0100)]
rec: Dump the correct NSEC record type for negative cache entries
Remi Gacogne [Sun, 19 Nov 2017 19:22:47 +0000 (20:22 +0100)]
rec: Add the validation status when dumping the negative cache
Wim [Fri, 17 Nov 2017 22:58:46 +0000 (23:58 +0100)]
dnsdist: Add burst option to MaxQPSIPRule
bert hubert [Fri, 17 Nov 2017 16:09:54 +0000 (17:09 +0100)]
Merge pull request #5969 from giganteous/rec-correct-documentation-typo
Fix reference to the wrong product
Kai Storbeck [Fri, 17 Nov 2017 16:04:37 +0000 (17:04 +0100)]
Fix reference to the wrong product
aerique [Fri, 17 Nov 2017 13:05:40 +0000 (14:05 +0100)]
Merge pull request #5965 from aerique:feature/update-rec-4.1.0-rc3-changelog
Update ChangeLog and secpoll for rec-4.1.0-rc3.
Pieter Lexis [Fri, 17 Nov 2017 12:20:52 +0000 (13:20 +0100)]
Fix hang when PATCHing zone during rectify
Before, we would spawn a new UeberBackend in the DNSSECKeeper, but there
was already a transaction going on, so the rectify would never finish,
as rectifyZone would not return.
aerique [Fri, 17 Nov 2017 11:27:31 +0000 (12:27 +0100)]
Merge pull request #5961 from jake2184/master
Edit configname definition to include the 'config-name' argument
Pieter Lexis [Thu, 16 Nov 2017 16:43:13 +0000 (17:43 +0100)]
Support csk in the cryptokey endpoint
Pieter Lexis [Thu, 16 Nov 2017 16:41:40 +0000 (17:41 +0100)]
Compare algorithm mnemonics case insensitive
Pieter Lexis [Thu, 16 Nov 2017 15:05:50 +0000 (16:05 +0100)]
Map DNSSEC algo-numbers and names 1:1