]>
granicus.if.org Git - pdns/log
Pieter Lexis [Thu, 8 Dec 2016 13:02:58 +0000 (14:02 +0100)]
Add security advisories
Pieter Lexis [Fri, 13 Jan 2017 08:10:46 +0000 (09:10 +0100)]
Merge pull request #4893 from rgacogne/tsig-ixfr
Check TSIG signature on IXFR
Pieter Lexis [Thu, 12 Jan 2017 13:43:25 +0000 (14:43 +0100)]
Merge pull request #4889 from rgacogne/auth-unknown-record-content-size
auth: Correctly check unknown record content size
Remi Gacogne [Thu, 15 Sep 2016 13:28:45 +0000 (15:28 +0200)]
Check TSIG signature on IXFR
Pieter Lexis [Thu, 12 Jan 2017 13:16:07 +0000 (14:16 +0100)]
Merge pull request #4887 from rgacogne/auth-webserver-exit
auth: Don't exit if the webserver can't accept a connection
Pieter Lexis [Thu, 12 Jan 2017 13:15:24 +0000 (14:15 +0100)]
Merge pull request #4882 from rgacogne/spurious-rrs
Don't parse spurious RRs in queries when we don't need them
Pieter Lexis [Thu, 12 Jan 2017 12:42:48 +0000 (13:42 +0100)]
Merge pull request #4880 from rgacogne/rec-depth-limit
rec: Add `max-recursion-depth` to limit the number of internal recursion
Remi Gacogne [Mon, 24 Oct 2016 09:09:00 +0000 (11:09 +0200)]
auth: Correctly check unknown record content size
Remi Gacogne [Thu, 15 Sep 2016 14:41:32 +0000 (16:41 +0200)]
auth: Don't exit if the webserver can't accept a connection
This could lead to a Denial Of Service, before we even got a chance
to check that the remote client is allowed by the ACL.
Reported by mongo (thanks!).
Remi Gacogne [Fri, 16 Sep 2016 15:10:25 +0000 (17:10 +0200)]
Don't parse spurious RRs in queries when we don't need them
Pieter Lexis [Wed, 11 Jan 2017 18:09:16 +0000 (19:09 +0100)]
Merge pull request #4868 from grinapo/master
Document that carbon-server requires IP address, no hostname accepted.
Pieter Lexis [Wed, 11 Jan 2017 18:08:43 +0000 (19:08 +0100)]
Merge pull request #4872 from pieterlexis/dnsdist-out-of-tree
Fix dnsdist out-of-tree builds
Pieter Lexis [Wed, 11 Jan 2017 18:08:23 +0000 (19:08 +0100)]
Merge pull request #4874 from pieterlexis/ship-mkpubsuffix
Recursor: ship mkpubsuffixcc
Pieter Lexis [Wed, 11 Jan 2017 18:08:05 +0000 (19:08 +0100)]
Merge pull request #4876 from pieterlexis/fix-freebsd-configure
Fix configure on FreeBSD
Pieter Lexis [Tue, 10 Jan 2017 14:20:44 +0000 (15:20 +0100)]
Fix dnsdist out-of-tree builds
Closes #4866
Remi Gacogne [Wed, 11 Jan 2017 14:52:19 +0000 (15:52 +0100)]
rec: Add `max-recursion-depth` to `upgrading.md`
Pieter Lexis [Wed, 11 Jan 2017 12:44:12 +0000 (13:44 +0100)]
Fix configure on FreeBSD
AX_CHECK_LINK_FLAG produced a broken configure script that did not work
on FreeBSD.
Fixes #4875
Remi Gacogne [Tue, 10 Jan 2017 12:12:17 +0000 (13:12 +0100)]
rec: Add `max-recursion-depth` to limit the number of internal recursion
Default to 40, was unlimited.
Pieter Lexis [Tue, 10 Jan 2017 17:04:24 +0000 (18:04 +0100)]
Merge pull request #4804 from ahupowerdns/tcp-forward
remove hardcoding of port 53 for TCP/IP forwarded zones in recursor, …
Pieter Lexis [Tue, 10 Jan 2017 17:01:54 +0000 (18:01 +0100)]
Recursor: ship mkpubsuffixcc
Closes #4842
Pieter Lexis [Tue, 10 Jan 2017 12:11:12 +0000 (13:11 +0100)]
Merge pull request #4794 from pieterlexis/issue-4342
RPZ: some logging fixes
Pieter Lexis [Tue, 10 Jan 2017 12:10:34 +0000 (13:10 +0100)]
Merge pull request #4800 from pieterlexis/pdnsutil-fancyness
Various documentation improvements
Pieter Lexis [Tue, 10 Jan 2017 10:54:05 +0000 (11:54 +0100)]
Merge pull request #4864 from Habbie/enable-jdnssec
reinstate jdnssec usage now that it supports ECDSA
Pieter Lexis [Tue, 10 Jan 2017 10:53:50 +0000 (11:53 +0100)]
Merge pull request #4803 from pieterlexis/issue-4801
Graceful fallback if pandoc is unavailable
Pieter Lexis [Tue, 10 Jan 2017 10:53:23 +0000 (11:53 +0100)]
Merge pull request #4824 from pieterlexis/issue-4680-check-ecdsa-use-openssl-include
Check in the detected OpenSSL/libcrypto for ECDSA
Pieter Lexis [Tue, 10 Jan 2017 10:53:10 +0000 (11:53 +0100)]
Merge pull request #4829 from mind04/axfr
make sure AXFR only delete records from a SLAVE domain in a multi bac…
Pieter Lexis [Tue, 10 Jan 2017 10:52:49 +0000 (11:52 +0100)]
Merge pull request #4836 from zeha/tldnames
Remove hardcoded tld names co.za, co.il
Pieter Lexis [Tue, 10 Jan 2017 10:52:34 +0000 (11:52 +0100)]
Merge pull request #4838 from pieterlexis/check-libatomic
Check if we can link against libatomic if needed
Pieter Lexis [Tue, 10 Jan 2017 10:52:23 +0000 (11:52 +0100)]
Merge pull request #4852 from rgacogne/issue-4851
DNSName: Check that both first two bits are set in compressed labels
Pieter Lexis [Tue, 10 Jan 2017 10:52:09 +0000 (11:52 +0100)]
Merge pull request #4855 from ahupowerdns/getaddrinfo-triplicate
It turns out our use of getaddrinfo in communicator.hh would be retur…
Pieter Lexis [Tue, 10 Jan 2017 10:51:49 +0000 (11:51 +0100)]
Merge pull request #4860 from rgacogne/unfuck-dq
rec: Fix `dq` members alterations from Lua not being taken into account
grin [Tue, 10 Jan 2017 10:36:06 +0000 (11:36 +0100)]
Typo fix
grin [Tue, 10 Jan 2017 09:38:56 +0000 (10:38 +0100)]
Document that carbon-server requires IP address, no hostname accepted.
Remi Gacogne [Mon, 9 Jan 2017 16:59:54 +0000 (17:59 +0100)]
Merge pull request #4856 from rgacogne/dnsdist-better-docs
dnsdist: Clarify docs: `maintenance()`, cache memory usage and `exceed*`
Pieter Lexis [Mon, 2 Jan 2017 11:23:05 +0000 (12:23 +0100)]
Check if we can link against libatomic if needed
Also move the OS detection to the top
Peter van Dijk [Mon, 9 Jan 2017 11:14:48 +0000 (12:14 +0100)]
clean up - was identical to expected_result
Peter van Dijk [Mon, 9 Jan 2017 11:01:40 +0000 (12:01 +0100)]
reinstate jdnssec usage now that it supports ECDSA
Peter van Dijk [Mon, 9 Jan 2017 10:51:13 +0000 (11:51 +0100)]
Merge pull request #4839 from mind04/ent-asterisk-unbound
nsec ent-asterisk test is no longer bogus with unbound 1.6.0
Peter van Dijk [Mon, 9 Jan 2017 10:09:05 +0000 (11:09 +0100)]
Merge pull request #4862 from rgacogne/jdnssec-0.13
jdnssec-tools 0.13 has been released
Remi Gacogne [Mon, 9 Jan 2017 09:24:08 +0000 (10:24 +0100)]
jdnssec-tools 0.13 has been released
Remi Gacogne [Fri, 6 Jan 2017 12:16:35 +0000 (13:16 +0100)]
rec: Add a regression test for `NXDOMAIN` from `presolve()`
Remi Gacogne [Fri, 6 Jan 2017 10:38:27 +0000 (11:38 +0100)]
rec: Fix `dq` members alterations from Lua not being taken into account
Apparently when using reference, LuaWrapper pass the object by copy
and not by reference, so for now we pass `dq` as a pointer, not a
reference.
Remi Gacogne [Thu, 5 Jan 2017 09:47:20 +0000 (10:47 +0100)]
dnsdist: Clarify docs: `maintenance()`, cache memory usage and `exceed*`
Remi Gacogne [Thu, 5 Jan 2017 08:48:26 +0000 (09:48 +0100)]
dnsdist: Update the website's frontage for 1.1.0
Pieter Lexis [Thu, 5 Jan 2017 17:56:04 +0000 (18:56 +0100)]
Merge pull request #4833 from zeha/dnsdist-sidebar-scroll
dnsdist docs: make sidebar scrollable
Pieter Lexis [Thu, 5 Jan 2017 17:55:31 +0000 (18:55 +0100)]
Merge pull request #4822 from ekohl/document-webserver-needed-for-api
Document webserver=yes is needed for API until 4.1.0
bert hubert [Wed, 4 Jan 2017 22:17:55 +0000 (23:17 +0100)]
It turns out our use of getaddrinfo in communicator.hh would be returning all addresses in triplicate (one for each socket type). See https://bugzilla.mozilla.org/show_bug.cgi?id=223811
We may have filtered this out at a later stage, but it was wrong in any case.
bert hubert [Wed, 4 Jan 2017 21:39:06 +0000 (22:39 +0100)]
improve comment on getaddrinfo
Remi Gacogne [Wed, 4 Jan 2017 10:48:47 +0000 (11:48 +0100)]
DNSName: Check that both first two bits are set in compressed labels
We checked that at least one of the first two bits was set,
but the 10 and 01 are combinations do not indicate a compressed label
and are reserved for future use.
Kees Monshouwer [Mon, 2 Jan 2017 15:23:41 +0000 (16:23 +0100)]
add required unbound version to the ent-asterisk test description
Christian Hofstaedtler [Mon, 2 Jan 2017 10:12:13 +0000 (11:12 +0100)]
Remove hardcoded tld names co.za, co.il
These are already in the current public suffix list.
Kees Monshouwer [Sat, 31 Dec 2016 21:04:00 +0000 (22:04 +0100)]
nsec ent-asterisk test is no longer bogus with unbound 1.6.0
Christian Hofstaedtler [Sat, 31 Dec 2016 14:27:21 +0000 (15:27 +0100)]
dnsdist docs: make sidebar scrollable
Kees Monshouwer [Tue, 20 Dec 2016 14:13:15 +0000 (15:13 +0100)]
make sure AXFR only delete records from a SLAVE domain in a multi backend setup
Pieter Lexis [Thu, 29 Dec 2016 17:01:30 +0000 (18:01 +0100)]
Check in the detected OpenSSL/libcrypto for ECDSA
We used to 'just' use the default includes for this detection.
Fixes #4680
Remi Gacogne [Thu, 29 Dec 2016 14:55:18 +0000 (15:55 +0100)]
Merge pull request #4823 from rgacogne/dnsdist-110-changelog
dnsdist: Update ChangeLog for 1.1.0
Remi Gacogne [Thu, 29 Dec 2016 12:21:46 +0000 (13:21 +0100)]
Merge pull request #4812 from rgacogne/dnsdist-qdcount-zero-responses
dnsdist: Handle header-only responses, handle Refused as Servfail in the cache
Remi Gacogne [Thu, 29 Dec 2016 11:21:40 +0000 (12:21 +0100)]
dnsdist: Update ChangeLog for 1.1.0
Ewoud Kohl van Wijngaarden [Thu, 29 Dec 2016 11:06:25 +0000 (12:06 +0100)]
Document webserver=yes is needed for API until 4.1.0
536ab56f5d6e3f657c787c2e6be1a55c7a422241 removed the need for
webserver=yes in pdns.conf when api=yes but that hasn't made it to
a stable release. This ensures the documentation provides a working
configuration for new users.
Remi Gacogne [Thu, 29 Dec 2016 10:46:36 +0000 (11:46 +0100)]
dnsdist: Check that cached responses are >= sizeof(dnsheader)
The check is done before inserting the response into the cache, but
it feels safer to check it again before passing it to `memcpy()`.
We check that the cached response is larger than
`sizeof(dnsheader) + qname` afterwards, but the previous commit
moved the header copy before that check.
Remi Gacogne [Thu, 29 Dec 2016 09:49:34 +0000 (10:49 +0100)]
Merge pull request #4762 from rgacogne/suffixmatchnode-existing-node
SuffixMatchNode: Fix an insertion issue for an existing node
Pieter Lexis [Tue, 27 Dec 2016 06:29:25 +0000 (07:29 +0100)]
Merge pull request #4719 from tuxis-ie/pdnsutil.list-zone
Print $ORIGIN . on list-zone, so the output can be used in load-zone
Pieter Lexis [Tue, 27 Dec 2016 06:28:53 +0000 (07:28 +0100)]
Merge pull request #4624 from rgacogne/auth-tcp-rfc7766-section10
auth: Add TCP management options described in section 10 of rfc7766
Pieter Lexis [Tue, 27 Dec 2016 06:28:21 +0000 (07:28 +0100)]
Merge pull request #4606 from mind04/nsec-dnsname
Use dnsname for nsec generation
Remi Gacogne [Fri, 23 Dec 2016 09:25:45 +0000 (10:25 +0100)]
dnsdist: Handle Refused as ServFail in the packet cache
Remi Gacogne [Thu, 22 Dec 2016 12:46:09 +0000 (13:46 +0100)]
dnsdist: Handle responses with qdcount == 0
@rygl reported that unbound at least sends `Refused` responses
containing only the DNS header.
bert hubert [Wed, 21 Dec 2016 13:07:56 +0000 (14:07 +0100)]
remove hardcoding of port 53 for TCP/IP forwarded zones in recursor, to address #4799
Pieter Lexis [Wed, 21 Dec 2016 11:54:12 +0000 (12:54 +0100)]
Graceful fallback if pandoc is unavailable
Closes #4801
bert hubert [Wed, 21 Dec 2016 08:51:38 +0000 (09:51 +0100)]
make it less wrong
bert hubert [Wed, 21 Dec 2016 08:48:27 +0000 (09:48 +0100)]
talks about 3.0
Pieter Lexis [Wed, 21 Dec 2016 08:19:20 +0000 (09:19 +0100)]
Merge pull request #4789 from rgacogne/rec-prepend-label-get-zone-cut
rec: Don't choke on escaped content in getZoneCuts()
Pieter Lexis [Wed, 21 Dec 2016 08:18:53 +0000 (09:18 +0100)]
Merge pull request #4790 from pieterlexis/manpage-fixes
Revamp the manpage building
Pieter Lexis [Wed, 21 Dec 2016 08:18:40 +0000 (09:18 +0100)]
Merge pull request #4791 from rgacogne/rawlabels-cleanup
Auth: Cleanup `DNSName::getRawLabels()` usage
Pieter Lexis [Wed, 21 Dec 2016 08:18:25 +0000 (09:18 +0100)]
Merge pull request #4793 from pieterlexis/openbsd-hostname
Don't call `hostname -f` on openbsd
Pieter Lexis [Tue, 20 Dec 2016 19:08:42 +0000 (20:08 +0100)]
Document wildcards for the API
Pieter Lexis [Tue, 20 Dec 2016 18:24:52 +0000 (19:24 +0100)]
Document TSIG commands in pdnsutil
Pieter Lexis [Tue, 20 Dec 2016 17:49:54 +0000 (18:49 +0100)]
Describe more migration methods
Remi Gacogne [Tue, 20 Dec 2016 13:33:59 +0000 (14:33 +0100)]
dnsdist: Add `DNSAction.Refused` to the documentation
Reported by @rygl (thanks!).
Pieter Lexis [Tue, 20 Dec 2016 12:36:48 +0000 (13:36 +0100)]
Merge pull request #4781 from zeha/api-comment-zero-ttl
API: correctly take TTL from first record even if we are at the last comment
Pieter Lexis [Tue, 20 Dec 2016 12:36:34 +0000 (13:36 +0100)]
Merge pull request #4777 from pieterlexis/issue-4771
Only delegate if NS's are below apex in auth-zones
Pieter Lexis [Tue, 20 Dec 2016 12:36:11 +0000 (13:36 +0100)]
Merge pull request #4774 from pieterlexis/document-systemd-unit-edit
Document disable-syslog intereaction with systemd
bert hubert [Tue, 20 Dec 2016 10:40:33 +0000 (11:40 +0100)]
fix SOA record in HOWTO
Remi Gacogne [Tue, 20 Dec 2016 08:50:32 +0000 (09:50 +0100)]
Merge pull request #4623 from rgacogne/rec-tcp-rfc7766-section10
rec: Add TCP management options described in section 10 of rfc7766
Remi Gacogne [Mon, 19 Sep 2016 15:09:35 +0000 (17:09 +0200)]
auth: Add TCP management options described in section 10 of rfc7766
* max-tcp-connection-duration
* max-tcp-connections-per-client
* max-tcp-transactions-per-conn
* tcp-idle-timeout
Remi Gacogne [Tue, 20 Dec 2016 08:45:23 +0000 (09:45 +0100)]
Merge pull request #4758 from rgacogne/rec-dq-on-stack
rec: Allocate the DNSQuestion `dq` object on the stack
Remi Gacogne [Tue, 20 Dec 2016 08:40:00 +0000 (09:40 +0100)]
Merge pull request #4784 from rgacogne/dnsdist-doc-first-available
dnsdist: Fix the `firstAvailable` policy description
Remi Gacogne [Tue, 20 Dec 2016 08:27:09 +0000 (09:27 +0100)]
Merge pull request #4783 from rgacogne/atomic-powerpc
Add -latomic on powerpc
Pieter Lexis [Mon, 19 Dec 2016 17:30:49 +0000 (18:30 +0100)]
RPZ: log additions/removals at degug, not info
Pieter Lexis [Mon, 19 Dec 2016 17:20:47 +0000 (18:20 +0100)]
Unconfuse the RPZ summary
Closes #4342
Pieter Lexis [Mon, 19 Dec 2016 17:02:24 +0000 (18:02 +0100)]
Don't call `hostname -f` on openbsd
Closes #2579
Remi Gacogne [Mon, 19 Dec 2016 16:43:18 +0000 (17:43 +0100)]
Auth: Cleanup `DNSName::getRawLabels()` usage
No real issue I'm aware of, but it's cleaner that way.
Pieter Lexis [Mon, 19 Dec 2016 15:55:12 +0000 (16:55 +0100)]
Revamp the manpage building
* Always dist the relevant manpages
* Don't build tools manpages is configured with `--disable-tools`
(Closes #4643)
* Don't remove manpages if they cannot be rebuilt (Closes #3306)
Remi Gacogne [Mon, 19 Dec 2016 15:27:14 +0000 (16:27 +0100)]
rec: Don't choke on escaped content in getZoneCuts()
`getZoneCuts()` was constructing a `DNSName` by passing a raw label returned
from `DNSName::getRawLabels()` as a string. The constructor then tried to handle
escaped characters from the string, resulting in a different `DNSName` than the
expected one. This caused the `qname != begin` condition to be false even after
every label in `labelsToAdd` had been added, causing an UB by calling
`std::vector::back()` on an empty vector.
Using `DNSName::prependRawLabel()` instead prevents this issue since the string is
not escaped.
Remi Gacogne [Mon, 19 Dec 2016 13:29:34 +0000 (14:29 +0100)]
Merge pull request #3869 from rgacogne/rec-outgoing-protobuf
rec: Log outgoing queries / incoming responses via protobuf
Remi Gacogne [Mon, 19 Dec 2016 08:58:53 +0000 (09:58 +0100)]
dnsdist: Fix the `firstAvailable` policy description
It doesn't use the server's `order`, except when falling back to
`leastOutstanding`.
Remi Gacogne [Sun, 18 Dec 2016 15:03:47 +0000 (16:03 +0100)]
Add -latomic on powerpc
Christian Hofstaedtler [Sat, 17 Dec 2016 16:43:46 +0000 (17:43 +0100)]
API: correctly take TTL from first record even if we are at the last comment
Fixes #4766.
Christian Hofstaedtler [Sat, 17 Dec 2016 16:17:20 +0000 (17:17 +0100)]
API: Add test demonstrating issue #4766
Pieter Lexis [Fri, 16 Dec 2016 17:43:28 +0000 (18:43 +0100)]
Merge pull request #4539 from pieterlexis/remove-unused-var
Remove 'kind' param in DNSBackend::getDomainKeys
Pieter Lexis [Fri, 16 Dec 2016 14:24:13 +0000 (15:24 +0100)]
rec: only delegate if NS's are below apex in auth-zones
As:
1. we **are** authoritative for the zone named at the apex
2. We would servfail because we could get an upward referral
Closes #4771