Commit graph

7219 commits

Author SHA1 Message Date
Evan Hunt
0c90d09604 CHANGES and release note for [GL #4364] 2023-12-20 16:57:49 -08:00
Tom Krizek
4156fa09d9
Update sphinx_rtd_theme and docutils 2023-12-20 18:00:58 +01:00
Tom Krizek
1349733fbc Merge tag 'v9.19.19' 2023-12-20 15:59:22 +01:00
Matthijs Mekking
6722ae9103 Revert "Add release note and CHANGES for #4423"
This reverts commit 7af2ec7e4f.
2023-12-20 08:30:44 +00:00
Matthijs Mekking
7af2ec7e4f Add release note and CHANGES for #4423 2023-12-19 14:53:51 +01:00
Michał Kępień
b1baf7af3a
"trust-anchor-telemetry" is no longer experimental
Remove the CFG_CLAUSEFLAG_EXPERIMENTAL flag from the
"trust-anchor-telemetry" statement as the behavior of the latter has not
been changed since its initial implementation and there are currently no
plans to do so.  This silences a relevant log message that was emitted
even when the feature was explicitly disabled.
2023-12-18 15:11:39 +01:00
Petr Špaček
b57c37d8c5 Add CHANGES and release note for [GL #4467] 2023-12-14 09:11:46 +01:00
Michal Nowak
1fc56d705e
Add Alpine Linux 3.19 2023-12-12 10:36:03 +01:00
Tom Krizek
9f82448ab5 Set up release notes for BIND 9.19.20 2023-12-08 15:51:48 +01:00
Michał Kępień
b6e8419045
Tweak and reword release notes 2023-12-07 15:34:47 +01:00
Michał Kępień
51706a1f16
Prepare release notes for BIND 9.19.19 2023-12-07 14:53:14 +01:00
Evan Hunt
66496d550b remove resolver-retry-interval and resolver-nonbackoff-tries
fully remove these options and mark them as ancient.
2023-12-06 11:54:59 -08:00
Evan Hunt
4aaa4f7dca deprecate resolver-retry-interval and resolver-nonbackoff-tries
these options control default timing of retries in the resolver
for experimental purposes; they are not known to useful in production
environments.  they will be removed in the future; for now, we
only log a warning if they are used.
2023-12-06 11:51:22 -08:00
Artem Boldariev
5f7ca686c6 Update release notes [GL #4388]
Mention the initial support for PROXYv2.
2023-12-06 15:15:25 +02:00
Artem Boldariev
5ed3a76f9d BIND: Add 'allow-proxy' and 'allow-proxy-on' options
The main intention of PROXY protocol is to pass endpoints information
to a back-end server (in our case - BIND). That means that it is a
valid way to spoof endpoints information, as the addresses and ports
extracted from PROXYv2 headers, from the point of view of BIND, are
used instead of the real connection addresses.

Of course, an ability to easily spoof endpoints information can be
considered a security issue when used uncontrollably. To resolve that,
we introduce 'allow-proxy' and 'allow-proxy-on' ACL options. These are
the only ACL options in BIND that work with real PROXY connections
addresses, allowing a DNS server operator to specify from what clients
and on which interfaces he or she is willing to accept PROXY
headers. By default, for security reasons we do not allow to accept
them.
2023-12-06 15:15:25 +02:00
Artem Boldariev
f650d3eb63 Add 'proxy' option to 'listen-on' statement
This commit extends "listen-on" statement with "proxy" options that
allows one to enable PROXYv2 support on a dedicated listener. It can
have the following values:

- "plain" to send PROXYv2 headers without encryption, even in the case
of encrypted transports.
- "encrypted" to send PROXYv2 headers encrypted right after the TLS
handshake.
2023-12-06 15:15:25 +02:00
Michal Nowak
2ab292c169
Drop OpenBSD system test CI job
The system tests on OpenBSD consistently exhibit lower stability
compared to our other CI platforms. Some of these challenges are
intrinsic to the system test itself and require attention. However,
there are OpenBSD issues, which seem to be more widespread on this
platform than others. In our daily CI pipelines, OpenBSD system tests
often bear the brunt of all failed CI jobs.

It's possible that our OpenBSD CI image could be optimized, but we
currently lack the domain-specific knowledge needed to make
improvements.
2023-12-05 16:14:31 +01:00
Matthijs Mekking
294943ba7c Add release note and CHANGES for #4363
This protocol change is definitely worth mentioning.
2023-12-05 14:58:58 +00:00
Michal Nowak
9152fc40a8
Add FreeBSD 14.0 2023-12-04 15:42:24 +01:00
Suzanne Goldlust
15eea792b9 Fix broken link to TLD DNSSEC stats 2023-12-04 10:00:30 +00:00
Suzanne Goldlust
1482f5b1ed Fix broken link to OMB memo 2023-12-04 10:00:30 +00:00
Michał Kępień
dc25df18f3 Merge tag 'v9.19.18' 2023-11-15 14:54:10 +01:00
Ondřej Surý
8e230d8908
Add CHANGES and release note for [GL #4421] 2023-11-15 10:31:34 +01:00
Ondřej Surý
17da9fed58
Remove AES algorithm for DNS cookies
The AES algorithm for DNS cookies was being kept for legacy reasons, and
it can be safely removed in the next major release.  Remove both the AES
usage for DNS cookies and the AES implementation itself.
2023-11-15 10:31:16 +01:00
Michal Nowak
cdb4b97b28
Add Fedora 39 2023-11-14 17:45:05 +01:00
Ondřej Surý
2a3b3beaf1
Add CHANGES and release note for [GL #4421] 2023-11-13 15:00:04 +01:00
Petr Špaček
993e53ba53 Set up release notes for BIND 9.19.19 2023-11-10 13:50:32 +01:00
Michał Kępień
46980fd8c2
Reorder release notes 2023-11-09 12:36:34 +01:00
Michał Kępień
38d0b73a37
Tweak and reword release notes 2023-11-09 12:36:34 +01:00
Michał Kępień
b35f8dbbc1
Prepare release notes for BIND 9.19.18 2023-11-09 12:36:34 +01:00
Michał Kępień
af92841c5e
Tweak CVE-2021-25219 reference 2023-11-09 12:36:34 +01:00
Matthijs Mekking
91430cd59a Remove dnssec-policy/max-zone-ttl deprecation text
The readthedocs also placed a deprecation warning on 'max-zone-ttl'
that is part of 'dnssec-policy'. This option is of course not being
deprecated.
2023-11-05 11:37:33 +01:00
Mark Andrews
967bdb33be Add release note for [GL #4209] 2023-11-01 16:51:56 +01:00
Michał Kępień
789879b572 Add release note for GL #4340 2023-11-01 15:18:02 +00:00
Matthijs Mekking
ac19d43a32 Add release note and CHANGES for #4355 2023-10-30 20:07:01 +01:00
Ondřej Surý
3a08cb5807
Add CHANGES and release note for [GL #4391] 2023-10-26 22:43:03 +02:00
Ondřej Surý
f8e264ba6d
Remove the lock-file configuration and -X argument to named
The lock-file configuration (both from configuration file and -X
argument to named) has better alternatives nowadays.  Modern process
supervisor should be used to ensure that a single named process is
running on a given configuration.

Alternatively, it's possible to wrap the named with flock(1).
2023-10-26 22:42:37 +02:00
Ondřej Surý
d3f2766a79
Mark the lock-file configuration option as deprecated
This is first step in removing the lock-file configuration option, it
marks both the `lock-file` configuration directive and -X option to
named as deprecated.
2023-10-26 22:41:45 +02:00
Michal Nowak
f8733fc051
Add OpenBSD 7.4 2023-10-26 16:27:56 +02:00
Ondřej Surý
8294a43acf
Add CHANGES and release note for [GL #4386] 2023-10-26 12:56:40 +02:00
Mark Andrews
c1b8279ebb Add release note for [GL #4387] 2023-10-26 16:14:02 +11:00
Mark Andrews
c7a06b1fa1 Add release note for [GL #4101] 2023-10-20 14:06:25 +11:00
Ondřej Surý
ec41e8c763
Add CHANGES and release note for [GL #4367] 2023-10-19 14:57:25 +02:00
Matthijs Mekking
a97e088ec5 Add release note and CHANGES for #4349 2023-10-17 10:52:43 +02:00
Matthijs Mekking
0512ca0ad8 Update inline-signing documentation
Add the missing documentation for 'dnssec-policy/inline-signing'.
Update the zone-only option 'inline-signing' to indicate that the
use of inline signing should be set in 'dnssec-policy' and that this
is merely a way to override the value for the given zone.

(cherry picked from commit 2b7381950d17fe4d289959e5f76f020cc462200a)
2023-10-17 10:52:43 +02:00
Matthijs Mekking
a8306b541b Add changes and release note for #4350 2023-10-16 09:26:56 +02:00
Petr Špaček
fc907baa7f Describe BIND threat model
Basically all local data is considered trusted, and proper ACLs and
limits need to be explicitly configured. We are also free to let
protocol non-compliant servers burn in flames.
2023-10-13 09:00:43 +02:00
Michał Kępień
561a83a291
Remove PDF-related bits from the build system
Read the Docs is capable of building the PDF version of the BIND 9 ARM
using just the contents of the doc/arm/ directory - it does not need the
build system to facilitate that.  Since the BIND 9 ARM is also built in
other formats when "make doc" is run, drop the parts of the build system
that enable building the PDF version as they pull in complexity without
bringing much added value in return.  Update related files accordingly.
2023-10-12 14:24:42 +02:00
Petr Špaček
6451462a93 Fix no-case-compress description in the ARM
We confused ourselves, it seems.
2023-10-03 14:35:49 +02:00
Aram Sargsyan
93088fbf8b Fix the incoming transfers' "Needs Refresh" state in stats channel
The "Needs Refresh" flag is exposed in two places in the statistics
channel: first - there is a state called "Needs Refresh", when the
process hasn't started yet, but the zone needs a refresh, and second
- there there is a field called "Additional Refresh Queued", when the
process is ongoing, but another refresh is queued for the same zone.

The DNS_ZONEFLG_NEEDREFRESH flag, however, is set only when there is
an ongoing zone transfer and a new notify is received. That is, the
flag is not set for the first case above.

In order to fix the issue, use the DNS_ZONEFLG_NEEDREFRESH flag only
when the zone transfer is running, otherwise, decide whether a zone
needs a refresh using its refresh and expire times.
2023-09-22 11:47:26 +00:00