Commit graph

6462 commits

Author SHA1 Message Date
Michał Kępień
cc6d89f913 Add CHANGES entry
(cherry picked from commit 0c59f1362c)
2021-06-17 17:17:37 +02:00
Tinderbox User
13b9f23cce prep 9.16.17 2021-06-16 22:29:27 +02:00
Michał Kępień
e0ba988ac8 Tweak and reword recent CHANGES entries 2021-06-16 22:29:27 +02:00
Michał Kępień
46001e4de3 Add CHANGES entry
(cherry picked from commit c223d81691)
2021-06-10 10:26:51 +02:00
Matthijs Mekking
203652baef Add release note and change entry for [#2725]
(cherry picked from commit d51aed7112)
2021-06-09 09:18:51 +02:00
Ondřej Surý
bff37dc79b Add CHANGES and release note for [GL #2746]
(cherry picked from commit 22aa929aac)
2021-06-02 18:10:44 +02:00
Ondřej Surý
6ca678aca3 Add CHANGES and release note for [GL #2732]
(cherry picked from commit 3e433b87fb)
2021-05-31 16:57:20 +02:00
Matthijs Mekking
8433a39c54 Add CHANGES and notes for [#2733]
(cherry picked from commit 7ca253818e)
2021-05-30 00:33:42 -07:00
Evan Hunt
534b4d8ed3 CHANGES, release note
(cherry picked from commit d8b793760c)
2021-05-27 12:09:43 -07:00
Mark Andrews
9f6912e64b Add CHANGES note for [GL #2536]
(cherry picked from commit 475a553e37)
2021-05-27 15:27:03 +02:00
Mark Andrews
8389380bde Add CHANGES note for [GL #2685]
(cherry picked from commit d99c312938)
2021-05-26 08:50:19 +10:00
Tinderbox User
2427e53d97 prep 9.16.16 2021-05-20 12:24:21 +02:00
Michał Kępień
bf54e20580 Tweak and reword recent CHANGES entries 2021-05-20 12:24:21 +02:00
Matthijs Mekking
01f9b6e9c4 Release notes and changes for [#1875]
(cherry picked from commit fa1cd0a1f1)
2021-05-20 09:53:32 +02:00
Michał Kępień
4a4d215037 Add CHANGES entry 2021-05-19 09:59:31 +02:00
Matthijs Mekking
271bad4362 Release notes and changes for [GL #2463]
Mention the bugfix.

(cherry picked from commit a9f4b074c4)
2021-05-19 00:44:32 +00:00
Mark Andrews
ae9c74a846 Add CHANGES for [GL #2689]
(cherry picked from commit d24ea068c8)
2021-05-18 11:43:14 +10:00
Evan Hunt
4c9c6a8823 CHANGES, release notes 2021-05-14 12:52:48 +02:00
Mark Andrews
eded531bee Add CHANGES entry for [GL #2528]
(cherry picked from commit 7e54d8d2cb)
2021-05-13 16:01:51 +10:00
Matthijs Mekking
353161bd3c Changes and release notes for [#2603]
(cherry picked from commit 7663c17f3b3d2b1600a6864bec90bb045763a96a)
2021-05-05 18:23:51 +02:00
Mark Andrews
84dbaad15a Add CHANGES note for [GL #2670]
(cherry picked from commit 79da175a76)
2021-05-05 23:36:06 +10:00
Matthijs Mekking
1d16443fde Changes and release notes for [#2596]
(cherry picked from commit 366ed047dd)
2021-05-05 12:54:05 +02:00
Ondřej Surý
ce5f036cff Add CHANGES and release note for [GL #2671] 2021-05-05 10:24:42 +02:00
Matthijs Mekking
305fc213a0 Release notes and changes for [#2645]
The feature "going insecure gracefully" has been changed.

(cherry picked from commit 75024736a4)
2021-04-30 13:58:22 +02:00
Mark Andrews
501008c510 Add CHANGES for [GL #2445]
(cherry picked from commit fd1f7b6480)
2021-04-30 11:17:00 +02:00
Mark Andrews
53d755966e Update ZONEMD to match RFC 8976
* The location of the digest type field has changed to where the
  reserved field was.
* The reserved field is now called scheme and is where the digest
  type field was.
* Digest type 2 has been defined (SHA256).

(cherry picked from commit 8510ccaa54)
2021-04-30 11:21:19 +10:00
Tinderbox User
b0f44204fa prep 9.16.15 2021-04-29 11:12:38 +02:00
Michał Kępień
109f840ba2 Tweak and reword recent CHANGES entries 2021-04-29 11:12:38 +02:00
Tinderbox User
4999118246 prep 9.16.14 2021-04-29 11:12:38 +02:00
Michał Kępień
bdeea86101 Tweak and reword recent CHANGES entries 2021-04-29 11:12:38 +02:00
Michał Kępień
84007b700f Add CHANGES entry for [GL #2604] 2021-04-29 11:12:38 +02:00
Mark Andrews
3c611b3682 Add CHANGES entry for [GL #2540] 2021-04-29 11:12:38 +02:00
Mark Andrews
51b533bdd5 Add CHANGES entry for [GL #2467] 2021-04-29 11:12:38 +02:00
Mark Andrews
08ceb7daa7 Add CHANGES for [GL #2642]
5625.   [func]          Reduce the supported maximum number of iterations
                        that can be configured in an NSEC3 zones to 150.
                        [GL #2642]

(cherry picked from commit e04f06873f)
2021-04-29 17:56:00 +10:00
Diego Fronza
8bd7b2e31d Add CHANGES note for GL #2626 2021-04-26 11:38:28 -03:00
Michał Kępień
ae5a84c82b Add CHANGES entry
(cherry picked from commit 47a7b042e5)
2021-04-26 12:45:28 +02:00
Matthijs Mekking
c599fb85a6 Changes and release notes for [#2628]
(cherry picked from commit b99ec65745)
2021-04-26 10:49:00 +02:00
Evan Hunt
49d9c1abd6 Add CHANGES note for [GL !4835]
(cherry picked from commit 07e349de3c)
2021-04-19 14:32:53 +02:00
Michał Kępień
381202629e Add CHANGES entry 2021-04-16 14:40:06 +02:00
Mark Andrews
382f915175 Add CHANGES and release note for [GL #2623]
(cherry picked from commit 3df637fb83)
2021-04-16 13:50:21 +02:00
Matthijs Mekking
e5736de60d Implement draft-vandijk-dnsop-nsec-ttl
The draft says that the NSEC(3) TTL must have the same TTL value
as the minimum of the SOA MINIMUM field and the SOA TTL. This was
always the intended behaviour.

Update the zone structure to also track the SOA TTL. Whenever we
use the MINIMUM value to determine the NSEC(3) TTL, use the minimum
of MINIMUM and SOA TTL instead.

There is no specific test for this, however two tests need adjusting
because otherwise they failed: They were testing for NSEC3 records
including the TTL. Update these checks to use 600 (the SOA TTL),
rather than 3600 (the SOA MINIMUM).

(cherry picked from commit 9af8caa733)
2021-04-13 14:18:33 +02:00
Matthijs Mekking
dcf6e3e58a Fix nonsensical stale TTL values in cache dump
When introducing change 5149, "rndc dumpdb" started to print a line
above a stale RRset, indicating how long the data will be retained.

At that time, I thought it should also be possible to load
a cache from file. But if a TTL has a value of 0 (because it is stale),
stale entries wouldn't be loaded from file. So, I added the
'max-stale-ttl' to TTL values, and adjusted the $DATE accordingly.

Since we actually don't have a "load cache from file" feature, this
is premature and is causing confusion at operators. This commit
changes the 'max-stale-ttl' adjustments.

A check in the serve-stale system test is added for a non-stale
RRset (longttl.example) to make sure the TTL in cache is sensible.

Also, the comment above stale RRsets could have nonsensical
values. A possible reason why this may happen is when the RRset was
marked a stale but the 'max-stale-ttl' has passed (and is actually an
RRset awaiting cleanup). This would lead to the "will be retained"
value to be negative (but since it is stored in an uint32_t, you would
get a nonsensical value (e.g. 4294362497).

To mitigate against this, we now also check if the header is not
ancient. In addition we check if the stale_ttl would be negative, and
if so we set it to 0. Most likely this will not happen because the
header would already have been marked ancient, but there is a possible
race condition where the 'rdh_ttl + serve_stale_ttl' has passed,
but the header has not been checked for staleness.

(cherry picked from commit 2a5e0232ed)
2021-04-13 10:59:00 +02:00
Michał Kępień
ef4460949f Add CHANGES entry
(cherry picked from commit 7eb87270a4)
2021-04-08 10:41:09 +02:00
Mark Andrews
2840fca4c5 Add CHANGES and release note for [GL #2600]
(cherry picked from commit 0174098aca)
2021-04-07 21:30:01 +02:00
Matthijs Mekking
c63b533690 Change default stale-answer-client-timeout to off
Using "stale-answer-client-timeout" turns out to have unforeseen
negative consequences, and thus it is better to disable the feature
by default for the time being.

(cherry picked from commit e443279bbf)
2021-04-07 14:46:55 +02:00
Matthijs Mekking
4b25333037 Add notes and changes for [#2594]
Pretty newsworthy.

(cherry picked from commit e44bcc6f53)
2021-04-02 13:28:48 +02:00
Mark Andrews
99132eda0e Add CHANGES and release note for GL #2607 2021-04-01 16:11:25 +02:00
Diego Fronza
ec83e02ed2 Add CHANGES note for [GL #2490] 2021-03-25 14:35:16 -03:00
Matthijs Mekking
d12b40f6fb Rekey immediately after rndc checkds/rollover
Call 'dns_zone_rekey' after a 'rndc dnssec -checkds' or 'rndc dnssec
-rollover' command is received, because such a command may influence
the next key event. Updating the keys immediately avoids unnecessary
rollover delays.

The kasp system test no longer needs to call 'rndc loadkeys' after
a 'rndc dnssec -checkds' or 'rndc dnssec -rollover' command.

(cherry picked from commit 82f72ae249)
2021-03-22 15:35:22 +01:00
Matthijs Mekking
3156c0d103 Add CHANGES and notes for [#2517]
(cherry picked from commit 841e90c6fc)
2021-03-22 13:57:10 +01:00