Commit graph

191 commits

Author SHA1 Message Date
Mark Andrews
47d19078de note RNDC module 2016-05-24 10:47:58 +10:00
Mark Andrews
259107718f update for 9.11.0a2 2016-05-17 14:08:30 +10:00
Witold Krecicki
e846f127d6 4362. [func] Changed rndc reconfig behaviour so that newly added
zones are loaded asynchronously and the loading does
			not block the server. [RT #41934]
2016-05-05 21:41:12 +02:00
Evan Hunt
370c6e0ac1 [master] add nsip-wait-recurse release note 2016-05-05 09:33:28 -07:00
Evan Hunt
66074f152f [master] log message when using ISC DLV
4352.	[cleanup]	The ISC DNSSEC Lookaside Validation (DLV) service
			is scheduled to be disabled in 2017.  A warning is
			now logged when named is configured to use it,
			either explicitly or via "dnssec-lookaside auto;"
			[RT #42207]
2016-05-04 14:37:25 -07:00
Mark Andrews
1bebd86e9f fix tag mis-match 2016-04-29 11:10:21 +10:00
Evan Hunt
f6096b958c [master] dnssec-keymgr
4349.   [contrib]       kasp2policy: A python script to create a DNSSEC
                        policy file from an OpenDNSSEC KASP XML file.

4348.	[func]		dnssec-keymgr: A new python-based DNSSEC key
			management utility, which reads a policy definition
			file and can create or update DNSSEC keys as needed
			to ensure that a zone's keys match policy, roll over
			correctly on schedule, etc.  Thanks to Sebastian
			Castro for assistance in development. [RT #39211]
2016-04-28 00:16:01 -07:00
Evan Hunt
4d3f9f216a [master] better relnote for read-only controls option 2016-03-24 16:52:17 -07:00
Evan Hunt
1831596a79 [master] fixes for release notes 2016-03-24 14:40:44 -07:00
Evan Hunt
936bfae6d5 [master] remove pre-9.11.0a1 security fixes from 9.11 release notes 2016-03-24 12:11:53 -07:00
Tinderbox User
46472a450e regen master 2016-03-23 06:45:14 +00:00
Evan Hunt
bee8d5b202 [master] fix broken tag 2016-03-22 21:38:25 -07:00
Evan Hunt
4488842485 [master] prep 9.11.0a1 2016-03-22 20:00:47 -07:00
Mark Andrews
98c5690bd9 note rrsig regeneration 2016-03-10 17:05:49 +11:00
Mark Andrews
7a3a30e296 add AVC 2016-03-04 18:18:04 +11:00
Evan Hunt
44c86318ed [master] recursively clean empty interior nodes when deleting database records
4324.	[bug]		When deleting records from a zone database, interior
			nodes could be left empty but not deleted, damaging
			search performance afterward. [RT #40997]
2016-03-03 21:13:42 -08:00
Mark Andrews
455c0848f8 4322. [security] Duplicate EDNS COOKIE options in a response could
trigger an assertion failure. (CVE-2016-2088)
                        [RT #41809]
2016-02-27 11:23:50 +11:00
Mukund Sivaraman
5995fec51c Fix resolver assertion failure due to improper DNAME handling (CVE-2016-1286) (#41753) 2016-02-22 12:22:43 +05:30
Mark Andrews
a2b15b3305 4318. [security] Malformed control messages can trigger assertions
in named and rndc. (CVE-2016-1285) [RT #41666]
2016-02-18 12:11:27 +11:00
Evan Hunt
b5c22260e5 [master] remove reporter's name per his request 2016-01-29 10:35:14 -08:00
Evan Hunt
630b2d0c5a [master] NOSETFC incorrectly applied
4300.	[bug]		A flag could be set in the wrong field when setting
			up nonrecursive queries; this could cause the
			SERVFAIL cache to cache responses it shouldn't.
			New querytrace logging has been added which
			identified this error. [RT #41155]
2016-01-22 13:58:11 -08:00
Evan Hunt
bb5d14d724 [master] millisecond granularity for statschannel timers
4290.	[func]		The timers returned by the statistics channel
			(indicating current time, server boot time, and
			most recent reconfiguration time) are now reported
			with millisecond accuracy. [RT #40082]
2016-01-07 15:34:58 -08:00
Evan Hunt
455b99ed92 [master] fix ticket number 2016-01-05 09:08:49 -08:00
Evan Hunt
c8b968f414 [master] fix use after free on xfr timeout
4289.	[bug]		The server could crash due to memory being used
			after it was freed if a zone transfer timed out.
			[RT #41297]
2016-01-04 22:05:23 -08:00
Evan Hunt
aadca3f7d0 [master] Merge branch 'master' of ssh://repo/proj/git/prod/bind9 2016-01-04 16:09:40 -08:00
Evan Hunt
41494939b6 [master] fixed bogus server regression
4288.	[bug]		Fixed a regression in resolver.c:possibly_mark()
			which caused known-bogus servers to be queried
			anyway. [RT #41321]
2016-01-04 15:47:16 -08:00
Tinderbox User
e1836d1fe4 update copyright notice / whitespace 2016-01-04 23:45:26 +00:00
Evan Hunt
43176d82c8 [master] clean up notes 2016-01-03 21:22:00 -08:00
Mark Andrews
292eb9c4e4 4286. [security] render_ecs errors were mishandled when printing out
a OPT record resulting in a assertion failure.
                        (CVE-2015-8705) [RT #41397]

(cherry picked from commit 3e0c1603a8)
2015-12-31 22:19:46 +11:00
Mark Andrews
9c52f43036 remove period 2015-12-31 14:35:06 +11:00
Mark Andrews
1b3d211802 4285. [security] Specific APL data could trigger a INSIST.
(CVE-2015-8704) [RT #41396]
2015-12-31 13:43:21 +11:00
Evan Hunt
fbed5f0f44 [master] fix geoip options
4284.	[bug]		Some GeoIP options were incorrectly documented
			using abbreviated forms which were not accepted by
			named.  The code has been updated to allow both
			long and abbreviated forms. [RT #41381]
2015-12-26 10:50:32 -08:00
Mark Andrews
8beb9bf514 add dig +mapped 2015-12-19 09:51:53 +11:00
Mukund Sivaraman
6960e7fd12 Update notes.xml for #40996 2015-12-15 18:06:13 +05:30
Evan Hunt
4071efbec0 [master] disallow map zones in response-policy
4269.	[bug]		Zones using "map" format master files currently
			don't work as policy zones.  This limitation has
			now been documented; attempting to use such zones
			in "response-policy" statements is now a
			configuration error.  [RT #38321]
2015-12-02 21:10:09 -08:00
Mark Andrews
7bde79b32a update description 2015-12-03 15:42:58 +11:00
Mark Andrews
ff2f98076c Add CVE-2015-8461 2015-12-03 15:31:28 +11:00
Mark Andrews
cbc660172d spelling 2015-11-20 14:55:20 +11:00
Mark Andrews
b57276f89e note the address changes for H.ROOT-SERVERS.NET 2015-11-18 11:08:50 +11:00
Evan Hunt
63042d5b57 [master] typo 2015-11-16 18:21:17 -08:00
Mark Andrews
c8821d124c 4260. [security] Insufficient testing when parsing a message allowed
records with an incorrect class to be be accepted,
                        triggering a REQUIRE failure when those records
                        were subsequently cached. (CVE-2015-8000) [RT #4098]
2015-11-16 13:12:20 +11:00
Mukund Sivaraman
8012e06abf Update notes.xml for #40498 2015-11-11 13:51:55 +05:30
Witold Krecicki
bfd4b9e11a 4255. [func] Add 'message-compression' option to disable DNS compression in responses. [RT #40726] 2015-11-05 12:19:04 +01:00
Evan Hunt
6b8519147a [master] NTAs did not survive reoad/reconfig
4251.	[bug]		NTAs were deleted when the server was reconfigured
			or reloaded. [RT #41058]
2015-11-04 10:34:28 -08:00
Mark Andrews
30eec077db cleanup trailing white space in SGML like files 2015-10-22 16:09:46 +11:00
Evan Hunt
90174e64f4 [master] shorten default servfail-ttl
4239.	[func]		Changed default servfail-ttl value to 1 second from 10.
			Also, the maximum value is now 30 instead of 300. [RT #37556]
2015-10-17 13:44:01 -07:00
Tinderbox User
19c7b1a029 update copyright notice / whitespace 2015-10-06 23:45:23 +00:00
Evan Hunt
14a656f94b [master] upgrade doc toolchain
4237.	[doc]		Upgraded documentation toolchain to use DocBook 5
			and dblatex. [RT #40766]
2015-10-05 21:59:35 -07:00
Mukund Sivaraman
56ebb560a1 Fix notes and CHANGES for #40761 2015-10-06 05:44:53 +05:30
Mukund Sivaraman
9260c1157d Update CHANGES and notes.xml for #40761 2015-10-03 07:11:12 +05:30
Mukund Sivaraman
930719e876 Update the default value for number of UDP listeners (#40761) 2015-10-03 07:08:55 +05:30
Evan Hunt
b66b333f59 [master] dnstap
4235.	[func]		Added support in named for "dnstap", a fast method of
			capturing and logging DNS traffic, and a new command
			"dnstap-read" to read a dnstap log file.  Use
			"configure --enable-dnstap" to enable this
			feature (note that this requires libprotobuf-c
			and libfstrm). See the ARM for configuration details.

			Thanks to Robert Edmonds of Farsight Security.
			[RT #40211]
2015-10-02 12:32:42 -07:00
Evan Hunt
a00f9e2f50 [master] merge dyndb
4224.	[func]		Added support for "dyndb", a new interface for loading
			zone data from an external database, developed by
			Red Hat for the FreeIPA project.

			DynDB drivers fully implement the BIND database
			API, and are capable of significantly better
			performance and functionality than DLZ drivers,
			while taking advantage of advanced database
			features not available in BIND such as multi-master
			replication.

			Thanks to Adam Tkac and Petr Spacek of Red Hat.
			[RT #35271]
2015-09-28 23:12:35 -07:00
Mark Andrews
f6e45a5c54 4217. [protocol] Add support for CSYNC. [RT #40532] 2015-09-18 23:45:12 +10:00
Mark Andrews
e0a30050c8 4214. [protocol] Add support for TALINK. [RT #40544] 2015-09-18 07:43:43 +10:00
Mark Andrews
5a49f61ca9 4199. [protocol] Add support for NINFO, RKEY, SINK, TA.
[RT #40545] [RT #40547] [RT #40561] [RT #40563]
2015-09-11 17:35:01 +10:00
Mark Andrews
a0ef8211d3 4201. [func] The default preferred-glue is now the address record
type of the transport the query was received
                        over.  [RT #40468]
2015-09-11 13:27:58 +10:00
Mark Andrews
3fa134363f 4200. [cleanup] win32: update BINDinstall to be BIND release
independent. [RT #38915]
2015-09-11 12:25:39 +10:00
Mark Andrews
3dd63ba00f 4199. [protocol] Add support for NINFO, RKEY, TA.
[RT #40545] [RT #40547] [RT #40563]
2015-09-10 17:58:29 +10:00
Mark Andrews
63874956de 4199. [protocol] Add support for NINFO, RKEY. [RT #40547] [RT #40563] 2015-09-10 17:07:05 +10:00
Mark Andrews
8b29fc0b7a 4199. [protocol] Add support for RKEY. [RT #40563] 2015-09-10 14:50:20 +10:00
Evan Hunt
4c9ead8b9f [master] fix incorrect bug ID 2015-08-27 10:22:46 -07:00
Tinderbox User
310f88d008 [master] fix the o umlaut for HTML and TXT too 2015-08-15 02:55:15 +00:00
Evan Hunt
afc3103851 [master] add CVE number 2015-08-13 15:30:49 -07:00
Tinderbox User
a73d9c0b4d support umlaut 'o' 2015-08-13 19:42:19 +00:00
Evan Hunt
9716b6a5d6 [master] xml doesn't define ö 2015-08-12 18:16:04 -07:00
Mark Andrews
c631ff56bf Updated CHANGES note to include require-server-cookie:
4152.   [func]          Implement DNS COOKIE option.  This replaces the
                        experimental SIT option of BIND 9.10.  The following
                        named.conf directives are available: send-cookie,
                        cookie-secret, cookie-algorithm, nocookie-udp-size
                        and require-server-cookie.  The following dig options
                        are available: +[no]cookie[=value] and +[no]badcookie.
                        [RT #39928]
2015-08-13 08:26:23 +10:00
Evan Hunt
c707e2b986 [master] fix length check in OPENPGPKEY
4170.	[security]	An incorrect boundary check in the OPENPGPKEY
			rdatatype could trigger an assertion failure.
			[RT #40286]
2015-08-11 20:01:44 -07:00
Evan Hunt
ce9f893e21 [master] address buffer accounting error
4168.	[security]	A buffer accounting error could trigger an
			assertion failure when parsing certain malformed
			DNSSEC keys. (CVE-2015-5722) [RT #40212]
2015-08-07 13:16:10 -07:00
Evan Hunt
d2f45d7ffd [master] revert incorrect 'correction' 2015-08-05 12:15:25 -07:00
Evan Hunt
7ed374872f [master] corrected relnotes -- assertion in name.c not message.c 2015-07-31 12:03:29 -07:00
Mark Andrews
c5eb9add52 add CVE-2015-5477 2015-07-15 07:51:06 +10:00
Evan Hunt
1479200aa0 [master] DDoS mitigation features
3938.	[func]		Added quotas to be used in recursive resolvers
			that are under high query load for names in zones
			whose authoritative servers are nonresponsive or
			are experiencing a denial of service attack.

			- "fetches-per-server" limits the number of
			  simultaneous queries that can be sent to any
			  single authoritative server.  The configured
			  value is a starting point; it is automatically
			  adjusted downward if the server is partially or
			  completely non-responsive. The algorithm used to
			  adjust the quota can be configured via the
			  "fetch-quota-params" option.
			- "fetches-per-zone" limits the number of
			  simultaneous queries that can be sent for names
			  within a single domain.  (Note: Unlike
			  "fetches-per-server", this value is not
			  self-tuning.)
			- New stats counters have been added to count
			  queries spilled due to these quotas.

			See the ARM for details of these options. [RT #37125]
2015-07-08 22:53:39 -07:00
Evan Hunt
70d987def5 [master] traffic size stats
4156.	[func]		Added statistics counters to track the sizes
			of incoming queries and outgoing responses in
			histogram buckets, as specified in RSSAC002.
			[RT #39049]
2015-07-06 22:29:06 -07:00
Mukund Sivaraman
33ca26968b Allow RPZ rewrite logging to be configured on a per-zone basis (#39754) 2015-07-06 08:57:51 +05:30
Mark Andrews
ce67023ae3 4152. [func] Implement DNS COOKIE option. This replaces the
experimental SIT option of BIND 9.10.  The following
                        named.conf directives are avaliable: send-cookie,
                        cookie-secret, cookie-algorithm and nocookie-udp-size.
                        The following dig options are available:
                        +[no]cookie[=value] and +[no]badcookie.  [RT #39928]
2015-07-06 09:44:24 +10:00
Mukund Sivaraman
f4d1c19691 Add comma 2015-06-17 12:23:44 +05:30
Mark Andrews
572e95f52a add release notes for CVE-2015-4620 2015-06-17 11:19:53 +10:00
Evan Hunt
8c9fba44a4 [master] further RPZ fixes
4131.	[bug]		Addressed further problems with reloading RPZ
			zones. [RT #39649]
2015-06-03 18:18:55 -07:00
Evan Hunt
f5c20627f4 [master] fix tags 2015-05-21 14:29:22 -07:00
Mukund Sivaraman
72a1c3f1a7 Update notes.xml and CHANGES for #39567 2015-05-21 21:45:47 +05:30
Mukund Sivaraman
705cea35a8 Fix RPZ radix tree search() for CLIENT-IP triggers (#39481) 2015-05-21 11:10:49 +05:30
Evan Hunt
19365b43e9 [master] ensure rpz summary consistence during AXFR updates
4121.	[bug]		When updating a response-policy zone via AXFR,
			summary data about other policy zones could fall
			out of sync. Ultimately this could trigger an
			assertion failure in rpz.c. [RT #39567]
2015-05-20 15:00:50 -07:00
Evan Hunt
7e6cf6fc6e [master] address a possible policy update race
4120.	[bug]		A bug in RPZ could cause the server to crash if
			policy zones were updated while recursion was
			pending for RPZ processing of an active query.
			[RT #39415]
2015-05-19 15:47:42 -07:00
Mukund Sivaraman
b947e1a521 Fix a bug in RPZ that could cause unwanted recursion (#39229)
Conflicts:
	doc/arm/notes.xml
2015-05-07 08:29:36 +05:30
Mark Andrews
e77e449549 4109. [port] linux: support reading the local port range from
net.ipv4.ip_local_port_range. [RT # 39379]
2015-04-25 08:25:42 +10:00
Evan Hunt
ef1aaab9ed [master] more verbose CHANGES note, added release note
4108.	[func]		An additional NXDOMAIN redirect method (option
			"nxdomain-redirect") has been added, allowing
			redirection to a specified DNS namespace instead
			of a single redirect zone. [RT #37989]
2015-04-23 09:40:07 -07:00
Mark Andrews
c82b378115 4108. [func] A additional nxdomain redirect (nxdomain-redirect)
method is now supported. [RT #37989]
2015-04-23 16:57:15 +10:00
Evan Hunt
fc3ed1dbda [master] fix +split and +rrcomments with dig +short
4101.	[bug]		dig: the +split and +rrcomments options didn't
			work with +short. [RT #39291]
2015-04-15 09:50:07 -07:00
Jeremy C. Reed
2637d30fbd docbook <command> tags around named server references 2015-04-13 11:46:35 -05:00
Jeremy C. Reed
2b66b8b6fb fix mismatched docbook tag 2015-04-13 11:38:40 -05:00
Evan Hunt
d9b37259f3 [master] hold a reference on fetch context during query
4094.	[bug]		A race during shutdown or reconfiguration could
			cause an assertion in mem.c. [RT #38979]
2015-04-08 14:33:45 -07:00
Evan Hunt
f28e5058c3 [master] dig can now learn the SIT value when retrying
4093.	[func]		Dig now learns the SIT value from truncated
			responses when it retries over TCP. [RT #39047]
2015-04-06 23:16:54 -07:00
Mark Andrews
1b05d22789 4082. [bug] Incrementally sign large inline zone deltas.
[RT #37927]
2015-03-05 09:59:29 +11:00
Evan Hunt
ff295743c2 [master] release note for change #4013 2015-03-04 09:06:03 -08:00
Evan Hunt
7ae96d8823 [master] add "lock-file" and fix up singleton code
4080.	[func]		Completed change #4022, adding a "lock-file" option
			to named.conf to override the default lock file,
			in addition to the "named -X <filename>" command
			line option.  Setting the lock file to "none"
			using either method disables the check completely.
			[RT #37908]
2015-03-02 19:27:54 -08:00
Mukund Sivaraman
84f95ddb25 Update win32 configure for --enable-querytrace (#37520)
Also enable querytrace when --enable-developer is specified.
2015-03-02 12:57:50 +05:30
Evan Hunt
7acc2f2156 [master] fix LOADPENDING issues
4063.	[bug]		Asynchronous zone loads were not handled
			correctly when the zone load was already in
			progress; this could trigger a crash in zt.c.
			[RT #37573]
2015-02-22 20:43:39 -08:00
Evan Hunt
591389c7d4 [master] 5011 tests and fixes
4056.	[bug]		Expanded automatic testing of trust anchor
			management and fixed several small bugs including
			a memory leak and a possible loss of key state
			information. [RT #38458]

4055.	[func]		"rndc managed-keys" can be used to check status
			of trust anchors or to force keys to be refreshed,
			Also, the managed keys data file has easier-to-read
			comments.  [RT #38458]
2015-02-05 17:18:15 -08:00
Francis Dupont
1059bc2e42 added mdig tool 2015-02-04 14:22:32 +01:00