Commit graph

7331 commits

Author SHA1 Message Date
Nicki Křížek
e9b6031e0c
Add new changelog file
Create new changelog and include it in the documentation. Include the
previous CHANGES as plain text without any markup.
2024-07-29 13:03:19 +02:00
Nicki Křížek
8b153abd3c
Set up release notes for BIND 9.21.0 2024-07-23 17:39:26 +02:00
Nicki Křížek
03e289030e Merge tag 'v9.20.0' 2024-07-23 17:15:41 +02:00
Nicki Křížek
3489840948
Update documentation for 9.20.0 2024-07-08 14:53:01 +02:00
Nicki Křížek
890ebd3fd3
Create release notes for 9.20.0 2024-07-08 14:53:01 +02:00
Nicki Křížek
1fa52674e1
Extend max-types-per-name documentation 2024-07-08 14:53:01 +02:00
Nicki Křížek
b3423bb347
Reorder release notes 2024-07-08 14:53:01 +02:00
Nicki Křížek
6d44c8fcbd
Tweak and reword release notes 2024-07-08 14:53:00 +02:00
Nicki Křížek
10d2aceb02
Add release note for [GL #4708] 2024-07-08 14:53:00 +02:00
Nicki Křížek
a624b8c541
Add release note for [GL #4736] 2024-07-08 14:53:00 +02:00
Nicki Křížek
0a584eb318
Add release note for [GL #3472] 2024-07-08 14:53:00 +02:00
Nicki Křížek
e847f32a36
Prepare release notes for BIND 9.19.25
This version won't be released. This commit is just a preparation for
9.20.0.
2024-07-08 14:53:00 +02:00
Matthijs Mekking
6f58d2c6fa
Add release note for [GL #4507] 2024-06-10 17:47:55 +02:00
Aram Sargsyan
d69fab1530
Mark SIG(0) quota settings as experimantal
A different solution in the future might be adopted depending
on feedback and other new information, so it makes sense to mark
these options as EXPERIMENTAL until we have more data.
2024-06-10 17:36:45 +02:00
Aram Sargsyan
be482311de
Add a release note for [GL #4480] 2024-06-10 17:35:36 +02:00
Aram Sargsyan
ad489c44df
Remove sig0checks-quota-maxwait-ms support
Waiting for a quota to appear complicates things and wastes
rosources on timer management. Just answer with REFUSE if
there is no quota.
2024-06-10 17:33:11 +02:00
Aram Sargsyan
bbc866d0cb
Document the SIG(0) signature checking quota options
Add documentation entries for the 'sig0checks-quota',
'sig0checks-quota-maxwait-ms', and 'sig0checks-quota-exempt'
optoins.
2024-06-10 17:33:10 +02:00
Aram Sargsyan
c7f79a0353
Add a quota for SIG(0) signature checks
In order to protect from a malicious DNS client that sends many
queries with a SIG(0)-signed message, add a quota of simultaneously
running SIG(0) checks.

This protection can only help when named is using more than one worker
threads. For example, if named is running with the '-n 4' option, and
'sig0checks-quota 2;' is used, then named will make sure to not use
more than 2 workers for the SIG(0) signature checks in parallel, thus
leaving the other workers to serve the remaining clients which do not
use SIG(0)-signed messages.

That limitation is going to change when SIG(0) signature checks are
offloaded to "slow" threads in a future commit.

The 'sig0checks-quota-exempt' ACL option can be used to exempt certain
clients from the quota requirements using their IP or network addresses.

The 'sig0checks-quota-maxwait-ms' option is used to define a maximum
amount of time for named to wait for a quota to appear. If during that
time no new quota becomes available, named will answer to the client
with DNS_R_REFUSED.
2024-06-10 17:33:08 +02:00
Evan Hunt
1bf7795b38
Add CHANGES and release note for [GL #3403] 2024-06-10 16:57:29 +02:00
Ondřej Surý
52b3d86ef0
Add a limit to the number of RR types for single name
Previously, the number of RR types for a single owner name was limited
only by the maximum number of the types (64k).  As the data structure
that holds the RR types for the database node is just a linked list, and
there are places where we just walk through the whole list (again and
again), adding a large number of RR types for a single owner named with
would slow down processing of such name (database node).

Add a configurable limit to cap the number of the RR types for a single
owner.  This is enforced at the database (rbtdb, qpzone, qpcache) level
and configured with new max-types-per-name configuration option that
can be configured globally, per-view and per-zone.
2024-06-10 16:55:09 +02:00
Ondřej Surý
32af7299eb
Add a limit to the number of RRs in RRSets
Previously, the number of RRs in the RRSets were internally unlimited.
As the data structure that holds the RRs is just a linked list, and
there are places where we just walk through all of the RRs, adding an
RRSet with huge number of RRs inside would slow down processing of said
RRSets.

Add a configurable limit to cap the number of the RRs in a single RRSet.
This is enforced at the database (rbtdb, qpzone, qpcache) level and
configured with new max-records-per-type configuration option that can
be configured globally, per-view and per-zone.
2024-06-10 16:55:07 +02:00
Ondřej Surý
1002f920f6
Add CHANGES and release note for [GL #4481] 2024-06-10 16:49:56 +02:00
Artem Boldariev
cdb5ae35e8
Modify release notes [GL #4473]
Mention that an intermittent BIND process termination in DoH code has
been fixed.
2024-06-10 16:41:00 +02:00
Evan Hunt
2b7cbd8d95 CHANGES and relnotes for [GL #4728] 2024-06-05 10:50:06 -07:00
Evan Hunt
c3d3d12911 change allow-transfer default to "none"
Changed the default value for 'allow-transfer' to 'none'; zone
transfers now require explicit authorization.

Updated all system tests to specify an allow-transfer ACL when needed.

Revised the ARM to specify that the default is 'none'.
2024-06-05 10:50:06 -07:00
Michal Nowak
6f22e79ef9
Add Alpine Linux 3.20 2024-05-23 10:58:25 +02:00
Michal Nowak
6b89d66ce8 Merge tag 'v9.19.24' 2024-05-16 11:37:12 +02:00
Aydın Mercan
d6dd51bb1b
Added CHANGES and release note for [GL #4668] 2024-05-10 12:08:52 +03:00
Petr Špaček
ead4a110ad Update reference for Catalog Zones spec to RFC9432 2024-05-07 13:38:40 +02:00
Petr Špaček
153311da2d Update KSK root sentinel references
The mechanism was published as RFC 8509. I've briefly looked at diff
between versions -08 and the RFC and did not find significant protocol
change. Quick manual check confirms what we seem to comply with the
published protocol.
2024-05-07 13:38:40 +02:00
Petr Špaček
8e4c0329c3 Mention RFC 9276 Guidance for NSEC3 Parameter Settings
Draft was eventually published as RFC 9276 but we did not update our
docs. Also add couple mentions in relevant places in the ARM and
dnssec-signzone man page, mainly around "do not touch" places.
2024-05-07 13:38:40 +02:00
Michal Nowak
1a09f822ad
Add Fedora 40 2024-05-06 19:35:29 +02:00
Michal Nowak
d02ed1a0eb
Add Ubuntu 24.04 LTS (Noble Numbat) 2024-05-06 17:58:22 +02:00
Matthijs Mekking
2726b569b1 Add release note and CHANGES for #3323 2024-05-06 11:39:02 +02:00
Michal Nowak
4fae72e2de Set up release notes for BIND 9.19.25 2024-05-03 15:51:53 +02:00
Michal Nowak
0f81fbcb1f
Tweak and reword release notes 2024-05-02 19:16:58 +02:00
Michal Nowak
8cdc0eafd9
Prepare release notes for BIND 9.19.24 2024-05-02 12:31:00 +02:00
Aydın Mercan
042bb98846
Add CHANGES and release note for [GL #4523] 2024-04-26 16:12:29 +03:00
Ondřej Surý
9305ebdabe
Add CHANGES and release note for [GL #1879] 2024-04-24 22:49:26 +02:00
Matthijs Mekking
e7525cab4f Add CHANGES and release note
Introduce the new 'dnssec-ksr' tool.
2024-04-19 13:52:21 +02:00
Matthijs Mekking
e033e58a85 dnssec-keygen: allow -f and -k together
The 'dnssec-keygen' tool now allows the options '-k <dnssec-policy>'
and '-f <flags>' together to create keys from a DNSSEC policy that only
match the given role. Allow setting '-fZ' to only create ZSKs, while
'-fK' will only create KSKs.
2024-04-19 10:41:04 +02:00
Matthijs Mekking
77d4afba1b Introduce new DNSSEC tool dnssec-ksr
Introduce a new DNSSEC tool, dnssec-ksr, for creating signed key
response (SKR) files, given one or more key signing requests (KSRs).

For now it is just a dummy tool, but the future purpose of this utility
is to pregenerate ZSKs and signed RRsets for DNSKEY, CDNSKEY, and CDS
for a given period that a KSK is to be offline.
2024-04-19 10:41:04 +02:00
Ondřej Surý
cbbc0051a3
Add CHANGES note for [GL #4416] 2024-04-18 20:09:47 +02:00
Ondřej Surý
5d4233c2c2
Add CHANGES and release notes for [GL #4586] 2024-04-18 16:05:32 +02:00
Petr Špaček
da607d6a06 Update Sphinx version used for documentation build 2024-04-18 12:46:13 +02:00
Ondřej Surý
fbea3bb255
Add CHANGES and release note for [GL #4680] 2024-04-18 10:53:31 +02:00
Matthijs Mekking
c3d8932f79 Add checkconf check for signatures-jitter
Having a value higher than signatures-validity does not make sense
and should be treated as a configuration error.
2024-04-18 09:50:33 +02:00
Matthijs Mekking
8b7785bc23 Add release notes and CHANGES for #4554
Mention the new signature jitter option.
2024-04-18 09:50:31 +02:00
Matthijs Mekking
2a4daaedca Add signatures-jitter option
Add an option to speficy signatures jitter.
2024-04-18 09:50:10 +02:00
Petr Špaček
c9ff77c067 Merge tag 'v9.19.23' 2024-04-18 09:21:47 +02:00