[nsd-users] NSD 4.3.7 released

Wouter Wijngaards wouter at nlnetlabs.nl
Thu Jul 22 14:26:13 UTC 2021


Hi,

NSD 4.3.7 release is available:
https://nlnetlabs.nl/downloads/nsd/nsd-4.3.7.tar.gz
sha256 fd3b9ec53bbd168d567a0bfcdf140c966511fdaf78bd539d091c1a13c13be8ad
pgp https://nlnetlabs.nl/downloads/nsd/nsd-4.3.7.tar.gz.asc

This release fixes a crash in dnstap. New features are XoT which
provides AXFR and IXFR over TLS, and DNS Cookies support and SVCB and
HTTPS RR type support.

For zone transfer TLS can be turned on by specifying the tls-auth-name
in the request-xfr config option, like
request-xfr: 192.0.2.1 NOKEY ns.example.com
With the tls-cert-bundle option, in the server section, the list of
certificates for authenticating the transfers over TLS can be configured.

The DNS cookies can be turned on or off with the answer-cookie option,
and instead of a randomly generated secret, for anycast or loadbalanced
deployment, the secret can be configured with cookie-secret or
cookie-secret-file and rollover of the cookie secret can be performed
with the nsd-control commands add_cookie_secret, activate_cookie_secret
and drop_cookie_secret, using the cookie-secret-file.

The SVCB and HTTPS RR type support mean that in zone files the syntax
for these RR types can be used and is written when a zone is downloaded.
In previous versions the unknown RR type support code provided a
fallback syntax in zone files and on the wire functionality for these types.

Compared to the pre-release version there are a couple small bugfixes in
the final release version, notably a fix for failure to compile without
ipv6.

4.3.7
================
FEATURES:
- Syntax of SVCB and HTTPS RR type as per draft-ietf-dnsop-svcb-https
- Client side DNS Zone Transfer-over-TLS (XoT) support as per
  draft-ietf-dprive-xfr-over-tls
- Interoperable DNS Cookies support as per RFC7873 and RFC9018

BUG FIXES:
- Fix for #170: Fix build warnings when IPv6 is disabled.
- Fix #170: Disabled IPv6 and DNSTAP enabled triggers a build error.
- Fix for #128: Skip over sendmmsg invalid argument when port is zero.
- Fix #171: Invalid negative response (NSEC3) after IXFR.
- Fix to make nsec3_chain_find_prev return NULL if one nsec3 left.
- Fix #174: NS Records below delegation are not ignored (nsd-checkzone
  also does not raise any issue).
- Fix #176: please review Loglevel on missing zonefile.
- Update the ACX_CHECK_NONBLOCKING_BROKEN test for the configure
  script.
- Fix #179: log notice and server-count.
- Update configure nonblocking test to use host.
- Fix #168: Buffer overflow in the dname_to_string() function
- Fixes for child server processes getting out of sync with the
  dnstap-collector process
- Fix gcc-11 warning on array bounds.
- Fix compile of cookies on FreeBSD without IPv6.
- Fix for loop initial declaration for nonc99 compiler
- Fix typo in xfrd-tcp.c.

Best regards, Wouter

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <http://lists.nlnetlabs.nl/pipermail/nsd-users/attachments/20210722/f61feeb5/attachment.bin>


More information about the nsd-users mailing list