Unbound 1.13.0rc1 pre-release

Yuri yvoinov at gmail.com
Tue Nov 24 15:47:13 UTC 2020


Confirm. It crashes repeatedly with stacktrace:

(dbx) where
current thread: t at 2
=>[1] reuse_cmp(0xfffffd7ffc5fed08, 0x0, 0x28, 0x0, 0xfffffd7ffe6f5000, 
0x379616265040000), at 0x4eb85e
   [2] rbtree_find_less_equal(), at 0x4dc2e9
   [3] 0x4eba25(), at 0x4eba25
   [4] pending_tcp_query(), at 0x50b69f
   [5] outnet_serviced_query(), at 0x50d2f3
   [6] worker_send_query(), at 0x5339cd
   [7] 0x525fbd(), at 0x525fbd
   [8] 0x527672(), at 0x527672
   [9] iter_operate(), at 0x545b0f
   [10] mesh_run(), at 0x4b702e
   [11] mesh_new_client(), at 0x4c7099
   [12] worker_handle_request(), at 0x4e5e3e
   [13] comm_point_udp_callback(), at 0x50553b
   [14] 0x59f010(), at 0x59f010
   [15] 0x59f4b7(), at 0x59f4b7
   [16] 0x5a37d8(), at 0x5a37d8
   [17] comm_base_dispatch(), at 0x505744
   [18] 0x52aa5a(), at 0x52aa5a
   [19] _thr_setup(), at 0xfffffd7ffef5dbab
   [20] _lwp_start(), at 0xfffffd7ffef5dde0

24.11.2020 21:45, RayG via Unbound-users пишет:
> Hi Wouter,
>
> Sorry this update just crashes...
>
> This is the tail of the log file - I have a complete log if required.
>
> BTW does this new release include a fix for my RPZ issue that George was looking at?
>
> 24/11/2020 15:41:08 unbound.exe[13260:2] info: sending query: www.tm.lg.prod.aadmsa.akadns.net. A IN
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: sending to target: <.> 8.8.8.8#853
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: dnssec status: not expected
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: pending_tcp_query
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: reuse_tcp_find
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: reuse_tcp_find: num reuse streams 45
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: reuse_tcp_find check inexact match
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: reuse_tcp_close_oldest
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: decommission_pending_tcp
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: bio_cb 3, before read
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: bio_cb 131, return read
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: bio_cb 6, before read
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: bio_cb 134, return read
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: bio_cb 1, before write
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: comm_point_close of 808: event_del
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: event_del 00000000075033A0 added=1 fd=808 tv=1606232526623  EV_READ EV_TIMEOUT
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: winsock: tcp wouldblock EV_READ
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: winsock: tcp wouldblock EV_WRITE
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: close fd 808
> 24/11/2020 15:41:08 unbound.exe[13260:2] debug: reuse_tcp_remove_tree_list
> 24/11/2020 15:41:08 unbound.exe[13260:2] fatal error: util/rbtree.c:324: change_child_ptr: assertion child->parent == old || child->parent == new failed
>
> -----Original Message-----
> From: Wouter Wijngaards <wouter at nlnetlabs.nl>
> Sent: 24 November 2020 14:29
> To: unbound-users at nlnetlabs.nl; maintainers at nlnetlabs.nl
> Subject: Unbound 1.13.0rc1 pre-release
>
> Hi,
>
> Unbound 1.13.0rc1 pre-release is available:
> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz
> sha256 a55e8b5dfc290867017e7fbb75f1023ee2f6234943f870a5c24694b0908d7c17
> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz.asc
>
>
> This version has fixes to connect for UDP sockets, slowing down potential ICMP side channel leakage.  The fix can be controlled with the option udp-connect: yes, it is enabled by default.
>
> Additionally CVE-2020-28935 is fixed, this solves a problem where the pidfile is altered by a symlink, and fails if a symlink is encountered.
> See https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt for more information.
>
> New features are upstream TCP and TLS query reuse, where a channel is reused for several queries.  And http-notls-downstream: yesno for unencrypted DoH, useful for back end support servers.  The option infra-keep-probing can be used to probe hosts that are down more frequently.
>
> The options edns-client-string and edns-client-string-opcode can be used to add an EDNS option with the specified string in queries towards servers, with the servers specified by IP address.  It replaces the edns-client-tag option.
>
> Features
> - Pass the comm_reply information to the inplace_cb_reply* functions
>    during the mesh state and update the documentation on that.
> - Fix #330: [Feature request] Add unencrypted DNS over HTTPS support.
>    This adds the option http-notls-downstream: yesno to change that,
>    and the dohclient test code has the -n option.
> - Merge PR #228 : infra-keep-probing option to probe hosts that are
>    down.  Add infra-keep-probing: yes option. Hosts that are down are
>    probed more frequently.
>    With the option turned on, it probes about every 120 seconds,
>    eventually after exponential backoff, and that keeps that way. If
>    traffic keeps up for the domain. It probes with one at a time, eg.
>    one query is allowed to probe, other queries within that 120 second
>    interval are turned away.
> - Merge PR #313 from Ralph Dolmans: Replace edns-client-tag with
>    edns-client-string option.
> - Merge PR #283 : Stream reuse.  This implements upstream stream
>    reuse for performing several queries over the same TCP or TLS
>    channel.
> - Fix to connect() to UDP destinations, default turned on,
>    this lowers vulnerability to ICMP side channels.
>    Option to toggle udp-connect, default is enabled.
>
> Bug Fixes
> - Fix #319: potential memory leak on config failure, in rpz config.
> - Fix dnstap socket and the chroot not applied properly to the dnstap
>    socket path.
> - Fix warning in libnss compile, nss_buf2dsa is not used without DSA.
> - Fix #323: unbound testsuite fails on mock build in systemd-nspawn
>    if systemd support is build.
> - Fix for python reply callback to see mesh state reply_list member,
>    it only removes it briefly for the commpoint call so that it does
>    not drop it and attempt to modify the reply list during reply.
> - Fix that if there are on reply callbacks, those are called per
>    reply and a new message created if that was modified by the call.
> - Free up auth zone parse region after use for lookup of host
> - Merge PR #326 from netblue30: DoH: implement content-length
>    header field.
> - DoH content length, simplify code, remove declaration after
>    statement and fix cast warning.
> - Fix that if there are reply callbacks for the given rcode, those
>    are called per reply and a new message created if that was modified
>    by the call.
> - Fix that the out of order TCP processing does not limit the
>    number of outstanding queries over a connection.
> - Fix python documentation warning on functions.rst inplace_cb_reply.
> - Log ip address when http session recv fails, eg. due to tls fail.
> - Fix to set the tcp handler event toggle flag back to default when
>    the handler structure is reused.
> - Clean the fix for out of order TCP processing limits on number
>    of queries.  It was tested to work.
> - Fix that http settings have colon in set_option, for
>    http-endpoint, http-max-streams, http-query-buffer-size,
>    http-response-buffer-size, and http-nodelay.
> - Fix memory leak of https port string when reading config.
> - local-zone regional allocations outside of chunk
> - Merge PR #324 from James Renken: Add modern X.509v3 extensions to
>    unbound-control TLS certificates.
> - Fix for PR #324 to attach the x509v3 extensions to the client
>    certificate.
> - Fix #327: net/if.h check fails on some darwin versions; contribution by
>    Joshua Root.
> - Fix #320: potential memory corruption due to size miscomputation upton
>    custom region alloc init.
> - Fix #333: Unbound Segmentation Fault w/ log_info Functions From
>    Python Mod.
> - Fix that minimal-responses does not remove addresses from a priming
>    query response.
> - In man page note that tls-cert-bundle is read before permission
>    drop and chroot.
> - Fix #341: fixing a possible memory leak.
> - Fix memory leak after fix for possible memory leak failure.
> - Fix #343: Fail to build --with-libnghttp2 with error: 'SSIZE_MAX'
>    undeclared.
> - Fix for #303 CVE-2020-28935 : Fix that symlink does not interfere
>    with chown of pidfile.
> - Fix #347: IP_DONTFRAG broken on Apple xcode 12.2.
> - Fix #350: with the AF_NETLINK permission, to fix 1.12.0 error:
>    failed to list interfaces: getifaddrs: Address family not
>    supported by protocol.
> - Merge #351 from dvzrv: Add AF_NETLINK to set of allowed socket
>    address families.
> - iana portlist updated.
>
> Best regards, Wouter
>
>


More information about the Unbound-users mailing list