Unbound 1.13.0rc1 pre-release
Yuri
yvoinov at gmail.com
Tue Nov 24 15:59:01 UTC 2020
Debug build produced following stacktrace:
t at 3 (l at 3) terminated by signal SEGV (no mapping at the fault address)
Current function is reuse_cmp_addrportssl
144 r = sockaddr_cmp(&r1->addr, r1->addrlen, &r2->addr,
r2->addrlen);
(dbx) where
current thread: t at 3
=>[1] reuse_cmp_addrportssl(key1 = 0xfffffd7ffc1ff268, key2 = (nil)),
line 144 in "outside_network.c"
[2] reuse_cmp(key1 = 0xfffffd7ffc1ff268, key2 = (nil)), line 160 in
"outside_network.c"
[3] rbtree_find_less_equal(rbtree = 0xfffffd7ffe6e0300, key =
0xfffffd7ffc1ff268, result = 0xfffffd7ffc1fefe8), line 527 in "rbtree.c"
[4] reuse_tcp_find(outnet = 0xfffffd7ffe6e0200, addr =
0xfffffd7ffe6f6258, addrlen = 16U, use_ssl = 1), line 480 in
"outside_network.c"
[5] pending_tcp_query(sq = 0xfffffd7ffe6f6200, packet =
0xfffffd7fc12180c0, timeout = 3000, callback = 0x57adec =
&serviced_tcp_callback(struct comm_point *c, void *arg, int error,
struct comm_reply *rep), callback_arg = 0xfffffd7ffe6f6200), line 2056
in "outside_network.c"
[6] serviced_tcp_send(sq = 0xfffffd7ffe6f6200, buff =
0xfffffd7fc12180c0), line 2767 in "outside_network.c"
[7] outnet_serviced_query(outnet = 0xfffffd7ffe6e0200, qinfo =
0xfffffd7fa1294580, flags = 256U, dnssec = 32768, want_dnssec = 0,
nocaps = 0, tcp_upstream = 0, ssl_upstream = 1, tls_auth_name =
0xfffffd7fa1294958 "cloudflare-dns.com", addr = 0xfffffd7fa1294840,
addrlen = 16U, zone = 0xfffffd7fa1294820 "", zonelen = 1U, qstate =
0xfffffd7fa1294088, callback = 0x4c1e16 =
&worker_handle_service_reply(), callback_arg = 0xfffffd7fa1295b40, buff
= 0xfffffd7fc12180c0, env = 0xfffffd7ffd815540), line 2998 in
"outside_network.c"
[8] worker_send_query(qinfo = 0xfffffd7fa1294580, flags = 256U,
dnssec = 32768, want_dnssec = 0, nocaps = 0, addr = 0xfffffd7fa1294840,
addrlen = 16U, zone =0xfffffd7fa1294820 "", zonelen = 1U, ssl_upstream =
1, tls_auth_name = 0xfffffd7fa1294958 "cloudflare-dns.com", q =
0xfffffd7fa1294088), line 2001 in "worker.c"
[9] processQueryTargets(qstate = 0xfffffd7fa1294088, iq =
0xfffffd7fa1294480,ie = 0xfffffd7ffe28b100, id = 1), line 2600 in
"iterator.c"
[10] iter_handle(qstate = 0xfffffd7fa1294088, iq =
0xfffffd7fa1294480, ie = 0xfffffd7ffe28b100, id = 1), line 3634 in
"iterator.c"
[11] process_request(qstate = 0xfffffd7fa1294088, iq =
0xfffffd7fa1294480, ie= 0xfffffd7ffe28b100, id = 1), line 3677 in
"iterator.c"
[12] iter_operate(qstate = 0xfffffd7fa1294088, event =
module_event_pass, id = 1, outbound = (nil)), line 3889 in "iterator.c"
[13] mesh_run(mesh = 0xfffffd7ffe6f0600, mstate = 0xfffffd7fa1294038,
ev = module_event_pass, e = (nil)), line 1699 in "mesh.c"
[14] mesh_new_client(mesh = 0xfffffd7ffe6f0600, qinfo =
0xfffffd7ffc1ffb90, cinfo = (nil), qflags = 288U, edns =
0xfffffd7ffc1ffb70, rep = 0xfffffd7ffc1ffc70, qid = 48945U), line 585 in
"mesh.c"
[15] worker_handle_request(c = 0xfffffd7fca6e2800, arg =
0xfffffd7ffd814000, error = 0, repinfo = 0xfffffd7ffc1ffc70), line 1565
in "worker.c"
[16] comm_point_udp_callback(fd = 3, event = 2, arg =
0xfffffd7fca6e2800), line 716 in "netevent.c"
[17] event_process_active_single_queue(), at 0x5d1680
[18] event_process_active(), at 0x5d1b27
[19] 42(), at 0x5d5e48
[20] ub_event_base_dispatch(base = 0xfffffd7fe5a00400), line 280 in
"ub_event.c"
[21] comm_base_dispatch(b = 0xfffffd7ffe015d40), line 246 in "netevent.c"
[22] worker_work(worker = 0xfffffd7ffd814000), line 1941 in "worker.c"
[23] thread_start(arg = 0xfffffd7ffd814000), line 540 in "daemon.c"
[24] _thr_setup(), at 0xfffffd7ffef5dbab
[25] _lwp_start(), at 0xfffffd7ffef5dde0
24.11.2020 20:28, Wouter Wijngaards via Unbound-users пишет:
> Hi,
>
> Unbound 1.13.0rc1 pre-release is available:
> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz
> sha256 a55e8b5dfc290867017e7fbb75f1023ee2f6234943f870a5c24694b0908d7c17
> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz.asc
>
>
> This version has fixes to connect for UDP sockets, slowing down
> potential ICMP side channel leakage. The fix can be controlled with the
> option udp-connect: yes, it is enabled by default.
>
> Additionally CVE-2020-28935 is fixed, this solves a problem where the
> pidfile is altered by a symlink, and fails if a symlink is encountered.
> See https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt for more
> information.
>
> New features are upstream TCP and TLS query reuse, where a channel is
> reused for several queries. And http-notls-downstream: yesno for
> unencrypted DoH, useful for back end support servers. The option
> infra-keep-probing can be used to probe hosts that are down more
> frequently.
>
> The options edns-client-string and edns-client-string-opcode can be used
> to add an EDNS option with the specified string in queries towards
> servers, with the servers specified by IP address. It replaces the
> edns-client-tag option.
>
> Features
> - Pass the comm_reply information to the inplace_cb_reply* functions
> during the mesh state and update the documentation on that.
> - Fix #330: [Feature request] Add unencrypted DNS over HTTPS support.
> This adds the option http-notls-downstream: yesno to change that,
> and the dohclient test code has the -n option.
> - Merge PR #228 : infra-keep-probing option to probe hosts that are
> down. Add infra-keep-probing: yes option. Hosts that are down are
> probed more frequently.
> With the option turned on, it probes about every 120 seconds,
> eventually after exponential backoff, and that keeps that way. If
> traffic keeps up for the domain. It probes with one at a time, eg.
> one query is allowed to probe, other queries within that 120 second
> interval are turned away.
> - Merge PR #313 from Ralph Dolmans: Replace edns-client-tag with
> edns-client-string option.
> - Merge PR #283 : Stream reuse. This implements upstream stream
> reuse for performing several queries over the same TCP or TLS
> channel.
> - Fix to connect() to UDP destinations, default turned on,
> this lowers vulnerability to ICMP side channels.
> Option to toggle udp-connect, default is enabled.
>
> Bug Fixes
> - Fix #319: potential memory leak on config failure, in rpz config.
> - Fix dnstap socket and the chroot not applied properly to the dnstap
> socket path.
> - Fix warning in libnss compile, nss_buf2dsa is not used without DSA.
> - Fix #323: unbound testsuite fails on mock build in systemd-nspawn
> if systemd support is build.
> - Fix for python reply callback to see mesh state reply_list member,
> it only removes it briefly for the commpoint call so that it does
> not drop it and attempt to modify the reply list during reply.
> - Fix that if there are on reply callbacks, those are called per
> reply and a new message created if that was modified by the call.
> - Free up auth zone parse region after use for lookup of host
> - Merge PR #326 from netblue30: DoH: implement content-length
> header field.
> - DoH content length, simplify code, remove declaration after
> statement and fix cast warning.
> - Fix that if there are reply callbacks for the given rcode, those
> are called per reply and a new message created if that was modified
> by the call.
> - Fix that the out of order TCP processing does not limit the
> number of outstanding queries over a connection.
> - Fix python documentation warning on functions.rst inplace_cb_reply.
> - Log ip address when http session recv fails, eg. due to tls fail.
> - Fix to set the tcp handler event toggle flag back to default when
> the handler structure is reused.
> - Clean the fix for out of order TCP processing limits on number
> of queries. It was tested to work.
> - Fix that http settings have colon in set_option, for
> http-endpoint, http-max-streams, http-query-buffer-size,
> http-response-buffer-size, and http-nodelay.
> - Fix memory leak of https port string when reading config.
> - local-zone regional allocations outside of chunk
> - Merge PR #324 from James Renken: Add modern X.509v3 extensions to
> unbound-control TLS certificates.
> - Fix for PR #324 to attach the x509v3 extensions to the client
> certificate.
> - Fix #327: net/if.h check fails on some darwin versions; contribution by
> Joshua Root.
> - Fix #320: potential memory corruption due to size miscomputation upton
> custom region alloc init.
> - Fix #333: Unbound Segmentation Fault w/ log_info Functions From
> Python Mod.
> - Fix that minimal-responses does not remove addresses from a priming
> query response.
> - In man page note that tls-cert-bundle is read before permission
> drop and chroot.
> - Fix #341: fixing a possible memory leak.
> - Fix memory leak after fix for possible memory leak failure.
> - Fix #343: Fail to build --with-libnghttp2 with error: 'SSIZE_MAX'
> undeclared.
> - Fix for #303 CVE-2020-28935 : Fix that symlink does not interfere
> with chown of pidfile.
> - Fix #347: IP_DONTFRAG broken on Apple xcode 12.2.
> - Fix #350: with the AF_NETLINK permission, to fix 1.12.0 error:
> failed to list interfaces: getifaddrs: Address family not
> supported by protocol.
> - Merge #351 from dvzrv: Add AF_NETLINK to set of allowed socket
> address families.
> - iana portlist updated.
>
> Best regards, Wouter
>
More information about the Unbound-users
mailing list