Unbound 1.13.0rc2 pre-release

Yuri yvoinov at gmail.com
Wed Nov 25 15:19:43 UTC 2020


Well.... at least, it running.

No cores yet. 😉

25.11.2020 19:31, Wouter Wijngaards via Unbound-users пишет:
> Hi,
>
> Unbound 1.13.0rc2 pre-release is available:
> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc2.tar.gz
> sha256 63a626a301fe11d4aaf5990f0d46c645d7c99262ead76a9066e3515179f71417
> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc2.tar.gz.asc
>
> This RC2 fixes bugs that were reported on the RC1 candidate.
>
> Bug Fixes
> - Fix crash when TLS connection is closed prematurely, when
>    reuse tree comparison is not properly identical to insertion.
> - Fix padding of struct regional for 32bit systems.
> - with udp-connect ignore connection refused with UDP timeouts.
> - Fix udp-connect on FreeBSD, do send calls on connected UDP socket.
> - Better fix for reuse tree comparison for is-tls sockets.  Where
>    the tree key identity is preserved after cleanup of the TLS state.
> - Fix memory leak for edns client tag opcode config element.
> - Attempt fix for libevent state in tcp reuse cases after a packet
>    is written.
> - Fix readagain and writeagain callback functions for comm point
>    cleanup.
>
> Best regards, Wouter
>
> On 24/11/2020 15:28, Wouter Wijngaards via maintainers wrote:
>> Hi,
>>
>> Unbound 1.13.0rc1 pre-release is available:
>> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz
>> sha256 a55e8b5dfc290867017e7fbb75f1023ee2f6234943f870a5c24694b0908d7c17
>> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz.asc
>>
>>
>> This version has fixes to connect for UDP sockets, slowing down
>> potential ICMP side channel leakage.  The fix can be controlled with the
>> option udp-connect: yes, it is enabled by default.
>>
>> Additionally CVE-2020-28935 is fixed, this solves a problem where the
>> pidfile is altered by a symlink, and fails if a symlink is encountered.
>> See https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt for more
>> information.
>>
>> New features are upstream TCP and TLS query reuse, where a channel is
>> reused for several queries.  And http-notls-downstream: yesno for
>> unencrypted DoH, useful for back end support servers.  The option
>> infra-keep-probing can be used to probe hosts that are down more
>> frequently.
>>
>> The options edns-client-string and edns-client-string-opcode can be used
>> to add an EDNS option with the specified string in queries towards
>> servers, with the servers specified by IP address.  It replaces the
>> edns-client-tag option.
>>
>> Features
>> - Pass the comm_reply information to the inplace_cb_reply* functions
>>    during the mesh state and update the documentation on that.
>> - Fix #330: [Feature request] Add unencrypted DNS over HTTPS support.
>>    This adds the option http-notls-downstream: yesno to change that,
>>    and the dohclient test code has the -n option.
>> - Merge PR #228 : infra-keep-probing option to probe hosts that are
>>    down.  Add infra-keep-probing: yes option. Hosts that are down are
>>    probed more frequently.
>>    With the option turned on, it probes about every 120 seconds,
>>    eventually after exponential backoff, and that keeps that way. If
>>    traffic keeps up for the domain. It probes with one at a time, eg.
>>    one query is allowed to probe, other queries within that 120 second
>>    interval are turned away.
>> - Merge PR #313 from Ralph Dolmans: Replace edns-client-tag with
>>    edns-client-string option.
>> - Merge PR #283 : Stream reuse.  This implements upstream stream
>>    reuse for performing several queries over the same TCP or TLS
>>    channel.
>> - Fix to connect() to UDP destinations, default turned on,
>>    this lowers vulnerability to ICMP side channels.
>>    Option to toggle udp-connect, default is enabled.
>>
>> Bug Fixes
>> - Fix #319: potential memory leak on config failure, in rpz config.
>> - Fix dnstap socket and the chroot not applied properly to the dnstap
>>    socket path.
>> - Fix warning in libnss compile, nss_buf2dsa is not used without DSA.
>> - Fix #323: unbound testsuite fails on mock build in systemd-nspawn
>>    if systemd support is build.
>> - Fix for python reply callback to see mesh state reply_list member,
>>    it only removes it briefly for the commpoint call so that it does
>>    not drop it and attempt to modify the reply list during reply.
>> - Fix that if there are on reply callbacks, those are called per
>>    reply and a new message created if that was modified by the call.
>> - Free up auth zone parse region after use for lookup of host
>> - Merge PR #326 from netblue30: DoH: implement content-length
>>    header field.
>> - DoH content length, simplify code, remove declaration after
>>    statement and fix cast warning.
>> - Fix that if there are reply callbacks for the given rcode, those
>>    are called per reply and a new message created if that was modified
>>    by the call.
>> - Fix that the out of order TCP processing does not limit the
>>    number of outstanding queries over a connection.
>> - Fix python documentation warning on functions.rst inplace_cb_reply.
>> - Log ip address when http session recv fails, eg. due to tls fail.
>> - Fix to set the tcp handler event toggle flag back to default when
>>    the handler structure is reused.
>> - Clean the fix for out of order TCP processing limits on number
>>    of queries.  It was tested to work.
>> - Fix that http settings have colon in set_option, for
>>    http-endpoint, http-max-streams, http-query-buffer-size,
>>    http-response-buffer-size, and http-nodelay.
>> - Fix memory leak of https port string when reading config.
>> - local-zone regional allocations outside of chunk
>> - Merge PR #324 from James Renken: Add modern X.509v3 extensions to
>>    unbound-control TLS certificates.
>> - Fix for PR #324 to attach the x509v3 extensions to the client
>>    certificate.
>> - Fix #327: net/if.h check fails on some darwin versions; contribution by
>>    Joshua Root.
>> - Fix #320: potential memory corruption due to size miscomputation upton
>>    custom region alloc init.
>> - Fix #333: Unbound Segmentation Fault w/ log_info Functions From
>>    Python Mod.
>> - Fix that minimal-responses does not remove addresses from a priming
>>    query response.
>> - In man page note that tls-cert-bundle is read before permission
>>    drop and chroot.
>> - Fix #341: fixing a possible memory leak.
>> - Fix memory leak after fix for possible memory leak failure.
>> - Fix #343: Fail to build --with-libnghttp2 with error: 'SSIZE_MAX'
>>    undeclared.
>> - Fix for #303 CVE-2020-28935 : Fix that symlink does not interfere
>>    with chown of pidfile.
>> - Fix #347: IP_DONTFRAG broken on Apple xcode 12.2.
>> - Fix #350: with the AF_NETLINK permission, to fix 1.12.0 error:
>>    failed to list interfaces: getifaddrs: Address family not
>>    supported by protocol.
>> - Merge #351 from dvzrv: Add AF_NETLINK to set of allowed socket
>>    address families.
>> - iana portlist updated.
>>
>> Best regards, Wouter
>>
>>
>> _______________________________________________
>> maintainers mailing list
>> maintainers at lists.nlnetlabs.nl
>> https://lists.nlnetlabs.nl/mailman/listinfo/maintainers
>>


More information about the Unbound-users mailing list