Unbound 1.13.0rc2 pre-release
Yuri
yvoinov at gmail.com
Wed Nov 25 15:24:04 UTC 2020
On first look running faster with less CPU utilization during warming up.
25.11.2020 21:19, Yuri пишет:
> Well.... at least, it running.
>
> No cores yet. 😉
>
> 25.11.2020 19:31, Wouter Wijngaards via Unbound-users пишет:
>> Hi,
>>
>> Unbound 1.13.0rc2 pre-release is available:
>> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc2.tar.gz
>> sha256 63a626a301fe11d4aaf5990f0d46c645d7c99262ead76a9066e3515179f71417
>> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc2.tar.gz.asc
>>
>> This RC2 fixes bugs that were reported on the RC1 candidate.
>>
>> Bug Fixes
>> - Fix crash when TLS connection is closed prematurely, when
>> reuse tree comparison is not properly identical to insertion.
>> - Fix padding of struct regional for 32bit systems.
>> - with udp-connect ignore connection refused with UDP timeouts.
>> - Fix udp-connect on FreeBSD, do send calls on connected UDP socket.
>> - Better fix for reuse tree comparison for is-tls sockets. Where
>> the tree key identity is preserved after cleanup of the TLS state.
>> - Fix memory leak for edns client tag opcode config element.
>> - Attempt fix for libevent state in tcp reuse cases after a packet
>> is written.
>> - Fix readagain and writeagain callback functions for comm point
>> cleanup.
>>
>> Best regards, Wouter
>>
>> On 24/11/2020 15:28, Wouter Wijngaards via maintainers wrote:
>>> Hi,
>>>
>>> Unbound 1.13.0rc1 pre-release is available:
>>> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz
>>> sha256 a55e8b5dfc290867017e7fbb75f1023ee2f6234943f870a5c24694b0908d7c17
>>> pgp https://nlnetlabs.nl/downloads/unbound/unbound-1.13.0rc1.tar.gz.asc
>>>
>>>
>>> This version has fixes to connect for UDP sockets, slowing down
>>> potential ICMP side channel leakage. The fix can be controlled with
>>> the
>>> option udp-connect: yes, it is enabled by default.
>>>
>>> Additionally CVE-2020-28935 is fixed, this solves a problem where the
>>> pidfile is altered by a symlink, and fails if a symlink is encountered.
>>> See https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt for more
>>> information.
>>>
>>> New features are upstream TCP and TLS query reuse, where a channel is
>>> reused for several queries. And http-notls-downstream: yesno for
>>> unencrypted DoH, useful for back end support servers. The option
>>> infra-keep-probing can be used to probe hosts that are down more
>>> frequently.
>>>
>>> The options edns-client-string and edns-client-string-opcode can be
>>> used
>>> to add an EDNS option with the specified string in queries towards
>>> servers, with the servers specified by IP address. It replaces the
>>> edns-client-tag option.
>>>
>>> Features
>>> - Pass the comm_reply information to the inplace_cb_reply* functions
>>> during the mesh state and update the documentation on that.
>>> - Fix #330: [Feature request] Add unencrypted DNS over HTTPS support.
>>> This adds the option http-notls-downstream: yesno to change that,
>>> and the dohclient test code has the -n option.
>>> - Merge PR #228 : infra-keep-probing option to probe hosts that are
>>> down. Add infra-keep-probing: yes option. Hosts that are down are
>>> probed more frequently.
>>> With the option turned on, it probes about every 120 seconds,
>>> eventually after exponential backoff, and that keeps that way. If
>>> traffic keeps up for the domain. It probes with one at a time, eg.
>>> one query is allowed to probe, other queries within that 120 second
>>> interval are turned away.
>>> - Merge PR #313 from Ralph Dolmans: Replace edns-client-tag with
>>> edns-client-string option.
>>> - Merge PR #283 : Stream reuse. This implements upstream stream
>>> reuse for performing several queries over the same TCP or TLS
>>> channel.
>>> - Fix to connect() to UDP destinations, default turned on,
>>> this lowers vulnerability to ICMP side channels.
>>> Option to toggle udp-connect, default is enabled.
>>>
>>> Bug Fixes
>>> - Fix #319: potential memory leak on config failure, in rpz config.
>>> - Fix dnstap socket and the chroot not applied properly to the dnstap
>>> socket path.
>>> - Fix warning in libnss compile, nss_buf2dsa is not used without DSA.
>>> - Fix #323: unbound testsuite fails on mock build in systemd-nspawn
>>> if systemd support is build.
>>> - Fix for python reply callback to see mesh state reply_list member,
>>> it only removes it briefly for the commpoint call so that it does
>>> not drop it and attempt to modify the reply list during reply.
>>> - Fix that if there are on reply callbacks, those are called per
>>> reply and a new message created if that was modified by the call.
>>> - Free up auth zone parse region after use for lookup of host
>>> - Merge PR #326 from netblue30: DoH: implement content-length
>>> header field.
>>> - DoH content length, simplify code, remove declaration after
>>> statement and fix cast warning.
>>> - Fix that if there are reply callbacks for the given rcode, those
>>> are called per reply and a new message created if that was modified
>>> by the call.
>>> - Fix that the out of order TCP processing does not limit the
>>> number of outstanding queries over a connection.
>>> - Fix python documentation warning on functions.rst inplace_cb_reply.
>>> - Log ip address when http session recv fails, eg. due to tls fail.
>>> - Fix to set the tcp handler event toggle flag back to default when
>>> the handler structure is reused.
>>> - Clean the fix for out of order TCP processing limits on number
>>> of queries. It was tested to work.
>>> - Fix that http settings have colon in set_option, for
>>> http-endpoint, http-max-streams, http-query-buffer-size,
>>> http-response-buffer-size, and http-nodelay.
>>> - Fix memory leak of https port string when reading config.
>>> - local-zone regional allocations outside of chunk
>>> - Merge PR #324 from James Renken: Add modern X.509v3 extensions to
>>> unbound-control TLS certificates.
>>> - Fix for PR #324 to attach the x509v3 extensions to the client
>>> certificate.
>>> - Fix #327: net/if.h check fails on some darwin versions;
>>> contribution by
>>> Joshua Root.
>>> - Fix #320: potential memory corruption due to size miscomputation
>>> upton
>>> custom region alloc init.
>>> - Fix #333: Unbound Segmentation Fault w/ log_info Functions From
>>> Python Mod.
>>> - Fix that minimal-responses does not remove addresses from a priming
>>> query response.
>>> - In man page note that tls-cert-bundle is read before permission
>>> drop and chroot.
>>> - Fix #341: fixing a possible memory leak.
>>> - Fix memory leak after fix for possible memory leak failure.
>>> - Fix #343: Fail to build --with-libnghttp2 with error: 'SSIZE_MAX'
>>> undeclared.
>>> - Fix for #303 CVE-2020-28935 : Fix that symlink does not interfere
>>> with chown of pidfile.
>>> - Fix #347: IP_DONTFRAG broken on Apple xcode 12.2.
>>> - Fix #350: with the AF_NETLINK permission, to fix 1.12.0 error:
>>> failed to list interfaces: getifaddrs: Address family not
>>> supported by protocol.
>>> - Merge #351 from dvzrv: Add AF_NETLINK to set of allowed socket
>>> address families.
>>> - iana portlist updated.
>>>
>>> Best regards, Wouter
>>>
>>>
>>> _______________________________________________
>>> maintainers mailing list
>>> maintainers at lists.nlnetlabs.nl
>>> https://lists.nlnetlabs.nl/mailman/listinfo/maintainers
>>>
More information about the Unbound-users
mailing list