Unbound 1.13.1rc1 pre-release

George Thessalonikefs george at nlnetlabs.nl
Wed Feb 3 14:42:45 UTC 2021


Hi RayG,

The RPZ issue on windows is still ongoing.
The error as I see it is that TLS handshake to the server is not 
completed and thus you don't get the zonefile to apply the rules.
This is still an ongoing issue.

Best regards,
-- George

On 03/02/2021 15:29, RayG via Unbound-users wrote:
> Hi Wouter,
> 
> Thanks for the info, in that case RPZ is not working because I see no:
> 
> info: RPZ applied
> 
> entries in the log file and that would be confirmed as the data from:
> 
> https://urlhaus.abuse.ch/downloads/rpz
> 
> when I select any item and use DIG returns an IP address rather than NXDOMAIN.
> 
> So sorry Response Policy Zones is not working for me.
> 
> I look forward to hearing your reply.
> 
> Thanks
> 
> RayG
> 
> -----Original Message-----
> From: Wouter Wijngaards <wouter at nlnetlabs.nl>
> Sent: 03 February 2021 10:45
> To: RayG <rgsub1 at btinternet.com>; unbound-users at nlnetlabs.nl
> Subject: Re: Unbound 1.13.1rc1 pre-release
> 
> Hi RayG,
> 
>  From the unit test, a sample output if rpz-log is enabled:
> info: RPZ applied [rpz.example.com] a. nxdomain 127.0.0.1 at 53 a. TXT IN
> 
> It is applied to the query 'a' here, of type txt, from localhost.  And the action, or action-override, is nxdomain.
> 
> With rpz-log enabled, verbosity 0 is enough to see that, or more.  So verbosity does not matter.
> 
> Best regards, Wouter
> 
> On 02/02/2021 18:06, RayG wrote:
>> Hi Wouter,
>>
>> I am assuming that the RPZ issue I had on v1.13.0 is included in the fixes but I could not see something that registered with me in the notes you put out.
>>
>> Given that when I look at the URLHaus web site and pick a few names at random from the list I do get an NXDOMAIN response from Unbound.
>>
>> I was expecting the when this happened I would see in the log file some reference to the fact the NXDOMAIN was returned due to an RPZ entry?
>>
>> If this is correct what verbosity level is required to see the entries?
>>
>> Do you have any log examples to show it is working correctly please?
>>
>>       rpz: # MyResponsePolicyZones.conf
>>       name: "URLHaus"
>>       zonefile: "C:\ProgramData\Unbound\Logs\urlhaus.zone"
>>       url: "https://urlhaus.abuse.ch/downloads/rpz/"
>>       rpz-log: yes
>>       rpz-log-name: "URLHausRPZ"
>>       rpz-action-override: nxdomain
>>
>> Thanks
>>
>> RayG
>>
>> -----Original Message-----
>> From: RayG <rgsub1 at btinternet.com>
>> Sent: 02 February 2021 16:31
>> To: 'Wouter Wijngaards' <wouter at nlnetlabs.nl>;
>> unbound-users at nlnetlabs.nl
>> Subject: RE: Unbound 1.13.1rc1 pre-release
>>
>> Hi Wouter,
>>
>> OK that seems to have fixed things - we are now running - lets see what happens now...
>>
>> Thanks for the quick fixes.
>>
>> RayG
>>
>> -----Original Message-----
>> From: Wouter Wijngaards <wouter at nlnetlabs.nl>
>> Sent: 02 February 2021 16:27
>> To: RayG <rgsub1 at btinternet.com>; unbound-users at nlnetlabs.nl
>> Subject: Re: Unbound 1.13.1rc1 pre-release
>>
>> Hi RayG,
>>
>> Fixed this in the commit
>> https://github.com/NLnetLabs/unbound/commit/46939294710d24a37f9f838141
>> f26e6b063b01f3
>>
>> Thanks for the report!  I updated the link with the installer to a new installer with a root.key file that has the right contents.
>> www.nlnetlabs.nl/~wouter/unbound_setup_1.13.1_20210202.exe
>> www.nlnetlabs.nl/~wouter/unbound-1.13.1_20210202.zip
>>
>> Best regards, Wouter
>>
>> On 02/02/2021 16:38, RayG wrote:
>>> Hi Wouter,
>>>
>>> A bit further forward but it still will not run.
>>>
>>> The reason being that the root.key file has a zero length. It has the correct info when 1.13.0 is running.
>>>
>>> unbound_setup_1.13.1_20210202 corrupts the file.
>>>
>>> C:\Program Files\Unbound>unbound-checkconf.exe
>>> [1612280164] unbound-checkconf[9652:0] error: failed to read
>>> C:\Program Files\Unbound\root.key [1612280164]
>>> unbound-checkconf[9652:0] error: error reading auto-trust-anchor-file:
>>> C:\Program Files\Unbound\root.key [1612280164] unbound-checkconf[9652:0] error: validator: error in trustanchors config [1612280164] unbound-checkconf[9652:0] error: validator: could not apply configuration settings.
>>> [1612280164] unbound-checkconf[9652:0] fatal error: bad config for
>>> validator module
>>>
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0]
>>> notice: init module 0: respip
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0]
>>> notice: init module 1: validator
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0]
>>> error: failed to read C:\Program Files\Unbound\root.key
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0]
>>> error: error reading auto-trust-anchor-file: C:\Program
>>> Files\Unbound\root.key
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0]
>>> error: validator: error in trustanchors config
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] error: validator: could not apply configuration settings.
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0]
>>> error: module init for module validator failed
>>> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0]
>>> fatal
>>> error: failed to setup modules
>>>
>>> RayG
>>> -----Original Message-----
>>> From: Wouter Wijngaards <wouter at nlnetlabs.nl>
>>> Sent: 02 February 2021 15:17
>>> To: RayG <rgsub1 at btinternet.com>; unbound-users at nlnetlabs.nl
>>> Subject: Re: Unbound 1.13.1rc1 pre-release
>>>
>>> Hi RayG,
>>>
>>> Here is a build for today's fix
>>> www.nlnetlabs.nl/~wouter/unbound_setup_1.13.1_20210202.exe
>>> www.nlnetlabs.nl/~wouter/unbound-1.13.1_20210202.zip
>>> and .asc pgp signature and .sha256 sum files.
>>>
>>> Best regards, Wouter
>>>
>>> On 02/02/2021 15:44, RayG wrote:
>>>> Hi Wouter,
>>>>
>>>> Thanks
>>>>
>>>> I'll have to wait until you next build the Windows installer.
>>>>
>>>> RayG
>>>>
>>>> -----Original Message-----
>>>> From: Wouter Wijngaards <wouter at nlnetlabs.nl>
>>>> Sent: 02 February 2021 14:09
>>>> To: RayG <rgsub1 at btinternet.com>; unbound-users at nlnetlabs.nl;
>>>> maintainers at nlnetlabs.nl
>>>> Subject: Re: Unbound 1.13.1rc1 pre-release
>>>>
>>>> Hi RayG,
>>>>
>>>> This seems to be because of a default stack protector in mingw.  Fix
>>>> includes libssp in the libunbound/ directory of the zipfile, and
>>>> attempts to statically link with it in the unbound executable.  It
>>>> is applied to the repository in commits
>>>> https://github.com/NLnetLabs/unbound/commit/aa8dfe94d31e11c19897444b
>>>> 9
>>>> 5
>>>> 5af6ac10aec1cd
>>>> https://github.com/NLnetLabs/unbound/commit/f9a1ac3f0b1a415d8085e113
>>>> d
>>>> 4
>>>> 4797e62c436a52
>>>> https://github.com/NLnetLabs/unbound/commit/18840665bcbb28c9de07bc3b
>>>> 2
>>>> 0
>>>> 157a0dde13f8fd
>>>>
>>>> Best regards, Wouter
>>>>
>>>> On 02/02/2021 13:39, RayG wrote:
>>>>> V1.13.1rc1 will not run on Windows X64 (20H2)
>>>>>
>>>>> The error is:
>>>>> "the code execution cannot proceed because libssp-0.dll was not found"
>>>>>
>>>>> Reinstalling the application does not help,
>>>>>
>>>>> Reverting to v1.13.0
>>>>>
>>>>> RayG
>>>>> -----Original Message-----
>>>>> From: Wouter Wijngaards <wouter at nlnetlabs.nl>
>>>>> Sent: 02 February 2021 07:47
>>>>> To: unbound-users at nlnetlabs.nl; maintainers at nlnetlabs.nl
>>>>> Subject: Unbound 1.13.1rc1 pre-release
>>>>>
>>>>> Hi,
>>>>>
>>>>> Unbound 1.13.1rc1 pre-release is available
>>>>> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.1rc1.tar.gz
>>>>> sha256
>>>>> c652c0a35165c97962f0cd503902b95096b3f3252d1bf9cefe5ab9e4910e4fec
>>>>> pgp
>>>>> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.1rc1.tar.gz.asc
>>>>>
>>>>>
>>>>> This release contains a number of bug fixes.  There is added support for the EDNS Padding option (RFC7830 and RFC8467), and the EDNS NSID option (RFC 5001).  Unbound control has added commands to enable and disable rpz processing.  Reply callbacks have a start time passed to them that can be used to calculate time, these are callbacks for response processing.  With the option serve-original-ttl the TTL served in responses is the original, not counted down, value, for when in front of authority service.
>>>>>
>>>>> Features
>>>>> - Merge PR #375 by fhriley: Add rpz_enable and rpz_disable commands
>>>>>    to unbound-control.
>>>>> - Merge PR #391 from fhriley: Add start_time to reply callbacks so
>>>>>    modules can compute the response time.
>>>>> - Fix #397: [Feature request] add new type always_null to local-zone
>>>>>    similar to always_nxdomain.
>>>>> - Support for RFC5001: DNS Name Server Identifier (NSID) Option
>>>>>    with the nsid: option in unbound.conf
>>>>> - Padding of queries and responses with DNS over TLS as specified in
>>>>>    RFC7830 and RFC8467.
>>>>> - Merge PR #275 from Roland van Rijswijk-Deij: Add feature to return the
>>>>>    original instead of a decrementing TTL ('serve-original-ttl')
>>>>>
>>>>> Bug Fixes
>>>>> - Fix #358: Squelch udp connect 'no route to host' errors on low
>>>>>    verbosity.
>>>>> - Fix #360: for the additionally reported TCP Fast Open makes TCP
>>>>>    connections fail, in that case we print a hint that this is
>>>>>    happening with the error in the logs.
>>>>> - Fix #356: deadlock when listening tcp.
>>>>> - Fix unbound-dnstap-socket to not use log routine from interrupt
>>>>>    handler and not print so frequently when invoked in sequence.
>>>>> - Fix on windows to ignore connection failure on UDP, unless verbose.
>>>>> - make depend.
>>>>> - Fix #371: unbound-control timeout when Unbound is not running.
>>>>> - Fix to squelch permission denied and other errors from remote host,
>>>>>    they are logged at higher verbosity but not on low verbosity.
>>>>> - Merge PR #335 from fobser: Sprinkle in some static to prevent
>>>>>    missing prototype warnings.
>>>>> - Merge PR #373 from fobser: Warning: arithmetic on a pointer to void
>>>>>    is a GNU extension.
>>>>> - Fix missing prototypes in the code.
>>>>> - Fix error cases when udp-connect is set and send() returns an error
>>>>>    (modified patch from Xin Li @delphij).
>>>>> - For #376: Fix that comm point event is not double removed or double
>>>>>    added to event map.
>>>>> - iana portlist updated.
>>>>> - Fix #385: autoconf 2.70 impacts unbound build
>>>>> - Fix #379: zone loading over HTTP appears to have buffer issues.
>>>>> - Merge PR #395 from mptre: add missing null check.
>>>>> - Fix #387: client-subnet-always-forward seems to effectively bypass
>>>>>    any caching?
>>>>> - For #391: use struct timeval* start_time for callback information.
>>>>> - For #391: fix indentation.
>>>>> - For #391: more double casts in python start time calculation.
>>>>> - Add comment documentation.
>>>>> - Fix clang analysis warning.
>>>>> - Fix so local zone types always_nodata and always_deny can be used
>>>>>    from the config file.
>>>>> - Merge #399 from xiangbao227: The lock of lruhash table should
>>>>>    unlocked after markdel entry.
>>>>> - Fix for #93: dynlibmodule link fix for Windows.
>>>>> - Fix for #93: dynlibmodule import library is named libunbound.dll.a.
>>>>> - Merge #402 from fobser: Implement IPv4-Embedded addresses according
>>>>>    to RFC6052.
>>>>> - Fix #404: DNS query with small edns bufsize fail.
>>>>> - Fix declaration before statement and signed comparison warning in
>>>>>    dns64.
>>>>> - Fix TTL of SOA record for negative answers (localzone and
>>>>>    authzone data) to be the minimum of the SOA TTL and the SOA.MINIMUM.
>>>>> - Fix compile of unbound-dnstap-socket without dnstap installed.
>>>>> - Merge PR #355 from noloader: Make ICANN Update CA and DS Trust Anchor
>>>>>    static data.
>>>>> - Ignore cache blacklisting when trying to reply with expired data from
>>>>>    cache (#394).
>>>>> - Merge PR #408 from fobser: Prevent a few more yacc clashes.
>>>>> - Annotate that we ignore the return value of if_indextoname.
>>>>> - Fix to use correct type for label count in rpz routine.
>>>>> - Fix empty clause warning in config_file nsid parse.
>>>>> - Fix to use correct type for label count in ipdnametoaddr rpz routine.
>>>>> - Fix empty clause warning in edns pass for padding.
>>>>> - Fix for doxygen 1.8.20 compatibility.
>>>>> - Attempt to fix NULL keys in the reuse_tcp tree; relates to #411.
>>>>>
>>>>>
>>>>> Best regards, Wouter
>>>>>
>>>>>
>>>>
>>>
>>
>>
>>
> 


More information about the Unbound-users mailing list