stable

knot-2.6.1-1.fc26 and knot-resolver-1.5.0-1.fc26

FEDORA-2017-31519ecf40 created by pspacek 6 years ago for Fedora 26

Major updates for Knot DNS and Knot Resolver: Knot Resolver 1.5.0 (2017-11-02) ================================

Bugfixes

  • fix loading modules on Darwin

Improvements

  • new module ta_signal_query supporting Signaling Trust Anchor Knowledge using Keytag Query (RFC 8145 section 5); it is enabled by default
  • attempt validation for more records but require it for fewer of them (e.g. avoids SERVFAIL when server adds extra records but omits RRSIGs)

Knot Resolver 1.4.0 (2017-09-22)

Incompatible changes

  • lua: query flag-sets are no longer represented as plain integers. kres.query.* no longer works, and kr_query_t lost trivial methods 'hasflag' and 'resolved'. You can instead write code like qry.flags.NO_0X20 = true.

Bugfixes

  • fix exiting one of multiple forks (#150)
  • cache: change the way of using LMDB transactions. That in particular fixes some cases of using too much space with multiple kresd forks (#240).

Improvements

  • policy.suffix: update the aho-corasick code (#200)
  • root hints are now loaded from a zonefile; exposed as hints.root_file(). You can override the path by defining ROOTHINTS during compilation.
  • policy.FORWARD: work around resolvers adding unsigned NS records (#248)
  • reduce unneeded records previously put into authority in wildcarded answers

Knot Resolver 1.3.3 (2017-08-09)

Security

  • Fix a critical DNSSEC flaw. Signatures might be accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it, assuming the trust chain to that DNSKEY was valid.

Bugfixes

  • iterate: skip RRSIGs with bad label count instead of immediate SERVFAIL
  • utils: fix possible incorrect seeding of the random generator
  • modules/http: fix compatibility with the Prometheus text format

Improvements

  • policy: implement remaining special-use domain names from RFC6761 (#205), and make these rules apply only if no other non-chain rule applies

Knot DNS 2.6.1 (2017-11-02)

Features:

  • NSEC3 Opt-Out support in the DNSSEC signing
  • New CDS/CDNSKEY publish configuration option

Improvements:

  • Simplified DNSSEC log message with DNSKEY details
  • +tls-hostname in kdig implies +tls-ca if neither +tls-ca nor +tls-pin is given
  • New documentation sections for DNSSEC key rollovers and shared keys
  • Keymgr no longer prints useless algorithm number for generated key
  • Kdig prints unknown RCODE in a numeric format
  • Better support for LLVM libFuzzer

Bugfixes:

  • Faulty DNAME semantic check if present in the zone apex and NSEC3 is used
  • Immediate zone flush not scheduled during the zone load event
  • Server crashes upon dynamic zone addition if a query module is loaded
  • Kdig fails to connect over TLS due to SNI is set to server IP address
  • Possible out-of-bounds memory access at the end of the input
  • TCP Fast Open enabled by default in kdig breaks TLS connection

Knot DNS 2.6.0 (2017-09-29)

Features:

  • On-slave (inline) signing support
  • Automatic DNSSEC key algorithm rollover
  • Ed25519 algorithm support in DNSSEC (requires GnuTLS 3.6.0)
  • New 'journal-content' and 'zonefile-load' configuration options
  • keymgr tries to run as user/group set in the configuration
  • Public-only DNSSEC key import into KASP DB via keymgr
  • NSEC3 resalt and parent DS query events are persistent in timer DB
  • New processing state for a response suppression within a query module
  • Enabled server side TCP Fast Open if supported
  • TCP Fast Open support in kdig

Improvements:

  • Better record owner compression if related to the previous rdata dname
  • NSEC(3) chain is no longer recomputed whole on every update
  • Remove inconsistent and unnecessary quoting in log files
  • Avoiding of overlapping key rollovers at a time
  • More DNSSSEC-related semantic checks
  • Extended timestamp format in keymgr

Bugfixes:

  • Incorrect journal free space computation causing inefficient space handling
  • Interface-automatic broken on Linux in the presence of asymmetric routing

Knot DNS 2.5.6 (2017-11-02)

Improvements:

  • Keymgr no longer prints useless algorithm number for generated key

Bugfixes:

  • Faulty DNAME semantic check if present in the zone apex and NSEC3 is used
  • Immediate zone flush not scheduled during the zone load event
  • Server crashes upon dynamic zone addition if a query module is loaded
  • Kdig fails to connect over TLS due to SNI is set to server IP address

Knot DNS 2.5.5 (2017-09-29)

Improvements:

  • Constant time memory comparison in the TSIG processing
  • Proper use of the ctype functions
  • Generated RRSIG records have inception time 90 minutes in the past

Bugfixes:

  • Incorrect online signature for NSEC in the case of a CNAME record
  • Incorrect timestamps in dnstap records
  • EDNS Subnet Client validation rejects valid payloads
  • Module configuration semantic checks are not executed
  • Kzonecheck segfaults with unusual inputs

Knot DNS 2.5.4 (2017-08-31)

Improvements:

  • New minimum and maximum refresh interval config options (Thanks to Manabu Sonoda)
  • New warning when unforced flush with disabled zone file synchronization
  • New 'dnskey' keymgr command
  • Linking with libatomic on architectures that require it (Thanks to Pierre-Olivier Mercier)
  • Removed 'OK' from listing keymgr command outputs
  • Extended journal and keymgr documentation and logging

Bugfixes:

  • Incorrect handling of specific corner-cases with zone-in-journal
  • The 'share' keymgr command doesn't work
  • Server crashes if configured with query-size and reply-size statistics options
  • Malformed big integer configuration values on some 32-bit platforms
  • Keymgr uses local time when parsing date inputs
  • Memory leak in kdig upon IXFR query

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2017-31519ecf40

This update has been submitted for testing by pspacek.

6 years ago

This update has been pushed to testing.

6 years ago

This update has reached 7 days in testing and can be pushed to stable now if the maintainer wishes

6 years ago

This update has been submitted for batched by pspacek.

6 years ago

This update has been submitted for stable by pspacek.

6 years ago

This update has been pushed to stable.

6 years ago

Please login to add feedback.

Metadata
Type
security
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
disabled
Dates
submitted
6 years ago
in testing
6 years ago
in stable
6 years ago

Automated Test Results