* Tue Feb 13 2024 Adam Majer <adam.majer@suse.de>
- update to 5.0.2
* fixes crafted DNSSEC records in a zone can lead to a denial
of service in Recursor
https://doc.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
(bsc#1219823, bsc#1219826, CVE-2023-50387, CVE-2023-50868)
* Fri Feb 09 2024 Adam Majer <adam.majer@suse.de> 5.0.1
- update to 5.0.1
https://doc.powerdns.com/recursor/changelog/5.0.html#change-5.0.1
For upgrade from 4.9.x, see
https://doc.powerdns.com/recursor/upgrade.html#to-5-0-0-and-master
- cargo_build_fix.patch: add cargo_build parameters to Makefile...
* Fri Aug 25 2023 Adam Majer <adam.majer@suse.de> 4.9.1
- update to 4.9.1
* The setting of policy tags for packet cache hist has been fixed.
Previously, packet cache hits would not contain policy tags set in
the Lua gettags(-ffi) intercept functions.
* The retrieval of RPZ zones could fail in situations where a read of
the chunk length from the IXFR TCP stream would produce an
incomplete result.
- enable DSN-over-TLS (DoT) via OpenSSL
For complete list of changes, see
https://doc.powerdns.com/recursor/changelog/4.9.html#change-4.9.1
For upgrades since 4.8.x and earlier, see
https://doc.powerdns.com/recursor/upgrade.html
* Tue Apr 04 2023 Adam Majer <adam.majer@suse.de>
- update to 4.8.4
* Deterred spoofing attempts can lead to authoritative servers
being marked unavailable (bsc#1209897, CVE-2023-26437)
Version: 4.8.3-bp155.1.6
* Tue Mar 07 2023 Adam Majer <adam.majer@suse.de> 4.8.3
- update to 4.8.3
* Fix serve-stale logic to not cause intermittent high CPU load by:
+ correcting the removal of a negative cache entry,
+ correcting the serve-stale main loop regarding exception handling,
+ correctly handle negcache entries with serve-state status.
- changes in version 4.8.2
* Make cache cleaning of record an negative cache more fair
* Do not report “not decreasing socket buf size” as an error
* Do not use “message” as key, it has a special meaning to systemd-journal
* Add the ‘parse packet from auth’ error message to structured logging
* Refresh of negcache stale entry might use wrong qtype
* Do not chain ECS enabled queries
* Properly encode json string containing binary data
* Fri Jan 20 2023 Adam Majer <adam.majer@suse.de>
- update to 4.8.1
* Avoid unbounded recursion when retrieving DS records from some
misconfigured domains. (bsc#1207342, CVE-2023-22617)
* Mon Dec 12 2022 Michael Ströder <michael@stroeder.com>
- update to 4.8.0 with these major changes:
* Structured Logging has been implemented for almost all
subsystems.
* Optional Serve Stale functionality has been implemented,
providing resilience against connectivity problems towards
authoritative servers.
* Optional Record Locking has been implemented, providing an extra
layer of protection against spoofing attempts at the price of
reduced cache efficiency.
* Internal tables used to track information about authoritative
servers are now shared instead of per-thread, resulting in
better performance and lower memory usage.
* EDNS padding of outgoing DoT queries has been implemented,
providing better privacy protection.
* Metrics have been added about the protobuf and dnstap logging
subsystems and the rcodes received from authoritative
servers.
* Fri Nov 25 2022 Michael Ströder <michael@stroeder.com>
- update to 4.7.4
* Fix compilation of the event ports multiplexer. #12046, PR#12231
* Correct skip record condition in processRecords. #12198, PR#12230
* Also consider recursive forward in the “forwarded DS should not end up in negCache code.” #12189, #12199, PR#12227
* Timout handling for IXFRs as a client. #12125, PR#12190
* Detect invalid bytes in makeBytesFromHex(). #12066, PR#12173
* Log invalid RPZ content when obtained via IXFR. #12081, PR#12171
* When an expired NSEC3 entry is seen, move it to the front of the expiry queue. #12038, PR#12168
* Tue Sep 20 2022 Michael Ströder <michael@stroeder.com>
- update to 4.7.3
* Improvements
- For zones having many NS records, we are not interested in all so take a sample. #11904, PR#11936
- Also check qperq limit if throttling happened, as it increases counters. #11848, PR#11897
* Bug Fixes
- Failure to retrieve DNSKEYs of an Insecure zone should not be fatal. #11890, PR#11940
- Fix recursor not responsive after Lua config reload. #11850, PR#11879
- Clear the caches after loading authzones. #11843, PR#11847
- Resize answer length to actual received length in udpQueryResponse. #11773, PR#11774
* Tue Aug 23 2022 Michael Ströder <michael@stroeder.com>
- update to 4.7.2
* incomplete exception handling related to protobuf message generation.
(CVE-2022-37428, bsc#1202664)
* Fri Jul 08 2022 Michael Ströder <michael@stroeder.com>
- update to 4.7.1
* Improvements
- Allow generic format while parsing zone files for ZoneToCache.
References: #11724, #11726, pull request 11750
- Force gzip compression for debian packages (Zash). #11735, PR#11740
* Bug Fixes
- Run tasks from housekeeping thread in the proper way, causing queued
DoT probes to run more promptly. #11692, PR#11748
* Mon May 30 2022 Michael Ströder <michael@stroeder.com>
- update to 4.7.0
* A configurable way of adding Additional records to answers sent
to the client, so the client does not have to ask for these
records.
* The step sizes for Query Minimization are now computed following to
guidelines in [2]RFC 9156.
* The Recursor now schedules tasks to resolve IPv6 addresses of name
servers not learned by glue records. This has the consequence that,
if applicable, name servers will be contacted over IPv6 more often.
* An experimental implementation of unilateral [3]DoT probing. This
allows the Recursor to learn if a an authoritative servers supports
DoT.
* Recursor has gained a way to fall back to the parent NS set if
contacting servers in the child NS set does not lead to an answer.
This works around some broken authoritative servers configurations.
* ZONEMD validation of the zones retrieved by the [5]Zone to Cache,
providing integrity guarantees for the zone retrieved.
* The table recording round trip times of authoritative server IP
addresses is now shared between threads to make it more effective
and to reduce its memory footprint.
* A Lua FFI hook for post-resolve interception: [6]postresolve_ffi,
providing a very fast way to do post-resolve Lua scripting.
* Mon Apr 04 2022 Michael Ströder <michael@stroeder.com>
- update to 4.6.2
* Improvements
- Allow disabling of processing the root hints.
- References: #11283, pull request 11360
- Log an error if pdns.DROP is used as rcode in Lua callbacks.
- References: #11288, pull request 11361
- A CNAME answer on DS query should abort DS retrieval.
- References: #11245, pull request 11358
- Reject non-apex NSEC(3)s that have both the NS and SOA bits set.
- References: #11225, pull request 11357
- Fix build with OpenSSL 3.0.0.
- References: pull request 11260
- Shorter thread names.
- References: #11137, pull request 11170
- Two more features to print (DoT and scrypt).
- References: #11109, pull request 11169
* Bug Fixes
- Be more careful using refresh mode only for the record asked.
- References: #11371, pull request 11418
- Use the Lua context stored in SyncRes when calling hooks.
- References: #11300, pull request 11380
- QType ADDR is supposed to be used internally only.
- References: #11338, pull request 11363
- If we get NODATA on an AAAA in followCNAMERecords, try native dns64.
- References: #11327, pull request 11362
- Initialize isNew before calling a exception throwing function.
- References: #11257, pull request 11359
Version: 4.6.1-bp154.1.32
* Fri Mar 25 2022 Adam Majer <adam.majer@suse.de>
- update to 4.6.1
fixes incomplete validation of incoming IXFR transfer in
the Recursor. It applies to setups retrieving one or more RPZ
zones from a remote server if the network path to the server
is not trusted. (bsc#1197525, CVE-2022-27227)
* Fri Dec 17 2021 Michael Ströder <michael@stroeder.com>
- update to 4.6.0
Compared to the previous major (4.5) release of PowerDNS Recursor, this
release contains several sets of changes:
* The ability to flush records from the caches on a incoming
notify requests.
* A rewrite of the outgoing TCP code, adding both re-use of
connections and support for DoT to authoritative servers or
forwarders.
* Many improvements in the area of metrics: more metrics are
collected and more metrics are now exported in a Prometheus
friendly way.
* A new Zone to Cache function that will retrieve a zone (using
AXFR, HTTP, HTTPS or a local file) periodically and insert the
contents into the record cache, allowing the cache to be always hot
for a zone. This can be used for the root or any other zone.
* An experimental Event Tracing function, providing insight into
the time taken by the steps in the process of resolving a name.
* Fri Nov 05 2021 Michael Ströder <michael@stroeder.com>
- update to 4.5.7:
* A SHA-384 DS should not trump a SHA-256 one, only potentially ignore SHA-1 DS records.
References: #10908, pull request 10912
* rec_control wipe-cache-typed should check if a qtype arg is present and valid.
References: #10905, pull request 10911
* Put the correct string into appliedPolicyTrigger for Netmask matching rules.
References: #10842, pull request 10863
* Mon Oct 11 2021 Michael Ströder <michael@stroeder.com>
- update to 4.5.6:
* Bug Fixes
- fixes to the way RPZ updates are handled
- fix to a case where traffic to a forwarder could be throttled while it should not.
- fixed few minor DNSSEC validation issues
- fix for case where the combining of equivalent queries wasn't
effective were resolved
* Fri Jul 30 2021 Michael Ströder <michael@stroeder.com>
- update to 4.5.5:
* Improvements
- Work around clueless servers sending AA=0 answers.
References: #10555, pull request 10564
* Bug Fixes
- Ancestor NSEC3s can only deny the existence of a DS.
References: #10587, pull request 10593
- Make really sure we did not miss a cut on validation failure.
References: #10570, pull request 10575
- Clear the current proxy protocol values each iteration.
References: #10515, pull request 10573
* Mon Jul 05 2021 Wolfgang Rosenauer <wr@rosenauer.org>
- update to 4.5.4:
* Make sure that we pass the SOA along the NSEC(3) proof for
DS queries.
* Fri Jun 25 2021 Adam Majer <adam.majer@suse.de>
- no longer supports 32-bit arches -- requiers 64-bit time_t
- specfile cleanup - drop initrd cases
- build-require gcc7 on SLE-12 variant
* Wed Jun 09 2021 Michael Ströder <michael@stroeder.com>
- update to 4.5.2:
* default value of nsec3-max-iterations[1] has been lowered to 150
* fixed issue affecting the "refresh almost expired" function
* Tue May 11 2021 Michael Ströder <michael@stroeder.com>
- update to 4.5.1:
- Main changes:
* Dropped support for 32-bit platforms!
* Rewrite of the way zone cuts are determined, reducing the number of
outgoing queries by up to 17% when doing DNSSEC validation while reducing
the CPU usage more than 20% .
* Added implementation of EDNS0 padding (RFC 7830) for answers sent to clients.
* Added implementation of RFC 8198[2]: Aggressive use of DNSSEC-Validated Cache.
* Added a cache of non-resolving nameservers.
* Re-worked negative cache that is shared between threads.
* Added support for Extended DNS Errors (RFC 8914[5]).
* A "refresh almost expired records" (also called "refetch") mechanism[8]
has been introduced to keep the record cache warm.
- Other new features and improvements:
* The complete protobuf and dnstap logging code has been rewritten to
have much smaller performance impact.
* We have introduced non-offensive synonyms for words used in
settings. See the upgrade[9] guide.
* The default minimum TTL[10] override has been changed from 0 to 1.
* The spoof-nearmiss-max setting[11]'s default has been changed to 1.
This has the consequence that the Recursor will switch to do TCP
queries to authoritative nameservers sooner as an effective measure
against many spoofing attacks.
* Incoming queries over TCP now also use the packet cache, providing
another performance increase.
* File written to by the rec_control command are new opened by the
command itself. It is also possible to write the content to the
standard output stream by using a hyphen as file name.
* TCP FastOpen (RFC 7413[12]) support for outgoing TCP connections to
authoritative servers and forwarders.
* Wed Mar 31 2021 Adam Majer <adam.majer@suse.de>
- update to 4.4.3:
Improvements
Use a short-lived NSEC3 hashes cache for denial validation.
References: #9856, pull request 10221
Bug Fixes
More fail-safe handling of Newly Discovered Domain files.
Handle policy (if needed) after postresolve.
Return current rcode instead of 0 if there are no CNAME records to follow.
Lookup DS entries before CNAME entries.
Handle failure to start the web server more gracefully.
Test that we correctly cap the answer’s TTL in expanded wildcard cases.
Fix the gathering of denial proof for wildcard-expanded answers.
Make sure we take the right minimum for the packet cache TTL data in the SERVFAIL case.
For details see,
https://doc.powerdns.com/recursor/changelog/4.4.html#change-4.4.3
* Mon Dec 14 2020 Adam Majer <adam.majer@suse.de>
- update to 4.4.2:
Improvements
* UUID: Use the non-cryptographic variant of the boost::uuid.
* Keep a cached, valid entry over a fresher Bogus one.
* Ensure socket-dir matches runtime directory on old systemd
* Move to several distinct Bogus states, for easier debugging.
* Do not chase CNAME during qname minimization step 4.
Bug Fixes
* Untangle the validation/resolving qnames and qtypes.
* APL records: fix endianness problem.
For details see,
https://doc.powerdns.com/recursor/changelog/4.4.html#change-4.4.2
* Wed Nov 25 2020 Adam Majer <adam.majer@suse.de>
- update to 4.4.1
* Allow specifying a name in getMetric() that is used for Prometheus
* Avoids a CNAME loop detection issue with DNS64
* No longer sends overly long NOD lookups.
* If a.b.c CNAME x.a.b.c is encountered, switch off QName Minimization.
* Fix the processing of answers generated from gettag.
* Mon Nov 23 2020 Franck Bui <fbui@suse.com>
- Only require 'insserv' when this package ships an initscript
* Mon Oct 26 2020 Marcus Rueckert <mrueckert@suse.de>
- fix default config
- turn off chroot by default as it is not supported on systemd
enabled systems
- set query-local-address to ::,0.0.0.0
to make ipv6 only nameservers work out of the box
* Mon Oct 19 2020 Michael Ströder <michael@stroeder.com>
- update to 4.4.0 with these major enhancements:
* Native DNS64 support, without the need to use Lua.
* The ability to add custom tags to RPZ hits.
* Names encountered while resolving CNAMEs are now subject to RPZ
processing.
* More detailed information about RPZ handling is now available while
tracing, in Lua and in the protobuf logging messages.
* To allow more efficient use, the record cache is now shared between
threads.
* A routing tag[3] can be added in Lua code, which will be used as an
additional record cache key instead of an EDNS subnet mask,
enabling for a simpler record cache structure which will enhance
query processing where the EDNS subnet mask is relevant.
* The Proxy Protocol version 2 has been implemented to allow for a
structured exchange of information between a client (typically
dnsdist) and the Recursor.
- removed obsolete back-port fix 9070.patch
Version: 4.6.1-2.1
* Mon Mar 28 2022 adam.majer@suse.de
- fix building against sle-12 backports with gcc-9
- remove obsolete BR on protobuf
- add bundled information to the spec file
- boost_context.patch: Boost.Context detection fix on SLE12
* Fri Mar 25 2022 adam.majer@suse.de
- update to 4.6.1
fixes incomplete validation of incoming IXFR transfer in
the Recursor. It applies to setups retrieving one or more RPZ
zones from a remote server if the network path to the server
is not trusted. (bsc#1197525, CVE-2022-27227)
* Fri Dec 17 2021 michael@stroeder.com
- update to 4.6.0
Compared to the previous major (4.5) release of PowerDNS Recursor, this
release contains several sets of changes:
* The ability to flush records from the caches on a incoming
notify requests.
* A rewrite of the outgoing TCP code, adding both re-use of
connections and support for DoT to authoritative servers or
forwarders.
* Many improvements in the area of metrics: more metrics are
collected and more metrics are now exported in a Prometheus
friendly way.
* A new Zone to Cache function that will retrieve a zone (using
AXFR, HTTP, HTTPS or a local file) periodically and insert the
contents into the record cache, allowing the cache to be always hot
for a zone. This can be used for the root or any other zone.
* An experimental Event Tracing function, providing insight into
the time taken by the steps in the process of resolving a name.
* Fri Nov 05 2021 michael@stroeder.com
- update to 4.5.7:
* A SHA-384 DS should not trump a SHA-256 one, only potentially ignore SHA-1 DS records.
References: #10908, pull request 10912
* rec_control wipe-cache-typed should check if a qtype arg is present and valid.
References: #10905, pull request 10911
* Put the correct string into appliedPolicyTrigger for Netmask matching rules.
References: #10842, pull request 10863
* Mon Oct 11 2021 michael@stroeder.com
- update to 4.5.6:
* Bug Fixes
- fixes to the way RPZ updates are handled
- fix to a case where traffic to a forwarder could be throttled while it should not.
- fixed few minor DNSSEC validation issues
- fix for case where the combining of equivalent queries wasn't
effective were resolved
* Fri Jul 30 2021 michael@stroeder.com
- update to 4.5.5:
* Improvements
- Work around clueless servers sending AA=0 answers.
References: #10555, pull request 10564
* Bug Fixes
- Ancestor NSEC3s can only deny the existence of a DS.
References: #10587, pull request 10593
- Make really sure we did not miss a cut on validation failure.
References: #10570, pull request 10575
- Clear the current proxy protocol values each iteration.
References: #10515, pull request 10573
* Mon Jul 05 2021 wr@rosenauer.org
- update to 4.5.4:
* Make sure that we pass the SOA along the NSEC(3) proof for
DS queries.
* Fri Jun 25 2021 adam.majer@suse.de
- no longer supports 32-bit arches -- requiers 64-bit time_t
- specfile cleanup - drop initrd cases
- build-require gcc7 on SLE-12 variant
* Wed Jun 09 2021 michael@stroeder.com
- update to 4.5.2:
* default value of nsec3-max-iterations[1] has been lowered to 150
* fixed issue affecting the "refresh almost expired" function
* Tue May 11 2021 michael@stroeder.com
- update to 4.5.1:
- Main changes:
* Dropped support for 32-bit platforms!
* Rewrite of the way zone cuts are determined, reducing the number of
outgoing queries by up to 17% when doing DNSSEC validation while reducing
the CPU usage more than 20% .
* Added implementation of EDNS0 padding (RFC 7830) for answers sent to clients.
* Added implementation of RFC 8198[2]: Aggressive use of DNSSEC-Validated Cache.
* Added a cache of non-resolving nameservers.
* Re-worked negative cache that is shared between threads.
* Added support for Extended DNS Errors (RFC 8914[5]).
* A "refresh almost expired records" (also called "refetch") mechanism[8]
has been introduced to keep the record cache warm.
- Other new features and improvements:
* The complete protobuf and dnstap logging code has been rewritten to
have much smaller performance impact.
* We have introduced non-offensive synonyms for words used in
settings. See the upgrade[9] guide.
* The default minimum TTL[10] override has been changed from 0 to 1.
* The spoof-nearmiss-max setting[11]'s default has been changed to 1.
This has the consequence that the Recursor will switch to do TCP
queries to authoritative nameservers sooner as an effective measure
against many spoofing attacks.
* Incoming queries over TCP now also use the packet cache, providing
another performance increase.
* File written to by the rec_control command are new opened by the
command itself. It is also possible to write the content to the
standard output stream by using a hyphen as file name.
* TCP FastOpen (RFC 7413[12]) support for outgoing TCP connections to
authoritative servers and forwarders.
* Wed Mar 31 2021 adam.majer@suse.de
- update to 4.4.3:
Improvements
Use a short-lived NSEC3 hashes cache for denial validation.
References: #9856, pull request 10221
Bug Fixes
More fail-safe handling of Newly Discovered Domain files.
Handle policy (if needed) after postresolve.
Return current rcode instead of 0 if there are no CNAME records to follow.
Lookup DS entries before CNAME entries.
Handle failure to start the web server more gracefully.
Test that we correctly cap the answer’s TTL in expanded wildcard cases.
Fix the gathering of denial proof for wildcard-expanded answers.
Make sure we take the right minimum for the packet cache TTL data in the SERVFAIL case.
For details see,
https://doc.powerdns.com/recursor/changelog/4.4.html#change-4.4.3
* Mon Dec 14 2020 adam.majer@suse.de
- update to 4.4.2:
Improvements
* UUID: Use the non-cryptographic variant of the boost::uuid.
* Keep a cached, valid entry over a fresher Bogus one.
* Ensure socket-dir matches runtime directory on old systemd
* Move to several distinct Bogus states, for easier debugging.
* Do not chase CNAME during qname minimization step 4.
Bug Fixes
* Untangle the validation/resolving qnames and qtypes.
* APL records: fix endianness problem.
For details see,
https://doc.powerdns.com/recursor/changelog/4.4.html#change-4.4.2
* Wed Nov 25 2020 adam.majer@suse.de
- update to 4.4.1
* Allow specifying a name in getMetric() that is used for Prometheus
* Avoids a CNAME loop detection issue with DNS64
* No longer sends overly long NOD lookups.
* If a.b.c CNAME x.a.b.c is encountered, switch off QName Minimization.
* Fix the processing of answers generated from gettag.
* Mon Nov 23 2020 fbui@suse.com
- Only require 'insserv' when this package ships an initscript
* Mon Oct 26 2020 mrueckert@suse.de
- fix default config
- turn off chroot by default as it is not supported on systemd
enabled systems
- set query-local-address to ::,0.0.0.0
to make ipv6 only nameservers work out of the box
* Mon Oct 19 2020 michael@stroeder.com
- update to 4.4.0 with these major enhancements:
* Native DNS64 support, without the need to use Lua.
* The ability to add custom tags to RPZ hits.
* Names encountered while resolving CNAMEs are now subject to RPZ
processing.
* More detailed information about RPZ handling is now available while
tracing, in Lua and in the protobuf logging messages.
* To allow more efficient use, the record cache is now shared between
threads.
* A routing tag[3] can be added in Lua code, which will be used as an
additional record cache key instead of an EDNS subnet mask,
enabling for a simpler record cache structure which will enhance
query processing where the EDNS subnet mask is relevant.
* The Proxy Protocol version 2 has been implemented to allow for a
structured exchange of information between a client (typically
dnsdist) and the Recursor.
- removed obsolete back-port fix 9070.patch
* Wed Sep 09 2020 adam.majer@suse.de
- 9070.patch: backport compilation fix vs. latest Boost 1.74
based on https://github.com/PowerDNS/pdns/pull/9070
* Tue Sep 08 2020 michael@stroeder.com
- update to 4.3.4
* fixes an issue where certain CNAMEs could lead to resolver failure
* fixes an issue with the hostname reported in Carbon messages
* allows for multiple recursor services to run under systemd
- use HTTPS scheme for all URLs
* Fri Jul 17 2020 michael@stroeder.com
- update to 4.3.3
* Validate cached DNSKEYs against the DSs, not the RRSIGs only.
* Ignore cache-only for DNSKEYs and DS retrieval.
* A ServFail while retrieving DS/DNSKEY records is just that.
* Refuse DS records received from child zones.
* Better exception handling in houseKeeping/handlePolicyHit.
* Take initial refresh time from loaded zone.
Version: 4.3.1-bp152.1.1
* Tue May 19 2020 Adam Majer <adam.majer@suse.de>
- update to 4.3.1
* fixes an issue where records in the answer section of
a NXDOMAIN response lacking an SOA were not properly validated
(CVE-2020-12244, bsc#1171553)
* fixes an issue where invalid hostname on the server can result in
disclosure of invalid memory (CVE-2020-10030, bsc#1171553)
* fixes an issue in the DNS protocol has been found that allows
malicious parties to use recursive DNS services to attack third
party authoritative name servers (CVE-2020-10995, bsc#1171553)
* Sat Mar 07 2020 Wolfgang Rosenauer <wr@rosenauer.org>
- fixed configuration to make the service start
https://docs.powerdns.com/recursor/upgrade.html#x-to-4-3-0-or-master
* Tue Mar 03 2020 Adam Majer <adam.majer@suse.de>
- update to 4.3.0:
* A relaxed form of QName Minimization as described in rfc7816bis-01.
This feature is enabled by default
* Dnstap support for outgoing queries to authoritative servers and
the corresponding replies.
* The recursor now processes a number of requests incoming over
a TCP connection simultaneously and will return results
(potentially) out-of-order.
* Newly Observed Domain (NOD) functionality
* For details see
https://blog.powerdns.com/2020/03/03/powerdns-recursor-4-3-0-released/
* Mon Dec 09 2019 Adam Majer <adam.majer@suse.de>
- update to 4.2.1:
* Add deviceName field to protobuf messages
* Purge map of failed auths periodically by keeping
last changed timestamp.
* Prime NS records of root-servers.net parent (.net)
* Issue with ?zz? abbreviation for IPv6 RPZ triggers
* Basic validation of $GENERATE parameters
* Fix inverse handler registration logic for SNMP
* Mon Jul 15 2019 Michael Ströder <michael@stroeder.com>
- update to 4.2.0:
* removes several workarounds for authoritative servers that
respond badly to EDNS(0) queries
* support for DNS X-Proxied-For (draft-bellis-dnsop-xpf-04)
* EDNS Client Subnet Improvements
* New and Updated Settings
- distributor-threads
- public-suffix-list-file
- edns-outgoing-bufsize setting?s default has changed
from 1680 to 1232
* lot of small, incremental changes
* Tue May 21 2019 Adam Majer <adam.majer@suse.de>
- update to 4.1.13:
* Add the disable-real-memory-usage setting to skip expensive
collection of detailed memory usage info
* Fix DNSSEC validation of wildcards expanded onto themselves.
Version: 4.1.8-13.1
* Mon Nov 26 2018 adam.majer@suse.de
- update to 4.1.8
https://blog.powerdns.com/2018/11/26/powerdns-recursor-4-1-8-released/
- Fixes case where a crafted query can cause a denial of service
(CVE-2018-16855, bsc#1116592)
* Fri Nov 09 2018 adam.majer@suse.de
- update to 4.1.7
https://blog.powerdns.com/2018/11/09/powerdns-recursor-4-1-7-released/
- Revert ?Keep the EDNS status of a server on FormErr with EDNS?
- Refuse queries for all meta-types
* Wed Nov 07 2018 adam.majer@suse.de
- update to 4.1.6
- Revert "rec: Authority records in AA=1 CNAME answer are
authoritative"
https://github.com/PowerDNS/pdns/issues/7158
* Wed Nov 07 2018 michael@stroeder.com
- update to 4.1.5
- Improvements
* Add pdnslog to lua configuration scripts
* Fix compilation with libressl 2.7.0+
* Export outgoing ECS value and server ID in protobuf (if any)
* Switch to devtoolset 7 for el6
* Allow the signature inception to be off by number of seconds
- Bug Fixes
* Crafted answer can cause a denial of service
(bsc#1114157, CVE-2018-10851)
* Packet cache pollution via crafted query
(bsc#1114169, CVE-2018-14626)
* Crafted query for meta-types can cause a denial of service
(bsc#1114170, CVE-2018-14644)
* Delay creation of rpz threads until we dropped privileges
* Cleanup the netmask trees used for the ecs index on removals
* Make sure that the ecs scope from the auth is < to the source
* Authority records in aa=1 cname answer are authoritative
* Avoid a memory leak in catch-all exception handler
* Don?t require authoritative answers for forward-recurse zones
* Release memory in case of error in openssl ecdsa constructor
* Convert a few uses to toLogString to print DNSName?s that
may be empty in a safer manner
* Avoid a crash on DEC Alpha systems
* Clear all caches on (N)TA changes
* Fri Aug 31 2018 adam.majer@suse.de
- update to 4.1.4
- Improvements
* Split pdns_enable_unit_tests.
* Add a new max-udp-queries-per-round setting.
* Fix warnings reported by gcc 8.1.0.
* Tests: replace awk command by perl.
* Allow the snmp thread to retrieve statistics.
- Bug Fixes
* Don?t account chained queries more than once.
* Make rec_control respect include-dir.
* Load lua scripts only in worker threads.
* Purge all auth/forward zone data including subtree.
Version: 4.1.12-bp151.2.3
* Fri Apr 26 2019 mvetter@suse.com
- bsc#1130588: Require shadow instead of old pwdutils
* Tue Apr 02 2019 Michael Ströder <michael@stroeder.com>
- update to 4.1.12:
* Improvements
- Provide CPU usage statistics per thread (worker & distributor).
- Use a bounded load-balancing algo to distribute queries.
- Implement a configurable ECS cache limit so responses with an
ECS scope more specific than a certain threshold and a TTL
smaller than a specific threshold are not inserted into the
records cache at all.
* Bug Fixes
- Correctly interpret an empty AXFR response to an IXFR query.
- update to 4.1.11:
* Improvements
- Add an option to export only responses over protobuf to the
Lua protobufServer() directive.
- Reduce systemcall usage in protobuf logging. (See #7428.)
* Fri Jan 25 2019 Michael Ströder <michael@stroeder.com>
- update to 4.1.10
- #7403: Fix compilation in handleRunningTCPQuestion without
protobuf support
* Wed Nov 07 2018 Michael Ströder <michael@stroeder.com>
- update to 4.1.5
- Improvements
* Add pdnslog to lua configuration scripts
* Fix compilation with libressl 2.7.0+
* Export outgoing ECS value and server ID in protobuf (if any)
* Switch to devtoolset 7 for el6
* Allow the signature inception to be off by number of seconds
- Bug Fixes
* Crafted answer can cause a denial of service
(bsc#1114157, CVE-2018-10851)
* Packet cache pollution via crafted query
(bsc#1114169, CVE-2018-14626)
* Crafted query for meta-types can cause a denial of service
(bsc#1114170, CVE-2018-14644)
* Delay creation of rpz threads until we dropped privileges
* Cleanup the netmask trees used for the ecs index on removals
* Make sure that the ecs scope from the auth is < to the source
* Authority records in aa=1 cname answer are authoritative
* Avoid a memory leak in catch-all exception handler
* Don?t require authoritative answers for forward-recurse zones
* Release memory in case of error in openssl ecdsa constructor
* Convert a few uses to toLogString to print DNSName?s that
may be empty in a safer manner
* Avoid a crash on DEC Alpha systems
* Clear all caches on (N)TA changes
Version: 4.1.0-2.1
* Fri Dec 29 2017 adam.majer@suse.de
- _constraints: we seem to need at least 8GB RAM to build on S390x
and ppc64
* Mon Dec 04 2017 mrueckert@suse.de
- enable ed25519 support (new BR: libsodium-devel)
- enable net-snmp support (new BR: net-snmp-devel)
- simplify BR for lua: lua-devel everywhere now
* Mon Dec 04 2017 adam.majer@suse.de
- update to version 4.1.0:
+ Improved DNSSEC support
+ Improved documentation
+ Improved RPZ support
+ Improved EDNS Client Subnet support
+ SNMP support
+ Lua engine has gained access to more parts of the recursor
+ CPU affinity can now be specified
+ TCP Fast Open support
+ New performance metrics
+ For complete changes see:
https://blog.powerdns.com/2017/12/04/powerdns-recursor-4-1/
* Mon Nov 27 2017 adam.majer@suse.de
- update to version 4.0.7: (bsc#1069242)
+ fixes CVE-2017-15090: Insufficient validation of DNSSEC
signatures
+ fixes CVE-2017-15092: Cross-Site Scripting in the web interface
+ fixes CVE-2017-15093: Configuration file injection in the API
+ fixes CVE-2017-15094: Memory leak in DNSSEC parsing
+ Fix validation at the exact RRSIG inception or expiration time
+ Extract nested exception from Luawrapper
+ Throw an error when lua-conf-file can?t be loaded
+ Lowercase all outgoing qnames when lowercase-outgoing is set
* Thu Oct 19 2017 adam.majer@suse.de
- Added pdns-recursor.keyring linked from
https://dnsdist.org/install.html
* Fri Sep 29 2017 vcizek@suse.com
- Don't BuildRequire Botan 1.x
* Botan will be dropped as the 1.x branch is EOL and won't get
OpenSSL 1.1 support backported (bsc#1055322)
* Thu Jul 06 2017 adam.majer@suse.de
- update to version 4.0.6
+ fixes ed25519 signer
+ update root-servers.net entries
+ fixes handling of expired cache entries so they expire faster
* Tue Jul 04 2017 adam.majer@suse.de
- Enable DNSSEC validation by default.
* Tue Jun 13 2017 adam.majer@suse.de
- update to version 4.0.5
+ adds ed25519 (algorithm 15) support for DNSSEC
+ adds the 2017 DNSSEC root key
+ complete changeset is available at,
https://doc.powerdns.com/md/changelog/#powerdns-recursor-405
* Thu May 11 2017 mrueckert@suse.de
- move autoreconf into the build section
* Thu Feb 02 2017 adam.majer@suse.de
- use individual libboost-*-devel packages instead of boost-devel
- add signature file for upstream release
* Fri Jan 13 2017 adam.majer@suse.de
- update to version 4.0.4
The following security advisories were fixed
- 2016-02: Crafted queries can cause abnormal CPU usage
(CVE-2016-7068, boo#1018326)
- 2016-04: Insufficient validation of TSIG signatures
(CVE-2016-2120, boo#1018329)
complete changeset is availalbe at,
https://doc.powerdns.com/md/changelog/#powerdns-recursor-404
- remove 4462.patch: in upstream release.
* Mon Dec 12 2016 dimstar@opensuse.org
- BuildRequire pkgconfig(libsystemd) instead of
pkgconfig(libsystemd-daemon): these libs were merged in systemd
209 times. The build system is capable of finding either one.
* Tue Sep 13 2016 adam.majer@suse.de
- 4462.patch:
Disable fcontext usage with Boost 1.61+ and revert back to
slower SystemV ucontext. This fixes failure to build with
newer Boost version. (boo#998408)
* Tue Sep 06 2016 mrueckert@suse.de
- update to 4.0.3
A new release for the PowerDNS Recursor with version 4.0.3 is
available. This release has many fixes and improvements in the
Policy Engine (RPZ) and the Lua bindings to it. Therefore, we
recommend users of RPZ to upgrade to this release. We would like
to thank Wim (42wim on github) for testing and reporting on the
RPZ module.
Bug fixes
- #4350: Call gettag() for TCP queries
- #4376: Fix the use of an uninitialized filtering policy
- #4381: Parse query-local-address before lua-config-file
- #4383: Fix accessing an empty policyCustom, policyName from Lua
- #4387: ComboAddress: don?t allow invalid ports
- #4388: Fix RPZ default policy not being applied over IXFR
- #4391: DNSSEC: Actually follow RFC 7646 2.1
- #4396: Add boost context ldflags so freebsd builds can find the
libs
- #4402: Ignore NS records in a RPZ zone received over IXFR
- #4403: Fix build with OpenSSL 1.1.0 final
- #4404: Don?t validate when a Lua hook took the query
- #4425: Fix a protobuf regression (requestor/responder mix-up)
Additions and Enhancements
- #4394: Support Boost 1.61+ fcontext
- #4402: Add Lua binding for DNSRecord::d_place
* Sun Sep 04 2016 michael@stroeder.com
- update to 4.0.2
Bug fixes
- #4264: Set dq.rcode before calling postresolve
- #4294: Honor PIE flags.
- #4310: Fix build with LibreSSL, for which
OPENSSL_VERSION_NUMBER is irrelevant
- #4340: Don't shuffle CNAME records. (thanks to Gert van Dijk
for the extensive bug report!)
- #4354: Fix delegation-only
Additions and enhancements
- #4288: Respect the timeout when connecting to a protobuf server
- #4300: allow newDN to take a DNSName in; document missing
methods
- #4301: expose SMN toString to lua
- #4318: Anonymize the protobuf ECS value as well (thanks to Kai
Storbeck of XS4All for finding this)
- #4324: Allow Lua access to the result of the Policy Engine
decision, skip RPZ, finish RPZ implementation
- #4349: Remove unused DNSPacket::d_qlen
- #4351: RPZ: Use query-local-address(6) by default (thanks to
Oli Schacher of switch.ch for the bug report)
- #4357: Move the root DNSSEC data to a header file
* Sat Jul 30 2016 michael@stroeder.com
- update to 4.0.1
Bug fixes
- #4119 Improve DNSSEC record skipping for non dnssec queries
(Kees Monshouwer)
- #4162 Don't validate zones from the local auth store, go one
level down while validating when there is a CNAME
- #4187:
- Don't go bogus on islands of security
- Check all possible chains for Insecures
- Don't go Bogus on a CNAME at the apex
- #4215 RPZ: default policy should also override local data RRs
- #4243 Fix a crash when the next name in a chained query is
empty and rec_control current-queries is invoked
Improvements
- #4056 OpenSSL 1.1.0 support (Christian Hofstaedtler)
- #4140 Fix warnings with gcc on musl-libc (James Taylor)
- #4160 Also validate on +DO
- #4164 Fail to start when the lua-dns-script does not exist
- #4168 Add more Netmask methods for Lua (Aki Tuomi)
- #4210 Validate DNSSEC for security polling
- #4217 Turn on root-nx-trust by default and
log-common-errors=off
- #4207 Allow for multiple trust anchors per zone
- #4242 Fix compilation warning when building without Protobuf
- #4133 Add limits to the size of received {A,I}XFR
(CVE-2016-6172)
* Mon Jul 11 2016 mrueckert@suse.de
- update to 4.0.0
https://blog.powerdns.com/2016/07/11/powerdns-recursor-4-0-0-released/
https://blog.powerdns.com/2016/07/11/welcome-to-powerdns-4-0-0/
- packaging changes:
- enabled protobuf based stats
- enabled botan based code
- use upstream systemd files
* Tue Jul 21 2015 mrueckert@suse.de
- do not use /run/pdns instead of /var/run/pdns in the init script
for the rest we have the systemd unit file
* Tue Jun 09 2015 michael@stroeder.com
- update to 3.7.3 will prevent short bursts of high
resource usage with malformed qnames.