NEWS 14.6 KB
Newer Older
1 2
Knot Resolver 2.X.Y (2018-0M-DD)
================================
3

4 5
Bugfixes
--------
6
- detect_time_jump module: don't clear cache on suspend-resume (#284)
7
- stats module: fix stats.list() returning nothing, regressed in 2.0.0
8
- policy.TLS_FORWARD: refusal when configuring with multiple IPs (#306)
9 10


Vladimír Čunát's avatar
Vladimír Čunát committed
11 12 13 14 15 16 17
Knot Resolver 2.0.0 (2018-01-31)
================================

Incompatible changes
--------------------
- systemd: change unit files to allow running multiple instances,
  deployments with single instance now must use `kresd@1.service`
18
  instead of `kresd.service`; see kresd.systemd(7) for details
Vladimír Čunát's avatar
Vladimír Čunát committed
19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
- systemd: the directory for cache is now /var/cache/knot-resolver
- unify default directory and user to `knot-resolver`
- directory with trust anchor file specified by -k option must be writeable
- policy module is now loaded by default to enforce RFC 6761;
  see documentation for policy.PASS if you use locally-served DNS zones
- drop support for alternative cache backends memcached, redis,
  and for Lua bindings for some specific cache operations
- REORDER_RR option is not implemented (temporarily)

New features
------------
- aggressive caching of validated records (RFC 8198) for NSEC zones;
  thanks to ICANN for sponsoring this work.
- forwarding over TLS, authenticated by SPKI pin or certificate.
  policy.TLS_FORWARD pipelines queries out-of-order over shared TLS connection
  Beware: Some resolvers do not support out-of-order query processing.
  TLS forwarding to such resolvers will lead to slower resolution or failures.
- trust anchors: you may specify a read-only file via -K or --keyfile-ro
- trust anchors: at build-time you may set KEYFILE_DEFAULT (read-only)
- ta_sentinel module implements draft ietf-dnsop-kskroll-sentinel-00,
  enabled by default
- serve_stale module is prototype, subject to change
- extended API for Lua modules

Bugfixes
--------
- fix build on osx - regressed in 1.5.3 (different linker option name)


Vladimír Čunát's avatar
Vladimír Čunát committed
48 49 50 51 52 53 54 55 56 57
Knot Resolver 1.5.3 (2018-01-23)
================================

Bugfixes
--------
- fix the hints module on some systems, e.g. Fedora.
  Symptom: `undefined symbol: engine_hint_root_file`


Knot Resolver 1.5.2 (2018-01-22)
58 59 60 61 62 63 64 65 66 67 68 69 70 71
================================

Security
--------
- fix CVE-2018-1000002: insufficient DNSSEC validation, allowing
  attackers to deny existence of some data by forging packets.
  Some combinations pointed out in RFC 6840 sections 4.1 and 4.3
  were not taken into account.

Bugfixes
--------
- memcached: fix fallout from module rename in 1.5.1


72
Knot Resolver 1.5.1 (2017-12-12)
73
================================
74

75 76 77
Incompatible changes
--------------------
- script supervisor.py was removed, please migrate to a real process manager
78
- module ketcd was renamed to etcd for consistency
79
- module kmemcached was renamed to memcached for consistency
80

81 82
Bugfixes
--------
83
- fix SIGPIPE crashes (#271)
84
- tests: work around out-of-space for platforms with larger memory pages
85 86
- lua: fix mistakes in bindings affecting 1.4.0 and 1.5.0 (and 1.99.1-alpha),
  potentially causing problems in dns64 and workarounds modules
87 88 89 90 91 92 93
- predict module: various fixes (!399)

Improvements
------------
- add priming module to implement RFC 8109, enabled by default (#220)
- add modules helping with system time problems, enabled by default;
  for details see documentation of detect_time_skew and detect_time_jump
94 95


Vladimír Čunát's avatar
Vladimír Čunát committed
96
Knot Resolver 1.5.0 (2017-11-02)
97 98 99 100 101 102
================================

Bugfixes
--------
- fix loading modules on Darwin

103 104 105
Improvements
------------
- new module ta_signal_query supporting Signaling Trust Anchor Knowledge
Vladimír Čunát's avatar
Vladimír Čunát committed
106
  using Keytag Query (RFC 8145 section 5); it is enabled by default
Vladimír Čunát's avatar
Vladimír Čunát committed
107 108
- attempt validation for more records but require it for fewer of them
  (e.g. avoids SERVFAIL when server adds extra records but omits RRSIGs)
109

110

111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137
Knot Resolver 1.99.1-alpha (2017-10-26)
=======================================
This is an experimental release meant for testing aggressive caching.
It contains some regressions and might (theoretically) be even vulnerable.
The current focus is to minimize queries into the root zone.

Improvements
------------
- negative answers from validated NSEC (NXDOMAIN, NODATA)
- verbose log is very chatty around cache operations (maybe too much)

Regressions
-----------
- dropped support for alternative cache backends
  and for some specific cache operations
- caching doesn't yet work for various cases:
    * negative answers without NSEC (i.e. with NSEC3 or insecure)
	* +cd queries (needs other internal changes)
	* positive wildcard answers
- spurious SERVFAIL on specific combinations of cached records, printing:
	<= bad keys, broken trust chain
- make check
- a few Deckard tests are broken, probably due to some problems above
+ unknown ones?



138
Knot Resolver 1.4.0 (2017-09-22)
139 140 141 142 143
================================

Incompatible changes
--------------------
- lua: query flag-sets are no longer represented as plain integers.
144 145 146
  kres.query.* no longer works, and kr_query_t lost trivial methods
  'hasflag' and 'resolved'.
  You can instead write code like qry.flags.NO_0X20 = true.
147

148 149 150
Bugfixes
--------
- fix exiting one of multiple forks (#150)
151 152
- cache: change the way of using LMDB transactions.  That in particular
  fixes some cases of using too much space with multiple kresd forks (#240).
153

154 155 156
Improvements
------------
- policy.suffix: update the aho-corasick code (#200)
157 158
- root hints are now loaded from a zonefile; exposed as hints.root_file().
  You can override the path by defining ROOTHINTS during compilation.
159
- policy.FORWARD: work around resolvers adding unsigned NS records (#248)
160
- reduce unneeded records previously put into authority in wildcarded answers
161 162


Vladimír Čunát's avatar
Vladimír Čunát committed
163
Knot Resolver 1.3.3 (2017-08-09)
164 165
================================

Vladimír Čunát's avatar
Vladimír Čunát committed
166 167 168 169 170 171
Security
--------
- Fix a critical DNSSEC flaw.  Signatures might be accepted as valid
  even if the signed data was not in bailiwick of the DNSKEY used to
  sign it, assuming the trust chain to that DNSKEY was valid.

172 173 174
Bugfixes
--------
- iterate: skip RRSIGs with bad label count instead of immediate SERVFAIL
175
- utils: fix possible incorrect seeding of the random generator
176
- modules/http: fix compatibility with the Prometheus text format
177

178 179 180 181 182 183
Improvements
------------
- policy: implement remaining special-use domain names from RFC6761 (#205),
  and make these rules apply only if no other non-chain rule applies


Vladimír Čunát's avatar
Vladimír Čunát committed
184
Knot Resolver 1.3.2 (2017-07-28)
185 186
================================

187 188 189 190 191
Security
--------
- fix possible opportunities to use insecure data from cache as keys
  for validation

192 193 194
Bugfixes
--------
- daemon: check existence of config file even if rundir isn't specified
195
- policy.FORWARD and STUB: use RTT tracking to choose servers (#125, #208)
196
- dns64: fix CNAME problems (#203)  It still won't work with policy.STUB.
Vladimír Čunát's avatar
Vladimír Čunát committed
197
- hints: better interpretation of hosts-like files (#204)
198
         also, error out if a bad entry is encountered in the file
199
- dnssec: handle unknown DNSKEY/DS algorithms (#210)
Vladimír Čunát's avatar
Vladimír Čunát committed
200
- predict: fix the module, broken since 1.2.0 (#154)
201

202 203 204 205
Improvements
------------
- embedded LMDB fallback: update 0.9.18 -> 0.9.21

206

Vladimír Čunát's avatar
Vladimír Čunát committed
207
Knot Resolver 1.3.1 (2017-06-23)
208 209 210 211 212
================================

Bugfixes
--------
- modules/http: fix finding the static files (bug from 1.3.0)
213
- policy.FORWARD: fix some cases of CNAMEs obstructing search for zone cuts
214 215


216
Knot Resolver 1.3.0 (2017-06-13)
217 218 219 220 221 222 223 224 225
================================

Security
--------
- Refactor handling of AD flag and security status of resource records.
  In some cases it was possible for secure domains to get cached as
  insecure, even for a TLD, leading to disabled validation.
  It also fixes answering with non-authoritative data about nameservers.

226 227
Improvements
------------
228 229 230
- major feature: support for forwarding with validation (#112).
  The old policy.FORWARD action now does that; the previous non-validating
  mode is still avaliable as policy.STUB except that also uses caching (#122).
231
- command line: specify ports via @ but still support # for compatibility
232
- policy: recognize 100.64.0.0/10 as local addresses
233 234
- layer/iterate: *do* retry repeatedly if REFUSED, as we can't yet easily
  retry with other NSs while avoiding retrying with those who REFUSED
235 236
- modules: allow changing the directory where modules are found,
  and do not search the default library path anymore.
237

238 239 240
Bugfixes
--------
- validate: fix insufficient caching for some cases (relatively rare)
241 242
- avoid putting "duplicate" record-sets into the answer (#198)

243

244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264
Knot Resolver 1.2.6 (2017-04-24)
================================

Security
--------
- dnssec: don't set AD flag for NODATA answers if wildcard non-existence
  is not guaranteed due to opt-out in NSEC3

Improvements
------------
- layer/iterate: don't retry repeatedly if REFUSED

Bugfixes
--------
- lib/nsrep: revert some changes to NS reputation tracking that caused
  severe problems to some users of 1.2.5 (#178 and #179)
- dnssec: fix verification of wildcarded non-singleton RRsets
- dnssec: allow wildcards located directly under the root
- layer/rrcache: avoid putting answer records into queries in some cases


265
Knot Resolver 1.2.5 (2017-04-05)
Ondřej Surý's avatar
Ondřej Surý committed
266 267 268 269 270 271 272 273 274 275 276 277 278 279 280
================================

Security
--------
- layer/validate: clear AD if closest encloser proof has opt-outed
  NSEC3 (#169)
- layer/validate: check if NSEC3 records in wildcard expansion proof
  has an opt-out
- dnssec/nsec: missed wildcard no-data answers validation has been
  implemented

Improvements
------------
- modules/dnstap: a DNSTAP support module
  (Contributed by Vicky Shrestha)
281
- modules/workarounds: a module adding workarounds for known
Ondřej Surý's avatar
Ondřej Surý committed
282 283
  DNS protocol violators
- layer/iterate: fix logging of glue addresses
284 285
- kr_bitcmp: allow bits=0 and consequently 0.0.0.0/0 matches in view
  and renumber modules.
Ondřej Surý's avatar
Ondřej Surý committed
286 287
- modules/padding: Improve default padding of responses
  (Contributed by Daniel Kahn Gillmor)
Ondřej Surý's avatar
Ondřej Surý committed
288
- New kresc client utility (experimental; don't rely on the API yet)
Ondřej Surý's avatar
Ondřej Surý committed
289 290 291 292 293 294 295 296 297

Bugfixes
--------
- trust anchors: Improve trust anchors storage format (#167)
- trust anchors: support non-root TAs, one domain per file
- policy.DENY: set AA flag and clear AD flag
- lib/resolve: avoid unnecessary DS queries
- lib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted
- layer/iterate: During packet classification (answer vs. referral)
298
  don't analyze AUTHORITY section in authoritative answer if ANSWER
Ondřej Surý's avatar
Ondřej Surý committed
299 300
  section contains records that have been requested

301

Ondřej Surý's avatar
Ondřej Surý committed
302
Knot Resolver 1.2.4 (2017-03-09)
Ondřej Surý's avatar
Ondřej Surý committed
303 304
================================

Ondřej Surý's avatar
Ondřej Surý committed
305 306
Security
--------
Ondřej Surý's avatar
Ondřej Surý committed
307
- Knot Resolver 1.2.0 and higher could return AD flag for insecure
Ondřej Surý's avatar
Ondřej Surý committed
308 309
  answer if the daemon received answer with invalid RRSIG several
  times in a row.
Ondřej Surý's avatar
Ondřej Surý committed
310

Ondřej Surý's avatar
Ondřej Surý committed
311 312
Improvements
------------
Ondřej Surý's avatar
Ondřej Surý committed
313 314
- modules/policy: allow QTRACE policy to be chained with other
  policies
Ondřej Surý's avatar
Ondřej Surý committed
315 316 317 318
- hints.add_hosts(path): a new property
- module: document the API and simplify the code
- policy.MIRROR: support IPv6 link-local addresses
- policy.FORWARD: support IPv6 link-local addresses
Ondřej Surý's avatar
Ondřej Surý committed
319 320
- add net.outgoing_{v4,v6} to allow specifying address to use for
  connections
Ondřej Surý's avatar
Ondřej Surý committed
321 322 323 324

Bugfixes
--------
- layer/iterate: some improvements in cname chain unrolling
Ondřej Surý's avatar
Ondřej Surý committed
325 326
- layer/validate: fix duplicate records in AUTHORITY section in case
  of WC expansion proof
Ondřej Surý's avatar
Ondřej Surý committed
327
- lua: do *not* truncate cache size to unsigned
328 329
- forwarding mode: correctly forward +cd flag
- fix a potential memory leak
Ondřej Surý's avatar
Ondřej Surý committed
330 331
- don't treat answers that contain DS non-existance proof as insecure
- don't store NSEC3 and their signatures in the cache
Ondřej Surý's avatar
Ondřej Surý committed
332 333
- layer/iterate: when processing delegations, check if qname is at or
  below new authority
Ondřej Surý's avatar
Ondřej Surý committed
334 335


Ondřej Surý's avatar
Ondřej Surý committed
336 337 338 339 340 341 342 343 344 345 346
Knot Resolver 1.2.3 (2017-02-23)
================================

Bugfixes
--------
- Disable storing GLUE records into the cache even in the
  (non-default) QUERY_PERMISSIVE mode
- iterate: skip answer RRs that don't match the query
- layer/iterate: some additional processing for referrals
- lib/resolve: zonecut fetching error was fixed

Ondřej Surý's avatar
Ondřej Surý committed
347

Ondřej Surý's avatar
Ondřej Surý committed
348 349 350 351 352 353 354 355 356 357
Knot Resolver 1.2.2 (2017-02-10)
================================

Bugfixes:
---------
- Fix -k argument processing to avoid out-of-bounds memory accesses
- lib/resolve: fix zonecut fetching for explicit DS queries
- hints: more NULL checks
- Fix TA bootstrapping for multiple TAs in the IANA XML file

Ondřej Surý's avatar
Ondřej Surý committed
358 359 360 361
Testing:
--------
- Update tests to run tests with and without QNAME minimization

Ondřej Surý's avatar
Ondřej Surý committed
362

Vladimír Čunát's avatar
Vladimír Čunát committed
363 364 365 366 367 368 369 370 371
Knot Resolver 1.2.1 (2017-02-01)
====================================

Security:
---------
- Under certain conditions, a cached negative answer from a CD query
  would be reused to construct response for non-CD queries, resulting
  in Insecure status instead of Bogus.  Only 1.2.0 release was affected.

Ondřej Surý's avatar
Ondřej Surý committed
372 373 374 375 376 377 378 379 380
Documentation
-------------
- Update the typo in the documentation: The query trace policy is
  named policy.QTRACE (and not policy.TRACE)

Bugfixes:
---------
- lua: make the map command check its arguments

Ondřej Surý's avatar
Ondřej Surý committed
381

Ondřej Surý's avatar
Ondřej Surý committed
382
Knot Resolver 1.2.0 (2017-01-24)
383
====================================
384 385 386

Security:
---------
387 388
- In a policy.FORWARD() mode, the AD flag was being always set by mistake.
  It is now cleared, as the policy.FORWARD() doesn't do DNSSEC validation yet.
389

390 391 392 393
Improvements:
-------------
- The DNSSEC Validation has been refactored, fixing many resolving
  failures.
394 395 396
- Add module `version` that checks for updates and CVEs periodically.
- Support RFC7830: EDNS(0) padding in responses over TLS.
- Support CD flag on incoming requests.
397 398
- hints module: previously /etc/hosts was loaded by default, but not anymore.
  Users can now actually avoid loading any file.
399 400 401
- DNS over TLS now creates ephemeral certs.
- Configurable cache.{min,max}_tll option, with max_ttl defaulting to 6 days.
- Option to reorder RRs in the response.
Ondřej Surý's avatar
Ondřej Surý committed
402
- New policy.QTRACE policy to print packet contents
403 404 405 406 407 408

Bugfixes:
---------
- Trust Anchor configuration is now more robust.
- Correctly answer NOTIMPL for meta-types and non-IN RR classes.
- Free TCP buffer on cancelled connection.
409
- Fix crash in hints module on empty hints file, and fix non-lowercase hints.
410

411 412 413 414
Miscelaneous:
-------------
- It now requires knot >= 2.3.1 to link successfully.
- The API+ABI for modules changed slightly.
415
- New LRU implementation.
416

417

418 419 420 421 422 423 424 425
Knot Resolver 1.1.1 (2016-08-24)
================================

Bugfixes:
---------
 - Fix 0x20 randomization with retransmit
 - Fix pass-through for the stub mode
 - Fix the root hints IPv6 addresses
Ondřej Surý's avatar
Ondřej Surý committed
426
 - Fix dst addr for retries over TCP
427 428 429 430 431 432 433 434

Improvements:
-------------
 - Track RTT of all tried servers for faster retransmit
 - DAF: Allow forwarding to custom port
 - systemd: Read EnvironmentFile and user $KRESD_ARGS
 - systemd: Update systemd units to be named after daemon

435

436 437 438
Knot Resolver 1.1.0 (2016-08-12)
================================

439 440 441 442 443 444 445 446 447 448 449
Improvements:
-------------
 - RFC7873 DNS Cookies
 - RFC7858 DNS over TLS
 - HTTP/2 web interface, RESTful API
 - Metrics exported in Prometheus
 - DNS firewall module
 - Explicit CNAME target fetching in strict mode
 - Query minimisation improvements
 - Improved integration with systemd

450 451 452 453

Knot Resolver 1.0.0 (2016-05-30)
================================

454 455 456
Initial release:
----------------
 - The first initial release