Tags give the ability to mark specific points in history as being important
  • v4.3.0 protected   Knot Resolver 4.3.0
    Release v4.3.0

    Knot Resolver 4.3.0 (2019-12-04)

    Security - CVE-2019-19331

    • fix speed of processing large RRsets (DoS, #518)
    • improve CNAME chain length accounting (DoS, !899)

    Bugfixes

    • http module: use SO_REUSEPORT (!879)
    • systemd: kresd@.service now properly starts after network interfaces have been configured with IP addresses after reboot (!884)
    • sendmmsg: improve reliability (!704)
    • cache: fix crash on insertion via lua for NS and CNAME (!889)
    • rpm package: move root.keys to /var/lib/knot-resolver (#513, !888)

    Improvements

    • increase file-descriptor count limit to maximum allowed value (hard limit; !876)
    • watchdog module: support testing a DNS query (and switch C -> lua; !878, !881)
    • performance: use sendmmsg syscall towards clients by default (!877)
    • performance: avoid excessive getsockname() syscalls (!854)
    • performance: lua-related improvements (!874)
    • daemon now attempts to drop all capabilities (!896)
    • reduce CNAME chain length limit - now <= 12 (!899)
  • v4.2.2 protected   Knot Resolver 4.2.2
    Release v4.2.2

    Knot Resolver 4.2.2 (2019-10-07)

    Bugfixes

    • lua bindings: fix a 4.2.1 regression on 32-bit systems (#514) which also fixes libknot 2.9 support on all systems
  • v4.2.1 protected   Knot Resolver 4.2.1
    010b8a6a · release 4.2.1 ·
    Release v4.2.1

    Knot Resolver 4.2.1 (2019-09-26)

    Bugfixes

    • rebinding module: fix handling some requests, respect ALLOW_LOCAL flag
    • fix incorrect SERVFAIL on cached bogus answer for +cd request (!860) (regression since 4.1.0 release, in less common cases)
    • prefill module: allow a different module-loading style (#506)
    • validation: trim TTLs by RRSIG's expiration and original TTL (#319, #504)
    • NS choice algorithm: fix a regression since 4.0.0 (#497, !868)
    • policy: special domains home.arpa. and local. get NXDOMAIN (!855)

    Improvements

    • add compatibility with (future) libknot 2.9
  • v4.2.0 protected   Knot Resolver 4.2.0
    Release v4.2.0

    Knot Resolver 4.2.0 (2019-08-05)

    Improvements

    • queries without RD bit set are REFUSED by default (!838)
    • support forwarding to multiple targets (!825)

    Bugfixes

    • tls_client: fix issue with TLS session resumption (#489)
    • rebinding module: fix another false-positive assertion case (!851)

    Module API changes

    • kr_request::add_selected is now really put into answer, instead of the "duplicate" ::additional field (#490)
  • v4.1.0 protected   Knot Resolver 4.1.0
    Release v4.1.0

    Knot Resolver 4.1.0 (2019-07-10)

    Security

    • fix CVE-2019-10190: do not pass bogus negative answer to client (!827)
    • fix CVE-2019-10191: do not cache negative answer with forged QNAME+QTYPE (!839)

    Improvements

    • new cache garbage collector is available and enabled by default (#257) This improves cache efficiency on big installations.
    • DNS-over-HTTPS: unknown HTTP parameters are ignored to improve compatibility with non-standard clients (!832)
    • DNS-over-HTTPS: answers include access-control-allow-origin: * (!823) which allows JavaScript to use DoH endpoint.
    • http module: support named AF_UNIX stream sockets (again)
    • aggressive caching is disabled on minimal NSEC* ranges (!826) This improves cache effectivity with DNSSEC black lies and also accidentally works around bug in proofs-of-nonexistence from F5 BIG-IP load-balancers.
    • aarch64 support, even kernels with ARM64_VA_BITS >= 48 (#216, !797) This is done by working around a LuaJIT incompatibility. Please report bugs.
    • lua tables for C modules are more strict by default, e.g. nsid.foo will throw an error instead of returning nil (!797)
    • systemd: basic watchdog is now available and enabled by default (#275)

    Bugfixes

    • TCP to upstream: fix unlikely case of sending out wrong message length (!816)
    • http module: fix problems around maintenance of ephemeral certs (!819)
    • http module: also send intermediate TLS certificate to clients, if available and luaossl >= 20181207 (!819)
    • send EDNS with SERVFAILs, e.g. on validation failures (#180, !827)
    • prefill module: avoid crash on empty zone file (#474, !840)
    • rebinding module: avoid excessive iteration on blocked attempts (!842)
    • rebinding module: fix crash caused by race condition (!842)
    • rebinding module: log each blocked query only in verbose mode (!842)
    • cache: automatically clear stale reader locks (!844)

    Module API changes

    • lua modules may omit casting parameters of layer functions (!797)
  • v4.0.0 protected   Knot Resolver 4.0.0

    Knot Resolver 4.0.0 (2019-04-18)

    Incompatible changes

    • see upgrading guide: https://knot-resolver.readthedocs.io/en/stable/upgrading.html
    • configuration: trust_anchors aliases .file, .config() and .negative were removed (!788)
    • configuration: trust_anchors.keyfile_default is no longer accessible (!788)
    • daemon: -k/--keyfile and -K/--keyfile-ro options were removed
    • meson build system is now used for builds (!771)
    • build with embedded LMBD is no longer supported
    • default modules dir location has changed
    • DNSSEC is enabled by default
    • upstream packages for Debian now require systemd
    • libknot >= 2.8 is required
    • net.list() output format changed (#448)
    • net.listen() reports error when address-port pair is in use
    • bind to DNS-over-TLS port by default (!792)
    • stop versioning libkres library
    • default port for web management and APIs changed to 8453

    Improvements

    • policy.TLS_FORWARD: if hostname is configured, send it on wire (!762)
    • hints module: allow configuring the TTL and change default from 0 to 5s
    • policy module: policy.rpz() will watch the file for changes by default
    • packaging: lua cqueues added to default dependencies where available
    • systemd: service is no longer auto-restarted on configuration errors
    • always send DO+CD flags upstream, even in insecure zones (#153)
    • cache.stats() output is completely new; see docs (!775)
    • improve usability of table_print() (!790, !801)
    • add DNS-over-HTTPS support (#280)
    • docker image supports and exposes DNS-over-HTTPS

    Bugfixes

    • predict module: load stats module if config didn't specify period (!755)
    • trust_anchors: don't do 5011-style updates on anchors from files that were loaded as unmanaged trust anchors (!753)
    • trust_anchors.add(): include these TAs in .summary() (!753)
    • policy module: support '#' for separating port numbers, for consistency
    • fix startup on macOS+BSD when </dev/null and cqueues installed
    • policy.RPZ: log problems from zone-file level of parser as well (#453)
    • fix flushing of messages to logs in some cases (notably systemd) (!781)
    • fix fallback when SERVFAIL or REFUSED is received from upstream (!784)
    • fix crash when dealing with unknown TA key algorhitm (#449)
    • go insecure due to algorithm support even if DNSKEY is NODATA (!798)
    • fix mac addresses in the output of net.interfaces() command (!804)
    • http module: fix too early renewal of ephemeral certificates (!808)

    Module API changes

    • kr_straddr_split() changed API a bit (compiler will catch that)
    • C modules defining *_layer or *_props symbols need to change a bit See the upgrading guide for details. It's detected on module load.
  • v3.2.1 protected   Knot Resolver 3.2.1
    Release v3.2.1

    Knot Resolver 3.2.1 (2019-01-10)

    Bugfixes

    • trust_anchors: respect validity time range during TA bootstrap (!748)
    • fix TLS rehandshake handling (!739)
    • make TLS_FORWARD compatible with GnuTLS 3.3 (!741)
    • special thanks to Grigorii Demidov for his long-term work on Knot Resolver!

    Improvements

    • improve handling of timeouted outgoing TCP connections (!734)
    • trust_anchors: check syntax of public keys in DNSKEY RRs (!748)
    • validator: clarify message about bogus non-authoritative data (!735)
    • dnssec validation failures contain more verbose reasoning (!735)
    • new function trust_anchors.summary() describes state of DNSSEC TAs (!737), and logs new state of trust anchors after start up and automatic changes
    • trust anchors: refuse revoked DNSKEY even if specified explicitly, and downgrade missing the SEP bit to a warning
  • v3.2.0 protected   Knot Resolver 3.2.0
    Release v3.2.0

    Knot Resolver 3.2.0 (2018-12-17)

    New features

    • module edns_keepalive to implement server side of RFC 7828 (#408)
    • module nsid to implement server side of RFC 5001 (#289)
    • module bogus_log provides .frequent() table (!629, credit Ulrich Wisser)
    • module stats collects flags from answer messages (!629, credit Ulrich Wisser)
    • module view supports multiple rules with identical address/TSIG specification and keeps trying rules until a "non-chain" action is executed (!678)
    • module experimental_dot_auth implements an DNS-over-TLS to auth protocol (!711, credit Manu Bretelle)
    • net.bpf bindings allow advanced users to use eBPF socket filters

    Bugfixes

    • http module: only run prometheus in parent process if using --forks=N, as the submodule collects metrics from all sub-processes as well.
    • TLS fixes for corner cases (!700, !714, !716, !721, !728)
    • fix build with -DNOVERBOSELOG (#424)
    • policy.{FORWARD,TLS_FORWARD,STUB}: respect net.ipv{4,6} setting (!710)
    • avoid SERVFAILs due to certain kind of NS dependency cycles, again (#374) this time seen as 'circular dependency' in verbose logs
    • policy and view modules do not overwrite result finished requests (!678)

    Improvements

    • Dockerfile: rework, basing on Debian instead of Alpine
    • policy.{FORWARD,TLS_FORWARD,STUB}: give advantage to IPv6 when choosing whom to ask, just as for iteration
    • use pseudo-randomness from gnutls instead of internal ISAAC (#233)
    • tune the way we deal with non-responsive servers (!716, !723)
    • documentation clarifies interaction between policy and view modules (!678, !730)

    Module API changes

    • new layer is added: answer_finalize
    • kr_request keeps ::qsource.packet beyond the begin layer
    • kr_request::qsource.tcp renamed to ::qsource.flags.tcp
    • kr_request::has_tls renamed to ::qsource.flags.tls
    • kr_zonecut_add(), kr_zonecut_del() and kr_nsrep_sort() changed parameters slightly
  • v3.1.0 protected   Knot Resolver 3.1.0
    Release v3.1.0

    Knot Resolver 3.1.0 (2018-11-02)

    Incompatible changes

    • hints.use_nodata(true) by default; that's what most users want
    • libknot >= 2.7.2 is required

    Improvements

    • cache: handle out-of-space SIGBUS slightly better (#197)
    • daemon: improve TCP timeout handling (!686)

    Bugfixes

    • cache.clear('name'): fix some edge cases in API (#401)
    • fix error handling from TLS writes (!669)
    • avoid SERVFAILs due to certain kind of NS dependency cycles (#374)
  • v3.0.0 protected   Knot Resolver 3.0.0
    Release v3.0.0

    Knot Resolver 3.0.0 (2018-08-20)

    Incompatible changes

    • cache: fail lua operations if cache isn't open yet (!639) By default cache is opened after reading the configuration, and older versions were silently ignoring cache operations. Valid configuration must open cache using cache.open() or cache.size = before executing cache operations like cache.clear().
    • libknot >= 2.7.1 is required, which brings also larger API changes
    • in case you wrote custom Lua modules, please consult https://knot-resolver.readthedocs.io/en/latest/lib.html#incompatible-changes-since-3-0-0
    • in case you wrote custom C modules, please see compile against Knot DNS 2.7 and adjust your module according to messages from C compiler
    • DNS cookie module (RFC 7873) is not available in this release, it will be later reworked to reflect development in IEFT dnsop working group
    • version module was permanently removed because it was not really used by users; if you want to receive notifications abou new releases please subscribe to https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-resolver-announce

    Bugfixes

    • fix multi-process race condition in trust anchor maintenance (!643)
    • ta_sentinel: also consider static trust anchors not managed via RFC 5011

    Improvements

    • reorder_RR() implementation is brought back
    • bring in performace improvements provided by libknot 2.7
    • cache.clear() has a new, more powerful API
    • cache documentation was improved
    • old name "Knot DNS Resolver" is replaced by unambiguous "Knot Resolver" to prevent confusion with "Knot DNS" authoritative server
  • v2.4.1 protected   Knot Resolver 2.4.1
    Release v2.4.1

    Knot Resolver 2.4.1 (2018-08-02)

    Security

    • fix CVE-2018-10920: Improper input validation bug in DNS resolver component (security!7, security!9)

    Bugfixes

    • cache: fix TTL overflow in packet due to min_ttl (#388, security!8)
    • TLS session resumption: avoid bad scheduling of rotation (#385)
    • HTTP module: fix a regression in 2.4.0 which broke custom certs (!632)
    • cache: NSEC3 negative cache even without NS record (#384) This fixes lower hit rate in NSEC3 zones (since 2.4.0).
    • minor TCP and TLS fixes (!623, !624, !626)
  • v2.4.0 protected   Knot Resolver 2.4.0
    Release v2.4.0

    Knot Resolver 2.4.0 (2018-07-03)

    Incompatible changes

    • minimal libknot version is now 2.6.7 to pull in latest fixes (#366)

    Security

    • fix a rare case of zones incorrectly dowgraded to insecure status (!576)

    New features

    • TLS session resumption (RFC 5077), both server and client (!585, #105) (disabled when compiling with gnutls < 3.5)
    • TLS_FORWARD policy uses system CA certificate store by default (!568)
    • aggressive caching for NSEC3 zones (!600)
    • optional protection from DNS Rebinding attack (module rebinding, !608)
    • module bogus_log to log DNSSEC bogus queries without verbose logging (!613)

    Bugfixes

    • prefill: fix ability to read certificate bundle (!578)
    • avoid turning off qname minimization in some cases, e.g. co.uk. (#339)
    • fix validation of explicit wildcard queries (#274)
    • dns64 module: more properties from the RFC implemented (incl. bug #375)

    Improvements

    • systemd: multiple enabled kresd instances can now be started using kresd.target
    • ta_sentinel: switch to version 14 of the RFC draft (!596)
    • support for glibc systems with a non-Linux kernel (!588)
    • support per-request variables for Lua modules (!533)
    • support custom HTTP endpoints for Lua modules (!527)
  • v2.3.0 protected   Knot Resolver 2.3.0
    Release v2.3.0

    Knot Resolver 2.3.0 (2018-04-23)

    Security

    • fix CVE-2018-1110: denial of service triggered by malformed DNS messages (!550, !558, security!2, security!4)
    • increase resilience against slow lorris attack (security!5)

    Bugfixes

    • validation: fix SERVFAIL in case of CNAME to NXDOMAIN in a single zone (!538)
    • validation: fix SERVFAIL for DS . query (!544)
    • lib/resolve: don't send unecessary queries to parent zone (!513)
    • iterate: fix validation for zones where parent and child share NS (!543)
    • TLS: improve error handling and documentation (!536, !555, !559)

    Improvements

    • prefill: new module to periodically import root zone into cache (replacement for RFC 7706, !511)
    • network_listen_fd: always create end point for supervisor supplied file descriptor
    • use CPPFLAGS build environment variable if set (!547)
  • v2.2.0 protected   Knot Resolver 2.2.0
    Release v2.2.0

    Knot Resolver 2.2.0 (2018-03-28)

    New features

    • cache server unavailability to prevent flooding unreachable servers (Please note that caching algorithm needs further optimization and will change in further versions but we need to gather operational experience first.)

    Bugfixes

    • don't magically -D_FORTIFY_SOURCE=2 in some cases
    • allow large responses for outbound over TCP
    • fix crash with RR sets with over 255 records
  • v2.1.1 protected   Knot Resolver 2.1.1
    Release v2.1.1

    Knot Resolver 2.1.1 (2018-02-23)

    Bugfixes

    • when iterating, avoid unnecessary queries for NS in insecure parent. This problem worsened in 2.0.0. (#246)
    • prevent UDP packet leaks when using TLS forwarding
    • fix the hints module also on some other systems, e.g. Gentoo.
  • v2.1.0 protected   Knot Resolver 2.1.0
    Release v2.1.0

    Knot Resolver 2.1.0 (2018-02-16)

    Incompatible changes

    • stats: remove tracking of expiring records (predict uses another way)
    • systemd: re-use a single kresd.socket and kresd-tls.socket
    • ta_sentinel: implement protocol draft-ietf-dnsop-kskroll-sentinel-01 (our draft-ietf-dnsop-kskroll-sentinel-00 implementation had inverted logic)
    • libknot: require version 2.6.4 or newer to get bugfixes for DNS-over-TLS

    Bugfixes

    • detect_time_jump module: don't clear cache on suspend-resume (#284)
    • stats module: fix stats.list() returning nothing, regressed in 2.0.0
    • policy.TLS_FORWARD: refusal when configuring with multiple IPs (#306)
    • cache: fix broken refresh of insecure records that were about to expire
    • fix the hints module on some systems, e.g. Fedora (came back on 2.0.0)
    • build with older gnutls (conditionally disable features)
    • fix the predict module to work with insecure records & cleanup code
  • v2.0.0 protected   Knot Resolver 2.0.0
    8af42ad4 · Merge !472: release 2.0.0 ·
    Release v2.0.0

    Knot Resolver 2.0.0 (2018-01-31)

    Incompatible changes

    • systemd: change unit files to allow running multiple instances, deployments with single instance now must use kresd@1.service instead of kresd.service; see kresd.systemd(8) for details
    • systemd: the directory for cache is now /var/cache/knot-resolver
    • unify default directory and user to knot-resolver
    • directory with trust anchor file specified by -k option must be writeable
    • policy module is now loaded by default to enforce RFC 6761; see documentation for policy.PASS if you use locally-served DNS zones
    • drop support for alternative cache backends memcached, redis, and for Lua bindings for some specific cache operations
    • REORDER_RR option is not implemented (temporarily)

    New features

    • aggressive caching of validated records (RFC 8198) for NSEC zones; thanks to ICANN for sponsoring this work.
    • forwarding over TLS, authenticated by SPKI pin or certificate. policy.TLS_FORWARD pipelines queries out-of-order over shared TLS connection Beware: Some resolvers do not support out-of-order query processing. TLS forwarding to such resolvers will lead to slower resolution or failures.
    • trust anchors: you may specify a read-only file via -K or --keyfile-ro
    • trust anchors: at build-time you may set KEYFILE_DEFAULT (read-only)
    • ta_sentinel module implements draft ietf-dnsop-kskroll-sentinel-00, enabled by default
    • serve_stale module is prototype, subject to change
    • extended API for Lua modules

    Bugfixes

    • fix build on osx - regressed in 1.5.3 (different linker option name)
  • v1.5.3 protected   Knot Resolver 1.5.3
    df38a0ae · release 1.5.3 ·
    Release v1.5.3

    Knot Resolver 1.5.3 (2018-01-23)

    Bugfixes

    • fix the hints module on some systems, e.g. Fedora. Symptom: undefined symbol: engine_hint_root_file
  • v1.5.2 protected   Knot Resolver 1.5.2
    bf4fd314 · security release 1.5.2 ·
    Release v1.5.2

    Knot Resolver 1.5.2 (2018-01-22)

    Security

    • fix CVE-2018-1000002: insufficient DNSSEC validation, allowing attackers to deny existence of some data by forging packets. Some combinations pointed out in RFC 6840 sections 4.1 and 4.3 were not taken into account.

    Bugfixes

    • memcached: fix fallout from module rename in 1.5.1
  • v1.5.1 protected   Knot Resolver 1.5.1
    Release v1.5.1

    Knot Resolver 1.5.1 (2017-12-12)

    Incompatible changes

    • script supervisor.py was removed, please migrate to a real process manager
    • module ketcd was renamed to etcd for consistency
    • module kmemcached was renamed to memcached for consistency

    Bugfixes

    • fix SIGPIPE crashes (#271)
    • tests: work around out-of-space for platforms with larger memory pages
    • lua: fix mistakes in bindings affecting 1.4.0 and 1.5.0 (and 1.99.1-alpha), potentially causing problems in dns64 and workarounds modules
    • predict module: various fixes (!399)

    Improvements

    • add priming module to implement RFC 8109, enabled by default (#220)
    • add modules helping with system time problems, enabled by default; for details see documentation of detect_time_skew and detect_time_jump