NEWS 20.8 KB
Newer Older
1 2 3
Knot Resolver 3.x.y (2018-mm-dd)
================================

4 5 6 7
Incompatible changes
--------------------
- hints.use_nodata(true) by default; that's what most users want

8 9 10 11 12
Improvements
------------
- cache: handle out-of-space SIGBUS slightly better (#197)


Tomas Krizek's avatar
Tomas Krizek committed
13
Knot Resolver 3.0.0 (2018-08-20)
14 15
================================

16 17
Incompatible changes
--------------------
18 19 20 21 22 23 24
- cache: fail lua operations if cache isn't open yet (!639)
  By default cache is opened *after* reading the configuration,
  and older versions were silently ignoring cache operations.
  Valid configuration must open cache using `cache.open()` or `cache.size =`
  before executing cache operations like `cache.clear()`.
- libknot >= 2.7.1 is required, which brings also larger API changes
- in case you wrote custom Lua modules, please consult
Vladimír Čunát's avatar
Vladimír Čunát committed
25
  https://knot-resolver.readthedocs.io/en/latest/lib.html#incompatible-changes-since-3-0-0
26 27 28 29 30 31 32 33 34 35 36
- in case you wrote custom C modules, please see compile against
  Knot DNS 2.7 and adjust your module according to messages from C compiler
- DNS cookie module (RFC 7873) is not available in this release,
  it will be later reworked to reflect development in IEFT dnsop working group
- version module was permanently removed because it was not really used by users;
  if you want to receive notifications abou new releases please subscribe to
  https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-resolver-announce

Bugfixes
--------
- fix multi-process race condition in trust anchor maintenance (!643)
37
- ta_sentinel: also consider static trust anchors not managed via RFC 5011
38

39 40 41
Improvements
------------
- reorder_RR() implementation is brought back
42
- bring in performace improvements provided by libknot 2.7
Petr Špaček's avatar
Petr Špaček committed
43 44
- cache.clear() has a new, more powerful API
- cache documentation was improved
Petr Špaček's avatar
Petr Špaček committed
45 46
- old name "Knot DNS Resolver" is replaced by unambiguous "Knot Resolver"
  to prevent confusion with "Knot DNS" authoritative server
Petr Špaček's avatar
Petr Špaček committed
47

48

Tomas Krizek's avatar
Tomas Krizek committed
49 50 51 52 53 54 55 56
Knot Resolver 2.4.1 (2018-08-02)
================================

Security
--------
- fix CVE-2018-10920: Improper input validation bug in DNS resolver component
  (security!7, security!9)

57 58
Bugfixes
--------
Tomas Krizek's avatar
Tomas Krizek committed
59
- cache: fix TTL overflow in packet due to min_ttl (#388, security!8)
60
- TLS session resumption: avoid bad scheduling of rotation (#385)
Petr Špaček's avatar
Petr Špaček committed
61
- HTTP module: fix a regression in 2.4.0 which broke custom certs (!632)
62 63
- cache: NSEC3 negative cache even without NS record (#384)
  This fixes lower hit rate in NSEC3 zones (since 2.4.0).
Tomas Krizek's avatar
Tomas Krizek committed
64
- minor TCP and TLS fixes (!623, !624, !626)
65

66

Tomas Krizek's avatar
Tomas Krizek committed
67 68 69
Knot Resolver 2.4.0 (2018-07-03)
================================

70 71
Incompatible changes
--------------------
72
- minimal libknot version is now 2.6.7 to pull in latest fixes (#366)
73

74 75
Security
--------
76
- fix a rare case of zones incorrectly dowgraded to insecure status (!576)
77

78 79 80
New features
------------
- TLS session resumption (RFC 5077), both server and client (!585, #105)
81
  (disabled when compiling with gnutls < 3.5)
82 83 84 85
- TLS_FORWARD policy uses system CA certificate store by default (!568)
- aggressive caching for NSEC3 zones (!600)
- optional protection from DNS Rebinding attack (module rebinding, !608)
- module bogus_log to log DNSSEC bogus queries without verbose logging (!613)
86

87 88
Bugfixes
--------
89
- prefill: fix ability to read certificate bundle (!578)
90
- avoid turning off qname minimization in some cases, e.g. co.uk. (#339)
91
- fix validation of explicit wildcard queries (#274)
92
- dns64 module: more properties from the RFC implemented (incl. bug #375)
93

94 95
Improvements
------------
96
- systemd: multiple enabled kresd instances can now be started using kresd.target
97 98 99 100
- ta_sentinel: switch to version 14 of the RFC draft (!596)
- support for glibc systems with a non-Linux kernel (!588)
- support per-request variables for Lua modules (!533)
- support custom HTTP endpoints for Lua modules (!527)
101

102

Tomas Krizek's avatar
Tomas Krizek committed
103 104 105 106 107 108 109 110 111
Knot Resolver 2.3.0 (2018-04-23)
================================

Security
--------
- fix CVE-2018-1110: denial of service triggered by malformed DNS messages
  (!550, !558, security!2, security!4)
- increase resilience against slow lorris attack (security!5)

Petr Špaček's avatar
Petr Špaček committed
112 113 114 115
New features
------------
- new policy.REFUSE to reply REFUSED to clients

116 117
Bugfixes
--------
Tomas Krizek's avatar
Tomas Krizek committed
118 119 120 121 122 123 124 125 126 127 128 129
- validation: fix SERVFAIL in case of CNAME to NXDOMAIN in a single zone (!538)
- validation: fix SERVFAIL for DS . query (!544)
- lib/resolve: don't send unecessary queries to parent zone (!513)
- iterate: fix validation for zones where parent and child share NS (!543)
- TLS: improve error handling and documentation (!536, !555, !559)

Improvements
------------
- prefill: new module to periodically import root zone into cache
  (replacement for RFC 7706, !511)
- network_listen_fd: always create end point for supervisor supplied file descriptor
- use CPPFLAGS build environment variable if set (!547)
130 131


Tomas Krizek's avatar
Tomas Krizek committed
132 133 134 135 136 137 138
Knot Resolver 2.2.0 (2018-03-28)
================================

New features
------------
- cache server unavailability to prevent flooding unreachable servers
  (Please note that caching algorithm needs further optimization
139 140
  and will change in further versions but we need to gather operational
  experience first.)
141

Tomas Krizek's avatar
Tomas Krizek committed
142 143
Bugfixes
--------
144
- don't magically -D_FORTIFY_SOURCE=2 in some cases
Tomas Krizek's avatar
Tomas Krizek committed
145 146 147
- allow large responses for outbound over TCP
- fix crash with RR sets with over 255 records

148

Tomas Krizek's avatar
Tomas Krizek committed
149
Knot Resolver 2.1.1 (2018-02-23)
150 151 152 153 154 155
================================

Bugfixes
--------
- when iterating, avoid unnecessary queries for NS in insecure parent.
  This problem worsened in 2.0.0. (#246)
Tomas Krizek's avatar
Tomas Krizek committed
156
- prevent UDP packet leaks when using TLS forwarding
157
- fix the hints module also on some other systems, e.g. Gentoo.
158 159


Tomas Krizek's avatar
Tomas Krizek committed
160
Knot Resolver 2.1.0 (2018-02-16)
161
================================
162

163 164
Incompatible changes
--------------------
165
- stats: remove tracking of expiring records (predict uses another way)
Tomas Krizek's avatar
Tomas Krizek committed
166
- systemd: re-use a single kresd.socket and kresd-tls.socket
167 168
- ta_sentinel: implement protocol draft-ietf-dnsop-kskroll-sentinel-01
  (our draft-ietf-dnsop-kskroll-sentinel-00 implementation had inverted logic)
169
- libknot: require version 2.6.4 or newer to get bugfixes for DNS-over-TLS
170

171 172
Bugfixes
--------
173
- detect_time_jump module: don't clear cache on suspend-resume (#284)
174
- stats module: fix stats.list() returning nothing, regressed in 2.0.0
175
- policy.TLS_FORWARD: refusal when configuring with multiple IPs (#306)
176
- cache: fix broken refresh of insecure records that were about to expire
177 178
- fix the hints module on some systems, e.g. Fedora (came back on 2.0.0)
- build with older gnutls (conditionally disable features)
179
- fix the predict module to work with insecure records & cleanup code
180 181


Vladimír Čunát's avatar
Vladimír Čunát committed
182 183 184 185 186 187 188
Knot Resolver 2.0.0 (2018-01-31)
================================

Incompatible changes
--------------------
- systemd: change unit files to allow running multiple instances,
  deployments with single instance now must use `kresd@1.service`
189
  instead of `kresd.service`; see kresd.systemd(7) for details
Vladimír Čunát's avatar
Vladimír Čunát committed
190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218
- systemd: the directory for cache is now /var/cache/knot-resolver
- unify default directory and user to `knot-resolver`
- directory with trust anchor file specified by -k option must be writeable
- policy module is now loaded by default to enforce RFC 6761;
  see documentation for policy.PASS if you use locally-served DNS zones
- drop support for alternative cache backends memcached, redis,
  and for Lua bindings for some specific cache operations
- REORDER_RR option is not implemented (temporarily)

New features
------------
- aggressive caching of validated records (RFC 8198) for NSEC zones;
  thanks to ICANN for sponsoring this work.
- forwarding over TLS, authenticated by SPKI pin or certificate.
  policy.TLS_FORWARD pipelines queries out-of-order over shared TLS connection
  Beware: Some resolvers do not support out-of-order query processing.
  TLS forwarding to such resolvers will lead to slower resolution or failures.
- trust anchors: you may specify a read-only file via -K or --keyfile-ro
- trust anchors: at build-time you may set KEYFILE_DEFAULT (read-only)
- ta_sentinel module implements draft ietf-dnsop-kskroll-sentinel-00,
  enabled by default
- serve_stale module is prototype, subject to change
- extended API for Lua modules

Bugfixes
--------
- fix build on osx - regressed in 1.5.3 (different linker option name)


Vladimír Čunát's avatar
Vladimír Čunát committed
219 220 221 222 223 224 225 226 227 228
Knot Resolver 1.5.3 (2018-01-23)
================================

Bugfixes
--------
- fix the hints module on some systems, e.g. Fedora.
  Symptom: `undefined symbol: engine_hint_root_file`


Knot Resolver 1.5.2 (2018-01-22)
Vladimír Čunát's avatar
Vladimír Čunát committed
229 230 231 232 233 234 235 236 237 238 239 240 241 242
================================

Security
--------
- fix CVE-2018-1000002: insufficient DNSSEC validation, allowing
  attackers to deny existence of some data by forging packets.
  Some combinations pointed out in RFC 6840 sections 4.1 and 4.3
  were not taken into account.

Bugfixes
--------
- memcached: fix fallout from module rename in 1.5.1


243
Knot Resolver 1.5.1 (2017-12-12)
244
================================
245

246 247 248
Incompatible changes
--------------------
- script supervisor.py was removed, please migrate to a real process manager
249
- module ketcd was renamed to etcd for consistency
250
- module kmemcached was renamed to memcached for consistency
251

Vladimír Čunát's avatar
Vladimír Čunát committed
252 253
Bugfixes
--------
254
- fix SIGPIPE crashes (#271)
255
- tests: work around out-of-space for platforms with larger memory pages
256 257
- lua: fix mistakes in bindings affecting 1.4.0 and 1.5.0 (and 1.99.1-alpha),
  potentially causing problems in dns64 and workarounds modules
258 259 260 261 262 263 264
- predict module: various fixes (!399)

Improvements
------------
- add priming module to implement RFC 8109, enabled by default (#220)
- add modules helping with system time problems, enabled by default;
  for details see documentation of detect_time_skew and detect_time_jump
Vladimír Čunát's avatar
Vladimír Čunát committed
265 266


Vladimír Čunát's avatar
Vladimír Čunát committed
267
Knot Resolver 1.5.0 (2017-11-02)
268 269 270 271 272 273
================================

Bugfixes
--------
- fix loading modules on Darwin

274 275 276
Improvements
------------
- new module ta_signal_query supporting Signaling Trust Anchor Knowledge
Vladimír Čunát's avatar
Vladimír Čunát committed
277
  using Keytag Query (RFC 8145 section 5); it is enabled by default
Vladimír Čunát's avatar
Vladimír Čunát committed
278 279
- attempt validation for more records but require it for fewer of them
  (e.g. avoids SERVFAIL when server adds extra records but omits RRSIGs)
280

281

Vladimír Čunát's avatar
Vladimír Čunát committed
282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304
Knot Resolver 1.99.1-alpha (2017-10-26)
=======================================
This is an experimental release meant for testing aggressive caching.
It contains some regressions and might (theoretically) be even vulnerable.
The current focus is to minimize queries into the root zone.

Improvements
------------
- negative answers from validated NSEC (NXDOMAIN, NODATA)
- verbose log is very chatty around cache operations (maybe too much)

Regressions
-----------
- dropped support for alternative cache backends
  and for some specific cache operations
- caching doesn't yet work for various cases:
    * negative answers without NSEC (i.e. with NSEC3 or insecure)
	* +cd queries (needs other internal changes)
	* positive wildcard answers
- spurious SERVFAIL on specific combinations of cached records, printing:
	<= bad keys, broken trust chain
- make check
- a few Deckard tests are broken, probably due to some problems above
305
- also unknown ones?
Vladimír Čunát's avatar
Vladimír Čunát committed
306 307 308



Vladimír Čunát's avatar
Vladimír Čunát committed
309
Knot Resolver 1.4.0 (2017-09-22)
310 311 312 313 314
================================

Incompatible changes
--------------------
- lua: query flag-sets are no longer represented as plain integers.
315 316 317
  kres.query.* no longer works, and kr_query_t lost trivial methods
  'hasflag' and 'resolved'.
  You can instead write code like qry.flags.NO_0X20 = true.
318

319 320 321
Bugfixes
--------
- fix exiting one of multiple forks (#150)
322 323
- cache: change the way of using LMDB transactions.  That in particular
  fixes some cases of using too much space with multiple kresd forks (#240).
324

325 326 327
Improvements
------------
- policy.suffix: update the aho-corasick code (#200)
328 329
- root hints are now loaded from a zonefile; exposed as hints.root_file().
  You can override the path by defining ROOTHINTS during compilation.
330
- policy.FORWARD: work around resolvers adding unsigned NS records (#248)
331
- reduce unneeded records previously put into authority in wildcarded answers
332 333


Vladimír Čunát's avatar
Vladimír Čunát committed
334
Knot Resolver 1.3.3 (2017-08-09)
335 336
================================

Vladimír Čunát's avatar
Vladimír Čunát committed
337 338 339 340 341 342
Security
--------
- Fix a critical DNSSEC flaw.  Signatures might be accepted as valid
  even if the signed data was not in bailiwick of the DNSKEY used to
  sign it, assuming the trust chain to that DNSKEY was valid.

343 344 345
Bugfixes
--------
- iterate: skip RRSIGs with bad label count instead of immediate SERVFAIL
346
- utils: fix possible incorrect seeding of the random generator
Vladimír Čunát's avatar
Vladimír Čunát committed
347
- modules/http: fix compatibility with the Prometheus text format
348

349 350 351 352 353 354
Improvements
------------
- policy: implement remaining special-use domain names from RFC6761 (#205),
  and make these rules apply only if no other non-chain rule applies


Vladimír Čunát's avatar
Vladimír Čunát committed
355
Knot Resolver 1.3.2 (2017-07-28)
356 357
================================

358 359 360 361 362
Security
--------
- fix possible opportunities to use insecure data from cache as keys
  for validation

363 364 365
Bugfixes
--------
- daemon: check existence of config file even if rundir isn't specified
366
- policy.FORWARD and STUB: use RTT tracking to choose servers (#125, #208)
367
- dns64: fix CNAME problems (#203)  It still won't work with policy.STUB.
Vladimír Čunát's avatar
Vladimír Čunát committed
368
- hints: better interpretation of hosts-like files (#204)
369
         also, error out if a bad entry is encountered in the file
370
- dnssec: handle unknown DNSKEY/DS algorithms (#210)
Vladimír Čunát's avatar
Vladimír Čunát committed
371
- predict: fix the module, broken since 1.2.0 (#154)
372

373 374 375 376
Improvements
------------
- embedded LMDB fallback: update 0.9.18 -> 0.9.21

377

Vladimír Čunát's avatar
Vladimír Čunát committed
378
Knot Resolver 1.3.1 (2017-06-23)
379 380 381 382 383
================================

Bugfixes
--------
- modules/http: fix finding the static files (bug from 1.3.0)
384
- policy.FORWARD: fix some cases of CNAMEs obstructing search for zone cuts
385 386


387
Knot Resolver 1.3.0 (2017-06-13)
388 389 390 391 392 393 394 395 396
================================

Security
--------
- Refactor handling of AD flag and security status of resource records.
  In some cases it was possible for secure domains to get cached as
  insecure, even for a TLD, leading to disabled validation.
  It also fixes answering with non-authoritative data about nameservers.

397 398
Improvements
------------
399 400
- major feature: support for forwarding with validation (#112).
  The old policy.FORWARD action now does that; the previous non-validating
401
  mode is still available as policy.STUB except that also uses caching (#122).
402
- command line: specify ports via @ but still support # for compatibility
403
- policy: recognize 100.64.0.0/10 as local addresses
404 405
- layer/iterate: *do* retry repeatedly if REFUSED, as we can't yet easily
  retry with other NSs while avoiding retrying with those who REFUSED
406 407
- modules: allow changing the directory where modules are found,
  and do not search the default library path anymore.
408

409 410 411
Bugfixes
--------
- validate: fix insufficient caching for some cases (relatively rare)
412 413
- avoid putting "duplicate" record-sets into the answer (#198)

414

Vladimír Čunát's avatar
Vladimír Čunát committed
415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435
Knot Resolver 1.2.6 (2017-04-24)
================================

Security
--------
- dnssec: don't set AD flag for NODATA answers if wildcard non-existence
  is not guaranteed due to opt-out in NSEC3

Improvements
------------
- layer/iterate: don't retry repeatedly if REFUSED

Bugfixes
--------
- lib/nsrep: revert some changes to NS reputation tracking that caused
  severe problems to some users of 1.2.5 (#178 and #179)
- dnssec: fix verification of wildcarded non-singleton RRsets
- dnssec: allow wildcards located directly under the root
- layer/rrcache: avoid putting answer records into queries in some cases


436
Knot Resolver 1.2.5 (2017-04-05)
Ondřej Surý's avatar
Ondřej Surý committed
437 438 439 440 441 442 443 444 445 446 447 448 449 450 451
================================

Security
--------
- layer/validate: clear AD if closest encloser proof has opt-outed
  NSEC3 (#169)
- layer/validate: check if NSEC3 records in wildcard expansion proof
  has an opt-out
- dnssec/nsec: missed wildcard no-data answers validation has been
  implemented

Improvements
------------
- modules/dnstap: a DNSTAP support module
  (Contributed by Vicky Shrestha)
452
- modules/workarounds: a module adding workarounds for known
Ondřej Surý's avatar
Ondřej Surý committed
453 454
  DNS protocol violators
- layer/iterate: fix logging of glue addresses
455 456
- kr_bitcmp: allow bits=0 and consequently 0.0.0.0/0 matches in view
  and renumber modules.
Ondřej Surý's avatar
Ondřej Surý committed
457 458
- modules/padding: Improve default padding of responses
  (Contributed by Daniel Kahn Gillmor)
Ondřej Surý's avatar
Ondřej Surý committed
459
- New kresc client utility (experimental; don't rely on the API yet)
Ondřej Surý's avatar
Ondřej Surý committed
460 461 462 463 464 465 466 467 468

Bugfixes
--------
- trust anchors: Improve trust anchors storage format (#167)
- trust anchors: support non-root TAs, one domain per file
- policy.DENY: set AA flag and clear AD flag
- lib/resolve: avoid unnecessary DS queries
- lib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted
- layer/iterate: During packet classification (answer vs. referral)
469
  don't analyze AUTHORITY section in authoritative answer if ANSWER
Ondřej Surý's avatar
Ondřej Surý committed
470 471
  section contains records that have been requested

Vladimír Čunát's avatar
Vladimír Čunát committed
472

Ondřej Surý's avatar
Ondřej Surý committed
473
Knot Resolver 1.2.4 (2017-03-09)
Ondřej Surý's avatar
Ondřej Surý committed
474 475
================================

Ondřej Surý's avatar
Ondřej Surý committed
476 477
Security
--------
Ondřej Surý's avatar
Ondřej Surý committed
478
- Knot Resolver 1.2.0 and higher could return AD flag for insecure
Ondřej Surý's avatar
Ondřej Surý committed
479 480
  answer if the daemon received answer with invalid RRSIG several
  times in a row.
Ondřej Surý's avatar
Ondřej Surý committed
481

Ondřej Surý's avatar
Ondřej Surý committed
482 483
Improvements
------------
Ondřej Surý's avatar
Ondřej Surý committed
484 485
- modules/policy: allow QTRACE policy to be chained with other
  policies
Ondřej Surý's avatar
Ondřej Surý committed
486 487 488 489
- hints.add_hosts(path): a new property
- module: document the API and simplify the code
- policy.MIRROR: support IPv6 link-local addresses
- policy.FORWARD: support IPv6 link-local addresses
Ondřej Surý's avatar
Ondřej Surý committed
490 491
- add net.outgoing_{v4,v6} to allow specifying address to use for
  connections
Ondřej Surý's avatar
Ondřej Surý committed
492 493 494 495

Bugfixes
--------
- layer/iterate: some improvements in cname chain unrolling
Ondřej Surý's avatar
Ondřej Surý committed
496 497
- layer/validate: fix duplicate records in AUTHORITY section in case
  of WC expansion proof
Ondřej Surý's avatar
Ondřej Surý committed
498
- lua: do *not* truncate cache size to unsigned
499 500
- forwarding mode: correctly forward +cd flag
- fix a potential memory leak
Ondřej Surý's avatar
Ondřej Surý committed
501 502
- don't treat answers that contain DS non-existance proof as insecure
- don't store NSEC3 and their signatures in the cache
Ondřej Surý's avatar
Ondřej Surý committed
503 504
- layer/iterate: when processing delegations, check if qname is at or
  below new authority
Ondřej Surý's avatar
Ondřej Surý committed
505 506


Ondřej Surý's avatar
Ondřej Surý committed
507 508 509 510 511 512 513 514 515 516 517
Knot Resolver 1.2.3 (2017-02-23)
================================

Bugfixes
--------
- Disable storing GLUE records into the cache even in the
  (non-default) QUERY_PERMISSIVE mode
- iterate: skip answer RRs that don't match the query
- layer/iterate: some additional processing for referrals
- lib/resolve: zonecut fetching error was fixed

Ondřej Surý's avatar
Ondřej Surý committed
518

Ondřej Surý's avatar
Ondřej Surý committed
519 520 521 522 523 524 525 526 527 528
Knot Resolver 1.2.2 (2017-02-10)
================================

Bugfixes:
---------
- Fix -k argument processing to avoid out-of-bounds memory accesses
- lib/resolve: fix zonecut fetching for explicit DS queries
- hints: more NULL checks
- Fix TA bootstrapping for multiple TAs in the IANA XML file

Ondřej Surý's avatar
Ondřej Surý committed
529 530 531 532
Testing:
--------
- Update tests to run tests with and without QNAME minimization

Ondřej Surý's avatar
Ondřej Surý committed
533

Vladimír Čunát's avatar
Vladimír Čunát committed
534 535 536 537 538 539 540 541 542
Knot Resolver 1.2.1 (2017-02-01)
====================================

Security:
---------
- Under certain conditions, a cached negative answer from a CD query
  would be reused to construct response for non-CD queries, resulting
  in Insecure status instead of Bogus.  Only 1.2.0 release was affected.

Ondřej Surý's avatar
Ondřej Surý committed
543 544 545 546 547 548 549 550 551
Documentation
-------------
- Update the typo in the documentation: The query trace policy is
  named policy.QTRACE (and not policy.TRACE)

Bugfixes:
---------
- lua: make the map command check its arguments

Ondřej Surý's avatar
Ondřej Surý committed
552

Ondřej Surý's avatar
Ondřej Surý committed
553
Knot Resolver 1.2.0 (2017-01-24)
554
====================================
555 556 557

Security:
---------
558 559
- In a policy.FORWARD() mode, the AD flag was being always set by mistake.
  It is now cleared, as the policy.FORWARD() doesn't do DNSSEC validation yet.
560

561 562 563 564
Improvements:
-------------
- The DNSSEC Validation has been refactored, fixing many resolving
  failures.
565 566 567
- Add module `version` that checks for updates and CVEs periodically.
- Support RFC7830: EDNS(0) padding in responses over TLS.
- Support CD flag on incoming requests.
568 569
- hints module: previously /etc/hosts was loaded by default, but not anymore.
  Users can now actually avoid loading any file.
570 571 572
- DNS over TLS now creates ephemeral certs.
- Configurable cache.{min,max}_tll option, with max_ttl defaulting to 6 days.
- Option to reorder RRs in the response.
Ondřej Surý's avatar
Ondřej Surý committed
573
- New policy.QTRACE policy to print packet contents
574 575 576 577 578 579

Bugfixes:
---------
- Trust Anchor configuration is now more robust.
- Correctly answer NOTIMPL for meta-types and non-IN RR classes.
- Free TCP buffer on cancelled connection.
580
- Fix crash in hints module on empty hints file, and fix non-lowercase hints.
581

582 583
Miscellaneous:
--------------
584 585
- It now requires knot >= 2.3.1 to link successfully.
- The API+ABI for modules changed slightly.
586
- New LRU implementation.
587

588

589 590 591 592 593 594 595 596
Knot Resolver 1.1.1 (2016-08-24)
================================

Bugfixes:
---------
 - Fix 0x20 randomization with retransmit
 - Fix pass-through for the stub mode
 - Fix the root hints IPv6 addresses
Ondřej Surý's avatar
Ondřej Surý committed
597
 - Fix dst addr for retries over TCP
598 599 600 601 602 603 604 605

Improvements:
-------------
 - Track RTT of all tried servers for faster retransmit
 - DAF: Allow forwarding to custom port
 - systemd: Read EnvironmentFile and user $KRESD_ARGS
 - systemd: Update systemd units to be named after daemon

606

607 608 609
Knot Resolver 1.1.0 (2016-08-12)
================================

610 611 612 613 614 615 616 617 618 619 620
Improvements:
-------------
 - RFC7873 DNS Cookies
 - RFC7858 DNS over TLS
 - HTTP/2 web interface, RESTful API
 - Metrics exported in Prometheus
 - DNS firewall module
 - Explicit CNAME target fetching in strict mode
 - Query minimisation improvements
 - Improved integration with systemd

621 622 623 624

Knot Resolver 1.0.0 (2016-05-30)
================================

625 626 627
Initial release:
----------------
 - The first initial release