NEWS 29.6 KB
Newer Older
Tomas Krizek's avatar
Tomas Krizek committed
1
Knot Resolver 4.2.1 (2019-09-26)
Vladimír Čunát's avatar
Vladimír Čunát committed
2
3
4
5
6
================================

Bugfixes
--------
- rebinding module: fix handling some requests, respect ALLOW_LOCAL flag
7
8
- fix incorrect SERVFAIL on cached bogus answer for +cd request (!860)
  (regression since 4.1.0 release, in less common cases)
9
- prefill module: allow a different module-loading style (#506)
10
- validation: trim TTLs by RRSIG's expiration and original TTL (#319, #504)
11
- NS choice algorithm: fix a regression since 4.0.0 (#497, !868)
Tomas Krizek's avatar
Tomas Krizek committed
12
- policy: special domains home.arpa. and local. get NXDOMAIN (!855)
Vladimír Čunát's avatar
Vladimír Čunát committed
13

14
15
16
17
Improvements
------------
- add compatibility with (future) libknot 2.9

Vladimír Čunát's avatar
Vladimír Čunát committed
18

Tomas Krizek's avatar
Tomas Krizek committed
19
Knot Resolver 4.2.0 (2019-08-05)
20
21
================================

22
23
24
Improvements
------------
- queries without RD bit set are REFUSED by default (!838)
Tomas Krizek's avatar
Tomas Krizek committed
25
- support forwarding to multiple targets (!825)
26

27
28
29
Bugfixes
--------
- tls_client: fix issue with TLS session resumption (#489)
30
- rebinding module: fix another false-positive assertion case (!851)
31

32
33
34
35
36
37
Module API changes
------------------
- kr_request::add_selected is now really put into answer,
  instead of the "duplicate" ::additional field (#490)


Petr Špaček's avatar
Petr Špaček committed
38
Knot Resolver 4.1.0 (2019-07-10)
39
40
================================

41
42
Security
--------
43
44
- fix CVE-2019-10190: do not pass bogus negative answer to client (!827)
- fix CVE-2019-10191: do not cache negative answer with forged QNAME+QTYPE (!839)
45

46
47
Improvements
------------
Petr Špaček's avatar
Petr Špaček committed
48
49
50
51
- new cache garbage collector is available and enabled by default (#257)
  This improves cache efficiency on big installations.
- DNS-over-HTTPS: unknown HTTP parameters are ignored to improve compatibility
  with non-standard clients (!832)
52
- DNS-over-HTTPS: answers include `access-control-allow-origin: *` (!823)
Petr Špaček's avatar
Petr Špaček committed
53
54
  which allows JavaScript to use DoH endpoint.
- http module: support named AF_UNIX stream sockets (again)
55
- aggressive caching is disabled on minimal NSEC* ranges (!826)
Petr Špaček's avatar
Petr Špaček committed
56
57
  This improves cache effectivity with DNSSEC black lies and also accidentally
  works around bug in proofs-of-nonexistence from F5 BIG-IP load-balancers.
Vladimír Čunát's avatar
Vladimír Čunát committed
58
- aarch64 support, even kernels with ARM64_VA_BITS >= 48 (#216, !797)
Petr Špaček's avatar
Petr Špaček committed
59
  This is done by working around a LuaJIT incompatibility. Please report bugs.
60
61
- lua tables for C modules are more strict by default, e.g. `nsid.foo`
  will throw an error instead of returning `nil` (!797)
Petr Špaček's avatar
Petr Špaček committed
62
- systemd: basic watchdog is now available and enabled by default (#275)
63

64
65
Bugfixes
--------
Petr Špaček's avatar
Petr Špaček committed
66
- TCP to upstream: fix unlikely case of sending out wrong message length (!816)
67
- http module: fix problems around maintenance of ephemeral certs (!819)
68
69
- http module: also send intermediate TLS certificate to clients,
  if available and luaossl >= 20181207 (!819)
70
- send EDNS with SERVFAILs, e.g. on validation failures (#180, !827)
71
- prefill module: avoid crash on empty zone file (#474, !840)
72
73
- rebinding module: avoid excessive iteration on blocked attempts (!842)
- rebinding module: fix crash caused by race condition (!842)
74
- rebinding module: log each blocked query only in verbose mode (!842)
75
- cache: automatically clear stale reader locks (!844)
76

77

Petr Špaček's avatar
Petr Špaček committed
78
79
80
81
82
Module API changes
------------------
- lua modules may omit casting parameters of layer functions (!797)


Tomas Krizek's avatar
Tomas Krizek committed
83
Knot Resolver 4.0.0 (2019-04-18)
84
85
================================

Tomas Krizek's avatar
Tomas Krizek committed
86
87
Incompatible changes
--------------------
Tomas Krizek's avatar
Tomas Krizek committed
88
- see upgrading guide: https://knot-resolver.readthedocs.io/en/stable/upgrading.html
89
90
- configuration: trust_anchors aliases .file, .config() and .negative were removed (!788)
- configuration: trust_anchors.keyfile_default is no longer accessible (!788)
91
- daemon: -k/--keyfile and -K/--keyfile-ro options were removed
92
93
94
95
96
- meson build system is now used for builds (!771)
- build with embedded LMBD is no longer supported
- default modules dir location has changed
- DNSSEC is enabled by default
- upstream packages for Debian now require systemd
Tomas Krizek's avatar
Tomas Krizek committed
97
- libknot >= 2.8 is required
Tomas Krizek's avatar
Tomas Krizek committed
98
- net.list() output format changed (#448)
99
- net.listen() reports error when address-port pair is in use
Tomas Krizek's avatar
Tomas Krizek committed
100
101
102
- bind to DNS-over-TLS port by default (!792)
- stop versioning libkres library
- default port for web management and APIs changed to 8453
Tomas Krizek's avatar
Tomas Krizek committed
103

104
105
Improvements
------------
Tomas Krizek's avatar
Tomas Krizek committed
106
- policy.TLS_FORWARD: if hostname is configured, send it on wire (!762)
107
108
109
- hints module: allow configuring the TTL and change default from 0 to 5s
- policy module: policy.rpz() will watch the file for changes by default
- packaging: lua cqueues added to default dependencies where available
110
- systemd: service is no longer auto-restarted on configuration errors
Tomas Krizek's avatar
Tomas Krizek committed
111
112
113
114
115
- always send DO+CD flags upstream, even in insecure zones (#153)
- cache.stats() output is completely new; see docs (!775)
- improve usability of table_print() (!790, !801)
- add DNS-over-HTTPS support (#280)
- docker image supports and exposes DNS-over-HTTPS
116

117
118
119
Bugfixes
--------
- predict module: load stats module if config didn't specify period (!755)
120
121
- trust_anchors: don't do 5011-style updates on anchors from files
  that were loaded as unmanaged trust anchors (!753)
122
- trust_anchors.add(): include these TAs in .summary() (!753)
123
- policy module: support '#' for separating port numbers, for consistency
124
- fix startup on macOS+BSD when </dev/null and cqueues installed
125
- policy.RPZ: log problems from zone-file level of parser as well (#453)
Tomas Krizek's avatar
Tomas Krizek committed
126
- fix flushing of messages to logs in some cases (notably systemd) (!781)
127
- fix fallback when SERVFAIL or REFUSED is received from upstream (!784)
128
- fix crash when dealing with unknown TA key algorhitm (#449)
129
- go insecure due to algorithm support even if DNSKEY is NODATA (!798)
Tomas Krizek's avatar
Tomas Krizek committed
130
- fix mac addresses in the output of net.interfaces() command (!804)
131
- http module: fix too early renewal of ephemeral certificates (!808)
132

133
134
135
Module API changes
------------------
- kr_straddr_split() changed API a bit (compiler will catch that)
136
137
- C modules defining `*_layer` or `*_props` symbols need to change a bit
  See the upgrading guide for details.  It's detected on module load.
138

139

Petr Špaček's avatar
Petr Špaček committed
140
Knot Resolver 3.2.1 (2019-01-10)
141
142
143
144
================================

Bugfixes
--------
Petr Špaček's avatar
Petr Špaček committed
145
146
147
148
- trust_anchors: respect validity time range during TA bootstrap (!748)
- fix TLS rehandshake handling (!739)
- make TLS_FORWARD compatible with GnuTLS 3.3 (!741)
- special thanks to Grigorii Demidov for his long-term work on Knot Resolver!
149

150
151
Improvements
------------
Petr Špaček's avatar
Petr Špaček committed
152
153
154
- improve handling of timeouted outgoing TCP connections (!734)
- trust_anchors: check syntax of public keys in DNSKEY RRs (!748)
- validator: clarify message about bogus non-authoritative data (!735)
155
156
157
- dnssec validation failures contain more verbose reasoning (!735)
- new function trust_anchors.summary() describes state of DNSSEC TAs (!737),
  and logs new state of trust anchors after start up and automatic changes
158
159
- trust anchors: refuse revoked DNSKEY even if specified explicitly,
  and downgrade missing the SEP bit to a warning
160

161

Petr Špaček's avatar
Petr Špaček committed
162
Knot Resolver 3.2.0 (2018-12-17)
163
164
================================

165
166
167
New features
------------
- module edns_keepalive to implement server side of RFC 7828 (#408)
168
- module nsid to implement server side of RFC 5001 (#289)
Petr Špaček's avatar
Petr Špaček committed
169
170
171
172
173
174
175
- module bogus_log provides .frequent() table (!629, credit Ulrich Wisser)
- module stats collects flags from answer messages (!629, credit Ulrich Wisser)
- module view supports multiple rules with identical address/TSIG specification
  and keeps trying rules until a "non-chain" action is executed (!678)
- module experimental_dot_auth implements an DNS-over-TLS to auth protocol
  (!711, credit Manu Bretelle)
- net.bpf bindings allow advanced users to use eBPF socket filters
176

177
178
179
180
Bugfixes
--------
- http module: only run prometheus in parent process if using --forks=N,
  as the submodule collects metrics from all sub-processes as well.
Petr Špaček's avatar
Petr Špaček committed
181
- TLS fixes for corner cases (!700, !714, !716, !721, !728)
182
- fix build with -DNOVERBOSELOG (#424)
183
- policy.{FORWARD,TLS_FORWARD,STUB}: respect net.ipv{4,6} setting (!710)
184
185
- avoid SERVFAILs due to certain kind of NS dependency cycles, again
  (#374) this time seen as 'circular dependency' in verbose logs
Petr Špaček's avatar
Petr Špaček committed
186
- policy and view modules do not overwrite result finished requests (!678)
187

Tomas Krizek's avatar
Tomas Krizek committed
188
189
190
Improvements
------------
- Dockerfile: rework, basing on Debian instead of Alpine
191
192
- policy.{FORWARD,TLS_FORWARD,STUB}: give advantage to IPv6
  when choosing whom to ask, just as for iteration
193
- use pseudo-randomness from gnutls instead of internal ISAAC (#233)
194
- tune the way we deal with non-responsive servers (!716, !723)
Petr Špaček's avatar
Petr Špaček committed
195
196
197
198
199
200
201
202
203
- documentation clarifies interaction between policy and view modules (!678, !730)

Module API changes
------------------
- new layer is added: answer_finalize
- kr_request keeps ::qsource.packet beyond the begin layer
- kr_request::qsource.tcp renamed to ::qsource.flags.tcp
- kr_request::has_tls renamed to ::qsource.flags.tls
- kr_zonecut_add(), kr_zonecut_del() and kr_nsrep_sort() changed parameters slightly
Tomas Krizek's avatar
Tomas Krizek committed
204

205

Tomas Krizek's avatar
Tomas Krizek committed
206
Knot Resolver 3.1.0 (2018-11-02)
207
208
================================

209
210
211
Incompatible changes
--------------------
- hints.use_nodata(true) by default; that's what most users want
Tomas Krizek's avatar
Tomas Krizek committed
212
- libknot >= 2.7.2 is required
213

214
215
216
Improvements
------------
- cache: handle out-of-space SIGBUS slightly better (#197)
Tomas Krizek's avatar
Tomas Krizek committed
217
- daemon: improve TCP timeout handling (!686)
218

219
220
221
Bugfixes
--------
- cache.clear('name'): fix some edge cases in API (#401)
Tomas Krizek's avatar
Tomas Krizek committed
222
- fix error handling from TLS writes (!669)
223
- avoid SERVFAILs due to certain kind of NS dependency cycles (#374)
224

225

Tomas Krizek's avatar
Tomas Krizek committed
226
Knot Resolver 3.0.0 (2018-08-20)
227
228
================================

229
230
Incompatible changes
--------------------
Petr Špaček's avatar
Petr Špaček committed
231
232
233
234
235
236
237
- cache: fail lua operations if cache isn't open yet (!639)
  By default cache is opened *after* reading the configuration,
  and older versions were silently ignoring cache operations.
  Valid configuration must open cache using `cache.open()` or `cache.size =`
  before executing cache operations like `cache.clear()`.
- libknot >= 2.7.1 is required, which brings also larger API changes
- in case you wrote custom Lua modules, please consult
Vladimír Čunát's avatar
Vladimír Čunát committed
238
  https://knot-resolver.readthedocs.io/en/latest/lib.html#incompatible-changes-since-3-0-0
Petr Špaček's avatar
Petr Špaček committed
239
240
241
242
243
244
245
246
247
248
249
- in case you wrote custom C modules, please see compile against
  Knot DNS 2.7 and adjust your module according to messages from C compiler
- DNS cookie module (RFC 7873) is not available in this release,
  it will be later reworked to reflect development in IEFT dnsop working group
- version module was permanently removed because it was not really used by users;
  if you want to receive notifications abou new releases please subscribe to
  https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-resolver-announce

Bugfixes
--------
- fix multi-process race condition in trust anchor maintenance (!643)
250
- ta_sentinel: also consider static trust anchors not managed via RFC 5011
251

252
253
254
Improvements
------------
- reorder_RR() implementation is brought back
Petr Špaček's avatar
Petr Špaček committed
255
- bring in performace improvements provided by libknot 2.7
Petr Špaček's avatar
Petr Špaček committed
256
257
- cache.clear() has a new, more powerful API
- cache documentation was improved
Petr Špaček's avatar
Petr Špaček committed
258
259
- old name "Knot DNS Resolver" is replaced by unambiguous "Knot Resolver"
  to prevent confusion with "Knot DNS" authoritative server
Petr Špaček's avatar
Petr Špaček committed
260

261

Tomas Krizek's avatar
Tomas Krizek committed
262
263
264
265
266
267
268
269
Knot Resolver 2.4.1 (2018-08-02)
================================

Security
--------
- fix CVE-2018-10920: Improper input validation bug in DNS resolver component
  (security!7, security!9)

270
271
Bugfixes
--------
Tomas Krizek's avatar
Tomas Krizek committed
272
- cache: fix TTL overflow in packet due to min_ttl (#388, security!8)
273
- TLS session resumption: avoid bad scheduling of rotation (#385)
Petr Špaček's avatar
Petr Špaček committed
274
- HTTP module: fix a regression in 2.4.0 which broke custom certs (!632)
275
276
- cache: NSEC3 negative cache even without NS record (#384)
  This fixes lower hit rate in NSEC3 zones (since 2.4.0).
Tomas Krizek's avatar
Tomas Krizek committed
277
- minor TCP and TLS fixes (!623, !624, !626)
278

279

Tomas Krizek's avatar
Tomas Krizek committed
280
281
282
Knot Resolver 2.4.0 (2018-07-03)
================================

283
284
Incompatible changes
--------------------
285
- minimal libknot version is now 2.6.7 to pull in latest fixes (#366)
286

287
288
Security
--------
289
- fix a rare case of zones incorrectly dowgraded to insecure status (!576)
290

291
292
293
New features
------------
- TLS session resumption (RFC 5077), both server and client (!585, #105)
294
  (disabled when compiling with gnutls < 3.5)
295
296
297
298
- TLS_FORWARD policy uses system CA certificate store by default (!568)
- aggressive caching for NSEC3 zones (!600)
- optional protection from DNS Rebinding attack (module rebinding, !608)
- module bogus_log to log DNSSEC bogus queries without verbose logging (!613)
299

300
301
Bugfixes
--------
302
- prefill: fix ability to read certificate bundle (!578)
303
- avoid turning off qname minimization in some cases, e.g. co.uk. (#339)
304
- fix validation of explicit wildcard queries (#274)
305
- dns64 module: more properties from the RFC implemented (incl. bug #375)
306

307
308
Improvements
------------
309
- systemd: multiple enabled kresd instances can now be started using kresd.target
310
311
312
313
- ta_sentinel: switch to version 14 of the RFC draft (!596)
- support for glibc systems with a non-Linux kernel (!588)
- support per-request variables for Lua modules (!533)
- support custom HTTP endpoints for Lua modules (!527)
314

315

Tomas Krizek's avatar
Tomas Krizek committed
316
317
318
319
320
321
322
323
324
Knot Resolver 2.3.0 (2018-04-23)
================================

Security
--------
- fix CVE-2018-1110: denial of service triggered by malformed DNS messages
  (!550, !558, security!2, security!4)
- increase resilience against slow lorris attack (security!5)

Petr Špaček's avatar
Petr Špaček committed
325
326
327
328
New features
------------
- new policy.REFUSE to reply REFUSED to clients

329
330
Bugfixes
--------
Tomas Krizek's avatar
Tomas Krizek committed
331
332
333
334
335
336
337
338
339
340
341
342
- validation: fix SERVFAIL in case of CNAME to NXDOMAIN in a single zone (!538)
- validation: fix SERVFAIL for DS . query (!544)
- lib/resolve: don't send unecessary queries to parent zone (!513)
- iterate: fix validation for zones where parent and child share NS (!543)
- TLS: improve error handling and documentation (!536, !555, !559)

Improvements
------------
- prefill: new module to periodically import root zone into cache
  (replacement for RFC 7706, !511)
- network_listen_fd: always create end point for supervisor supplied file descriptor
- use CPPFLAGS build environment variable if set (!547)
343
344


Tomas Krizek's avatar
Tomas Krizek committed
345
346
347
348
349
350
351
Knot Resolver 2.2.0 (2018-03-28)
================================

New features
------------
- cache server unavailability to prevent flooding unreachable servers
  (Please note that caching algorithm needs further optimization
352
353
  and will change in further versions but we need to gather operational
  experience first.)
354

Tomas Krizek's avatar
Tomas Krizek committed
355
356
Bugfixes
--------
357
- don't magically -D_FORTIFY_SOURCE=2 in some cases
Tomas Krizek's avatar
Tomas Krizek committed
358
359
360
- allow large responses for outbound over TCP
- fix crash with RR sets with over 255 records

361

Tomas Krizek's avatar
Tomas Krizek committed
362
Knot Resolver 2.1.1 (2018-02-23)
363
364
365
366
367
368
================================

Bugfixes
--------
- when iterating, avoid unnecessary queries for NS in insecure parent.
  This problem worsened in 2.0.0. (#246)
Tomas Krizek's avatar
Tomas Krizek committed
369
- prevent UDP packet leaks when using TLS forwarding
370
- fix the hints module also on some other systems, e.g. Gentoo.
371
372


Tomas Krizek's avatar
Tomas Krizek committed
373
Knot Resolver 2.1.0 (2018-02-16)
374
================================
375

376
377
Incompatible changes
--------------------
378
- stats: remove tracking of expiring records (predict uses another way)
Tomas Krizek's avatar
Tomas Krizek committed
379
- systemd: re-use a single kresd.socket and kresd-tls.socket
Petr Špaček's avatar
Petr Špaček committed
380
381
- ta_sentinel: implement protocol draft-ietf-dnsop-kskroll-sentinel-01
  (our draft-ietf-dnsop-kskroll-sentinel-00 implementation had inverted logic)
382
- libknot: require version 2.6.4 or newer to get bugfixes for DNS-over-TLS
383

384
385
Bugfixes
--------
386
- detect_time_jump module: don't clear cache on suspend-resume (#284)
387
- stats module: fix stats.list() returning nothing, regressed in 2.0.0
388
- policy.TLS_FORWARD: refusal when configuring with multiple IPs (#306)
389
- cache: fix broken refresh of insecure records that were about to expire
390
391
- fix the hints module on some systems, e.g. Fedora (came back on 2.0.0)
- build with older gnutls (conditionally disable features)
392
- fix the predict module to work with insecure records & cleanup code
393
394


Vladimír Čunát's avatar
Vladimír Čunát committed
395
396
397
398
399
400
401
Knot Resolver 2.0.0 (2018-01-31)
================================

Incompatible changes
--------------------
- systemd: change unit files to allow running multiple instances,
  deployments with single instance now must use `kresd@1.service`
402
  instead of `kresd.service`; see kresd.systemd(7) for details
Vladimír Čunát's avatar
Vladimír Čunát committed
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
- systemd: the directory for cache is now /var/cache/knot-resolver
- unify default directory and user to `knot-resolver`
- directory with trust anchor file specified by -k option must be writeable
- policy module is now loaded by default to enforce RFC 6761;
  see documentation for policy.PASS if you use locally-served DNS zones
- drop support for alternative cache backends memcached, redis,
  and for Lua bindings for some specific cache operations
- REORDER_RR option is not implemented (temporarily)

New features
------------
- aggressive caching of validated records (RFC 8198) for NSEC zones;
  thanks to ICANN for sponsoring this work.
- forwarding over TLS, authenticated by SPKI pin or certificate.
  policy.TLS_FORWARD pipelines queries out-of-order over shared TLS connection
  Beware: Some resolvers do not support out-of-order query processing.
  TLS forwarding to such resolvers will lead to slower resolution or failures.
- trust anchors: you may specify a read-only file via -K or --keyfile-ro
- trust anchors: at build-time you may set KEYFILE_DEFAULT (read-only)
- ta_sentinel module implements draft ietf-dnsop-kskroll-sentinel-00,
  enabled by default
- serve_stale module is prototype, subject to change
- extended API for Lua modules

Bugfixes
--------
- fix build on osx - regressed in 1.5.3 (different linker option name)


Vladimír Čunát's avatar
Vladimír Čunát committed
432
433
434
435
436
437
438
439
440
441
Knot Resolver 1.5.3 (2018-01-23)
================================

Bugfixes
--------
- fix the hints module on some systems, e.g. Fedora.
  Symptom: `undefined symbol: engine_hint_root_file`


Knot Resolver 1.5.2 (2018-01-22)
Vladimír Čunát's avatar
Vladimír Čunát committed
442
443
444
445
446
447
448
449
450
451
452
453
454
455
================================

Security
--------
- fix CVE-2018-1000002: insufficient DNSSEC validation, allowing
  attackers to deny existence of some data by forging packets.
  Some combinations pointed out in RFC 6840 sections 4.1 and 4.3
  were not taken into account.

Bugfixes
--------
- memcached: fix fallout from module rename in 1.5.1


456
Knot Resolver 1.5.1 (2017-12-12)
457
================================
458

459
460
461
Incompatible changes
--------------------
- script supervisor.py was removed, please migrate to a real process manager
462
- module ketcd was renamed to etcd for consistency
463
- module kmemcached was renamed to memcached for consistency
464

Vladimír Čunát's avatar
Vladimír Čunát committed
465
466
Bugfixes
--------
467
- fix SIGPIPE crashes (#271)
468
- tests: work around out-of-space for platforms with larger memory pages
469
470
- lua: fix mistakes in bindings affecting 1.4.0 and 1.5.0 (and 1.99.1-alpha),
  potentially causing problems in dns64 and workarounds modules
471
472
473
474
475
476
477
- predict module: various fixes (!399)

Improvements
------------
- add priming module to implement RFC 8109, enabled by default (#220)
- add modules helping with system time problems, enabled by default;
  for details see documentation of detect_time_skew and detect_time_jump
Vladimír Čunát's avatar
Vladimír Čunát committed
478
479


Vladimír Čunát's avatar
Vladimír Čunát committed
480
Knot Resolver 1.5.0 (2017-11-02)
481
482
483
484
485
486
================================

Bugfixes
--------
- fix loading modules on Darwin

487
488
489
Improvements
------------
- new module ta_signal_query supporting Signaling Trust Anchor Knowledge
Vladimír Čunát's avatar
Vladimír Čunát committed
490
  using Keytag Query (RFC 8145 section 5); it is enabled by default
Vladimír Čunát's avatar
Vladimír Čunát committed
491
492
- attempt validation for more records but require it for fewer of them
  (e.g. avoids SERVFAIL when server adds extra records but omits RRSIGs)
493

494

Vladimír Čunát's avatar
Vladimír Čunát committed
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
Knot Resolver 1.99.1-alpha (2017-10-26)
=======================================
This is an experimental release meant for testing aggressive caching.
It contains some regressions and might (theoretically) be even vulnerable.
The current focus is to minimize queries into the root zone.

Improvements
------------
- negative answers from validated NSEC (NXDOMAIN, NODATA)
- verbose log is very chatty around cache operations (maybe too much)

Regressions
-----------
- dropped support for alternative cache backends
  and for some specific cache operations
- caching doesn't yet work for various cases:
    * negative answers without NSEC (i.e. with NSEC3 or insecure)
	* +cd queries (needs other internal changes)
	* positive wildcard answers
- spurious SERVFAIL on specific combinations of cached records, printing:
	<= bad keys, broken trust chain
- make check
- a few Deckard tests are broken, probably due to some problems above
518
- also unknown ones?
Vladimír Čunát's avatar
Vladimír Čunát committed
519
520
521



Vladimír Čunát's avatar
Vladimír Čunát committed
522
Knot Resolver 1.4.0 (2017-09-22)
523
524
525
526
527
================================

Incompatible changes
--------------------
- lua: query flag-sets are no longer represented as plain integers.
528
529
530
  kres.query.* no longer works, and kr_query_t lost trivial methods
  'hasflag' and 'resolved'.
  You can instead write code like qry.flags.NO_0X20 = true.
531

532
533
534
Bugfixes
--------
- fix exiting one of multiple forks (#150)
535
536
- cache: change the way of using LMDB transactions.  That in particular
  fixes some cases of using too much space with multiple kresd forks (#240).
537

538
539
540
Improvements
------------
- policy.suffix: update the aho-corasick code (#200)
Vladimír Čunát's avatar
Vladimír Čunát committed
541
542
- root hints are now loaded from a zonefile; exposed as hints.root_file().
  You can override the path by defining ROOTHINTS during compilation.
543
- policy.FORWARD: work around resolvers adding unsigned NS records (#248)
544
- reduce unneeded records previously put into authority in wildcarded answers
545
546


Vladimír Čunát's avatar
Vladimír Čunát committed
547
Knot Resolver 1.3.3 (2017-08-09)
548
549
================================

Vladimír Čunát's avatar
Vladimír Čunát committed
550
551
552
553
554
555
Security
--------
- Fix a critical DNSSEC flaw.  Signatures might be accepted as valid
  even if the signed data was not in bailiwick of the DNSKEY used to
  sign it, assuming the trust chain to that DNSKEY was valid.

556
557
558
Bugfixes
--------
- iterate: skip RRSIGs with bad label count instead of immediate SERVFAIL
559
- utils: fix possible incorrect seeding of the random generator
Vladimír Čunát's avatar
Vladimír Čunát committed
560
- modules/http: fix compatibility with the Prometheus text format
561

562
563
564
565
566
567
Improvements
------------
- policy: implement remaining special-use domain names from RFC6761 (#205),
  and make these rules apply only if no other non-chain rule applies


Vladimír Čunát's avatar
Vladimír Čunát committed
568
Knot Resolver 1.3.2 (2017-07-28)
569
570
================================

571
572
573
574
575
Security
--------
- fix possible opportunities to use insecure data from cache as keys
  for validation

576
577
578
Bugfixes
--------
- daemon: check existence of config file even if rundir isn't specified
579
- policy.FORWARD and STUB: use RTT tracking to choose servers (#125, #208)
580
- dns64: fix CNAME problems (#203)  It still won't work with policy.STUB.
Vladimír Čunát's avatar
Vladimír Čunát committed
581
- hints: better interpretation of hosts-like files (#204)
582
         also, error out if a bad entry is encountered in the file
583
- dnssec: handle unknown DNSKEY/DS algorithms (#210)
Vladimír Čunát's avatar
Vladimír Čunát committed
584
- predict: fix the module, broken since 1.2.0 (#154)
585

586
587
588
589
Improvements
------------
- embedded LMDB fallback: update 0.9.18 -> 0.9.21

590

Vladimír Čunát's avatar
Vladimír Čunát committed
591
Knot Resolver 1.3.1 (2017-06-23)
592
593
594
595
596
================================

Bugfixes
--------
- modules/http: fix finding the static files (bug from 1.3.0)
597
- policy.FORWARD: fix some cases of CNAMEs obstructing search for zone cuts
598
599


600
Knot Resolver 1.3.0 (2017-06-13)
601
602
603
604
605
606
607
608
609
================================

Security
--------
- Refactor handling of AD flag and security status of resource records.
  In some cases it was possible for secure domains to get cached as
  insecure, even for a TLD, leading to disabled validation.
  It also fixes answering with non-authoritative data about nameservers.

610
611
Improvements
------------
612
613
- major feature: support for forwarding with validation (#112).
  The old policy.FORWARD action now does that; the previous non-validating
614
  mode is still available as policy.STUB except that also uses caching (#122).
615
- command line: specify ports via @ but still support # for compatibility
616
- policy: recognize 100.64.0.0/10 as local addresses
617
618
- layer/iterate: *do* retry repeatedly if REFUSED, as we can't yet easily
  retry with other NSs while avoiding retrying with those who REFUSED
619
620
- modules: allow changing the directory where modules are found,
  and do not search the default library path anymore.
621

622
623
624
Bugfixes
--------
- validate: fix insufficient caching for some cases (relatively rare)
625
626
- avoid putting "duplicate" record-sets into the answer (#198)

627

Vladimír Čunát's avatar
Vladimír Čunát committed
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
Knot Resolver 1.2.6 (2017-04-24)
================================

Security
--------
- dnssec: don't set AD flag for NODATA answers if wildcard non-existence
  is not guaranteed due to opt-out in NSEC3

Improvements
------------
- layer/iterate: don't retry repeatedly if REFUSED

Bugfixes
--------
- lib/nsrep: revert some changes to NS reputation tracking that caused
  severe problems to some users of 1.2.5 (#178 and #179)
- dnssec: fix verification of wildcarded non-singleton RRsets
- dnssec: allow wildcards located directly under the root
- layer/rrcache: avoid putting answer records into queries in some cases


Ondřej Surý's avatar
Ondřej Surý committed
649
Knot Resolver 1.2.5 (2017-04-05)
Ondřej Surý's avatar
Ondřej Surý committed
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
================================

Security
--------
- layer/validate: clear AD if closest encloser proof has opt-outed
  NSEC3 (#169)
- layer/validate: check if NSEC3 records in wildcard expansion proof
  has an opt-out
- dnssec/nsec: missed wildcard no-data answers validation has been
  implemented

Improvements
------------
- modules/dnstap: a DNSTAP support module
  (Contributed by Vicky Shrestha)
665
- modules/workarounds: a module adding workarounds for known
Ondřej Surý's avatar
Ondřej Surý committed
666
667
  DNS protocol violators
- layer/iterate: fix logging of glue addresses
668
669
- kr_bitcmp: allow bits=0 and consequently 0.0.0.0/0 matches in view
  and renumber modules.
Ondřej Surý's avatar
Ondřej Surý committed
670
671
- modules/padding: Improve default padding of responses
  (Contributed by Daniel Kahn Gillmor)
Ondřej Surý's avatar
Ondřej Surý committed
672
- New kresc client utility (experimental; don't rely on the API yet)
Ondřej Surý's avatar
Ondřej Surý committed
673
674
675
676
677
678
679
680
681

Bugfixes
--------
- trust anchors: Improve trust anchors storage format (#167)
- trust anchors: support non-root TAs, one domain per file
- policy.DENY: set AA flag and clear AD flag
- lib/resolve: avoid unnecessary DS queries
- lib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted
- layer/iterate: During packet classification (answer vs. referral)
682
  don't analyze AUTHORITY section in authoritative answer if ANSWER
Ondřej Surý's avatar
Ondřej Surý committed
683
684
  section contains records that have been requested

Vladimír Čunát's avatar
Vladimír Čunát committed
685

Ondřej Surý's avatar
Ondřej Surý committed
686
Knot Resolver 1.2.4 (2017-03-09)
Ondřej Surý's avatar
Ondřej Surý committed
687
688
================================

Ondřej Surý's avatar
Ondřej Surý committed
689
690
Security
--------
Ondřej Surý's avatar
Ondřej Surý committed
691
- Knot Resolver 1.2.0 and higher could return AD flag for insecure
Ondřej Surý's avatar
Ondřej Surý committed
692
693
  answer if the daemon received answer with invalid RRSIG several
  times in a row.
Ondřej Surý's avatar
Ondřej Surý committed
694

Ondřej Surý's avatar
Ondřej Surý committed
695
696
Improvements
------------
Ondřej Surý's avatar
Ondřej Surý committed
697
698
- modules/policy: allow QTRACE policy to be chained with other
  policies
Ondřej Surý's avatar
Ondřej Surý committed
699
700
701
702
- hints.add_hosts(path): a new property
- module: document the API and simplify the code
- policy.MIRROR: support IPv6 link-local addresses
- policy.FORWARD: support IPv6 link-local addresses
Ondřej Surý's avatar
Ondřej Surý committed
703
704
- add net.outgoing_{v4,v6} to allow specifying address to use for
  connections
Ondřej Surý's avatar
Ondřej Surý committed
705
706
707
708

Bugfixes
--------
- layer/iterate: some improvements in cname chain unrolling
Ondřej Surý's avatar
Ondřej Surý committed
709
710
- layer/validate: fix duplicate records in AUTHORITY section in case
  of WC expansion proof
Ondřej Surý's avatar
Ondřej Surý committed
711
- lua: do *not* truncate cache size to unsigned
712
713
- forwarding mode: correctly forward +cd flag
- fix a potential memory leak
Ondřej Surý's avatar
Ondřej Surý committed
714
715
- don't treat answers that contain DS non-existance proof as insecure
- don't store NSEC3 and their signatures in the cache
Ondřej Surý's avatar
Ondřej Surý committed
716
717
- layer/iterate: when processing delegations, check if qname is at or
  below new authority
Ondřej Surý's avatar
Ondřej Surý committed
718
719


Ondřej Surý's avatar
Ondřej Surý committed
720
721
722
723
724
725
726
727
728
729
730
Knot Resolver 1.2.3 (2017-02-23)
================================

Bugfixes
--------
- Disable storing GLUE records into the cache even in the
  (non-default) QUERY_PERMISSIVE mode
- iterate: skip answer RRs that don't match the query
- layer/iterate: some additional processing for referrals
- lib/resolve: zonecut fetching error was fixed

Ondřej Surý's avatar
Ondřej Surý committed
731

Ondřej Surý's avatar
Ondřej Surý committed
732
733
734
735
736
737
738
739
740
741
Knot Resolver 1.2.2 (2017-02-10)
================================

Bugfixes:
---------
- Fix -k argument processing to avoid out-of-bounds memory accesses
- lib/resolve: fix zonecut fetching for explicit DS queries
- hints: more NULL checks
- Fix TA bootstrapping for multiple TAs in the IANA XML file

Ondřej Surý's avatar
Ondřej Surý committed
742
743
744
745
Testing:
--------
- Update tests to run tests with and without QNAME minimization

Ondřej Surý's avatar
Ondřej Surý committed
746

Vladimír Čunát's avatar
Vladimír Čunát committed
747
748
749
750
751
752
753
754
755
Knot Resolver 1.2.1 (2017-02-01)
====================================

Security:
---------
- Under certain conditions, a cached negative answer from a CD query
  would be reused to construct response for non-CD queries, resulting
  in Insecure status instead of Bogus.  Only 1.2.0 release was affected.

Ondřej Surý's avatar
Ondřej Surý committed
756
757
758
759
760
761
762
763
764
Documentation
-------------
- Update the typo in the documentation: The query trace policy is
  named policy.QTRACE (and not policy.TRACE)

Bugfixes:
---------
- lua: make the map command check its arguments

Ondřej Surý's avatar
Ondřej Surý committed
765

Ondřej Surý's avatar
Ondřej Surý committed
766
Knot Resolver 1.2.0 (2017-01-24)
767
====================================
768
769
770

Security:
---------
771
772
- In a policy.FORWARD() mode, the AD flag was being always set by mistake.
  It is now cleared, as the policy.FORWARD() doesn't do DNSSEC validation yet.
773

774
775
776
777
Improvements:
-------------
- The DNSSEC Validation has been refactored, fixing many resolving
  failures.
778
779
780
- Add module `version` that checks for updates and CVEs periodically.
- Support RFC7830: EDNS(0) padding in responses over TLS.
- Support CD flag on incoming requests.
781
782
- hints module: previously /etc/hosts was loaded by default, but not anymore.
  Users can now actually avoid loading any file.
783
784
785
- DNS over TLS now creates ephemeral certs.
- Configurable cache.{min,max}_tll option, with max_ttl defaulting to 6 days.
- Option to reorder RRs in the response.
Ondřej Surý's avatar
Ondřej Surý committed
786
- New policy.QTRACE policy to print packet contents
787
788
789
790
791
792

Bugfixes:
---------
- Trust Anchor configuration is now more robust.
- Correctly answer NOTIMPL for meta-types and non-IN RR classes.
- Free TCP buffer on cancelled connection.
793
- Fix crash in hints module on empty hints file, and fix non-lowercase hints.
794

795
796
Miscellaneous:
--------------
797
798
- It now requires knot >= 2.3.1 to link successfully.
- The API+ABI for modules changed slightly.
799
- New LRU implementation.
800

801

802
803
804
805
806
807
808
809
Knot Resolver 1.1.1 (2016-08-24)
================================

Bugfixes:
---------
 - Fix 0x20 randomization with retransmit
 - Fix pass-through for the stub mode
 - Fix the root hints IPv6 addresses
Ondřej Surý's avatar
Ondřej Surý committed
810
 - Fix dst addr for retries over TCP
811
812
813
814
815
816
817
818

Improvements:
-------------
 - Track RTT of all tried servers for faster retransmit
 - DAF: Allow forwarding to custom port
 - systemd: Read EnvironmentFile and user $KRESD_ARGS
 - systemd: Update systemd units to be named after daemon

819

820
821
822
Knot Resolver 1.1.0 (2016-08-12)
================================

823
824
825
826
827
828
829
830
831
832
833
Improvements:
-------------
 - RFC7873 DNS Cookies
 - RFC7858 DNS over TLS
 - HTTP/2 web interface, RESTful API
 - Metrics exported in Prometheus
 - DNS firewall module
 - Explicit CNAME target fetching in strict mode
 - Query minimisation improvements
 - Improved integration with systemd

834
835
836
837

Knot Resolver 1.0.0 (2016-05-30)
================================

838
839
840
Initial release:
----------------
 - The first initial release