Skip to content
Snippets Groups Projects
  1. Jul 27, 2020
  2. Jul 16, 2020
  3. Jul 15, 2020
  4. Jul 10, 2020
  5. Jul 08, 2020
  6. Jul 03, 2020
    • Tomas Krizek's avatar
      daemon: don't drop capabilities when running as root · 15d5b3d1
      Tomas Krizek authored and Vladimír Čunát's avatar Vladimír Čunát committed
      When the effective user is root, no capabilities are dropped. This
      change has no effect when running as non-privileged user or when
      switching to non-privileged user via user() in config.
      
      Dropping capabilities as a root user resulted in the following
      unexpected behaviour:
      
      1. When using trust anchor update, r/w access to root keys is neeeded.
         These are typically owned by knot-resolver user. When kresd is
         executed as root and capabilities are dropped, this file was no longer
         writable, because it is owned by knot-resolver, not root.
      2. It is impossible to recreate/resize cache due to the same permission
         issue as above.
      
      If you want to drop capabilities when starting kresd as a root user,
      you can switch the user with the `user()` command. This changes the
      effective user ID and drops any capabilities as well.
      Verified
      15d5b3d1
  7. May 27, 2020
  8. May 26, 2020
  9. May 25, 2020
  10. May 18, 2020
  11. May 13, 2020
  12. May 08, 2020
  13. May 07, 2020
  14. May 06, 2020
  15. Apr 27, 2020
  16. Apr 24, 2020
  17. Apr 15, 2020
    • Petr Špaček's avatar
      lua: properly initialize random number generator · 4b7050ba
      Petr Špaček authored
      Formerly multiple instances could use the same seed,
      which prevented the retry logic in Lua modules (e.g. prefill) from
      retrying at different times.
      
      AFAIK security impact is zero aside from potential thundering-herd
      problem with many kresd instances.
      Verified
      4b7050ba
  18. Apr 14, 2020
  19. Apr 02, 2020
  20. Apr 01, 2020
    • Tomas Krizek's avatar
      daemon: decrease tcp backlog to 128 · 6e0c68be
      Tomas Krizek authored and Vladimír Čunát's avatar Vladimír Čunát committed
      From our TCP benchmarks, values over 128 don't seem to have any
      measurable benefits, even with hundreds of thousands of connections.
      
      On the contrary, during very high TCP and CPU load, smaller backlog
      seems to dramatically improve latency for clients that keep idle TCP
      connections.
      
      During normal/low load, smaller backlog doesn't seem to have any
      benefits.
      
      When measured against "aggressive" clients that immediately close the
      TCP connection once their query is answered, backlog smaller than 128
      was measured to hurt performance.
      
      The application's backlog size is ultimately limited by
      net.core.somaxconn, which has been set to 128 prior to Linux 5.4.
      Therefore, this change only affects newer kernels and those who have
      manually set this value to a higher size.
      
      For more, see
      https://gitlab.labs.nic.cz/knot/knot-resolver/-/merge_requests/968
      Verified
      6e0c68be
  21. Mar 27, 2020
  22. Mar 26, 2020
  23. Mar 25, 2020