non port: dns/unbound/pkg-plist |
Number of commits found: 75 |
Friday, 25 Apr 2025
|
11:56 Vladimir Druzenko (vvd) Author: Jaap Akkerhuis
dns/unbound: Update 1.22.0 => 1.23.0
Release notes:
https://www.nlnetlabs.nl/news/2025/Apr/24/unbound-1.23.0-released/
Changelog:
https://github.com/NLnetLabs/unbound/releases/tag/release-1.23.0
PR: 286341 263838
2a34729 |
Friday, 18 Oct 2024
|
13:18 Rodrigo Osorio (rodrigo)
dns/unbound: update to 1.22.0
Changelog: https://nlnetlabs.nl/news/2024/Oct/17/unbound-1.22.0-released/
Full changelog: https://nlnetlabs.nl/projects/unbound/download/#unbound-1-22-0
PR: 282172
Reported by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
d258c36 |
Sunday, 6 Oct 2024
|
16:16 Robert Clausecker (fuz) Author: Jaap Akkerhuis
dns/unbound: Update to version 1.21.1
- patch for users who use base OpenSSL
PR: 281894, 281804
Security: 2368755b-83f6-11ef-8d2e-a04a5edf46d9
Security: CVE-2024-8508
4af9b83 |
Friday, 16 Aug 2024
|
16:12 Vladimir Druzenko (vvd) Author: Jaap Akkerhuis
dns/unbound: Update 1.20.0 → 1.21.0
Release announcement:
https://nlnetlabs.nl/news/2024/Aug/15/unbound-1.21.0-released/
PR: 280853
MFH: 2024Q3
3fd26c3 |
Friday, 10 May 2024
|
17:59 Fernando Apesteguía (fernape) Author: Jaap Akkerhuis
dns/unbound: Uodate to 1.20.0
ChangeLog: https://nlnetlabs.nl/news/2024/May/08/unbound-1.20.0-released/
Summary of the DNSBomb vulnerability CVE-2024-33655.
The DNSBomb attack, via specially timed DNS queries and answers, can cause a
Denial of Service on resolvers and spoofed targets.
Unbound itself is not vulnerable for DoS, rather it can be used to take part in
a pulsing DoS amplification attack.
PR: 278870
Reported by: jaap@NLnetLabs.nl (maintainer)
Security: CVE-2024-33655
a478d4b |
Friday, 15 Mar 2024
|
12:29 Dan Langille (dvl) Author: Jaap Akkerhuis
dns/unbound: Update to unbound 1.19.3
This release has a number of bug fixes. The CNAME synthesized for a
DNAME record uses the original TTL, of the DNAME record, and that means
it can be cached for the TTL, instead of 0.
There is a fix that when a message was stored in cache, but one of the
RRsets was not updated due to cache policy, it now restricts the message
TTL if the cache version of the RRset has a shorter TTL. It avoids a
bug where the message is not expired, but its contents is expired.
For dnstap, it logs type DoH and DoT correctly, if that is used for
the message.
The b.root-servers.net address is updated in the default root hints.
When performing retries for failed sends, a retry at a smaller UDP size
is now not performed when that attempt is not actually smaller, and at
defaults, since the flag day changes, it is the same size. This makes
it skip the step, it is useless because there is no reduction in size.
Clients with a valid DNS Cookie will bypass the ratelimit, if one is
set. The value from ip-ratelimit-cookie is used for these queries.
Furthermore there is a fix to make correct EDE Prohibited answers for
access control denials, and a fix for EDNS client subnet scope zero
answers.
For more details, see
https://github.com/NLnetLabs/unbound/releases/tag/release-1.19.3
PR: 277686
Security: c2ad8700-de25-11ee-9190-84a93843eb75
cad8155 |
Wednesday, 14 Feb 2024
|
14:56 Cy Schubert (cy)
dns/unbound: Update to 1.19.1
Release notes at
https://www.nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
Security: CVE-2023-50387, CVE-2023-50868
Approved by: Jaap Akkerhuis <jaap@NLnetLabs.nl>
MFH: 2024Q1
efa763f |
Sunday, 28 Jan 2024
|
22:14 Muhammad Moinur Rahman (bofh)
dns/unbound: Moved man to share/man
Approved by: portmgr (blanket)
d23228f |
Monday, 13 Nov 2023
|
17:53 Fernando Apesteguía (fernape) Author: Jaap Akkerhuis
dns/unbound: Update to 1.19.0
ChangeLog: https://nlnetlabs.nl/news/2023/Nov/08/unbound-1.19.0-released/
Features
* Fix #850: [FR] Ability to use specific database in Redis, with new
redis-logical-db configuration option.
* Merge #944: Disable EDNS DO. Disable the EDNS DO flag in upstream requests.
This can be helpful for devices that cannot handle DNSSEC information. But it
should not be enabled otherwise, because that would stop DNSSEC validation.
The DNSSEC validation would not work for Unbound itself, and also not for
downstream users. Default is no. The option is disable-edns-do: no
* Expose the script filename in the Python module environment 'mod_env' instead
of the config_file structure which includes the linked list of scripts in a
multi Python module setup; fixes #79.
* Expose the configured listening and outgoing interfaces, if any, as a list of
strings in the Python 'config_file' class instead of the current Swig object
proxy; fixes #79.
* Mailing list patches from Daniel Gröber for DNS64 fallback to plain AAAA when
no A record exists for synthesis, and minor DNS64 code refactoring for better
readability.
* Merge #951: Cachedb no store. The cachedb-no-store: yes option is used to stop
cachedb from writing messages to the backend storage. It reads messages when
data is available from the backend. The default is no.
Bug Fixes
* Fix for version generation race condition that ignored changes.
* Fix #942: 1.18.0 libunbound DNS regression when built without
OpenSSL.
* Fix for WKS call to getservbyname that creates allocation on exit in unit test
by testing numbers first and testing from the services list later.
* Fix autoconf 2.69 warnings in configure.
* Fix #927: unbound 1.18.0 make test error. Fix make test without SHA1.
* Merge #931: Prevent warnings from -Wmissing-prototypes.
* Fix to scrub resource records of type A and AAAA that have an
inappropriate size. They are removed from responses.
* Fix to move msgparse_rrset_remove_rr code to util/msgparse.c.
* Fix to add EDE text when RRs have been removed due to length.
* Fix to set ede match in unit test for rr length removal.
* Fix to print EDE text in readable form in output logs.
* Fix send of udp retries when ENOBUFS is returned. It stops looping
and also waits for the condition to go away. Reported by Florian
Obser.
* Fix authority zone answers for obscured DNAMEs and delegations.
* Merge #936: Check for c99 with autoconf versions prior to 2.70.
* Fix to remove two c99 notations.
* Fix rpz tcp-only action with rpz triggers nsdname and nsip.
* Fix misplaced comment.
* Merge #881: Generalise the proxy protocol code.
* Fix #946: Forwarder returns servfail on upstream response noerror no
data.
* Fix edns subnet so that queries with a source prefix of zero cause
the recursor send no edns subnet option to the upstream.
* Fix that printout of EDNS options shows the EDNS cookie option by
name.
* Fix infinite loop when reading multiple lines of input on a broken
remote control socket. Addesses #947 and #948.
* Fix #949: "could not create control compt".
* Fix that cachedb does not warn when serve-expired is disabled about
use of serve-expired-reply-ttl and serve-expired-client-timeout.
* Fix for #949: Fix pythonmod/ubmodule-tst.py for Python 3.x.
* Better fix for infinite loop when reading multiple lines of input on
a broken remote control socket, by treating a zero byte line the
same as transmission end. Addesses #947 and #948.
* For multi Python module setups, clean previously parsed module
functions in __main__'s dictionary, if any, so that only current
module functions are registered.
* Fix #954: Inconsistent RPZ handling for A record returned along with
CNAME.
* Fixes for the DNS64 patches.
* Update the dns64_lookup.rpl test for the DNS64 fallback patch.
* Merge #955 from buevsan: fix ipset wrong behavior.
* Update testdata/ipset.tdir test for ipset fix.
* Fix to print detailed errors when an SSL IO routine fails via
SSL_get_error.
* Clearer configure text for missing protobuf-c development libraries.
* autoconf.
* Merge #930 from Stuart Henderson: add void to
log_ident_revert_to_default declaration.
* Fix #941: dnscrypt doesn't work after upgrade to 1.18 with
suggestion by dukeartem to also fix the udp_ancil with dnscrypt.
* Fix SSL compile failure for definition in log_crypto_err_io_code_arg.
* Fix SSL compile failure for other missing definitions in
log_crypto_err_io_code_arg.
* Fix compilation without openssl, remove unused function warning.
* Mention flex and bison in README.md when building from repository
source.
PR: 275012
Reported by: jaap@NLnetLabs.nl (maintainer)
bb5a92c |
Saturday, 2 Sep 2023
|
15:29 Fernando Apesteguía (fernape) Author: R. Christian McDonald
dns/unbound: update to 1.18.0
ChangeLog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-18-0
PR: 273456
Reported by: rcm@rcm.sh
Approved by: jaap@NLnetLabs.nl (maintainer)
036a47f |
Friday, 13 Jan 2023
|
21:12 Brad Davis (brd)
dns/unbound: Update to 1.17.1
The release notes can be found at:
https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-17-1
PR: 268913
Approved by: jaap@NLnetLabs.nl (maintainer)
Sponsored by: Rubicon Communications, LLC ("Netgate")
850f050 |
Sunday, 16 Oct 2022
|
17:37 Fernando Apesteguía (fernape) Author: Jaap Akkerhuis
dns/unbound: Update to 1.17.0
ChangeLog: https://www.nlnetlabs.nl/news/2022/Oct/13/unbound-1.17.0-released/
Remove additional MASTER_SITES (certificate error)
PR: 267018
Reported by: jaap@NLnetLabs.nl (maintainer)
Reviewed by: diizzy@
7b0d6de |
Thursday, 29 Sep 2022
|
05:39 Fernando Apesteguía (fernape) Author: Herbert J. Skuhra
dns/unbound: Update to 1.16.3
ChangeLog: https://nlnetlabs.nl/news/2022/Sep/21/unbound-1.16.3-released/
Fixes Non-Responsive Delegation Attack.
PR: 266654
Reported by: herbert@gojira.at
Approved by: jaap@NLnetLabs.nl (maintainer)
Security: CVE-2022-3204
2efbd2b |
Friday, 5 Aug 2022
|
18:58 Bernard Spil (brnrd)
dns/unbound: Security update to 1.6.2
PR: 265645
Reported by: Jaap Akkerhuis <jaap NLnetLabs nl> (maintainer)
Security: bc43a578-14ec-11ed-856e-d4c9ef517024
MFH: 2022Q3
9ed08e8 |
Tuesday, 12 Jul 2022
|
17:47 Fernando Apesteguía (fernape) Author: Jaap Akkerhuis
dns/unbound: Update to 1.16.1
ChangeLog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-16-1
PR: 265151
Reported by: jaap@NLnetLabs.nl (maintainer)
MFH: 2022Q3 (bugfixes)
0046203 |
Wednesday, 8 Jun 2022
|
10:33 Li-Wen Hsu (lwhsu) Author: Jaap Akkerhuis
dns/unbound: Update to 1.16.0
This release has EDE support, for extended EDNS error reporting,
it fixes unsupported ZONEMD algorithms to load, and has more bug fixes.
The EDE errors can be turned on by `ede: yes`, it is default disabled.
Validation errors and other errors are then reported. If you also want
stale answers for expired responses to have an error code, the option
`ede-serve-expired: yes` can be used.
On request, the port now also has dnscrypt support default enabled.
PR: 264538
993f58d |
Thursday, 17 Feb 2022
|
21:21 Dries Michiels (driesm) Author: Jaap Akkerhuis
dns/unbound: Update to 1.15.0
[The Makefile of the port got cleaned up to make portfmt happy]
This release has bug fixes for crashes that happened on heavy network
usage. The default for the aggressive-nsec option has changed, it is now
enabled.
The ratelimit logic had to be reworked for the crash fixes. As a result,
there are new options to control the behaviour of ratelimiting.
The ratelimit-backoff and ip-ratelimit-backoff options can be used to
control how severe the backoff is when the ratelimit is exceeded.
The rpz-signal-nxdomain-ra option can be used to unset the RA flag, for
NXDOMAIN answers from RPZ. That is used by some clients to detect that
the domain is externally blocked. The RPZ option for-downstream can be
used like for auth zones, this allows the RPZ zone information to be
queried. That can be useful for monitoring scripts.
Features
- Fix #596: unset the RA bit when a query is blocked by an unbound
RPZ nxdomain reply. The option rpz-signal-nxdomain-ra allows to
signal that a domain is externally blocked to clients when it
is blocked with NXDOMAIN by unsetting RA.
- Add rpz: for-downstream: yesno option, where the RPZ zone is
authoritatively answered for, so the RPZ zone contents can be
checked with DNS queries directed at the RPZ zone.
- Merge PR #616: Update ratelimit logic. It also introduces
ratelimit-backoff and ip-ratelimit-backoff configuration options.
- Change aggressive-nsec default to yes.
Bug Fixes
- Fix compile warning for if_nametoindex on windows 64bit.
- Merge PR #581 from fobser: Fix -Wmissing-prototypes and -Wshadow
warnings in rpz.
- Fix validator debug output about DS support, print correct algorithm.
- Add code similar to fix for ldns for tab between strings, for
consistency, the test case was not broken.
- Allow local-data for classes other than IN to inherit a configured
local-zone's type if possible, instead of defaulting to type
transparent as per the implicit rule.
- Fix to pick up other class local zone information before unlock.
- Add missing configure flags for optional features in the
documentation.
- Fix Unbound capitalization in the documentation.
- Fix #591: Unbound-anchor manpage links to non-existent license file.
- contrib/aaaa-filter-iterator.patch file renewed diff content to
apply cleanly to the current coderepo for the current code version.
- Fix to add test for rpz-signal-nxdomain-ra.
- Fix #596: only unset RA when NXDOMAIN is signalled.
- Fix that RPZ does not set RD flag on replies, it should be copied
from the query.
- Fix for #596: fix that rpz return message is returned and not just
the rcode from the iterator return path. This fixes signal unset RA
after a CNAME.
- Fix unit tests for rpz now that the AA flag returns successfully from
the iterator loop.
- Fix for #596: add unit test for nsdname trigger and signal unset RA.
- Fix for #596: add unit test for nsip trigger and signal unset RA.
- Fix #598: Fix unbound-checkconf fatal error: module conf
'respip dns64 validator iterator' is not known to work.
- Fix for #596: Fix rpz-signal-nxdomain-ra to work for clientip
triggered operation.
- Merge #600 from pemensik: Change file mode before changing file
owner.
- Fix prematurely terminated TCP queries when a reply has the same ID.
- For #602: Allow the module-config "subnetcache validator cachedb
iterator".
- Fix EDNS to upstream where the same option could be attached
more than once.
- Add a region to serviced_query for allocations.
- For dnstap, do not wakeupnow right there. Instead zero the timer to
force the wakeup callback asap.
- Fix #610: Undefine-shift in sldns_str2wire_hip_buf.
- Fix #588: Unbound 1.13.2 crashes due to p->pc is NULL in
serviced_udp_callback.
- Merge PR #612: TCP race condition.
- Test for NSID in SERVFAIL response due to DNSSEC bogus.
- Fix #599: [FR] RFC 9156 (obsoletes RFC 7816), by noting the new RFC
document.
- Fix tls-* and ssl-* documented alternate syntax to also be available
through remote-control and unbound-checkconf.
- Better cleanup on failed DoT/DoH listening socket creation.
- iana portlist update.
- Fix review comment for use-after-free when failing to send UDP out.
- Merge PR #603 from fobser: Use OpenSSL 1.1 API to access DSA and RSA
internals.
- Merge PR #532 from Shchelk: Fix: buffer overflow bug.
- Merge PR #617: Update stub/forward-host notation to accept port and
tls-auth-name.
- Update stream_ssl.tdir test to also use the new forward-host
notation.
- Fix header comment for doxygen for authextstrtoaddr.
- please clang analyzer for loop in test code.
- Fix docker splint test to use more portable uname.
- Update contrib/aaaa-filter-iterator.patch with diff for current
software version.
- Fix for #611: Integer overflow in sldns_wire2str_pkt_scan.
PR: 261888
cfd10e7 |
Tuesday, 14 Dec 2021
|
21:06 Cy Schubert (cy) Author: Jaap Akkerhuis
dns/unbound: Update to 1.14.0
Changelog:
This release contains bug fixes and a full set of RPZ triggers and
actions that are supported. This works with RPZ zones, configured with
`rpz:`.
It is possible to selectively enable use of TCP for stub zones and
forward zones, without having enable it server wide, by enabling it
with the `stub-tcp-upstream: yes` and `forward-tcp-upstream: yes` options.
The added contrib/Dockerfile.tests from ziollek can be used to setup
a Docker environment to run tests in. The documentation is in the
doc/README.tests file.
If openssl it installed with different versions, you can set the
location as `--with-ssl=/usr/include/openssl11` and it then detects the
use of the lib dir split off in /usr/lib64/openssl11 with regex. This is
useful if to pass to configure if openssl is installed in such a manner.
The option `outbound-msg-retry` can be used to select the number of
retries when a non-positive response is received. It is best left at
default, but when the upstream is known to not need retries, it can be
lowered, because in that case the upstream is performing the retry for
non-positive responses.
The domain `home.arpa.` is set by default as blocked, as per RFC8375. If
you want to use it, unblock it with a local-zone nodefault statement, or
use another type of local-zone to override it with your choice.
In the config it is possible to enter IPv6 scope-id values with
interface names, instead of a number, for link-local addresses.
Features
- Merge #401: RPZ triggers. This add additional RPZ triggers,
unbound supports a full set of rpz triggers, and this now
includes nsdname, nsip and clientip triggers. Also actions
are fully supported, and this now includes the tcp-only action.
- Merge #519: Support for selective enabling tcp-upstream for
stub/forward zones.
- Merge PR #514, from ziollek: Docker environment for run tests.
- Support using system-wide crypto policies.
- Fix that --with-ssl can use "/usr/include/openssl11" to pass the
location of a different openssl version.
- Merged #41 from Moritz Schneider: made outbound-msg-retry
configurable.
- Implement RFC8375: Special-Use Domain 'home.arpa.'.
- Merge PR #555 from fobser: Allow interface names as scope-id in IPv6
link-local addresses.
Bug Fixes
- Add test tool readzone to .gitignore.
- Merge #521: Update mini_event.c.
- Merge #523: fix: free() call more than once with the same pointer.
- For #519: note stub-tcp-upstream and forward-tcp-upstream in
the example configuration file.
- For #519: yacc and lex. And fix python bindings, and test program
unbound-dnstap-socket.
- For #519: fix comments for doxygen.
- Fix to print error from unbound-anchor for writing to the key
file, also when not verbose.
- For #514: generate configure.
- Fix for #431: Squelch permission denied errors for udp connect,
and udp send, they are visible at higher verbosity settings.
- Fix zonemd verification of key that is not in DNS but in the zone
and needs a chain of trust.
- zonemd, fix order of bogus printout string manipulation.
- Fix to support harden-algo-downgrade for ZONEMD dnssec checks.
- Merge PR #528 from fobser: Make sldns_str2wire_svcparam_buf()
static.
- Fix #527: not sending quad9 cert to syslog (and may be more).
- Fix sed script in ssldir split handling.
- Fix #529: Fix: log_assert does nothing if UNBOUND_DEBUG is
undefined.
- Fix #531: Fix: passed to proc after free.
- Fix #536: error: RPZ: name of record (drop.spamhaus.org.rpz.local.)
to insert into RPZ.
- Fix the stream wait stream_wait_count_lock and http2 buffer locks
setup and desetup from race condition.
- Fix RPZ locks. Do not unlock zones lock if requested and rpz find
zone does not find the zone. Readlock the clientip that is found
for ipbased triggers. Unlock the nsdname zone lock when done.
Unlock zone and ip in rpz nsip and nsdname callback. Unlock
authzone and localzone if clientip found in rpz worker call.
- Fix compile warning in libunbound for listen desetup routine.
- Fix asynclook unit test for setup of lockchecks before log.
- Fix #533: Negative responses get cached even when setting
cache-max-negative-ttl: 1
- Fix tcp fastopen failure when disabled, try normal connect instead.
- Fix #538: Fix subnetcache statistics.
- Small fixes for #41: changelog, conflicts resolved,
processQueryResponse takes an iterator env argument like other
functions in the iterator, no colon in string for set_option,
and some whitespace style, to make it similar to the rest.
- Fix for #41: change outbound retry to int to fix signed comparison
warnings.
- Fix root_anchor test to check with new icannbundle date.
- Fix initialisation errors reported by gcc sanitizer.
- Fix lock debug code for gcc sanitizer reports.
- Fix more initialisation errors reported by gcc sanitizer.
- Fix crosscompile on windows to work with openssl 3.0.0 the
link with ws2_32 needs -l:libssp.a for __strcpy_chk.
Also copy results from lib64 directory if needed.
- For crosscompile on windows, detect 64bit stackprotector library.
- Fix crosscompile shell syntax.
- Fix crosscompile windows to use libssp when it exists.
- For the windows compile script disable gost.
- Fix that on windows, use BIO_set_callback_ex instead of deprecated
BIO_set_callback.
- Fix crosscompile script for the shared build flags.
- Fix to add example.conf note for outbound-msg-retry.
- Fix chaos replies to have truncation for short message lengths,
or long reply strings.
- Fix to protect custom regional create against small values.
- Fix #552: Unbound assumes index.html exists on RPZ host.
- Fix that forward-zone name is documented as the full name of the
zone. It is not relative but a fully qualified domain name.
- Fix analyzer review failure in rpz action override code to not
crash on unlocking the local zone lock.
- Fix to remove unused code from rpz resolve client and action
function.
- Merge #565: unbound.service.in: Disable ProtectKernelTunables again.
- Fix for #558: fix loop in comm_point->tcp_free when a comm_point is
reclaimed more than once during callbacks.
- Fix for #558: clear the UB_EV_TIMEOUT bit before adding an event.
- Improve EDNS option handling, now also works for synthesised
responses such as local-data and server.id CH TXT responses.
- Merge PR #570 from rex4539: Fix typos.
- Fix for #570: regen aclocal.m4, fix configure.ac for spelling.
- Fix to make python module opt_list use opt_list_in.
- Fix #574: unbound-checkconf reports fatal error if interface names
are used as value for interfaces:
- Fix #574: Review fixes for it.
- Fix #576: [FR] UB_* error codes in unbound.h
- Fix #574: Review fix for spelling.
- Fix to remove git tracking and ci information from release tarballs.
- iana portlist update.
- Merge PR #511 from yan12125: Reduce unnecessary linking.
- Merge PR #493 from Jaap: Fix generation of libunbound.pc.
- Merge PR #562 from Willem: Reset keepalive per new tcp session.
- Merge PR #522 from sibeream: memory management violations fixed.
- Merge PR #530 from Shchelk: Fix: dereferencing a null pointer.
- Fix #454: listen_dnsport.c:825: error: ‘IPV6_TCLASS’ undeclared.
- Fix #574: Review fixes for size allocation.
- Fix doc/unbound.doxygen to remove obsolete tag warning.
PR: 260360, 260417
Reported by: Jaap Akkerhuis <jaap@NLnetLabs.nl>
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl>
0d90eb7 |
Monday, 16 Aug 2021
|
23:18 Renato Botelho (garga) Author: Jaap Akkerhuis
dns/unbound: Update to 1.13.2
Added a new option DEP-RSA1024 to enable --with-deprecate-rsa-1024
Changelog:
- Merge PR #317: ZONEMD Zone Verification, with RFC 8976 support.
ZONEMD records are checked for zones loaded as auth-zone,
with DNSSEC if available. There is an added option
zonemd-permissive-mode that makes it log but not fail wrong zones.
With zonemd-reject-absence for an auth-zone the presence of a
zonemd can be mandated for specific zones.
- Fix: Resolve interface names on control-interface too.
- Merge #470 from edevil: Allow configuration of persistent TCP
connections.
- Fix #474: always_null and others inside view.
- Add that log-servfail prints an IP address and more information
about one of the last failures for that query.
- Merge #478: Allow configuration of TCP timeout while waiting for
response.
- Add ./configure --with-deprecate-rsa-1024 that turns off RSA 1024.
- Move the NSEC3 max iterations count in line with the 150 value
used by BIND, Knot and PowerDNS. This sets the default value
for it in the configuration to 150 for all key sizes.
- zonemd-check: yesno option, default no, enables the processing
of ZONEMD records for that zone.
- Merge #486 by fobster: Make VAL_MAX_RESTART_COUNT configurable.
- Merge PR #491: Add SVCB and HTTPS types and handling according to
draft-ietf-dnsop-svcb-https.
- Introduce 'http-user-agent:' and 'hide-http-user-agent:' options.
PR: 257809
Sponsored by: Rubicon Communications, LLC ("Netgate")
42ac7e7 |
Tuesday, 9 Feb 2021
|
19:49 nc
dns/unbound: Update to 1.13.1
Changes: https://nlnetlabs.nl/news/2021/Feb/09/unbound-1.13.1-released/
PR: 253376
Submitted by: Jaap Akkerhuis <jaap AT NLnetLabs DOT nl> (maintainer)
 |
Saturday, 12 Dec 2020
|
16:54 brnrd
dns/unbound: Security update to 1.13.0
* Sort options and port_docs while here
PR: 251563
Submitted by: Jaap Akkerhuis <jaap nlnetlabs nl> (maintainer)
Approved by: maintainer (implicit)
MFH: 2020Q4
Security: 388ebb5b-3c95-11eb-929d-d4c9ef517024
 |
Monday, 12 Oct 2020
|
15:33 garga
dns/unbound: Update to 1.12.0
PR: 250199
Submitted by: maintainer
Sponsored by: Rubicon Communications, LLC (Netgate)
 |
Friday, 21 Aug 2020
|
14:17 lwhsu
dns/unbound: Update to 1.11.0
PR: 248808
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
 |
Tuesday, 19 May 2020
|
19:02 delphij
dns/unbound: update to 1.10.1.
PR: 246569
Submitted by: Jaap Akkerhuis (maintainer)
MFH: 2020Q2
Security: CVE-2020-12662, CVE-2020-12663
 |
Saturday, 22 Feb 2020
|
13:59 pi
dns/unbound: update 1.9.6 -> 1.10.0
PR: 244244
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Relnotes: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=244244#c0
 |
Monday, 16 Dec 2019
|
09:44 joneum
Update to 1.9.6
PR: 242603
Sponsored by: Netzkommune GmbH
 |
Saturday, 23 Nov 2019
|
12:54 joneum
Update to 1.9.5
Changelog:
https://nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-ipsec-module
PR: 242075
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
MFH: 2019Q4
Sponsored by: Netzkommune GmbH
 |
Thursday, 3 Oct 2019
|
19:28 sunpoet
Update to 1.9.4
Changes: https://github.com/NLnetLabs/unbound/blob/master/doc/Changelog
PR: 241033
Reported by: C <cm@appliedprivacy.net>
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Security: 108a4be3-e612-11e9-9963-5f1753e0aca0
MFH: 2019Q4
 |
Monday, 2 Sep 2019
|
16:31 swills
dns/unbound: update to 1.9.3
Whil here, improve rc script
PR: 240163
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
 |
Wednesday, 19 Jun 2019
|
04:56 joneum
Update to 1.9.2
PR: 238651
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
Sponsored by: Netzkommune GmbH
 |
Monday, 18 Mar 2019
|
11:35 swills
dns/unbound: update to 1.9.1
PR: 236575
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
 |
Tuesday, 5 Feb 2019
|
14:27 sunpoet
Update to 1.9.0
Changes: https://www.nlnetlabs.nl/svn/unbound/tags/release-1.9.0/doc/Changelog
PR: 235522
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
 |
Wednesday, 26 Dec 2018
|
22:20 swills
dns/unbound: Update to 1.8.3
PR: 233933
Submitted by: jaap@NLnetLabs.nl
 |
Sunday, 9 Dec 2018
|
01:06 swills
dns/unbound: Update to 1.8.2
PR: 233796
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Monday, 8 Oct 2018
|
17:29 swills
dns/unbound upgrade to 1.8.1
PR: 232070
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Tuesday, 18 Sep 2018
|
18:24 swills
dns/unbound: update to 1.8.0
Bump PORTREVISION on consumers due to library major version change
PR: 231283
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Thursday, 21 Jun 2018
|
21:12 sunpoet
Update to 1.7.3
Changes: https://www.nlnetlabs.nl/svn/unbound/tags/release-1.7.3/doc/Changelog
PR: 229202
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
 |
Thursday, 14 Jun 2018
|
23:22 swills
dns/unbound: upgrade to 1.7.2
PR: 228889
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Thursday, 10 May 2018
|
14:50 miwi
- Update to 2.5.9
- Update WWW
PR: 227949
Submitted by: maintainer
Sponsored by: iXsystems Inc.
 |
Wednesday, 21 Mar 2018
|
17:00 pi
dns/unbound: upgrade 1.6.8 -> 1.7.0
Features
- auth-zone provides a way to configure RFC7706 from unbound.conf,
eg. with auth-zone: name: "." for-downstream: no for-upstream: yes
fallback-enabled: yes and masters or a zonefile with data.
- Aggressive use of NSEC implementation. Use cached NSEC records to
generate NXDOMAIN, NODATA and positive wildcard answers.
- Accept tls-upstream in unbound.conf, the ssl-upstream keyword is
also recognized and means the same. Also for tls-port,
tls-service-key, tls-service-pem, stub-tls-upstream and
forward-tls-upstream.
- [dnscrypt] introduce dnscrypt-provider-cert-rotated option,
from Manu Bretelle.
This option allows handling multiple cert/key pairs while only
distributing some of them.
In order to reliably match a client magic with a given key without
strong assumption as to how those were generated, we need both key and
cert. Likewise, in order to know which ES version should be used.
On the other hand, when rotating a cert, it can be desirable to only
serve the new cert but still be able to handle clients that are still
using the old certs's public key.
The `dnscrypt-provider-cert-rotated` allow to instruct unbound to not
publish the cert as part of the DNS's provider_name's TXT answer.
- Update B root ipv4 address.
- make ip-transparent option work on OpenBSD.
- Fix #2801: Install libunbound.pc.
- ltrace.conf file for libunbound in contrib.
- Fix #3598: Fix swig build issue on rhel6 based system.
configure --disable-swig-version-check stops the swig version check.
Bug Fixes
- Fix #1749: With harden-referral-path: performance drops, due to
circular dependency in NS and DS lookups.
- [dnscrypt] prevent dnscrypt-secret-key, dnscrypt-provider-cert
duplicates
- Better documentation for cache-max-negative-ttl.
- Fixed libunbound manual typo.
- Fix #1949: [dnscrypt] make provider name mismatch more obvious.
- Fix #2031: Double included headers
- Document that errno is left informative on libunbound config read
fail.
- iana port update.
- Fix #1913: ub_ctx_config is under circumstances thread-safe.
- Fix #2362: TLS1.3/openssl-1.1.1 not working.
- Fix #2034 - Autoconf and -flto.
- Fix #2141 - for libsodium detect lack of entropy in chroot, print
a message and exit.
- Fix #2492: Documentation libunbound.
- Fix #2882: Unbound behaviour changes (wrong) when domain-insecure is
set for stub zone. It no longer searches for DNSSEC information.
- Fix #3299 - forward CNAME daisy chain is not working
- Fix link failure on OmniOS.
- Check whether --with-libunbound-only is set when using --with-nettle
or --with-nss.
- Fix qname-minimisation documentation (A QTYPE, not NS)
- Fix that DS queries with referral replies are answered straight
away, without a repeat query picking the DS from cache.
The correct reply should have been an answer, the reply is fixed
by the scrubber to have the answer in the answer section.
- Fix that expiration date checks don't fail with clang -O2.
- Fix queries being leaked above stub when refetching glue.
- Copy query and correctly set flags on REFUSED answers when cache
snooping is not allowed.
- make depend: code dependencies updated in Makefile.
- Fix #3397: Fix that cachedb could return a partial CNAME chain.
- Fix #3397: Fix that when the cache contains an unsigned DNAME in
the middle of a cname chain, a result without the DNAME could
be returned.
- Fix that unbound-checkconf -f flag works with auto-trust-anchor-file
for startup scripts to get the full pathname(s) of anchor file(s).
- Print fatal errors about remote control setup before log init,
so that it is printed to console.
- Use NSEC with longest ce to prove wildcard absence.
- Only use *.ce to prove wildcard absence, no longer names.
- Fix unfreed locks in log and arc4random at exit of unbound.
- Fix lock race condition in dns cache dname synthesis.
- Fix #3451: dnstap not building when you have a separate build dir.
And removed protoc warning, set dnstap.proto syntax to proto2.
- Added tests with wildcard expanded NSEC records (CVE-2017-15105 test)
- Unit test for auth zone https url download.
- tls-cert-bundle option in unbound.conf enables TLS authentication.
- Fixes for clang static analyzer, the missing ; in
edns-subnet/addrtree.c after the assert made clang analyzer
produce a failure to analyze it.
- Fix #3505: Documentation for default local zones references
wrong RFC.
- Fix #3494: local-zone noview can be used to break out of the view
to the global local zone contents, for queries for that zone.
- Fix for more maintainable code in localzone.
- more robust cachedump rrset routine.
- Save wildcard RRset from answer with original owner for use in
aggressive NSEC.
- Fixup contrib/fastrpz.patch so that it applies.
- Fix compile without threads, and remove unused variable.
- Fix compile with staticexe and python module.
- Fix nettle compile.
- Fix to check define of DSA for when openssl is without deprecated.
- iana port update.
- Fix #3582: Squelch address already in use log when reuseaddr option
causes same port to be used twice for tcp connections.
- Reverted fix for #3512, this may not be the best way forward;
although it could be changed at a later time, to stay similar to
other implementations.
- Fix for windows compile.
- Fixed contrib/fastrpz.patch, even though this already applied
cleanly for me, now also for others.
- patch to log creates keytag queries, from A. Schulze.
- patch suggested by Debian lintian: allow to -> allow one to, from
A. Schulze.
- Attempt to remove warning about trailing whitespace.
- Added documentation for aggressive-nsec: yes.
PR: 226822
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Friday, 19 Jan 2018
|
16:27 dbaio
dns/unbound: Update to 1.6.8, Fixes security vulnerability
PR: 225313
Submitted by: jaap@NLnetLabs.nl (maintainer)
MFH: 2018Q1
Security: 8d3bae09-fd28-11e7-95f2-005056925db4
 |
Thursday, 12 Oct 2017
|
14:44 dbaio
dns/unbound: Update to 1.6.7
Changes: http://www.unbound.net/pipermail/unbound-users/2017-October/004972.html
PR: 222941
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Friday, 22 Sep 2017
|
00:51 dbaio
dns/unbound: Update to 1.6.6
Changes: http://www.unbound.net/pipermail/unbound-users/2017-September/004936.html
PR: 222503
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Monday, 21 Aug 2017
|
21:45 swills
dns/unbound: Upgrade to 1.6.5
PR: 221692
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Wednesday, 12 Jul 2017
|
22:44 dbaio
dns/unbound: Update to 1.6.4
Changes: http://www.unbound.net/pipermail/unbound-users/2017-June/004818.html
PR: 220673
Submitted by: jaap@NLnetLabs.nl (maintainer)
Approved by: garga (mentor, implicit)
 |
Tuesday, 13 Jun 2017
|
20:37 adamw
Update unbound to 1.6.3.
This release fixes a spurious assertion failure when unbound receives a
malformed packet with 0x20 enabled.
Bug Fixes
- Fix #1280: Unbound fails assert when response from authoritative
contains malformed qname. When 0x20 caps-for-id is enabled, when
assertions are not enabled the malformed qname is handled correctly.
PR: 219958
Submitted by: maintainer (jaap NLnetLabs nl)
 |
Saturday, 29 Apr 2017
|
20:59 pi
dns/unbound: update 1.6.1 -> 1.6.2
PR: 218872
Changes: http://www.unbound.net/pipermail/unbound-users/2017-April/004762.html
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Wednesday, 8 Mar 2017
|
01:48 wen
- Update to 1.6.1
PR: 217614
Submitted by: jaap@NLnetLabs.nl(maintainer)
 |
Saturday, 17 Dec 2016
|
13:20 sunpoet
- Update to 1.6.0
- Do not silence installation message
- While I'm here:
- Move LIB_DEPENDS upwards
- Use = instead of += for CONFIGURE_ARGS and USES
- Convert to options helper
- Use TEST_TARGET
Changes: https://unbound.nlnetlabs.nl/pipermail/unbound-users/2016-December/004587.html
PR: 215322
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
 |
Sunday, 2 Oct 2016
|
10:30 pawel
Update to version 1.5.10
In this release there is a fix for long downtime after connectivity
loss, which was a longstanding unsolved issue. Features for tcp, TCP
Fast Open and timeout pressure to close connections when the tcp
connections are getting full. Option to use ipv6 /64 for extra entropy.
Features
- Create a pkg-config file for libunbound in contrib.
- TCP Fast open patch from Sara Dickinson.
- Finegrained localzone control with define-tag, access-control-tag,
access-control-tag-action, access-control-tag-data, local-zone-tag, and
local-zone-override. And added types always_transparent, always_refuse,
always_nxdomain with that.
- If more than half of tcp connections are in use, a shorter timeout
is used (200 msec, vs 2 minutes) to pressure tcp for new connects.
- [bugzilla: 787 ] Fix #787: outgoing-interface netblock/64 ipv6
option to use linux freebind to use 64bits of entropy for every query
with random local part.
- For #787: prefer-ip6 option for unbound.conf prefers to send
upstream queries to ipv6 servers.
- Add default root hints for IPv6 E.ROOT-SERVERS.NET, 2001:500:a8::e.
- keep debug symbols in windows build.
PR: 213043
Submitted by: maintainer
 |
Wednesday, 24 Aug 2016
|
15:11 mat
Do not auto-enable unbound munin plugins when installing unbound.
PR: 211999
Submitted by: maintainer
Reported by: wollman
Sponsored by: Absolight
 |
Saturday, 18 Jun 2016
|
21:53 rm
dns/unbound: update to 1.5.9
PR: 210257
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Tuesday, 15 Mar 2016
|
06:19 ohauer
- Update unbound to version 1.5.8
- add OPTION for DNSTAP logging support
- rename OPTION s/MUNIN/MUNIN_PLUGIN/ so it is consistent with nsd
- use OPTIONS_SUB
- use ${opt}_target
- use @sample macro for unbound.conf
- sort pkg-plist
Features
- ip-transparent option for FreeBSD with IP_BINDANY socket option.
- insecure-lan-zones: yesno config option, patch from Dag-Erling Smorgrav.
- RR Type CSYNC support RFC 7477, in debug printout and config input.
- RR Type OPENPGPKEY support (draft-ietf-dane-openpgpkey-07).
- [bugzilla: 731 ] tcp-mss, outgoing-tcp-mss options for unbound.conf, patch
from Daisuke Higashi.
- Support RFC7686: handle ".onion" Special-Use Domain. It is blocked by
default, andcan be unblocked with "nodefault" localzone config.
- ub_ctx_set_stub() function for libunbound to config stub zones.
The release fixes line endings in the unbound-control-setup script, and
a potential gost-hash validation failure and handles the ".onion" domain
to avoid privacy leakage.
PR: 207948
Submitted by: jaap@NLnetLabs.nl (maintainer)
 |
Thursday, 4 Feb 2016
|
15:58 erwin
- Update unbound to 1.5.7
- Bump PORTREVISIOn on dependent ports
Some Upgrade Notes:
This release fixes a validation failure for nodata with wildcards and
emptynonterminals. Fixes OpenSSL Library compability. Fixes correct
response for malformed EDNS queries. For crypto in libunbound there is
libnettle support.
Qname minimisation is implemented. Use qname-minimisation: yes to
enable it. This version sends the full query name when an error is
found for intermediate names. It should therefore not fail for names
on nonconformant servers. It combines well with
harden-below-nxdomain: yes because those nxdomains are probed by the
qname minimisation, and that will both stop privacy sensitive traffic
and reduce nonsense traffic to authority servers. So consider
enabling both. In this implementation IPv6 reverse lookups add
several labels per increment, because otherwise those lookups would be
very slow. [ Reference
https://tools.ietf.org/html/draft-ietf-dnsop-qname-minimisation-08 ]
More details at <http://unbound.net>
PR: 206347
Submitted by: Jaap Akkerhuis <jaap@NLnetLabs.nl>
Approved by: maintainer timeout
Sponsored by: DK Hostmaster A/S
 |
Sunday, 11 Oct 2015
|
12:58 sem
- Update to 1.5.5
 |
Monday, 17 Aug 2015
|
19:31 sem
- Update to 1.5.4
- Disable FILTER_AAAA option. The patch is obsolated.
PR: 202385
Submitted by: edwin
 |
Sunday, 3 May 2015
|
14:21 bapt
Use @dir mechanisms to ensure etc/unbound belongs to the unbound user
 |
Thursday, 12 Mar 2015
|
14:47 sem
- Update to 1.5.3
PR: 198538
Submitted by: garga
 |
Thursday, 19 Feb 2015
|
17:55 sem
- Update to 1.5.2
 |
Wednesday, 10 Dec 2014
|
13:44 sem
- Do not remove /var/run/unbound for smooth upgrading.
PR: 195846
Submitted by: roberto
 |
Tuesday, 9 Dec 2014
|
17:11 sem
- Fix build with python
- Fix plist
PR: 195803
 |
Friday, 5 Dec 2014
|
18:52 sem
- Update to 1.5.0
- Removed FreeBSD 10 check for libevent, because of upstream fixes (as stated in
changelog)
- Converted files/patch-Makefile.in to sed patch, which is position independent
PR: 195674
Submitted by: lightside@gmx.com
 |
Monday, 27 Oct 2014
|
12:13 bapt
Cleanup plist
 |
Wednesday, 27 Aug 2014
|
06:32 koobs
dns/unbound: Fix packaging with PYTHON option enabled
- Fix packaging with PYTHON option enabled
While I'm here, pet portlint.
PR: 193057
Reported by: Jaret Bartsch <jaretbartsch at yahoo dot ca>
Reviewed by: antoine
Approved by: portmgr (blanket: packaging)
 |
Friday, 22 Aug 2014
|
09:06 amdmi3
- Switch dns/unbound to USES=libtool, drop .la files
- Bump dependent ports as .so version has changed
- While here, add LICENSE_FILE to dns/getdns
Approved by: portmgr blanket
 |
Tuesday, 4 Mar 2014
|
15:51 zi
- Add STAGE support
- Fix build with custom LOCALBASE/PREFIX
- Add ability to specify flags to unbound-anchor via unbound_anchorflags in
rc.conf (useful for when /etc/resolv.conf only contains 127.0.0.1)
- Bump PORTREVISION
PR: ports/187239
Submitted by: zi@
Approved by: sem@ (maintainer)
 |
Monday, 23 Sep 2013
|
02:39 sem
- Update to 1.4.21
 |
Tuesday, 26 Jun 2012
|
17:44 zi
- Add Munin Support [1]
- Add LICENSE
- Fix ECDSA Support
- Convert to OptionsNG
- Pacify portlint(1)
- Stylistic changes
- Remove pkg-install/pkg-deinstall files
PR: ports/156015
Submitted by: Takefu <takefu@airport.fm> [1]
Approved by: sem@ (maintainer)
 |
Friday, 27 Jan 2012
|
09:40 sem
- Fix plist
Submitted by: dougb
 |
Tuesday, 9 Nov 2010
|
14:09 sem
- Update to 1.4.7
* It uses GOST by default and depends on port's openssl 1.0.0
(may be turned off by an option).
 |
Thursday, 17 Dec 2009
|
12:45 sem
- Update to 1.4.1
- Use --disable-sha2 on 6.4 because of broken OpenSSL in base.
 |
Tuesday, 16 Jun 2009
|
13:35 sem
- Update to 1.3.0
 |
Wednesday, 19 Nov 2008
|
20:59 sem
- Update to 1.1.0
 |
Wednesday, 21 May 2008
|
17:12 sem
- Update to 1.0
 |
Tuesday, 29 Apr 2008
|
07:35 sem
- New port: dns/unbound
Unbound is designed as a set of modular components, so that also
DNSSEC (secure DNS) validation and stub-resolvers (that do not run as
a server, but are linked into an application) are easily possible.
Goals:
* A validating recursive DNS resolver.
* Code diversity in the DNS resolver monoculture.
* Drop-in replacement for BIND apart from config.
* DNSSEC support.
* Fully RFC compliant.
* High performance
o even with validation.
* Used as (Only the first 15 lines of the commit message are shown above )
 |
Number of commits found: 75 |