Merge branch 'michal/prepare-documentation-for-bind-9.18.11' into 'security-v9_18'
Prepare documentation for BIND 9.18.11 See merge request isc-private/bind9!493
This commit is contained in:
7
CHANGES
7
CHANGES
@@ -13,9 +13,6 @@
|
||||
exceeded, and the XML and JSON statistics version
|
||||
numbers have been updated. (CVE-2022-3094) [GL #3523]
|
||||
|
||||
6063. [bug] Revert a change that limited to honour single
|
||||
read for TLSDNS as it broke XoT. [GL #3772]
|
||||
|
||||
6062. [func] The DSCP implementation, which has been
|
||||
nonfunctional for some time, is now marked as
|
||||
obsolete and the implementation has been removed.
|
||||
@@ -74,7 +71,9 @@
|
||||
[GL !7206]
|
||||
|
||||
5830. [func] Implement incremental resizing of isc_ht hash tables to
|
||||
perform the rehashing gradually. [GL #3212]
|
||||
perform the rehashing gradually. The catalog zone
|
||||
implementation has been optimized to work with hundreds
|
||||
of thousands of member zones. [GL #3212] [GL #3744]
|
||||
|
||||
--- 9.18.10 released ---
|
||||
|
||||
|
||||
@@ -35,7 +35,7 @@ information about each release, and source code.
|
||||
|
||||
.. include:: ../notes/notes-known-issues.rst
|
||||
|
||||
.. include:: ../notes/notes-current.rst
|
||||
.. include:: ../notes/notes-9.18.11.rst
|
||||
.. include:: ../notes/notes-9.18.10.rst
|
||||
.. include:: ../notes/notes-9.18.9.rst
|
||||
.. include:: ../notes/notes-9.18.8.rst
|
||||
|
||||
@@ -250,7 +250,7 @@ at a very high level, looking up the name ``www.isc.org`` :
|
||||
|
||||
Let's take a quick break here and look at what we've got so far...
|
||||
how can our server trust this answer? If a clever attacker had taken over
|
||||
the ``isc.org`` name server(s), or course she would send matching
|
||||
the ``isc.org`` name server(s), of course she would send matching
|
||||
keys and signatures. We need to ask someone else to have confidence
|
||||
that we are really talking to the real ``isc.org`` name server. This
|
||||
is a critical part of DNSSEC: at some point, the DNS administrators
|
||||
|
||||
@@ -55,46 +55,54 @@ New Features
|
||||
Removed Features
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
- The Differentiated Services Code Point (DSCP) feature in BIND
|
||||
has been non-operational since the new Network Manager was introduced
|
||||
in BIND 9.16. It is now marked as obsolete, and vestigial code
|
||||
implementing it has been removed. Configuring DSCP values in
|
||||
``named.conf`` will cause a warning to be logged. :gl:`#3773`
|
||||
- The Differentiated Services Code Point (DSCP) feature in BIND has been
|
||||
non-operational since the new Network Manager was introduced in BIND
|
||||
9.16. It is now marked as obsolete, and vestigial code implementing it
|
||||
has been removed. Configuring DSCP values in ``named.conf`` now causes
|
||||
a warning to be logged. :gl:`#3773`
|
||||
|
||||
Feature Changes
|
||||
~~~~~~~~~~~~~~~
|
||||
|
||||
- None.
|
||||
- The catalog zone implementation has been optimized to work with
|
||||
hundreds of thousands of member zones. :gl:`#3212` :gl:`#3744`
|
||||
|
||||
Bug Fixes
|
||||
~~~~~~~~~
|
||||
|
||||
- TLS session resumption might lead to handshake failures when client
|
||||
certificates are used for authentication (Mutual TLS). This has
|
||||
been fixed. :gl:`#3725`
|
||||
- A rare assertion failure was fixed in outgoing TCP DNS connection
|
||||
handling. :gl:`#3178` :gl:`#3636`
|
||||
|
||||
- When an outgoing request timed out, the ``named`` would retry up to three
|
||||
times with the same server instead of trying a next available name server.
|
||||
This has been fixed. :gl:`#3637`
|
||||
- Large zone transfers over TLS (XoT) could fail. This has been fixed.
|
||||
:gl:`#3772`
|
||||
|
||||
- Recently used ADB names and ADB entries (IP addresses) could get cleaned when
|
||||
ADB would be under memory pressure. To mitigate this, count only actual ADB
|
||||
names and ADB entries into the overmem memory limit (exclude internal memory
|
||||
structures used for "housekeeping") and exclude recently used (<= 10 seconds)
|
||||
ADB names and entries from the overmem memory cleaner. :gl:`#3739`
|
||||
- In addition to a previously fixed bug, another similar issue was
|
||||
discovered where quotas could be erroneously reached for servers,
|
||||
including any configured forwarders, resulting in SERVFAIL answers
|
||||
being sent to clients. This has been fixed. :gl:`#3752`
|
||||
|
||||
- Fix a rare assertion failure in the outgoing TCP DNS connection handling.
|
||||
:gl:`#3178` :gl:`#3636`
|
||||
- In certain query resolution scenarios (e.g. when following CNAME
|
||||
records), :iscman:`named` configured to answer from stale cache could
|
||||
return a SERVFAIL response despite a usable, non-stale answer being
|
||||
present in the cache. This has been fixed. :gl:`#3678`
|
||||
|
||||
- In addition to a previously fixed bug, another similar issue was discovered
|
||||
where quotas could be erroneously reached for servers, including any
|
||||
configured forwarders, resulting in SERVFAIL answers being sent to clients.
|
||||
This has been fixed. :gl:`#3752`
|
||||
- When an outgoing request timed out, :iscman:`named` would retry up to
|
||||
three times with the same server instead of trying the next available
|
||||
name server. This has been fixed. :gl:`#3637`
|
||||
|
||||
- Clients may see an unexpected "Prohibited" extended DNS error when ``named``
|
||||
is configured with :any:`allow-recursion`). :gl:`#3743`
|
||||
- Recently used ADB names and ADB entries (IP addresses) could get
|
||||
cleaned when ADB was under memory pressure. To mitigate this, only
|
||||
actual ADB names and ADB entries are now counted (excluding internal
|
||||
memory structures used for "housekeeping") and recently used (<= 10
|
||||
seconds) ADB names and entries are excluded from the overmem memory
|
||||
cleaner. :gl:`#3739`
|
||||
|
||||
- Fix a TLS error that occured with large transfers over XoT. :gl:`#3772`
|
||||
- The "Prohibited" Extended DNS Error was inadvertently set in some
|
||||
NOERROR responses. This has been fixed. :gl:`#3743`
|
||||
|
||||
- Previously, TLS session resumption could have led to handshake
|
||||
failures when client certificates were used for authentication (Mutual
|
||||
TLS). This has been fixed. :gl:`#3725`
|
||||
|
||||
Known Issues
|
||||
~~~~~~~~~~~~
|
||||
Reference in New Issue
Block a user