Tweak and reword release notes

This commit is contained in:
Andoni Duarte Pintado
2025-01-16 10:41:20 +01:00
committed by Michał Kępień
parent 84f36eaa83
commit fa4c45d9e8

View File

@@ -15,42 +15,48 @@ Notes for BIND 9.21.4
Security Fixes
~~~~~~~~~~~~~~
- [CVE-2024-12705] DNS-over-HTTP(s) flooding fixes.
- DNS-over-HTTPS flooding fixes. :cve:`2024-12705`
Fix DNS-over-HTTP(S) implementation issues that arise under heavy
Fix DNS-over-HTTPS implementation issues that arise under heavy
query load. Optimize resource usage for :iscman:`named` instances that
accept queries over DNS-over-HTTP(S).
accept queries over DNS-over-HTTPS.
Previously, :iscman:`named` would process all incoming HTTP/2 data at
Previously, :iscman:`named` processed all incoming HTTP/2 data at
once, which could overwhelm the server, especially when dealing with
clients that send requests but don't wait for responses. That has been
clients that sent requests but did not wait for responses. That has been
fixed. Now, :iscman:`named` handles HTTP/2 data in smaller chunks and
throttles reading until the remote side reads the response data. It
also throttles clients that send too many requests at once.
Additionally, :iscman:`named` now carefully processes data sent by
some clients, which can be considered "flooding." It logs these
clients and drops connections from them. :gl:`#4795`
In addition, :iscman:`named` now evaluates excessive streams opened by
clients that include no DNS data, which is considered "flooding." It
logs these clients and drops connections from them. :gl:`#4795`
In some cases, :iscman:`named` could leave DNS-over-HTTP(S)
connections in the `CLOSE_WAIT` state indefinitely. That also has been
fixed. ISC would like to thank JF Billaud for thoroughly investigating
the issue and verifying the fix. :gl:`#5083` :gl:`#4795` :gl:`#5083`
In some cases, :iscman:`named` could leave DNS-over-HTTPS
connections in the `CLOSE_WAIT` state indefinitely. That has also been
fixed. :gl:`#5083`
- [CVE-2024-11187] Limit the additional processing for large RDATA sets.
ISC would like to thank Jean-François Billaud for his assistance with
investigating this issue.
- Limit additional section processing for large RDATA sets.
:cve:`2024-11187`
When answering queries, don't add data to the additional section if
the answer has more than 13 names in the RDATA. This limits the number
of lookups into the database(s) during a single client query, reducing
query processing load. :gl:`#5034`
the query-processing load. :gl:`#5034`
ISC would like to thank Toshifumi Sakaguchi for bringing this
vulnerability to our attention.
New Features
~~~~~~~~~~~~
- Add Extended DNS Error Code 22 - No Reachable Authority.
When the resolver is trying to query an authority server and
eventually timed out, a SERVFAIL answer is given to the client. Add
When the resolver is trying to query an authoritative server and
eventually times out, a SERVFAIL answer is given to the client. Add
the Extended DNS Error Code 22 - No Reachable Authority to the
response. :gl:`#2268`
@@ -70,119 +76,114 @@ New Features
- Add a new option to configure the maximum number of outgoing queries
per client request.
The configuration option 'max-query-count' sets how many outgoing
queries per client request is allowed. The existing
'max-recursion-queries' is the number of permissible queries for a
The configuration option :any:`max-query-count` sets how many outgoing
queries per client request are allowed. The existing
:any:`max-recursion-queries` value is the number of permissible queries for a
single name and is reset on every CNAME redirection. This new option
is a global limit on the client request. The default is 200.
This allows us to send a bit more queries while looking up a single
name. The default for 'max-recursion-queries' is changed from 32 to
50. :gl:`#4980` :gl:`#4921`
The default for :any:`max-recursion-queries` is changed from 32 to
50. This allows :any:`named` to send a few more queries
while looking up a single name. :gl:`#4980` :gl:`#4921`
Removed Features
~~~~~~~~~~~~~~~~
- Remove dnssec-must-be-secure feature.
- Remove the ``dnssec-must-be-secure`` feature. :gl:`#4482`
:gl:`#4482`
- Remove ``sortlist`` option.
- Remove 'sortlist' option.
The `sortlist` option, which was deprecated in BIND 9.20, has now been
The ``sortlist`` option, which was deprecated in BIND 9.20, has now been
removed. :gl:`#4665`
- Remove fixed value for the rrset-order option.
- Remove support for fixed RRset ordering.
Remove the "fixed" value from the "rrset-order" option and from the
autoconf script. :gl:`#4666`
Remove the ``fixed`` value from the :any:`rrset-order` option and the
``--enable-fixed-rrset`` option from the ``./configure`` script.
:gl:`#4666`
- Remove trusted-keys and managed-keys options.
- Remove ``trusted-keys`` and ``managed-keys`` options.
These options have been deprecated in 9.19 in favor of the
'trust-anchors' option and are now being removed. :gl:`#5080`
:any:`trust-anchors` option and are now being removed. :gl:`#5080`
Feature Changes
~~~~~~~~~~~~~~~
- The configuration clauses parental-agents and primaries are renamed to
remote-servers.
- The configuration clauses ``parental-agents`` and ``primaries`` are renamed to
:any:`remote-servers`.
The top blocks 'primaries' and 'parental-agents' are no longer
preferred and should be renamed to 'remote-servers'. The zone
statements 'parental-agents' and 'primaries' are still used, and may
refer to any 'remote-servers' top block. :gl:`#4544`
The top blocks ``primaries`` and ``parental-agents`` are no longer
preferred and should be renamed to :any:`remote-servers`. The zone
statements :any:`parental-agents` and :any:`primaries` are still used, and may
refer to any :any:`remote-servers` top block. :gl:`#4544`
Bug Fixes
~~~~~~~~~
- Fix nsupdate hang when processing a large update.
- Fix :iscman:`nsupdate` hang when processing a large update.
To mitigate DNS flood attacks over a single TCP connection, we
throttle the connection when the other side does not read the data.
Throttling should only occur on server-side sockets, but erroneously
also happened for nsupdate, which acts as a client. When nsupdate
started throttling the connection, it never attempts to read again.
This has been fixed. :gl:`#4910`
To mitigate DNS flood attacks over a single TCP connection, throttle
the connection when the other side does not read the data. Throttling
should only occur on server-side sockets, but erroneously also
happened for :iscman:`nsupdate`, which acts as a client. When
:iscman:`nsupdate` started throttling the connection, it never
attempted to read again. This has been fixed. :gl:`#4910`
- Fix possible assertion failure when reloading server while processing
updates.
update policy rules. :gl:`#5006`
:gl:`#5006`
- Preserve cache across reconfig when using :any:`attach-cache`.
- Preserve cache across reconfig when using attach-cache.
When the `attach-cache` option is used in the `options` block with an
When the :any:`attach-cache` option is used in the ``options`` block with an
arbitrary name, it causes all views to use the same cache. Previously,
this configuration caused the cache to be deleted and a new cache
created every time the server was reconfigured. This has been fixed.
to be created every time the server was reconfigured. This has been fixed.
:gl:`#5061`
- Resolve the spurious drops in performance due GLUE cache.
- Resolve the spurious drops in performance due to glue cache.
For performance reasons, the returned GLUE records are cached on the
For performance reasons, the returned glue records are cached on the
first use. The current implementation could randomly cause a
performance drop and increased memory use. This has been fixed.
:gl:`#5064`
- Fix dnssec-signzone signing non-DNSKEY RRsets with revoked keys.
- Fix :iscman:`dnssec-signzone` signing non-DNSKEY RRsets with revoked keys.
`dnssec-signzone` was using revoked keys for signing RRsets other than
:any:`dnssec-signzone` was using revoked keys for signing RRsets other than
DNSKEY. This has been corrected. :gl:`#5070`
- Disable deterministic ecdsa for fips builds.
- Disable deterministic ECDSA for FIPS builds.
FIPS 186-5 [1] allows the usage deterministic ECDSA (Section 6.3)
which is compabile with RFC 6979 [2] but OpenSSL seems to follow FIPS
186-4 (Section 6.3) [3] which only allows for random k values, failing
k value generation for OpenSSL >=3.2. [4]
`FIPS 186-5 <https://csrc.nist.gov/pubs/fips/186-5/final>`_ allows use
of deterministic ECDSA (Section 6.3), which is compatible with
:rfc:`6979`, but OpenSSL seems to follow `FIPS 186-4
<https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf>`_
(Section 6.3), which only allows random ``k`` values. This causes ``k``
value generation to fail for OpenSSL >= 3.2, making BIND unable to
generate ECDSA signatures when in FIPS mode.
Fix signing by not using deterministic ECDSA when FIPS mode is active.
This signing is now fixed by not using deterministic ECDSA when FIPS mode is active. :gl:`#5072`
[1]: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf [2]:
https://datatracker.ietf.org/doc/html/rfc6979 [3]:
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf [4]: https:
//github.com/openssl/openssl/blob/85f17585b0d8b55b335f561e2862db14a20b
1e64/crypto/ec/ecdsa_ossl.c#L201-L207 :gl:`#5072`
- Fix improper handling of unknown directives in ``resolv.conf``.
- Unknown directive in resolv.conf not handled properly.
The line after an unknown directive in resolv.conf could accidentally
be skipped, potentially affecting dig, host, nslookup, nsupdate, or
delv. This has been fixed. :gl:`#5084`
The line after an unknown directive in ``resolv.conf`` could accidentally be
skipped, potentially affecting :iscman:`dig`, :iscman:`host`,
:iscman:`nslookup`, :iscman:`nsupdate`, or :iscman:`delv`. This has been
fixed. :gl:`#5084`
- Querying an NSEC3-signed zone for an empty record could trigger an
assertion.
A bug in the qpzone database could trigger a crash when querying for a
deleted name, or a newly-added empty non-terminal name, in an
deleted name, or a newly added empty non-terminal name, in an
NSEC3-signed zone. This has been fixed. :gl:`#5108`
- Fix response policy zones and catalog zones with an $INCLUDE statement
- Fix response policy zones and catalog zones with an ``$INCLUDE`` statement
defined.
Response policy zones (RPZ) and catalog zones were not working
correctly if they had an $INCLUDE statement defined. This has been
correctly if they had an ``$INCLUDE`` statement defined. This has been
fixed. :gl:`#5111`