Commit Graph

33140 Commits

Author SHA1 Message Date
Ondřej Surý
ce5f036cff Add CHANGES and release note for [GL #2671] 2021-05-05 10:24:42 +02:00
Ondřej Surý
8d92112de9 Change the max-ixfr-ratio default value to unlimited
When the feature was backported, we should have leave it disabled by
default, it turns out the default `100%` is producing some unexpected
results (under investigation), so for the time being, we are going to to
disable the max-ixfr-ratio.
2021-05-05 10:24:42 +02:00
Mark Andrews
059358c494 Merge branch '2678-named-checkconf-doesn-t-catch-redefinition-of-dnssec-policy-insecure-v9_16' into 'v9_16'
named-checkconf now detects redefinition of dnssec-policy 'insecure'

See merge request isc-projects/bind9!4995
2021-05-05 07:29:44 +00:00
Mark Andrews
cb77a8efed named-checkconf now detects redefinition of dnssec-policy 'insecure'
(cherry picked from commit dba13d280a)
2021-05-05 17:05:17 +10:00
Michal Nowak
7cc68a9def Merge branch 'mnowak/use-sigabrt-from-start.pl-v9_16' into 'v9_16'
[v9_16] Use SIGABRT instead of SIGKILL to produce cores on failed start

See merge request isc-projects/bind9!4991
2021-05-04 15:54:08 +00:00
Ondřej Surý
82c9e477a1 Use SIGABRT instead of SIGKILL to produce cores on failed start
When the `named` would hang on startup it would be killed with SIGKILL
leaving us with no information about the state the process was in.
This commit changes the start.pl script to send SIGABRT instead, so we
can properly collect and process the coredump from the hung named
process.

(cherry picked from commit 861a236937)
2021-05-04 17:18:45 +02:00
Matthijs Mekking
d627c63f2d Merge branch '2624-kasp-test-failure-job-1630205-v9_16' into 'v9_16'
Fix intermittent kasp test failure

See merge request isc-projects/bind9!4986
2021-05-04 08:59:28 +00:00
Matthijs Mekking
cced7fdaf4 Fix intermittent kasp test failure
The kasp system test performs for each zone a couple of checks to make
sure the zone is signed correctly. To avoid test failures caused by
timing issues, there is first a check to ensure the zone is done
signing, 'wait_for_done_signing'. This function waits with the DNSSEC
checks until a "zone_rekey done" log message is seen for a specific
key.

Unfortunately this is not sufficient to avoid test failures due to
timing issues, because there is a small amount of time in between this
log message and the newly signed zone actually being served.

Therefore, in 'check_apex', retry for three seconds the DNSKEY query
check. After that, additional checks should pass without retries,
because at that point we know for sure the zone has been resigned with
the expected keys.

Also reduce the number of redundant 'check_signatures'

(cherry picked from commit 572f421df4)
2021-05-04 10:25:25 +02:00
Mark Andrews
50a4b15835 Merge branch '2621-pull-request-to-fix-rdnc-addzone-doc-v9_16' into 'v9_16'
Remove spurious $ and \ in addzone example

See merge request isc-projects/bind9!4984
2021-05-04 03:02:45 +00:00
Mark Andrews
18f710c438 Remove spurious $ and \ in addzone example
(cherry picked from commit 205d1bb762)
2021-05-04 12:44:22 +10:00
Matthijs Mekking
733fb98cf4 Merge branch 'matthijs-nsupdate-update_test-v9_16' into 'v9_16'
Update nsupdate test (9.16)

See merge request isc-projects/bind9!4978
2021-04-30 14:28:42 +00:00
Matthijs Mekking
fd01889b8a Update nsupdate test
The nsupdate system test did not record failures from the
'update_test.pl' Perl script. This was because the 'ret' value was
not being saved outside the '{ $PERL ... || ret=1 } cat_i' scope.

Change this piece to store the output in a separate file and then
cat its contents. Now the 'ret' value is being saved.

Also record failures in 'update_test.pl' if sending the update
failed.

Add missing 'n' incrementals to 'nsupdate/test.sh' to keep track of
test numbers.

(cherry picked from commit 5b31811b5f)
2021-04-30 14:28:30 +02:00
Matthijs Mekking
75277fc825 Merge branch '2645-dnssec-polic-insecure-v9_16' into 'v9_16'
Add built-in dnssec-policy "insecure"

See merge request isc-projects/bind9!4976
2021-04-30 12:02:22 +00:00
Matthijs Mekking
8db61e976a Add kasp test policy goes straight to "none"
Add a test case when a dnssec-policy is reconfigured to "none",
without setting it to "insecure" first. This is unsupported behavior,
but we want to make sure the behavior is somewhat expected. The
zone should remain signed (but will go bogus once the signatures
expire).

(cherry picked from commit 287428e0aa)
2021-04-30 13:58:22 +02:00
Matthijs Mekking
305fc213a0 Release notes and changes for [#2645]
The feature "going insecure gracefully" has been changed.

(cherry picked from commit 75024736a4)
2021-04-30 13:58:22 +02:00
Matthijs Mekking
3ce9e6424b Update documentation with "insecure" policy
Update the ARM to mention the new built-in "insecure" policy.  Update
the DNSSEC guide recipe "Revert to unsigned" to add the additional
step of reconfiguring the zone to "insecure" (instead of immediately
set it to "none").

(cherry picked from commit fadc57d3d0)
2021-04-30 13:58:22 +02:00
Matthijs Mekking
9f8af9a0e1 Add test for "insecure" policy
While it is meant to be used for transitioning a zone to insecure,
add a test case where a zone uses the "insecure" policy immediately.

The zone will go through DNSSEC maintenance, but the outcome should
be the same as 'dnssec-policy none;', that is the zone should be
unsigned.

(cherry picked from commit 9c6ff463fd)
2021-04-30 13:58:22 +02:00
Matthijs Mekking
e5ae856c6c Update kasp tests to "insecure" policy
The tests for going insecure should be changed to use the built-in
"insecure" policy.

The function that checks dnssec status output should again check
for the special case "none".

(cherry picked from commit 17e3b056c8)
2021-04-30 13:58:22 +02:00
Matthijs Mekking
375112a623 Add built-in dnssec-policy "insecure"
Add a new built-in policy "insecure", to be used to gracefully unsign
a zone. Previously you could just remove the 'dnssec-policy'
configuration from your zone statement, or remove it.

The built-in policy "none" (or not configured) now actually means
no DNSSEC maintenance for the corresponding zone. So if you
immediately reconfigure your zone from whatever policy to "none",
your zone will temporarily be seen as bogus by validating resolvers.

This means we can remove the functions 'dns_zone_use_kasp()' and
'dns_zone_secure_to_insecure()' again. We also no longer have to
check for the existence of key state files to figure out if a zone
is transitioning to insecure.

(cherry picked from commit 2710d9a11d)
2021-04-30 13:58:22 +02:00
Petr Špaček
fdf7be247d Merge branch 'pspacek/rtd-sphinx-fix-v9_16' into 'v9_16'
Fix ARM build on readthedocs.org

See merge request isc-projects/bind9!4977
2021-04-30 11:17:25 +00:00
Petr Špaček
28f104f1fd Fix ARM build on readthedocs.org
By default readthedocs.org uses Sphinx 1.8.5, but MR !4563 has
introduced depedency on ReferenceRole class which is available only in
Sphinx 2.0.0.

Path to doc/arm/requirements.txt needs to be configured in
readthedocs.org.
2021-04-30 13:02:22 +02:00
Matthijs Mekking
1df2c4a429 Merge branch '2445-nsec3-iterations-resolver-v9_16' into 'v9_16'
Mark DNSSEC responses with NSEC3 records that exceed 150 as insecure (9.16)

See merge request isc-projects/bind9!4962
2021-04-30 10:13:01 +00:00
Mark Andrews
205738f941 Add release note for [GL #2445]
(cherry picked from commit ad236976fc)
2021-04-30 11:17:01 +02:00
Mark Andrews
501008c510 Add CHANGES for [GL #2445]
(cherry picked from commit fd1f7b6480)
2021-04-30 11:17:00 +02:00
Mark Andrews
15111ab0db Check insecure responses returned with too many NSEC3 iterations
(cherry picked from commit e6e0e29fbb)
2021-04-30 11:16:45 +02:00
Mark Andrews
9170275738 Mark DNSSEC responses with NSEC3 records that exceed 150 as insecure
(cherry picked from commit af02bbcdd6)
2021-04-30 11:16:45 +02:00
Michal Nowak
c169f96f1e Merge branch 'mnowak/configure-with-enable-dnstap-by-default-v9_16' into 'v9_16'
[v9_16] Configure with --enable-dnstap by default

See merge request isc-projects/bind9!4965
2021-04-30 08:06:28 +00:00
Michal Nowak
11681a90a1 Update options{,.active} files with dnstap configured 2021-04-30 10:03:21 +02:00
Michal Nowak
06bddc8882 Suppress TSAN errors from libfstrm.so
dnstap_test produces TSAN errors which originate in libfstrm.so. Unless
libfstrm is TSAN clean or a workaround is placed in libfstrm sources,
suppressing TSAN coming from libfstrm is necessary to test DNSTAP under
TSAN.

(cherry picked from commit c97c6fbfea)
2021-04-30 10:03:21 +02:00
Michal Nowak
c1103b72c7 Configure with --enable-dnstap by default
All platforms but OpenBSD have dnstap dependencies readily in their
respective repositories, and dnstap thus can be tested there. Given that
majority of images have dnstap dependencies available, it seems fitting
to make dnstap enabled by default.

(cherry picked from commit deff0ae317)
2021-04-30 10:03:21 +02:00
Mark Andrews
691299c8df Merge branch '2668-handle-net-dns-versions-that-don-t-support-nsec3param-v9_16' into 'v9_16'
NSEC3PARAM support was added to Net::DNS in 1.00_06

See merge request isc-projects/bind9!4972
2021-04-30 06:50:10 +00:00
Mark Andrews
f9425a9ae6 NSEC3PARAM support was added to Net::DNS in 1.00_06
Require 1.01 or later to when adding a NSEC3PARAM records.

(cherry picked from commit 044933756a)
2021-04-30 16:29:41 +10:00
Mark Andrews
7b8e81a968 Merge branch '2658-update-zonemd-now-that-rfc-8976-has-been-issued-v9_16' into 'v9_16'
Update ZONEMD to match RFC 8976

See merge request isc-projects/bind9!4969
2021-04-30 02:19:16 +00:00
Mark Andrews
53d755966e Update ZONEMD to match RFC 8976
* The location of the digest type field has changed to where the
  reserved field was.
* The reserved field is now called scheme and is where the digest
  type field was.
* Digest type 2 has been defined (SHA256).

(cherry picked from commit 8510ccaa54)
2021-04-30 11:21:19 +10:00
Michal Nowak
8019eb19cd Merge branch 'mnowak/disable-pytest-cacheprovider-plugin-v9_16' into 'v9_16'
[v9_16] Disable pytest cacheprovider plugin in CI

See merge request isc-projects/bind9!4964
2021-04-29 14:22:44 +00:00
Michal Nowak
a4ef2de0c7 Disable pytest cacheprovider plugin in CI
The pytest "cacheprovider" plugin produces a .cache/v/cache/lastfailed
file, which holds a Python dictionary structure with failed tests.
However, on Ubuntu 16.04 (Xenial) the file is created even though the
test passed and the file contains just an empty dictionary ("{}").

Given that we are not interested in this feature, disabling the
"cacheprovider" plugin globally and removing per-test removals of the
.cache directory seems like the best course of action.

(cherry picked from commit e1c3034107)
2021-04-29 15:49:44 +02:00
Matthijs Mekking
b63c90a09c Merge branch 'matthijs-follow-up-2642-nsec3-iter-kasp-9_16' into 'v9_16'
dnssec-policy: reduce NSEC3 iterations to 150

See merge request isc-projects/bind9!4954
2021-04-29 13:01:20 +00:00
Matthijs Mekking
c2225cde3e dnssec-policy: reduce NSEC3 iterations to 150
When reducing the number of NSEC3 iterations to 150, commit
aa26cde2ae added tests for dnssec-policy
to check that a too high iteration count is a configuration failure.

The test is not sufficient because 151 was always too high for
ECDSAP256SHA256. The test should check for a different algorithm.

There was an existing test case that checks for NSEC3 iterations.
Update the test with the new maximum values.

Update the code in 'kaspconf.c' to allow at most 150 iterations.

(cherry picked from commit efa5d84dcf)
2021-04-29 14:31:16 +02:00
Michał Kępień
44f5121078 Merge branch '2372-add-hyperlink-to-gl-xxxx-labels-in-documentation-v9_16' into 'v9_16'
[v9_16] Resolve "Add hyperlink to [GL XXXX] labels in documentation"

See merge request isc-projects/bind9!4959
2021-04-29 12:00:37 +00:00
Michal Nowak
c424aa3bc2 Update Danger check for GitLab references
Release notes now employ a custom :gl: Sphinx role for linking to GitLab
issues/MRs.  Tweak the relevant Danger checks to account for that.

(cherry picked from commit fe1dea6572)
2021-04-29 13:35:05 +02:00
Michał Kępień
902e4482e0 Add a Sphinx role for linking GitLab issues/MRs
Define a :gl: Sphinx role that takes a GitLab issue/MR number as an
argument and creates a hyperlink to the relevant ISC GitLab URL.  This
makes it easy to reach ISC GitLab pages directly from the release notes.

Make all GitLab references in the release notes use the new Sphinx role.

(cherry picked from commit 2fadf29e6b)
2021-04-29 13:35:05 +02:00
Michal Nowak
c7fc3445c2 Make use of the :rfc: role in the ARM consistent
Make sure all RFC references in the ARM use the stock :rfc: Sphinx role.

(cherry picked from commit aeb43a45ac)
2021-04-29 13:35:05 +02:00
Michał Kępień
9bba57c939 Merge branch 'v9_16_15-release' into 'v9_16'
Merge 9.16.15 release branch

See merge request isc-projects/bind9!4955
2021-04-29 09:44:20 +00:00
Michał Kępień
41d18279e4 Regenerate configure 2021-04-29 11:39:56 +02:00
Michał Kępień
cdc086a4f4 Set up release notes for BIND 9.16.16 2021-04-29 11:12:38 +02:00
Tinderbox User
e2316224a4 Merge branch 'prep-release' into v9_16_15-release 2021-04-29 11:12:38 +02:00
Michał Kępień
a02bc2ff64 Merge branch 'michal/prepare-documentation-for-bind-9.16.15' into 'v9_16_15-release'
Prepare documentation for BIND 9.16.15

See merge request isc-private/bind9!288
2021-04-29 11:12:38 +02:00
Tinderbox User
b0f44204fa prep 9.16.15 2021-04-29 11:12:38 +02:00
Tinderbox User
5937b49154 Merge branch 'prep-release' into v9_16_14-release 2021-04-29 11:12:38 +02:00
Michał Kępień
e8e1e9102d Prepare release notes for BIND 9.16.15 2021-04-29 11:12:38 +02:00