Commit Graph

32593 Commits

Author SHA1 Message Date
Michał Kępień
eeead1b98f Merge branch 'sgoldlust-1915-edits-to-man-pages-for-bind-arm-patch-16656-v9_16' into 'v9_16'
[v9_16] Edits to man pages for BIND 9 ARM

See merge request isc-projects/bind9!4558
2021-01-12 14:39:13 +00:00
Suzanne Goldlust
aee0570309 Text edits to manual paages
This commit updates the wording in following man pages:

* ddns-confgen.rst
* delv.rst
* dig.rst
* dnssec-dsfromkey.rst
* dnssec-importkey.rst
* dnssec-keyfromlabel.rst
* dnssec-keygen.rst
* dnssec-revoke.rst
* dnssec-settime.rst
* dnssec-signzone.rst
* dnssec-verify.rst
* dnstap-read.rst
* filter-aaaa.rst
* host.rst
* mdig.rst
* named-checkconf.rst
* named-checkzone.rst
* named-nzd2nzf.rst
* named.conf.rst
* named.rst
* nsec3hash.rst
* nsupdate.rst
* pkcs11-destroy.rst
* pkcs11-keygen.rst
* pkcs11-list.rst
* pkcs11-tokens.rst
* rndc-confgen.rst
* rndc.rst

(cherry picked from commit 78af7e54e6)
2021-01-12 15:37:47 +01:00
Michał Kępień
5942670d1b Merge branch '1915-edits-to-man-pages-for-bind-arm-v9_16' into 'v9_16'
[v9_16] Resolve "Edits to man pages for BIND ARM"

See merge request isc-projects/bind9!4557
2021-01-12 14:36:55 +00:00
Suzanne Goldlust
c7e22b3ac4 Text and formatting edits to various manual pages.
Follwing manual pages have been updated: rndc.conf.rst, rndc.rst
nsec3hash.rst, dnstap-read.rst, named-nzd2nzf.rst, mdig.rst,
named-rrchecker.rst, dnssec-revoke.rst, dnssec-cds.rst,
dnssec-keyfromlabel.rst, and dnssec-keygen.rst

(cherry picked from commit 1efa88cf09)
2021-01-12 15:35:14 +01:00
Michał Kępień
3fe7e43fc3 Merge branch '1940-removing-more-references-to-master-and-slave-in-bind-arm-v9_16' into 'v9_16'
[v9_16] Resolve "Removing more references to "master" and "slave" in BIND ARM"

See merge request isc-projects/bind9!4556
2021-01-12 14:34:20 +00:00
Suzanne Goldlust
4ba472ab21 Updates to .rst files to remove more references to "master" and "slave"
(cherry picked from commit 42386f3d9f)
2021-01-12 15:31:44 +01:00
Michał Kępień
52627eb9d3 Merge branch '1925-additional-text-edits-to-bind-arm-v9_16' into 'v9_16'
[v9_16] Resolve "Additional text edits to BIND ARM"

See merge request isc-projects/bind9!4555
2021-01-12 14:30:46 +00:00
Suzanne Goldlust
55636ab510 Various text edits and fixes to the documentation
(cherry picked from commit 5aa5ad5abc)
2021-01-12 15:26:59 +01:00
Michał Kępień
b47ee8faea Merge branch '1948-primaries-synonym-v9_16' into 'v9_16'
[v9_16] Resolve "add synonym for "masters""

See merge request isc-projects/bind9!4554
2021-01-12 14:24:06 +00:00
Evan Hunt
aa13408757 CHANGES, release note
(cherry picked from commit 565f99f9e5)
2021-01-12 15:21:14 +01:00
Evan Hunt
7b2880d191 further tidying of primary/secondary terminology in system tests
this changes most visble uses of master/slave terminology in tests.sh
and most uses of 'type master' or 'type slave' in named.conf files.
files in the checkconf test were not updated in order to confirm that
the old syntax still works. rpzrecurse was also left mostly unchanged
to avoid interference with DNSRPS.

(cherry picked from commit e43b3c1fa1)
2021-01-12 15:21:14 +01:00
Evan Hunt
85530bdd23 use primary/secondary terminology in 'rndc zonestatus'
(cherry picked from commit 68c384e118)
2021-01-12 15:21:14 +01:00
Evan Hunt
1a32a4d001 prevent "primaries" lists from having duplicate names
it is now an error to have two primaries lists with the same
name. this is true regardless of whether the "primaries" or
"masters" keywords were used to define them.

(cherry picked from commit f619708bbf)
2021-01-12 15:21:14 +01:00
Evan Hunt
746aa2581c add "primary-only" as a synonym for "master-only"
update the "notify" option to use RFC 8499 terminology as well.

(cherry picked from commit 424a3cf3cc)
2021-01-12 15:21:14 +01:00
Evan Hunt
04b9cdb53c add "primaries" as a synonym for "masters" in named.conf
as "type primary" is preferred over "type master" now, it makes
sense to make "primaries" available as a synonym too.

added a correctness check to ensure "primaries" and "masters"
cannot both be used in the same zone.

(cherry picked from commit 16e14353b1)
2021-01-12 15:21:14 +01:00
Matthijs Mekking
fa29c95992 Merge branch '2383-kasp-sig-validity-dnskey-bug-v9_16' into 'v9_16'
Fix signatures-validity config option (9.16)

See merge request isc-projects/bind9!4551
2021-01-12 12:40:47 +00:00
Matthijs Mekking
c4520620dc Fix signatures-validity config option
KASP was using 'signatures-validity-dnskey' instead of
'signatures-validity'.

(cherry picked from commit ad63e9e4f8)
2021-01-12 13:13:05 +01:00
Michal Nowak
e7b7c12a9a Merge branch 'mnowak/fix-copyright-date-in-man-pages-v9_16' into 'v9_16'
[v9_16] Update copyright date in man pages

See merge request isc-projects/bind9!4550
2021-01-11 12:06:46 +00:00
Michal Nowak
883e1cb4df Update copyright date in man pages
(cherry picked from commit 358c133ee2)
2021-01-11 12:54:46 +01:00
Michał Kępień
1100f13186 Merge branch '606-add-the-isc-dnssec-guide-as-a-bind-9-arm-appendix-v9_16' into 'v9_16'
[v9_16] Add the ISC DNSSEC Guide as a BIND 9 ARM appendix

See merge request isc-projects/bind9!4547
2021-01-08 12:58:02 +00:00
Michał Kępień
22bec45f9c Add the ISC DNSSEC Guide as a BIND 9 ARM appendix
Add the ISC DNSSEC Guide to the BIND 9 ARM in order to include the
former in every BIND release.

(cherry picked from commit f96e6a1e1d)
2021-01-08 13:53:52 +01:00
Michał Kępień
ec25a534b6 Merge branch '2366-add-CHANGES-entry-v9_16' into 'v9_16'
[v9_16] Add CHANGES entry for GL #2366

See merge request isc-projects/bind9!4545
2021-01-08 11:53:20 +00:00
Michał Kępień
a799a536fe Add CHANGES entry for GL #2366
(cherry picked from commit 995b72d2b7)
2021-01-08 12:51:40 +01:00
Mark Andrews
f31978efd0 Merge branch '2366-bind-9-16-10-build-fails-with-libmaxminddb-1-4-3' into 'v9_16'
Resolve "BIND 9.16.10 build fails with libmaxminddb-1.4.3"

See merge request isc-projects/bind9!4531
2021-01-06 08:04:25 +00:00
Mark Andrews
cafb021b2a Fix 'configure --with-maxminddb=<path>' 2021-01-06 17:53:10 +11:00
Mark Andrews
4c3fc7c4a0 Merge branch '2355-incorrect-increment-of-inactive-in-rbtdb-c-maybe_free_rbtdb-v9_16' into 'v9_16'
Resolve "Incorrect increment of inactive in rbtdb.c:maybe_free_rbtdb()"

See merge request isc-projects/bind9!4530
2021-01-06 05:51:10 +00:00
Mark Andrews
5874c04d13 Add release note
(cherry picked from commit 584e589d84)
2021-01-06 16:33:32 +11:00
Mark Andrews
0836e97d94 Add CHANGES
(cherry picked from commit 65702896bd)
2021-01-06 16:33:32 +11:00
Mark Andrews
07e899f616 Inactive incorrectly incremented
It is possible to have two threads destroying an rbtdb at the same
time when detachnode() executes and removes the last reference to
a node between exiting being set to true for the node and testing
if the references are zero in maybe_free_rbtdb().  Move NODE_UNLOCK()
to after checking if references is zero to prevent detachnode()
changing the reference count too early.

(cherry picked from commit 859d2fdad6)
2021-01-06 16:33:32 +11:00
Matthijs Mekking
dda76b7b5c Merge branch '2359-too-many-newlines-dnssec-signzone-verify-v9_16' into 'v9_16'
Fix dnssec-signzone and -verify logging (again)

See merge request isc-projects/bind9!4525
2021-01-05 13:00:25 +00:00
Matthijs Mekking
63e58f09a5 Fix dnssec-signzone and -verify logging (again)
While fixing #2359, 'report()' was changed so that it would print the
newline.

Newlines were missing from the output of 'dnssec-signzone'
and 'dnssec-verify' because change
664b8f04f5 moved the printing from
newlines to the library.

This had to be reverted because this also would print redundant
newlines in logfiles.

While doing the revert, some newlines in 'lib/dns/zoneverify.c'
were left in place, now making 'dnssec-signzone' and 'dnssec-verify'
print too many newlines.

This commit removes those newlines, so that the output looks nice
again.

(cherry picked from commit 18c62a077e)
2021-01-05 13:41:49 +01:00
Mark Andrews
29b2e1cd48 Merge branch '2359-missing-newlines-in-log-messages-dnssec-signzone-dnssec-verify-c-v9_16' into 'v9_16'
Resolve "missing newlines in log messages dnssec-signzone/dnssec-verify"

See merge request isc-projects/bind9!4522
2021-01-05 01:47:26 +00:00
Mark Andrews
70efdc9d1d Add CHANGES
(cherry picked from commit 244525a303)
2021-01-05 11:53:24 +11:00
Mark Andrews
76a08eef9d Fix dnssec-signzone and dnssec-verify logging
The newlines need to be appended to the messages generated by report
in a atomic manner.

(cherry picked from commit c36bd83822)
2021-01-05 11:52:59 +11:00
Mark Andrews
ad2f32a2e3 Merge branch '2361-the-additional-system-test-fails-on-system-gcc-mutexatomics' into 'v9_16'
Resolve "The additional system test fails on system:gcc:mutexatomics"

See merge request isc-projects/bind9!4520
2021-01-05 00:32:03 +00:00
Mark Andrews
f116975670 add CHANGES 2021-01-05 11:30:47 +11:00
Mark Andrews
72fa03a1e9 Use atomic_init when initalising server->reload_status 2021-01-04 05:16:16 +00:00
Mark Andrews
5a8410dcf6 Merge branch 'marka-copyrights' into 'v9_16'
update for 2021

See merge request isc-projects/bind9!4519
2021-01-04 04:35:20 +00:00
Mark Andrews
4222429b28 update for 2021 2021-01-04 15:14:44 +11:00
Matthijs Mekking
538d7d5f81 Merge branch '1750-dnssec-policy-none-v9_16' into 'v9_16'
Resolve "dnssec-policy graceful transition to insecure"

See merge request isc-projects/bind9!4513
2020-12-23 12:25:06 +00:00
Matthijs Mekking
7fdd0f7be9 Add notes for [#2341]
Mention the bugfix in the release.

(cherry picked from commit 08b6e8c2c9)
2020-12-23 12:06:35 +01:00
Matthijs Mekking
decdd1d3e1 Add documentation and notes for [#1750]
(cherry picked from commit 7825d8f916)
2020-12-23 12:06:09 +01:00
Matthijs Mekking
e4f4977c1e Fix a quirky mkeys test failure
The mkeys system test started to fail after introducing support for
zones transitioning to unsigned without going bogus. This is because
there was actually a bug in the code: if you reconfigure a zone and
remove the "auto-dnssec" option, the zone is actually still DNSSEC
maintained. This is because in zoneconf.c there is no call
to 'dns_zone_setkeyopt()' if the configuration option is not used
(cfg_map_get(zoptions, "auto-dnssec", &obj) will return an error).

The mkeys system test implicitly relied on this bug: initially the
root zone is being DNSSEC maintained, then at some point it needs to
reset the root zone in order to prepare for some tests with bad
signatures. Because it needs to inject a bad signature, 'auto-dnssec'
is removed from the configuration.

The test pass but for the wrong reasons:

I:mkeys:reset the root server
I:mkeys:reinitialize trust anchors
I:mkeys:check positive validation (18)

The 'check positive validation' test works because the zone is still
DNSSEC maintained: The DNSSEC records in the signed root zone file on
disk are being ignored.

After fixing the bug/introducing graceful transition to insecure,
the root zone is no longer DNSSEC maintained after the reconfig.

The zone now explicitly needs to be reloaded because otherwise the
'check positive validation' test works against an old version of the
zone (the one with all the revoked keys), and the test will obviously
fail.

(cherry picked from commit 2fc42b598b)
2020-12-23 11:57:03 +01:00
Matthijs Mekking
d564ad5f52 Update keymgr to allow transition to insecure mode
The keymgr prevented zones from going to insecure mode. If we
have a policy with an empty key list this is a signal that the zone
wants to go back to insecure mode. In this case allow one extra state
transition to be valid when checking for DNSSEC safety.

(cherry picked from commit 9134100069)
2020-12-23 11:56:54 +01:00
Matthijs Mekking
6da379d844 Publish CDS/CDNSKEY Delete Records
Check if zone is transitioning from secure to insecure. If so,
delete the CDS/CDNSKEY records, otherwise make sure they are not
part of the RRset.

(cherry picked from commit 68d715a229)
2020-12-23 11:56:44 +01:00
Matthijs Mekking
cf0439cd5f Treat dnssec-policy "none" as a builtin zone
Configure "none" as a builtin policy. Change the 'cfg_kasp_fromconfig'
api so that the 'name' will determine what policy needs to be
configured.

When transitioning a zone from secure to insecure, there will be
cases when a zone with no DNSSEC policy (dnssec-policy none) should
be using KASP. When there are key state files available, this is an
indication that the zone once was DNSSEC signed but is reconfigured
to become insecure.

If we would not run the keymgr, named would abruptly remove the
DNSSEC records from the zone, making the zone bogus. Therefore,
change the code such that a zone will use kasp if there is a valid
dnssec-policy configured, or if there are state files available.

(cherry picked from commit cf420b2af0)
2020-12-23 11:56:33 +01:00
Matthijs Mekking
6ff69ee8ba Add function to see if dst key uses kasp
For purposes of zones transitioning back to insecure mode, it is
practical to see if related keys have a state file associated.

(cherry picked from commit 8f2c5e45da)
2020-12-23 11:56:25 +01:00
Matthijs Mekking
63b72ad5e9 Small adjustments to kasp rndc_checkds function
Slightly better test output, and only call 'load keys' if the
'rndc checkds' call succeeded.

(cherry picked from commit 756674f6d1)
2020-12-23 11:56:16 +01:00
Matthijs Mekking
c3d2843915 Add tests for going from secure to insecure
Add two test zones that will be reconfigured to go insecure, by
setting the 'dnssec-policy' option to 'none'.

One zone was using inline-signing (implicitly through dnssec-policy),
the other is a dynamic zone.

Two tweaks to the kasp system test are required: we need to set
when to except the CDS/CDS Delete Records, and we need to know
when we are dealing with a dynamic zone (because the logs to look for
are slightly different, inline-signing prints "(signed)" after the
zone name, dynamic zones do not).

(cherry picked from commit fa2e4e66b0)
2020-12-23 11:56:07 +01:00
Mark Andrews
b5db21f80b Merge branch '2245-bind-9-16-8-does-not-honor-cpu-affinity-v9_16' into 'v9_16'
Resolve "bind 9.16.8 does not honor CPU affinity"

See merge request isc-projects/bind9!4510
2020-12-22 23:13:49 +00:00