Commit graph

59 commits

Author SHA1 Message Date
Steve Wills
851dc05ce4 dns/unbound upgrade to 1.8.1
PR:		232070
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2018-10-08 17:29:32 +00:00
Steve Wills
17425abd3c dns/unbound: update to 1.8.0
Bump PORTREVISION on consumers due to library major version change

PR:		231283
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2018-09-18 18:24:05 +00:00
Sunpoet Po-Chuan Hsieh
633968a463 Update to 1.7.3
Changes:	https://www.nlnetlabs.nl/svn/unbound/tags/release-1.7.3/doc/Changelog
PR:		229202
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2018-06-21 21:12:11 +00:00
Steve Wills
a2e2da7fcb dns/unbound: upgrade to 1.7.2
PR:		228889
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2018-06-14 23:22:21 +00:00
Martin Wilke
c79bac1a54 - Update to 2.5.9
- Update WWW

PR:	227949
Submitted by:	maintainer
Sponsored by:     iXsystems Inc.
2018-05-10 14:50:19 +00:00
Kurt Jaeger
f12a0eaf7e dns/unbound: upgrade 1.6.8 -> 1.7.0
Features
- auth-zone provides a way to configure RFC7706 from unbound.conf,
  eg. with auth-zone: name: "." for-downstream: no for-upstream: yes
  fallback-enabled: yes and masters or a zonefile with data.
- Aggressive use of NSEC implementation. Use cached NSEC records to
  generate NXDOMAIN, NODATA and positive wildcard answers.
- Accept tls-upstream in unbound.conf, the ssl-upstream keyword is
  also recognized and means the same.  Also for tls-port,
  tls-service-key, tls-service-pem, stub-tls-upstream and
  forward-tls-upstream.
- [dnscrypt] introduce dnscrypt-provider-cert-rotated option,
  from Manu Bretelle.
  This option allows handling multiple cert/key pairs while only
  distributing some of them.
  In order to reliably match a client magic with a given key without
  strong assumption as to how those were generated, we need both key and
  cert. Likewise, in order to know which ES version should be used.
  On the other hand, when rotating a cert, it can be desirable to only
  serve the new cert but still be able to handle clients that are still
  using the old certs's public key.
  The `dnscrypt-provider-cert-rotated` allow to instruct unbound to not
  publish the cert as part of the DNS's provider_name's TXT answer.
- Update B root ipv4 address.
- make ip-transparent option work on OpenBSD.
- Fix #2801: Install libunbound.pc.
- ltrace.conf file for libunbound in contrib.
- Fix #3598: Fix swig build issue on rhel6 based system.
  configure --disable-swig-version-check stops the swig version check.

Bug Fixes
- Fix #1749: With harden-referral-path: performance drops, due to
  circular dependency in NS and DS lookups.
- [dnscrypt] prevent dnscrypt-secret-key, dnscrypt-provider-cert
  duplicates
- Better documentation for cache-max-negative-ttl.
- Fixed libunbound manual typo.
- Fix #1949: [dnscrypt] make provider name mismatch more obvious.
- Fix #2031: Double included headers
- Document that errno is left informative on libunbound config read
  fail.
- iana port update.
- Fix #1913: ub_ctx_config is under circumstances thread-safe.
- Fix #2362: TLS1.3/openssl-1.1.1 not working.
- Fix #2034 - Autoconf and -flto.
- Fix #2141 - for libsodium detect lack of entropy in chroot, print
  a message and exit.
- Fix #2492: Documentation libunbound.
- Fix #2882: Unbound behaviour changes (wrong) when domain-insecure is
  set for stub zone.  It no longer searches for DNSSEC information.
- Fix #3299 - forward CNAME daisy chain is not working
- Fix link failure on OmniOS.
- Check whether --with-libunbound-only is set when using --with-nettle
  or --with-nss.
- Fix qname-minimisation documentation (A QTYPE, not NS)
- Fix that DS queries with referral replies are answered straight
  away, without a repeat query picking the DS from cache.
  The correct reply should have been an answer, the reply is fixed
  by the scrubber to have the answer in the answer section.
- Fix that expiration date checks don't fail with clang -O2.
- Fix queries being leaked above stub when refetching glue.
- Copy query and correctly set flags on REFUSED answers when cache
  snooping is not allowed.
- make depend: code dependencies updated in Makefile.
- Fix #3397: Fix that cachedb could return a partial CNAME chain.
- Fix #3397: Fix that when the cache contains an unsigned DNAME in
  the middle of a cname chain, a result without the DNAME could
  be returned.
- Fix that unbound-checkconf -f flag works with auto-trust-anchor-file
  for startup scripts to get the full pathname(s) of anchor file(s).
- Print fatal errors about remote control setup before log init,
  so that it is printed to console.
- Use NSEC with longest ce to prove wildcard absence.
- Only use *.ce to prove wildcard absence, no longer names.
- Fix unfreed locks in log and arc4random at exit of unbound.
- Fix lock race condition in dns cache dname synthesis.
- Fix #3451: dnstap not building when you have a separate build dir.
  And removed protoc warning, set dnstap.proto syntax to proto2.
- Added tests with wildcard expanded NSEC records (CVE-2017-15105 test)
- Unit test for auth zone https url download.
- tls-cert-bundle option in unbound.conf enables TLS authentication.
- Fixes for clang static analyzer, the missing ; in
  edns-subnet/addrtree.c after the assert made clang analyzer
  produce a failure to analyze it.
- Fix #3505: Documentation for default local zones references
  wrong RFC.
- Fix #3494: local-zone noview can be used to break out of the view
  to the global local zone contents, for queries for that zone.
- Fix for more maintainable code in localzone.
- more robust cachedump rrset routine.
- Save wildcard RRset from answer with original owner for use in
  aggressive NSEC.
- Fixup contrib/fastrpz.patch so that it applies.
- Fix compile without threads, and remove unused variable.
- Fix compile with staticexe and python module.
- Fix nettle compile.
- Fix to check define of DSA for when openssl is without deprecated.
- iana port update.
- Fix #3582: Squelch address already in use log when reuseaddr option
  causes same port to be used twice for tcp connections.
- Reverted fix for #3512, this may not be the best way forward;
  although it could be changed at a later time, to stay similar to
  other implementations.
- Fix for windows compile.
- Fixed contrib/fastrpz.patch, even though this already applied
  cleanly for me, now also for others.
- patch to log creates keytag queries, from A. Schulze.
- patch suggested by Debian lintian: allow to -> allow one to, from
  A. Schulze.
- Attempt to remove warning about trailing whitespace.
- Added documentation for aggressive-nsec: yes.

PR:		226822
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2018-03-21 17:00:23 +00:00
Danilo G. Baio
b7f258b03a dns/unbound: Update to 1.6.8, Fixes security vulnerability
PR:		225313
Submitted by:	jaap@NLnetLabs.nl (maintainer)
MFH:		2018Q1
Security:	8d3bae09-fd28-11e7-95f2-005056925db4
2018-01-19 16:27:07 +00:00
Danilo G. Baio
0e31c2371d dns/unbound: Update to 1.6.7
Changes:	http://www.unbound.net/pipermail/unbound-users/2017-October/004972.html

PR:		222941
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2017-10-12 14:44:18 +00:00
Danilo G. Baio
04be785c4e dns/unbound: Update to 1.6.6
Changes:	http://www.unbound.net/pipermail/unbound-users/2017-September/004936.html

PR:		222503
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2017-09-22 00:51:01 +00:00
Steve Wills
54f580aebe dns/unbound: Upgrade to 1.6.5
PR:		221692
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2017-08-21 21:45:28 +00:00
Danilo G. Baio
b0d3c55ea2 dns/unbound: Update to 1.6.4
Changes:	http://www.unbound.net/pipermail/unbound-users/2017-June/004818.html

PR:		220673
Submitted by:	jaap@NLnetLabs.nl (maintainer)
Approved by:	garga (mentor, implicit)
2017-07-12 22:44:53 +00:00
Adam Weinberger
a155d15ea3 Update unbound to 1.6.3.
This release fixes a spurious assertion failure when unbound receives a
malformed packet with 0x20 enabled.

Bug Fixes
- Fix #1280: Unbound fails assert when response from authoritative
  contains malformed qname. When 0x20 caps-for-id is enabled, when
  assertions are not enabled the malformed qname is handled correctly.

PR:		219958
Submitted by:	maintainer (jaap NLnetLabs nl)
2017-06-13 20:37:06 +00:00
Kurt Jaeger
04078721f0 dns/unbound: update 1.6.1 -> 1.6.2
PR:		218872
Changes:	http://www.unbound.net/pipermail/unbound-users/2017-April/004762.html
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2017-04-29 20:59:34 +00:00
Wen Heping
a300cdae9c - Update to 1.6.1
PR:		217614
Submitted by:	jaap@NLnetLabs.nl(maintainer)
2017-03-08 01:48:33 +00:00
Sunpoet Po-Chuan Hsieh
c1dd9659ec - Update to 1.6.0
- Do not silence installation message
- While I'm here:
  - Move LIB_DEPENDS upwards
  - Use = instead of += for CONFIGURE_ARGS and USES
  - Convert to options helper
  - Use TEST_TARGET

Changes:	https://unbound.nlnetlabs.nl/pipermail/unbound-users/2016-December/004587.html
PR:		215322
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl> (maintainer)
2016-12-17 13:20:19 +00:00
Pawel Pekala
581c76bab8 Update to version 1.5.10
In this release there is a fix for long downtime after connectivity
loss, which was a longstanding unsolved issue.  Features for tcp, TCP
Fast Open and timeout pressure to close connections when the tcp
connections are getting full.  Option to use ipv6 /64 for extra entropy.

Features
- Create a pkg-config file for libunbound in contrib.
- TCP Fast open patch from Sara Dickinson.
- Finegrained localzone control with define-tag, access-control-tag,
  access-control-tag-action, access-control-tag-data, local-zone-tag, and
  local-zone-override. And added types always_transparent, always_refuse,
  always_nxdomain with that.
- If more than half of tcp connections are in use, a shorter timeout
  is used (200 msec, vs 2 minutes) to pressure tcp for new connects.
- [bugzilla: 787 ] Fix #787: outgoing-interface netblock/64 ipv6
  option to use linux freebind to use 64bits of entropy for every query
  with random local part.
- For #787: prefer-ip6 option for unbound.conf prefers to send
  upstream queries to ipv6 servers.
- Add default root hints for IPv6 E.ROOT-SERVERS.NET, 2001:500:a8::e.
- keep debug symbols in windows build.

PR:		213043
Submitted by:	maintainer
2016-10-02 10:30:40 +00:00
Ruslan Makhmatkhanov
d22af7fecc dns/unbound: update to 1.5.9
PR:		210257
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2016-06-18 21:53:58 +00:00
Olli Hauer
c2840d6f99 - Update unbound to version 1.5.8
- add OPTION for DNSTAP logging support
- rename OPTION s/MUNIN/MUNIN_PLUGIN/ so it is consistent with nsd
- use OPTIONS_SUB
- use ${opt}_target
- use @sample macro for unbound.conf
- sort pkg-plist

Features
- ip-transparent option for FreeBSD with IP_BINDANY socket option.
- insecure-lan-zones: yesno config option, patch from Dag-Erling Smørgrav.
- RR Type CSYNC support RFC 7477, in debug printout and config input.
- RR Type OPENPGPKEY support (draft-ietf-dane-openpgpkey-07).
- [bugzilla: 731 ] tcp-mss, outgoing-tcp-mss options for unbound.conf, patch
  from Daisuke Higashi.
- Support RFC7686: handle ".onion" Special-Use Domain. It is blocked by
  default, andcan be unblocked with "nodefault" localzone config.
- ub_ctx_set_stub() function for libunbound to config stub zones.

The release fixes line endings in the unbound-control-setup script, and
a potential gost-hash validation failure and handles the ".onion" domain
to avoid privacy leakage.

PR:		207948
Submitted by:	jaap@NLnetLabs.nl (maintainer)
2016-03-15 06:19:52 +00:00
Erwin Lansing
d140eabacb - Update unbound to 1.5.7
- Bump PORTREVISIOn on dependent ports

Some Upgrade Notes:

This release fixes a validation failure for nodata with wildcards and
emptynonterminals. Fixes OpenSSL Library compability. Fixes correct
response for malformed EDNS queries. For crypto in libunbound there is
libnettle support.

Qname minimisation is implemented. Use qname-minimisation: yes to
enable it. This version sends the full query name when an error is
found for intermediate names. It should therefore not fail for names
on nonconformant servers. It combines well with
harden-below-nxdomain: yes because those nxdomains are probed by the
qname minimisation, and that will both stop privacy sensitive traffic
and reduce nonsense traffic to authority servers. So consider
enabling both. In this implementation IPv6 reverse lookups add
several labels per increment, because otherwise those lookups would be
very slow. [ Reference
https://tools.ietf.org/html/draft-ietf-dnsop-qname-minimisation-08 ]

More details at <http://unbound.net>

PR:		206347
Submitted by:	Jaap Akkerhuis <jaap@NLnetLabs.nl>
Approved by:	maintainer timeout
Sponsored by:	DK Hostmaster A/S
2016-02-04 15:58:30 +00:00
Sergey Matveychuk
1eb8ea886e - Update to 1.5.5 2015-10-11 12:58:34 +00:00
Sergey Matveychuk
7d8e6f7f5a - Update to 1.5.4
- Disable FILTER_AAAA option. The patch is obsolated.

PR:		202385
Submitted by:	edwin
2015-08-17 19:31:00 +00:00
Sergey Matveychuk
382865e1f5 - Update to 1.5.3
PR:		198538
Submitted by:	garga
2015-03-12 14:47:35 +00:00
Sergey Matveychuk
f5f04df80f - Update to 1.5.2 2015-02-19 17:55:34 +00:00
Sergey Matveychuk
eaf3f111f3 - Upgrade to 1.5.1. It fixes CVE-2014-8602.
- Mark python support as broken: does not build.

PR:		195814, 195803
Submitted by:	Kenji Rikitake, Jeroen
2014-12-09 02:18:01 +00:00
Sergey Matveychuk
4b1e4f7dc4 - Update to 1.5.0
- Removed FreeBSD 10 check for libevent, because of upstream fixes (as stated in changelog)
- Converted files/patch-Makefile.in to sed patch, which is position independent

PR:		195674
Submitted by:	lightside@gmx.com
2014-12-05 18:52:53 +00:00
Sergey Matveychuk
15491f2b37 - Update to 1.4.22 2014-03-13 11:07:56 +00:00
Sergey Matveychuk
5afc4828b2 - Update to 1.4.21 2013-09-23 02:39:57 +00:00
Sergey Matveychuk
09849c22a5 - Update to 1.4.20 2013-03-25 16:03:53 +00:00
Sergey Matveychuk
e7357dedfa - Update to 1.1.19 2012-12-14 13:56:16 +00:00
Sergey Matveychuk
d19bcdeba8 - Update to 1.4.18 2012-08-03 10:05:26 +00:00
Sergey Matveychuk
01c06198be - Update to 1.4.17
* Use ECDSA by default
  * Add a hack to build ldns with ECDSA support if it's not installed

Feature safe:	Yes
2012-05-24 15:02:38 +00:00
Sergey Matveychuk
03054de8a5 - Update to 1.4.16
* Bugfix release
2012-02-02 13:53:27 +00:00
Sergey Matveychuk
4050999bef - Update to 1.4.15
* Fixed a little memory leak
  * Couple other bugs fixed
- Run unbound-checkconf before start.
2012-01-26 13:44:58 +00:00
Sergey Matveychuk
df278d1dfa - Update to 1.4.14
* CVE-2011-4528 fixed
2011-12-19 13:44:11 +00:00
Sergey Matveychuk
e2c9da64eb - Update to 1.4.13 2011-09-15 12:04:09 +00:00
Sergey Matveychuk
567660bb5f - Update to 1.4.12 (a bugfix release)
- Disable GOST by default
- Depend on dns/ldns
2011-07-15 12:53:51 +00:00
Sergey Matveychuk
7855dfcc04 - Update to 1.4.11 2011-07-01 14:46:19 +00:00
Sergey Matveychuk
45c89956ba - Update to 1.4.10
* CVE-2011-1922 VU#531342 fixed
2011-05-25 09:30:38 +00:00
Sergey Matveychuk
b819ba41df - Update to 1.4.9 2011-03-24 13:24:05 +00:00
Sergey Matveychuk
4ff51aa3a5 - Update to 1.4.8
Feature safe:	yes
2011-01-24 16:19:05 +00:00
Sergey Matveychuk
a16e8de40f - Update to 1.4.7
* It uses GOST by default and depends on port's openssl 1.0.0
    (may be turned off by an option).
2010-11-09 14:09:52 +00:00
Sergey Matveychuk
6dd3ca4c36 - Update to 1.4.6 2010-08-04 11:06:04 +00:00
Sergey Matveychuk
7722c237dd - Update to 1.4.5 2010-06-15 15:46:14 +00:00
Sergey Matveychuk
9fe0c5b688 - Update to 1.4.4
* mistly bugs fix release
 * ECC-GOST is not supported by the port yet because of it requires
   OpenSSL 1.0.0 from ports. (There is in TODO).
2010-04-22 12:06:15 +00:00
Sergey Matveychuk
65f3f3ca62 - Update to 1.4.3 2010-03-12 12:54:34 +00:00
Sergey Matveychuk
e2ae93b2ae - Update to 1.4.1
- Use --disable-sha2 on 6.4 because of broken OpenSSL in base.
2009-12-17 12:45:52 +00:00
Sergey Matveychuk
658a748d85 - Update to 1.4.0 2009-11-26 15:19:48 +00:00
Sergey Matveychuk
8bd36732f2 - Update to 1.3.4
PR:		ports/140639
Submitted by:	Kurt Jaeger <pi at fa8.opsec.eu>
2009-11-17 14:38:37 +00:00
Sergey Matveychuk
1700cabbec - Update to 1.3.3 2009-08-05 17:21:35 +00:00
Sergey Matveychuk
a74a7a227a - Update to 1.3.1 2009-07-09 17:38:19 +00:00