Commit graph

25 commits

Author SHA1 Message Date
Fredrik Pettai
fbd29b1d87 Cleaned up Makefile 2009-11-08 00:08:24 +00:00
Fredrik Pettai
0be41ce824 Added missing $NetBSD$ header to the patchfile 2009-11-01 23:39:05 +00:00
Fredrik Pettai
7e1a2a1bc6 Build with softHSM default 2009-11-01 23:35:40 +00:00
Fredrik Pettai
514d66441d Make CUnit a build dependency only 2009-10-31 22:50:29 +00:00
Fredrik Pettai
a6a8553613 Log4shib is a forked version of log4cpp that has been created for the
Shibboleth project to ensure a conistent, working snapshot that builds
reliably on the necessary platforms.
2009-10-27 11:19:54 +00:00
Fredrik Pettai
ed802fd974 *** empty log message *** 2009-10-26 22:53:29 +00:00
Fredrik Pettai
0b220c28cd Fixed installation of configuration files. 2009-10-26 22:23:09 +00:00
Fredrik Pettai
78f7741d46 Added MESSAGE with a pointer to documentation. 2009-10-25 22:41:44 +00:00
Fredrik Pettai
ca07207ce8 Fix so the example conf files are installed 2009-10-24 22:00:25 +00:00
Fredrik Pettai
824f568ed8 Fixed dependency for dnsruby according to 1.0.0b3:
* The auditor (dnsruby) supports RSA/SHA256 and RSA/SHA512
2009-10-24 21:33:59 +00:00
Fredrik Pettai
0576c2db48 OpenDNSSEC 1.0.0b4 - 2009-10-23
* Default TTL in case of $TTL or explicit RR TTL becomes the SOA Minimum value (
was 3600).
* The signer engine will check if another engine is already running before start
ing.
* Startup scripts for Solaris (SMF).
* Auditor gives an error if key moves to "in use" without sufficient "prepublish
ed" time.

Bugfixes:
* Trailing spaces are not part of the domain name/ include file/ ttl in directiv
es.
* nsec3er: Print final RRset, even if no NSEC3 was needed at that RRset.
* Proper privileges dropping when creating the command socket
* Signer sometimes didn't terminate if socket shutdown failed.

Known issues:
* The Signer Engine fails with broken pipes sometimes.
2009-10-24 20:49:36 +00:00
Fredrik Pettai
aa23ff08f5 OpenDNSSEC 1.0.0b3 - 2009-10-16
* The auditor now tracks the SOA serial over time
* The auditor (dnsruby) supports RSA/SHA256 and RSA/SHA512

Bugfixes:
* The LDNS bug that affected SRV records has been fixed in ldns-trunk.
* Bugreport #41: Fix for SOA serial 'keep'.
* Allow for SOA Serial/TTL/Minimum values of zero.
* Correct socket binding of NotifyListen.
* Systems with older SQLite had problem rolling keys on a policy.
* Auditor now handles SSHFP and NAPTR records correctly (but needs Dnsruby 1.39)
* Auditor now handles TTLs in zone file with suffix s, m, h, d, and w.
2009-10-19 08:26:41 +00:00
Fredrik Pettai
e2ebba7f47 Removed etc/* files from PLIST 2009-10-11 19:44:36 +00:00
Fredrik Pettai
6eca2de11d OpenDNSSEC 1.0.0b2 - 2009-10-09
* Added experimental support for RSA/SHA256 and RSA/SHA512 to KASP enforcer
  and the signer engine.
* SignerThreads and KeygenInterval has been deprecated (actually removed
  just before 1.0.0b1).
* Added support for RSA/SHA256 and RSA/SHA512 to libhsm. No API changes.

Bugfixes:
* Bugreport #33 (#35): Output a signed zone if only the SOA record changed.
* Zone fetcher did not start correctly
* Create the pid / socket directory if it not yet exists, with the correct
  privileges.
* Signer Engine now catches exception if running with incorrect permission.
* TCP-support for LDNS on Solaris is fixed in LDNS trunk.

Known issues:
* LDNS is having problem with SRV records. The main effect is that these
  records are given non-valid RRSIGs. This is still under investigation.
2009-10-11 19:21:16 +00:00
Fredrik Pettai
31887e1635 Fixed PLIST according to 1.0.0b1 renaming of binaries 2009-10-05 14:51:39 +00:00
Fredrik Pettai
9ff5fa50b8 Fixed build dependency for platforms with native java support.
eg. MacOSX
2009-10-05 09:46:33 +00:00
Fredrik Pettai
8abb7ceb7b * kasp_check command added to check the conf.xml and kasp.xml
configuration files for sanity and consistency
* communicated and keygend combined to form "enforcerd" (although this
  name will change).
* ksmutil command line changes. Most commands have changed slightly, some
  have changed lots.
  See http://svn.opendnssec.org/docs/command-tools-syntax.txt .
* enforcer database now has a version number. If it differs from a #define
  in the code then the software will not connect to the database.
* "ksmutil list keys" now displays the keytag if the -l flag is passed to it.
* "Emergency Keys" renamed to "Standby Keys" as this better reflects their
   role as we use them.
* The behaviour of SOA Serial value 'counter' changed according to Ticket #31.
* changes to the KASP DB, please apply:
  If want to use your old database, use the following commands to upgrade:
    sqlite3 <PATH_TO_ENFORCER.DB> < enforcer/utils/migrate_090922_1.sqlite3
    sqlite3 <PATH_TO_ENFORCER.DB> < enforcer/utils/migrate_090930_1.sqlite3
  Or start fresh (with loss of information. User should remove old keys
  from the HSM):
    ksmutil setup
* move xml/ to conf/ (part of repository clean)

Bugfixes:
* Make sure that parenthesis in zonefiles don't concatenate rdata fields.

Known issues:
* TCP-support for LDNS on Solaris is currently broken due to an issue with
  SO_RCVTIMEO. The result is that the zonefetcher doesn't work. No other parts
  of OpenDNSSEC is affected by this bug. There is currently no workaround.
2009-10-02 21:29:02 +00:00
Fredrik Pettai
77232df11e Fixed small cleanups 2009-09-29 21:54:44 +00:00
Fredrik Pettai
be5c79438d Fixed Java dependency, VARBASE and PLIST 2009-09-29 15:10:19 +00:00
Fredrik Pettai
28b03b7326 Added license, breakout auditor + dependency to ruby 2009-09-29 08:14:37 +00:00
Fredrik Pettai
213e364f00 Fixed dnsruby dependency (${RUBY_PKGPREFIX})
Added python dependency
2009-09-28 21:36:19 +00:00
Fredrik Pettai
9539123a8c Fixed DEPENDS for dnsruby package, which was fixed. 2009-09-28 20:36:36 +00:00
Fredrik Pettai
00d0702b3d Add description file 2009-09-26 23:49:58 +00:00
Fredrik Pettai
a9cf1c0a41 Empty file 2009-09-26 23:49:01 +00:00
Fredrik Pettai
a653f0961a The OpenDNSSEC project announces the development of Open Source software
that manages the security of domain names on the Internet.
The project intends to drive adoption of Domain Name System Security Extensions
(DNSSEC) to further enhance Internet security.

The Features of OpenDNSSEC
- No manual management is needed (after first configuration)
- Works with all different versions of the Unix operating system
- Multiple zones with shared or individual policies
- Each policy specifies a set of key and signature settings
- Handle zone sizes ranging from a few RRs to millions of RRs
- Unsigned zone file in and signed zone file out.
- Supports RSA/SHA1 signatures ? ready for future algorithms
  (e.g.RSA/SHA2, GOST)
- Denial of existence using NSEC or NSEC3
- Automatic key generation in HSMs via the PKCS#11 interface
- Option support for sharing keys between zones
- Automatic key rollover
- Possibility of manual key rollover (emergency key rollover)
- Automatic zone signing using HSMs via the PKCS#11 interface
- Auditing of the signing process and result
- BSD license
2009-09-26 23:46:33 +00:00