Hi, NSD 4.3.7rc1 pre-release is available: https://nlnetlabs.nl/downloads/nsd/nsd-4.3.7rc1.tar.gz sha256 b9a046bdd98bfaea3c4dc0fcab401160d22c1af50e866c30a2c8cbe913b5de64 pgp https://nlnetlabs.nl/downloads/nsd/nsd-4.3.7rc1.tar.gz.asc This release fixes a crash in dnstap. New features are XoT which provides AXFR and IXFR over TLS, and DNS Cookies support and SVCB and HTTPS RR type support. For zone transfer TLS can be turned on by specifying the tls-auth-name in the request-xfr config option, like request-xfr: 192.0.2.1 NOKEY ns.example.com With the tls-cert-bundle option, in the server section, the list of certificates for authenticating the transfers over TLS can be configured. The DNS cookies can be turned on or off with the answer-cookie option, and instead of a randomly generated secret, for anycast or loadbalanced deployment, the secret can be configured with cookie-secret or cookie-secret-file and rollover of the cookie secret can be performed with the nsd-control commands add_cookie_secret, activate_cookie_secret and drop_cookie_secret, using the cookie-secret-file. The SVCB and HTTPS RR type support mean that in zone files the syntax for these RR types can be used and is written when a zone is downloaded. In previous versions the unknown RR type support code provided a fallback syntax in zone files and on the wire functionality for these types. 4.3.7 ===============FEATURES: - Syntax of SVCB and HTTPS RR type as per draft-ietf-dnsop-svcb-https - Client side DNS Zone Transfer-over-TLS (XoT) support as per draft-ietf-dprive-xfr-over-tls - Interoperable DNS Cookies support as per RFC7873 and RFC9018 BUG FIXES: - Fix for #170: Fix build warnings when IPv6 is disabled. - Fix #170: Disabled IPv6 and DNSTAP enabled triggers a build error. - Fix for #128: Skip over sendmmsg invalid argument when port is zero. - Fix #171: Invalid negative response (NSEC3) after IXFR. - Fix to make nsec3_chain_find_prev return NULL if one nsec3 left. - Fix #174: NS Records below delegation are not ignored (nsd-checkzone also does not raise any issue). - Fix #176: please review Loglevel on missing zonefile. - Update the ACX_CHECK_NONBLOCKING_BROKEN test for the configure script. - Fix #179: log notice and server-count. - Update configure nonblocking test to use host. - Fix #168: Buffer overflow in the dname_to_string() function - Fixes for child server processes getting out of sync with the dnstap-collector process - Fix gcc-11 warning on array bounds. Best regards, Wouter -------------- next part -------------- A non-text attachment was scrubbed... Name: OpenPGP_signature Type: application/pgp-signature Size: 840 bytes Desc: OpenPGP digital signature URL: <http://lists.nlnetlabs.nl/pipermail/nsd-users/attachments/20210715/6edafa31/attachment.bin>
Am 15.07.21 um 09:27 schrieb Wouter Wijngaards via nsd-users:> For zone transfer TLS can be turned on by specifying the tls-auth-name > in the request-xfr config option, like > request-xfr: 192.0.2.1 NOKEY ns.example.com > With the tls-cert-bundle option, in the server section, the list of > certificates for authenticating the transfers over TLS can be configured.* Only the client side is mentioned here. Is the server side already implemented? Otherwise XoT between two NSD instances is not possible yet. Some clarification would be helpful. * typo in xfrd-tcp.c: sucessful -> successful Andreas
Hi, NSD 4.3.7 release is available: https://nlnetlabs.nl/downloads/nsd/nsd-4.3.7.tar.gz sha256 fd3b9ec53bbd168d567a0bfcdf140c966511fdaf78bd539d091c1a13c13be8ad pgp https://nlnetlabs.nl/downloads/nsd/nsd-4.3.7.tar.gz.asc This release fixes a crash in dnstap. New features are XoT which provides AXFR and IXFR over TLS, and DNS Cookies support and SVCB and HTTPS RR type support. For zone transfer TLS can be turned on by specifying the tls-auth-name in the request-xfr config option, like request-xfr: 192.0.2.1 NOKEY ns.example.com With the tls-cert-bundle option, in the server section, the list of certificates for authenticating the transfers over TLS can be configured. The DNS cookies can be turned on or off with the answer-cookie option, and instead of a randomly generated secret, for anycast or loadbalanced deployment, the secret can be configured with cookie-secret or cookie-secret-file and rollover of the cookie secret can be performed with the nsd-control commands add_cookie_secret, activate_cookie_secret and drop_cookie_secret, using the cookie-secret-file. The SVCB and HTTPS RR type support mean that in zone files the syntax for these RR types can be used and is written when a zone is downloaded. In previous versions the unknown RR type support code provided a fallback syntax in zone files and on the wire functionality for these types. Compared to the pre-release version there are a couple small bugfixes in the final release version, notably a fix for failure to compile without ipv6. 4.3.7 ===============FEATURES: - Syntax of SVCB and HTTPS RR type as per draft-ietf-dnsop-svcb-https - Client side DNS Zone Transfer-over-TLS (XoT) support as per draft-ietf-dprive-xfr-over-tls - Interoperable DNS Cookies support as per RFC7873 and RFC9018 BUG FIXES: - Fix for #170: Fix build warnings when IPv6 is disabled. - Fix #170: Disabled IPv6 and DNSTAP enabled triggers a build error. - Fix for #128: Skip over sendmmsg invalid argument when port is zero. - Fix #171: Invalid negative response (NSEC3) after IXFR. - Fix to make nsec3_chain_find_prev return NULL if one nsec3 left. - Fix #174: NS Records below delegation are not ignored (nsd-checkzone also does not raise any issue). - Fix #176: please review Loglevel on missing zonefile. - Update the ACX_CHECK_NONBLOCKING_BROKEN test for the configure script. - Fix #179: log notice and server-count. - Update configure nonblocking test to use host. - Fix #168: Buffer overflow in the dname_to_string() function - Fixes for child server processes getting out of sync with the dnstap-collector process - Fix gcc-11 warning on array bounds. - Fix compile of cookies on FreeBSD without IPv6. - Fix for loop initial declaration for nonc99 compiler - Fix typo in xfrd-tcp.c. Best regards, Wouter -------------- next part -------------- A non-text attachment was scrubbed... Name: OpenPGP_signature Type: application/pgp-signature Size: 840 bytes Desc: OpenPGP digital signature URL: <http://lists.nlnetlabs.nl/pipermail/nsd-users/attachments/20210722/f61feeb5/attachment.bin>