Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified)) by mollari.NetBSD.org (Postfix) with ESMTPS id 5257E1A9217 for ; Fri, 4 Dec 2020 15:03:15 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id B867284D55; Fri, 4 Dec 2020 15:03:14 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id F362484D31 for ; Fri, 4 Dec 2020 15:03:13 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([IPv6:::1]) by localhost (mail.netbsd.org [IPv6:::1]) (amavisd-new, port 10025) with ESMTP id qJ4YCh3P5XxI for ; Fri, 4 Dec 2020 15:03:13 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id 030BA84CE1 for ; Fri, 4 Dec 2020 15:03:13 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id EBAE1FA9D; Fri, 4 Dec 2020 15:03:12 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1607094192188820" MIME-Version: 1.0 Date: Fri, 4 Dec 2020 15:03:12 +0000 From: "Havard Eidnes" Subject: CVS commit: pkgsrc/net/unbound To: pkgsrc-changes@NetBSD.org Reply-To: he@netbsd.org X-Mailer: log_accum Message-Id: <20201204150312.EBAE1FA9D@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1607094192188820 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: he Date: Fri Dec 4 15:03:12 UTC 2020 Modified Files: pkgsrc/net/unbound: Makefile distinfo Log Message: Update unbound to version 1.13.0. Pkgsrc changes: * none, other than checksums. Upstream changes: This version has fixes to connect for UDP sockets, slowing down potential ICMP side channel leakage. The fix can be controlled with the option udp-connect: yes, it is enabled by default. Additionally CVE-2020-28935 is fixed, this solves a problem where the pidfile is altered by a symlink, and fails if a symlink is encountered. See https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt for more information. New features are upstream TCP and TLS query reuse, where a channel is reused for several queries. And http-notls-downstream: yesno for unencrypted DoH, useful for back end support servers. The option infra-keep-probing can be used to probe hosts that are down more frequently. The options edns-client-string and edns-client-string-opcode can be used to add an EDNS option with the specified string in queries towards servers, with the servers specified by IP address. It replaces the edns-client-tag option. The released version equals the 1.13.0rc4 with an added fix for stream reuse and tcp fast open. Features - Pass the comm_reply information to the inplace_cb_reply* functions during the mesh state and update the documentation on that. - Fix #330: [Feature request] Add unencrypted DNS over HTTPS support. This adds the option http-notls-downstream: yesno to change that, and the dohclient test code has the -n option. - Merge PR #228 : infra-keep-probing option to probe hosts that are down. Add infra-keep-probing: yes option. Hosts that are down are probed more frequently. With the option turned on, it probes about every 120 seconds, eventually after exponential backoff, and that keeps that way. If traffic keeps up for the domain. It probes with one at a time, eg. one query is allowed to probe, other queries within that 120 second interval are turned away. - Merge PR #313 from Ralph Dolmans: Replace edns-client-tag with edns-client-string option. - Merge PR #283 : Stream reuse. This implements upstream stream reuse for performing several queries over the same TCP or TLS channel. - Fix to connect() to UDP destinations, default turned on, this lowers vulnerability to ICMP side channels. Option to toggle udp-connect, default is enabled. Bug Fixes - Fix #319: potential memory leak on config failure, in rpz config. - Fix dnstap socket and the chroot not applied properly to the dnstap socket path. - Fix warning in libnss compile, nss_buf2dsa is not used without DSA. - Fix #323: unbound testsuite fails on mock build in systemd-nspawn if systemd support is build. - Fix for python reply callback to see mesh state reply_list member, it only removes it briefly for the commpoint call so that it does not drop it and attempt to modify the reply list during reply. - Fix that if there are on reply callbacks, those are called per reply and a new message created if that was modified by the call. - Free up auth zone parse region after use for lookup of host - Merge PR #326 from netblue30: DoH: implement content-length header field. - DoH content length, simplify code, remove declaration after statement and fix cast warning. - Fix that if there are reply callbacks for the given rcode, those are called per reply and a new message created if that was modified by the call. - Fix that the out of order TCP processing does not limit the number of outstanding queries over a connection. - Fix python documentation warning on functions.rst inplace_cb_reply. - Log ip address when http session recv fails, eg. due to tls fail. - Fix to set the tcp handler event toggle flag back to default when the handler structure is reused. - Clean the fix for out of order TCP processing limits on number of queries. It was tested to work. - Fix that http settings have colon in set_option, for http-endpoint, http-max-streams, http-query-buffer-size, http-response-buffer-size, and http-nodelay. - Fix memory leak of https port string when reading config. - local-zone regional allocations outside of chunk - Merge PR #324 from James Renken: Add modern X.509v3 extensions to unbound-control TLS certificates. - Fix for PR #324 to attach the x509v3 extensions to the client certificate. - Fix #327: net/if.h check fails on some darwin versions; contribution by Joshua Root. - Fix #320: potential memory corruption due to size miscomputation upton custom region alloc init. - Fix #333: Unbound Segmentation Fault w/ log_info Functions From Python Mod. - Fix that minimal-responses does not remove addresses from a priming query response. - In man page note that tls-cert-bundle is read before permission drop and chroot. - Fix #341: fixing a possible memory leak. - Fix memory leak after fix for possible memory leak failure. - Fix #343: Fail to build --with-libnghttp2 with error: 'SSIZE_MAX' undeclared. - Fix for #303 CVE-2020-28935 : Fix that symlink does not interfere with chown of pidfile. - Fix #347: IP_DONTFRAG broken on Apple xcode 12.2. - Fix #350: with the AF_NETLINK permission, to fix 1.12.0 error: failed to list interfaces: getifaddrs: Address family not supported by protocol. - Merge #351 from dvzrv: Add AF_NETLINK to set of allowed socket address families. - iana portlist updated. - Fix crash when TLS connection is closed prematurely, when reuse tree comparison is not properly identical to insertion. - Fix padding of struct regional for 32bit systems. - with udp-connect ignore connection refused with UDP timeouts. - Fix udp-connect on FreeBSD, do send calls on connected UDP socket. - Better fix for reuse tree comparison for is-tls sockets. Where the tree key identity is preserved after cleanup of the TLS state. - Fix memory leak for edns client tag opcode config element. - Attempt fix for libevent state in tcp reuse cases after a packet is written. - Fix readagain and writeagain callback functions for comm point cleanup. - Fix to omit UDP receive errors from log, if verbosity low. These happen because of udp-connect. - For #352: contrib/metrics.awk for Prometheus style metrics output. - Fix that after failed read, the readagain cannot activate. - Clear readagain upon decommission of pending tcp structure. - Fix compile warning for type cast in http2_submit_dns_response. - Fix when use free buffer to initialize rbtree for stream reuse. - Fix compile warnings for windows. - Fix compile warnings in rpz initialization. - Fix contrib/metrics.awk for FreeBSD awk compatibility. - Fix assertion failure on double callback when iterator loses interest in query at head of line that then has the tcp stream not kept for reuse. - Fix stream reuse and tcp fast open. To generate a diff of this commit: cvs rdiff -u -r1.79 -r1.80 pkgsrc/net/unbound/Makefile cvs rdiff -u -r1.60 -r1.61 pkgsrc/net/unbound/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1607094192188820 Content-Disposition: inline Content-Length: 1734 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/net/unbound/Makefile diff -u pkgsrc/net/unbound/Makefile:1.79 pkgsrc/net/unbound/Makefile:1.80 --- pkgsrc/net/unbound/Makefile:1.79 Thu Oct 8 07:30:39 2020 +++ pkgsrc/net/unbound/Makefile Fri Dec 4 15:03:12 2020 @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.79 2020/10/08 07:30:39 he Exp $ +# $NetBSD: Makefile,v 1.80 2020/12/04 15:03:12 he Exp $ -DISTNAME= unbound-1.12.0 +DISTNAME= unbound-1.13.0 CATEGORIES= net MASTER_SITES= http://www.nlnetlabs.nl/downloads/unbound/ Index: pkgsrc/net/unbound/distinfo diff -u pkgsrc/net/unbound/distinfo:1.60 pkgsrc/net/unbound/distinfo:1.61 --- pkgsrc/net/unbound/distinfo:1.60 Fri Nov 13 17:05:39 2020 +++ pkgsrc/net/unbound/distinfo Fri Dec 4 15:03:12 2020 @@ -1,8 +1,8 @@ -$NetBSD: distinfo,v 1.60 2020/11/13 17:05:39 jperkin Exp $ +$NetBSD: distinfo,v 1.61 2020/12/04 15:03:12 he Exp $ -SHA1 (unbound-1.12.0.tar.gz) = 68009078d5f5025c95a8c9fe20b9e84335d53e2d -RMD160 (unbound-1.12.0.tar.gz) = 9a7e7e93ae21ac76567bfb457dd2111531fc395e -SHA512 (unbound-1.12.0.tar.gz) = 90d99bc65e9ba62e50a7809dbf1e98889d0fc9fd50cf3cc99b726c67bcaeda0c2bc176d09f84771adb9796833b595591462f96e949d6969a47d6898d8fae3479 -Size (unbound-1.12.0.tar.gz) = 5918399 bytes +SHA1 (unbound-1.13.0.tar.gz) = f38a10b1f302cb41787c68d98e9b89f0e7dce613 +RMD160 (unbound-1.13.0.tar.gz) = cd40f23f7bbf084e97134d134a1a56c448eea50c +SHA512 (unbound-1.13.0.tar.gz) = d4f3c5a7df5d46f8b1ee32b61e68bdc0d63030820d236ecc51bc3ac356d15248acb9a5e0b6009e1936b03b751e8dd05a071a95ab239fdbbbb308442a59642ad5 +Size (unbound-1.13.0.tar.gz) = 5950063 bytes SHA1 (patch-configure) = a949bdb26b37950c0301946af4521c9d0e984cf9 SHA1 (patch-services_listen__dnsport.c) = 11c5b3af93f07da5e1375babea91725055baa08a --_----------=_1607094192188820--