1
0
mirror of https://git.openwrt.org/feed/packages.git synced 2024-06-18 13:23:57 +02:00
Commit Graph

49 Commits

Author SHA1 Message Date
Ryan Keane
d421db0527 unbound: Update to 1.20.0
Updated 010-configure-uname.patch as source changed.
Removed 100-example-conf-in.patch as not needed any more.

Release message:

This release has a fix for the DNSBomb issue CVE-2024-33655. This has a
low severity for Unbound, since it makes Unbound complicit in targeting
others, but does not affect Unbound so much.

To mitigate the issue new configuration options are introduced.
The options discard-timeout: 1900, wait-limit: 1000
and wait-limit-cookie: 10000 are enabled by default. They limit the
number of outstanding queries that a querier can have. This limits
the reply pulse, and make Unbound less favorable for the issue.
With the config wait-limit-netblock and wait-limit-cookie-netblock
the parameters can be fine tuned for specific destinations.
More information on the attack and Unbound's mitigations are
presented further down.

Other fixes in this release are that Unbound no longer follows symlinks
when truncating the pidfile. Unbound also does not chown the pidfile,
this is for safety reasons. There are also a number of fixes for RPZ, in
handling CNAMEs. There is a memory leak fix for the edns client subnet
cache. For DNSSEC validation a case is fixed when the query is of type
DNAME. The unbound-anchor program is fixed to first write to a temporary
file, before replacing the original. This handles disk full situations,
and because of it unbound-anchor needs permission to create that file,
in the same directory as the original file. There is also a fix for
IP_DONTFRAG, to disable fragmentation instead of the opposite.

The option cache-min-negative-ttl can be used to set the minimum TTL
for negative responses in the cache. It complements existing options to
set the maximum ttl for negative responses and to set the minimum and
maximum ttl but not specifically for negative responses.

The option cachedb-check-when-serve-expired option makes Unbound use
cachedb to check for expired responses, when serve-expired is enabled,
and cachedb is used. It is enabled by default.

The -q option for unbound-checkconf can be added to silence it when
there are no errors.

Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
2024-06-16 16:44:45 -07:00
Jan Klos
558cbcac46
unbound: update to 1.19.3
Signed-off-by: Jan Klos <jan@klos.xyz>
2024-03-18 21:26:51 +01:00
S. Brusch
35ba14e50c unbound: update to latest upstream release version 1.19.1
Maintainer: @EricLuehrsen
Fixes: CVE-2023-50387, CVE-2023-50868
Release notes: https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
Run tested: BPi-R3, mediatek/filogic, OpenWrt 23.05.2
Signed-off-by: S. Brusch <ne20002@gmx.ch>
2024-02-18 19:30:22 +01:00
Eric Luehrsen
183f166279 unbound: update to 1.19.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2023-11-13 10:52:05 +08:00
Eric Luehrsen
03f70dcfd5 unbound: update to 1.18.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2023-09-09 10:05:22 +02:00
Ted Hess
2a71e17ca1 Unbound: Silence SSL unexpected eof messages
Refs: https://github.com/NLnetLabs/unbound/issues/812
      https://github.com/NLnetLabs/unbound/issues/846

This is a backport of: https://github.com/NLnetLabs/unbound/commit/d7e7761
and can be removed with the next release/update of the Unbound package

Signed-off-by: Ted Hess <thess@kitschensync.net>
2023-08-21 16:01:11 -04:00
Josef Schlehofer
97e69ec89c
unbound: update to version 1.17.1
- Refreshed one patch
- Removed deprecated AUTORELEASE

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-02-10 15:25:35 +01:00
Eric Luehrsen
6bc0293a73 unbound: update to 1.17.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2022-11-21 18:58:11 +08:00
Josef Schlehofer
027533f9a2
unbound: update to version 1.16.3
Changelog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-16-3
- Fixes: CVE-2022-3204

Refreshed one patch

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-09-25 12:25:59 +02:00
Pascal Ernster
2179432991
unbound: update to 1.16.2, fix CVE-2022-30698, CVE-2022-30699
Maintainer: @EricLuehrsen
Compile tested: x86/64
Run tested: x86/64
Description: Update to 1.16.2, fix CVE-2022-30698 and CVE-2022-30699.

Signed-off-by: Pascal Ernster <git@hardfalcon.net>
2022-08-02 23:43:45 +02:00
Pascal Ernster
e702a66058 unbound: update to 1.16.1
Maintainer: @EricLuehrsen
Compile tested: realtek/rtl838x, x86/64
Run tested: realtek/rtl838x, x86/64
Description: Update to 1.16.1

Signed-off-by: Pascal Ernster <git@hardfalcon.net>
2022-07-19 12:29:19 +03:00
Stijn Segers
695e0dbaa4 unbound: update to 1.16.0
Signed-off-by: Stijn Segers <foss@volatilesystems.org>
2022-06-19 00:44:36 -06:00
Josef Schlehofer
2abe98e134
unbound: update to version 1.15.0
Refresh patch

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-02-11 17:11:44 +01:00
Eric Luehrsen
824aa45133 unbound: update to 1.14.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2021-12-10 10:50:14 +01:00
Ansuel Smith
212eddb92b unbound: backport fix for permission denied error
Currently there is a problem with log spam when ipv6 network
is dropped. Fix this by backporting a patch to silence these errors
when verbose logging is not enabled.

Signed-off-by: Ansuel Smith <ansuelsmth@gmail.com>
2021-09-08 16:30:47 -04:00
Eric Luehrsen
17c25269d7 unbound: update to 1.3.2
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2021-08-17 02:24:37 -04:00
Felix Fietkau
cc1d0aa3d2 unbound: fix build on non-linux systems
Override places that call uname to detect target features

Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-06-16 12:59:00 +02:00
Ilya Lipnitskiy
5d8d4fbbcb
treewide: Run refresh on all packages
The crude loop I wrote to come up with this changeset:

  find -L package/feeds/packages/ -name patches | \
  sed 's/patches$/refresh/' | sort | xargs make

Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
2021-02-20 16:02:15 -08:00
Eric Luehrsen
874b65b3b0 unbound: update to 1.9.1 and remove upstream patches
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2019-03-12 20:02:34 -04:00
Jan Pavlinec
f986379802
unbound: update to version 1.9.0
Changes:
-remove old dns64 patch
-refresh openssl deprecated patch
-add DoT error log patch https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=4206

Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2019-02-11 12:34:22 +01:00
Jan Pavlinec
c4a57c3f07
unbound: add patch to fix dns64 crash
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2018-12-19 10:19:06 +01:00
Eric Luehrsen
0b4da5d97d unbound: update to 1.8.2
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2018-12-05 00:31:05 -05:00
Rosen Penev
1200c508fb unbound: Remove deprecated OpenSSL API
This will become pointless once OpenSSL 1.1.1 enters the tree.

Signed-off-by: Rosen Penev <rosenp@gmail.com>
2018-11-05 16:32:11 -08:00
Eric Luehrsen
361446f409 unbound: update to 1.8.1
bug fixes for memory leaks
bug fixes for DNS over TLS

Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2018-10-09 22:23:03 -04:00
Eric Luehrsen
10665f5ce9 unbound: add patches for leaks during TLS query
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2018-09-27 23:21:58 -04:00
Eric Luehrsen
32ad87ca80 unbound: update to 1.8.0
- adjust a few UCI translations to coordinate with upstream defaults
- remove OpenSSL < 1.1.0 API log error patch which is included upstream

Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2018-09-15 20:42:10 -04:00
Eric Luehrsen
1cccacf359 unbound: log openssl-1.0.2 lacks TLS host verification
ssl_set1_host() is not available without openssl-1.1.0. Unbound can not do
host cert verification. DNS over TLS connects, but hosts are unverified. A
patch for log err is added with a noitce in README.md.
(see: https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=658)

Also, squash some minor robustness and TLS usability fixes.

Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2018-08-10 02:11:13 -04:00
Eric Luehrsen
6a2239cbc0 unbound: update to 1.7.3
Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2018-06-23 12:47:14 -04:00
Eric Luehrsen
d6e7f64a3d unbound: update to 1.7.2
A few bug fixes but importantly fix a deadlock on
AXFR configuration when notify occurs (auth-zone:)

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2018-06-12 22:03:51 -04:00
Eric Luehrsen
b3f01f407a unbound: update to 1.7.1
Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2018-05-05 10:10:11 -04:00
Eric Luehrsen
0776f28b37 unbound: update to 1.7.0
Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2018-03-18 14:48:50 -04:00
Eric Luehrsen
d12d2e31d3 unbound: update to 1.6.8 for CVE-2017-15105
A vulnerability was discovered in the processing of wildcard synthesized
NSEC records. While synthesis of NSEC records is allowed by RFC4592,
these synthesized owner names should not be used in the NSEC processing.
This does, however, happen in Unbound 1.6.7 and earlier versions.
(see https://unbound.net/downloads/CVE-2017-15105.txt)

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2018-01-19 20:11:49 -05:00
Eric Luehrsen
e59bc86e21 unbound: update to 1.6.7
Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-10-11 00:12:48 -04:00
Eric Luehrsen
d61a16ca11 unbound: update to 1.6.6
Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-09-21 22:54:35 -04:00
Eric Luehrsen
92c4fa477b unbound: update to 1.6.5
This fixes the root.key file if created when unbound is installed between sep11 and oct11 2017

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-08-21 23:24:23 -04:00
Eric Luehrsen
3dbd00df3c unbound: update to 1.6.4
Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-06-27 23:47:46 -04:00
Eric Luehrsen
a7c293fe3a unbound: update to version 1.6.2
Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-04-25 20:42:15 -04:00
Eric Luehrsen
f85b021eaf unbound: Update to 1.6.1 with 2017 trust anchor
Unbound 1.6.1 has a few bug fixes for resource leaks,
configuration robustness, compile environment interaction,
and maintaining the trust anchor. The 2017 trust anchor
(DS) is built into unbound and unbound-anchor.

File /etc/unbound/root.key holds 2010/2017 DS record until 2018
https://www.icann.org/resources/pages/ksk-rollover
https://www.iana.org/domains/root

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2017-02-25 23:36:21 -05:00
Eric Luehrsen
e9226f1d26 unbound: update 1.6.0
- future opportunity: added "views:" clause
-- consider won't need UCI for security instances
-- consider access lists, forwards, views, and tags
-- consider query denial for DNS amplification defense
- future opportunity: thrifted "local-zone:" memory bloat
-- consider adblock package to feed thru unbound-control
-- consider access lists, forwards, views, and tags
-- consider offering LuCI parental controls or other

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2016-12-18 22:38:19 -05:00
Eric Luehrsen
8dfd5d0b84 Unbound: Incorporate hotplug/iface and root.key in tmpfs
-Patch for /etc/unbound/unbound.conf
--All work done in /var/lib/unbound/
--chroot or jail to /var/lib/unbound/
-Init script points to /usr/lib/unbound.sh
-Makefile to install new scripts in the package

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2016-10-30 00:22:53 -04:00
Eric Luehrsen
acf40cf6ae Unbound: Group patch work for example.conf.in
-Remove interlaced configuration changes
--Less sensitive to upstream example.conf changes
--Easier to read patch-of-patch work for maintenance
-Use MEMORY CONTROL EXAMPLE from http://unbound.net/
--Review and rework with respect to previous pacakge
--Effectively the same configuration as previous package
-Disable DNSSEC by default due to real-time chicken-n-egg
--Many OpenWrt target devices have no power-off clock (reboot)
--User choice of work around should be conscious
--Initial install should not fail reboot with DNSSEC default
-Add some defaults explicitly to prevent surprises

Signed-off-by: Eric Luehrsen <ericluehrsen@hotmail.com>
2016-10-20 21:52:22 -04:00
Hannu Nyman
524e19171c unbound: fix whitespace
* Fix upstream whitespace change in the patch.
* Minor cleanup to the header.

Signed-off-by: Hannu Nyman <hannu.nyman@iki.fi>
2016-10-18 18:24:17 +03:00
Stijn Segers
56891725c1 unbound: update to 1.5.10
Signed-off-by: Stijn Segers <francesco.borromini@inventati.org>
2016-10-18 18:22:37 +03:00
Michael Hanselmann
414eaacd90 unbound: Switch to non-privileged user
Until now unbound was always running as root by default. A DNS resolver can
easily run under a non-privileged user.

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2016-06-14 22:09:39 +02:00
Michael Hanselmann
c0e5d5ee45 unbound: Remove named.cache
The custom list of DNS root servers provided with the package is not necessary.
Unbound ships with a built-in list.

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2016-06-14 22:09:31 +02:00
Michael Hanselmann
67567e4536 [Unbound] Update to 1.5.7
Bump unbound to version 1.5.7 released on December 10, 2015.

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2015-12-14 23:33:18 +01:00
Michael Hanselmann
af3b2635df Update net/unbound to version 1.5.3
unbound 1.5.3 was released on March 10, 2015.

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2015-04-19 22:32:14 +02:00
Heiner Kallweit
2cfb8c6c2a unbound: bump to version 1.5.1
Signed-off-by: Heiner Kallweit <hkallweit1@gmail.com>
2015-02-12 21:01:12 +01:00
Michael Hanselmann
6f2ceb74b9 Import net/unbound package from Subversion
This is an import of the net/unbound package from Subversion
revision 40658 (May 2, 2014). The only change is the addition of
PKG_LICENSE, PKG_LICENSE_FILE and PKG_MAINTAINER to Makefile.
Unbound 1.4.22 is the current upstream release.

Signed-off-by: Michael Hanselmann <public@hansmi.ch>
2014-08-19 05:15:22 +02:00