History log of /openbsd/sbin/unwind/frontend.c (Results 1 – 25 of 83)
Revision Date Author Comments
# 7037e34c 05-Sep-2024 florian <florian@openbsd.org>

Sync to unbound 1.21.0; heavy lifting by sthen

parse_edns_from_query_pkt() grew a parameter to handle cookies, which
we don't use.


# 10427868 09-Aug-2024 florian <florian@openbsd.org>

Add 2024 root zone trust-anchor, it is expected to be used in 2026.

The trust-anchor was copied from the upcoming unbound(8) release and
verified against https://www.iana.org/reports/2024/root-ksk-2

Add 2024 root zone trust-anchor, it is expected to be used in 2026.

The trust-anchor was copied from the upcoming unbound(8) release and
verified against https://www.iana.org/reports/2024/root-ksk-2024.pdf

While here switch the 2017 trust-anchor from DNSKEY to DS to use the
same record type as for the 2024 trust-anchor. They are functionally
equivalent. It was verified against
https://www.iana.org/reports/2017/root-ksk-2017.pdf
As well as with run-time testing, i.e. unwind would still perform
DNSSEC validation.

checked pdfs & OK phessler

show more ...


# ce7279d8 21-May-2024 jsg <jsg@openbsd.org>

remove prototypes with no matching function and externs with no var
partly checked by millert@


# eeb36cc3 14-Dec-2023 claudio <claudio@openbsd.org>

Use imsg_get_fd() to access the fd passed with the imsg.
Go ahead florian@ OK tb@


# 6ced2d15 05-Sep-2023 florian <florian@openbsd.org>

Fix built.

The api changed to handle cookies and extended error codes.

Passing in NULL for config_file disables cookie handling so we do not
need to pass a valid comm_reply, NULL will do.


# cc695705 30-Apr-2023 jsg <jsg@openbsd.org>

avoid use after free
ok florian@


# c16f5ec7 08-Feb-2023 tb <tb@openbsd.org>

unwind: add two missing void to function definitions

Silences -Wstrict-prototype warnings seen with clang 15 on amd64 and arm64.

ok florian


# b9be5719 27-Nov-2022 tb <tb@openbsd.org>

Plug leak of tmp in case allocation of pq->abuf fails

ok florian


# 2de410b6 27-Nov-2022 tb <tb@openbsd.org>

KNF nit: place brace correctly

ok florian


# 69f07918 25-Nov-2022 bluhm <bluhm@openbsd.org>

Do not crash when a tcp query is larger than the length field
indicated.

Found by kn with amap.
Input bluhm.
OK deraadt, tb, otto, kn
from florian@


# dbf56da7 13-Mar-2022 florian <florian@openbsd.org>

parse_packet() is used by unbound to parse response packets, not
queries. There is no need to do all this work just to get access to
the query id and flags.

OK bket, sthen


# 1e80ba60 03-Mar-2022 florian <florian@openbsd.org>

Use LDNS_RCODE define; no functional change


# a1a7ba80 01-Mar-2022 florian <florian@openbsd.org>

Update to libunbound 1.15.0; heavy lifting by sthen in unbound(8).

Upstream renamed parse_edns_from_pkt to parse_edns_from_query_pkt and
added two arguments (config_file and comm_point) that we don'

Update to libunbound 1.15.0; heavy lifting by sthen in unbound(8).

Upstream renamed parse_edns_from_pkt to parse_edns_from_query_pkt and
added two arguments (config_file and comm_point) that we don't use,
adjust callers in frontend accordingly.

show more ...


# a86e21da 01-Mar-2022 florian <florian@openbsd.org>

Upstream renamed parse_extract_edns to
parse_extract_edns_from_response_msg and parse_edns_from_pkt to
parse_edns_from_query_pkt in libunbound 1.14.0.
Both funktions work equally well for us but it w

Upstream renamed parse_extract_edns to
parse_extract_edns_from_response_msg and parse_edns_from_pkt to
parse_edns_from_query_pkt in libunbound 1.14.0.
Both funktions work equally well for us but it would look weird to use
the "from_response_msg" function on the query so switch to
parse_edns_from_pkt in preparation for the libunbound update.

testing & OK sthen

show more ...


# 04e11352 16-Nov-2021 kn <kn@openbsd.org>

Validate RTM_PROPOSAL in resolver not frontend

The resolver is the actual consumer and shouldn't trust the frontend.
Fold the IPv4/IPv6 specific checks thanks to the previous commit.

Idea from flor

Validate RTM_PROPOSAL in resolver not frontend

The resolver is the actual consumer and shouldn't trust the frontend.
Fold the IPv4/IPv6 specific checks thanks to the previous commit.

Idea from florian
OK florian

show more ...


# abb04357 06-Feb-2021 florian <florian@openbsd.org>

Revert delayed opening of trust anchor file. The code was somewhat
ugly and the underlying problem (dhclient and unwind playing well
together) should be solved differently.
Final straw was jca report

Revert delayed opening of trust anchor file. The code was somewhat
ugly and the underlying problem (dhclient and unwind playing well
together) should be solved differently.
Final straw was jca reporting that it breaks his setup.

show more ...


# bdac6e2d 30-Jan-2021 florian <florian@openbsd.org>

Re-try to open DNSSEC trust anchor file if /var is not mounted yet.
This is a step towards starting unwind earlier, before the network is
up and partitions are mounted.
OK kn


# 5dca88ce 27-Jan-2021 florian <florian@openbsd.org>

Determine available address families (and monitor when this changes)
to configure libunbound accordingly. This way it no longer tries to
talk to IPv6 nameservers when only IPv4 is available and vice

Determine available address families (and monitor when this changes)
to configure libunbound accordingly. This way it no longer tries to
talk to IPv6 nameservers when only IPv4 is available and vice versa.
input deraadt
OK kn

show more ...


# 00b0420e 24-Jan-2021 florian <florian@openbsd.org>

Implement DNS64 synthesis.
When unwind(8) learns new autoconf resolvers (from dhcp or router
advertisements) it checks if a DNS64 is present in this network
location and tries to recover the IPv6 pre

Implement DNS64 synthesis.
When unwind(8) learns new autoconf resolvers (from dhcp or router
advertisements) it checks if a DNS64 is present in this network
location and tries to recover the IPv6 prefix used according to
RFC7050.
The learned autoconf resolvers are then prevented from upgrading to
the validating state since DNS64 breaks DNSSEC.
unwind(8) can now perform its own synthesis. If a query for a AAAA
record results in no answer we re-send the query for A and if that
leads to an answer we synthesize an AAAA answer using the learned
prefixes.

Testing & OK kn

show more ...


# d81b02e2 19-Jan-2021 florian <florian@openbsd.org>

Make imsg event structs static to fix -fno-common.
Follows claudio's lead in ospfd et al.
Problem reported by mortimer.


# 3538560b 19-Jan-2021 florian <florian@openbsd.org>

Move control_state and ctl_conns to control.c, it's not needed
elsewhere and unbreaks -fno-common.
Inspired by claudio
Problem reported by mortimer


# 7be68703 19-Jan-2021 florian <florian@openbsd.org>

Reduce scope of routesock unbreaking -fno-common.
Problem reported by mortimer.


# d223f0d9 19-Jan-2021 florian <florian@openbsd.org>

No need for a global uw_process; unbreaks -fno-common.
Problem reported by mortimer


# 297af7e1 12-Jan-2021 florian <florian@openbsd.org>

Implement listening on 53/TCP
Since we are only serving localhost we could get away with doing
serving over UDP only because we have a huge MTU on lo0, it's still
not correct behavior.
This also enab

Implement listening on 53/TCP
Since we are only serving localhost we could get away with doing
serving over UDP only because we have a huge MTU on lo0, it's still
not correct behavior.
This also enables sending truncated answers with TC set if the answer
does not fit into the edns announced udp size.

Testing at least by matthieu, jca, otto, phessler
OK phessler

show more ...


# a8ba344b 12-Jan-2021 florian <florian@openbsd.org>

Rewrite query parsing and answer formatting using libunbound provided
functions.
With this we can filter out DNSSEC RRsets if the client did not ask
for them. We will also be able to send truncated a

Rewrite query parsing and answer formatting using libunbound provided
functions.
With this we can filter out DNSSEC RRsets if the client did not ask
for them. We will also be able to send truncated answers to indicate
to the client to switch to tcp. This will be enabled in the next
commit.

Testing at least by matthieu, jca, otto, phessler
OK phessler

show more ...


1234