Package: knot-resolver / 5.6.0-1+deb12u1
Metadata
Package | Version | Patches format |
---|---|---|
knot-resolver | 5.6.0-1+deb12u1 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 validator lower the NSEC3 iteration limit 150 50.patch | (download) |
lib/dnssec/nsec3.h |
7 2 + 5 - 0 ! |
validator: lower the nsec3 iteration limit (150 -> 50) Also done by BIND9 >= 9.19.19: https://gitlab.isc.org/isc-projects/bind9/-/merge_requests/8515 The latest real-life measurements show that values above 50 are rare: https://chat.dns-oarc.net/community/pl/aadp9wwrp7g7ux1b8chbzebmze |
0002 validator similarly also limit excessive NSEC3 salt .patch | (download) |
lib/cache/api.c |
2 1 + 1 - 0 ! |
validator: similarly also limit excessive nsec3 salt length Limit combination of iterations and salt length, based on estimated |
0003 lib cache limit the amount of work on SHA1.patch | (download) |
lib/cache/nsec3.c |
14 14 + 0 - 0 ! |
lib/cache: limit the amount of work on sha1 That's when searching NSEC3 aggressive cache. |
0004 validator limit the amount of work on SHA1 in NSEC3 .patch | (download) |
lib/dnssec/nsec3.c |
12 12 + 0 - 0 ! |
validator: limit the amount of work on sha1 in nsec3 proofs |
0005 validator refuse to validate answers with more than .patch | (download) |
lib/layer/validate.c |
18 18 + 0 - 0 ! |
validator: refuse to validate answers with more than 8 nsec3 records |
0006 validator compatibility with older libknot versions.patch | (download) |
lib/layer/validate.c |
2 1 + 1 - 0 ! |
validator: compatibility with older libknot versions The value is in IANA registry, so it's very constant anyway. |
0007 lib cache bump CACHE_VERSION.patch | (download) |
lib/cache/api.c |
2 1 + 1 - 0 ! |
lib/cache: bump cache_version Ideally we would've done that at once with increasing NSEC3 strictness, i.e. in 5.7.1 + 6.0.6, as otherwise we could run into some recoverable assertions until the records got removed or expired. We at least do the bump now. |
0008 lib dnssec kr_rrset_validate_with_key deduplicate cl.patch | (download) |
lib/dnssec.c |
11 5 + 6 - 0 ! |
lib/dnssec kr_rrset_validate_with_key(): deduplicate cleanup |
0009 lib resolve kr_request_set_extended_error tweak prio.patch | (download) |
lib/resolve.c |
2 1 + 1 - 0 ! |
lib/resolve kr_request_set_extended_error(): tweak priorities Keep the first error in case priorities are equal. At least with the current KeyTrap topic that should work better, but blaming a single error is alchemy anyway, at least in some cases. |
0010 mitigate KeyTrap DoS CVE 2023 50387.patch | (download) |
daemon/engine.c |
1 1 + 0 - 0 ! |
mitigate keytrap dos = cve-2023-50387 |
0011 mitigate KeyTrap DoS CVE 2023 50387.patch | (download) |
lib/dnssec.c |
7 4 + 3 - 0 ! |
mitigate keytrap dos = cve-2023-50387 Improve: don't retry in this case. |
0012 lib dnssec fix imprecise assertion.patch | (download) |
lib/dnssec.c |
2 1 + 1 - 0 ! |
lib/dnssec: fix imprecise assertion It was no longer correct after commit cc5051b444130 (KeyTrap). |
0013 daemon more avoidance of excessive TCP reconnections.patch | (download) |
daemon/io.c |
38 10 + 28 - 0 ! |
daemon: more avoidance of excessive tcp reconnections Previously this penalization was only triggered if the remote server closed TCP. Now it's extended to us closing it when the server (only) sends back some nonsense. At least for the cases which I could see immediately. That's just three trivial one-line additions; the rest is refactoring. |