Hello!
CZ.NIC just released a new version of Knot DNS. There are some bug fixes
and improvements as usual. But most of the changes are new features.
The bug fixes are mostly insignificant, so I'll make it quick:
- We have resolved a problem with NSEC-signed zones when a wildcard was
incorrectly expanded below a closer empty non-terminal.
- The checks on the incoming IXFR were improved so that we now refuse
transfers containing non-existing records to be removed. This problem
was identified in draft-song-dnsop-ixfr-fallback-01.
- The kdig utility can now correctly process IXFR response with empty
content (i.e. when the zone is up-to-date).
- The server now makes sure that PKCS #11 modules are not loaded
multiple times.
As for the improvements:
- The code for semantic checks was refactored and the error messages
should be a bit more readable.
- The TC flag setting in delegation is now set only if the mandatory
glue doesn't fit. Optional glue may not fit and the TC flag won't be
set See my e-mail "glue and TC flags revisited" for more details:
https://lists.nic.cz/pipermail/knot-dns-users/2016-June/000905.html
- With the new version, you can set different EDNS(0) payload size
for IPv4 and IPv6. See max-ipv4-udp-payload and max-ipv6-udp-payload
configuration options.
And now the interesting new stuff:
- DNSSEC policy can be now defined in the server configuration. This
makes automatic signing even easier to use. It's only a few lines
of the configuration file. Really. Please, have a look at the
"Automatic DNSSEC signing" section in the documentation.
For easy transition, if the policies are not defined in the server
configuration, the ones from the old KASP database are used instead.
The keymgr with the --legacy option can be used to maintain the old
policies.
The KASP database is still used to store signing state and private
key material. This might be changed in the future versions.
- We have added support for automatic NSEC3 resalting. For this
purpose, the new nsec3-salt-length and nsec3-salt-lifetime policy
options were added.
Please note that in the previous releases, the NSEC/NSEC3 mode
for DNSSEC signing was determined by the presence of NSEC3PARAM
record in the zone. This is no longer true. The nsec3 policy option
is used instead. Note that this option was already present in older
releases but it didn't work; please check your signing policies
before the upgrade.
- The control interface was extended to allow changing the zone content.
It's experimental, the changes are internally processed similarly to
DDNS which brings the same performance drawbacks, but we would like
to builds some more robust interface on top of this one.
- The zone size limit for DDNS, AXFR, and IXFR can be now enforced
using the max-zone-size option. The default is unlimited. This is
our solution for the CVE-2016-6171.
Please note that for IXFR, the effective limit for the total size of
the records in the transfer is twice the configured value. However
the final zone size must satisfy the limit fully.
- The kdig utility can talk TLS. Also EDNS(0) padding is supported.
Does your local resolver support DNS-over-TLS? Give it a try:
$ kdig +tls +alignment=512
www.knot-dns.cz
And that's it! Thank you for using Knot DNS. And we are really looking
forward to your feedback.
Full changelog:
https://gitlab.labs.nic.cz/labs/knot/raw/v2.3.0/NEWS
Sources:
https://secure.nic.cz/files/knot-dns/knot-2.3.0.tar.xz
GPG signature:
https://secure.nic.cz/files/knot-dns/knot-2.3.0.tar.xz.asc
Best regards,
Jan
--
Jan Včelák, Knot DNS
CZ.NIC Labs
https://www.knot-dns.cz
--------------------------------------------
Milešovská 5, 130 00 Praha 3, Czech Republic
WWW:
https://labs.nic.cz https://www.nic.cz