167 Commits

Author SHA1 Message Date
Goetz Goerisch
0ca33e71e9 unbound: update to 1.24.2
Fixes: Possible Domain Hijacking via promiscuous NS Records (CVE-2025-11411)
Changelog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-24-2
Upstream commit f6269baa605d31859f28770e01a24e3677e5f82c
f6269baa60

Signed-off-by: Goetz Goerisch <ggoerisch@gmail.com>
2025-12-10 18:38:27 +01:00
Dirk Brenken
4a72200214 unbound: minimal fix for odhcpd lease file parsing
Current odhcpd in master writes MAC addresses with colons in his lease file,
this new odhcpd format leads to a crash loop in unbound (if DHCPv4 to SLAAC is selected).

Just remove the colons, before the processing in slaac_eui64 begins, fixes #28032

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-12-10 18:06:06 +01:00
Eric Luehrsen
7b63002273 unbound: update to 1.24.0
latest upstream 09182024

Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2025-09-29 05:43:10 -03:00
Stan Grishin
26d248de26 unbound: update README
* add adblock-fast to the Ad Blocking segment
* fix grammar (Its -> It's)
* modify last paragraph of the instructions as they are specific to adblock

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2025-09-20 23:25:44 +08:00
Dirk Brenken
732a8405ef unbound: bring back the service to the startup menu
* trivial fix for #25963 to workaround the current "10 line parsing limit"

Signed-off-by: Dirk Brenken <dev@brenken.org>
2025-06-08 12:35:21 +03:00
Eric Luehrsen
a0df926a01 unbound: update to 1.23.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2025-05-09 21:52:16 +03:00
hingbong lo
da4d3e9ab1 Unbound: Fixed: local-data except IPv6 GA addresses with odhcpd
issue #25954

Signed-off-by: hingbong lo <hingbonglo@gmail.com>
2025-03-19 19:34:54 +08:00
Jan Klos
6b989e0ad5 unbound: update to 1.22.0
Signed-off-by: Jan Klos <jan@klos.xyz>
[Solve PKG_RELEASE conflict]
2024-11-10 21:24:52 +02:00
Ted Hess
4d8c6d1869 Unbound: fix file lock race in odhcpd.sh
Signed-off-by: Ted Hess <thess@kitschensync.net>
2024-11-10 11:50:19 -05:00
Jan Klos
4dd2a82c32 unbound: update to 1.21.0
Signed-off-by: Jan Klos <jan@klos.xyz>
2024-08-28 22:10:42 +02:00
Dirk Brenken
468862b06d Merge pull request #24765 from dibdot/unbound-gawk
unbound: fix gawk incompatibility
2024-08-16 09:33:56 +02:00
Tobias Waldvogel
733f235fda unbound: fix local cnames
For cnames with a local data target the A RR is not resolved and
missing in the response. As most applications don't send another
query and fail, these entries are placed in a rpz zone instead.

Signed-off-by: Tobias Waldvogel <tobias.waldvogel@gmail.com>
2024-08-16 14:41:28 +08:00
Dirk Brenken
9094060d81 unbound: fix gawk incompatibility
* fix gawk incompatibility in iptools.sh

Signed-off-by: Dirk Brenken <dev@brenken.org>
2024-08-15 05:03:24 +02:00
Ryan Keane
d421db0527 unbound: Update to 1.20.0
Updated 010-configure-uname.patch as source changed.
Removed 100-example-conf-in.patch as not needed any more.

Release message:

This release has a fix for the DNSBomb issue CVE-2024-33655. This has a
low severity for Unbound, since it makes Unbound complicit in targeting
others, but does not affect Unbound so much.

To mitigate the issue new configuration options are introduced.
The options discard-timeout: 1900, wait-limit: 1000
and wait-limit-cookie: 10000 are enabled by default. They limit the
number of outstanding queries that a querier can have. This limits
the reply pulse, and make Unbound less favorable for the issue.
With the config wait-limit-netblock and wait-limit-cookie-netblock
the parameters can be fine tuned for specific destinations.
More information on the attack and Unbound's mitigations are
presented further down.

Other fixes in this release are that Unbound no longer follows symlinks
when truncating the pidfile. Unbound also does not chown the pidfile,
this is for safety reasons. There are also a number of fixes for RPZ, in
handling CNAMEs. There is a memory leak fix for the edns client subnet
cache. For DNSSEC validation a case is fixed when the query is of type
DNAME. The unbound-anchor program is fixed to first write to a temporary
file, before replacing the original. This handles disk full situations,
and because of it unbound-anchor needs permission to create that file,
in the same directory as the original file. There is also a fix for
IP_DONTFRAG, to disable fragmentation instead of the opposite.

The option cache-min-negative-ttl can be used to set the minimum TTL
for negative responses in the cache. It complements existing options to
set the maximum ttl for negative responses and to set the minimum and
maximum ttl but not specifically for negative responses.

The option cachedb-check-when-serve-expired option makes Unbound use
cachedb to check for expired responses, when serve-expired is enabled,
and cachedb is used. It is enabled by default.

The -q option for unbound-checkconf can be added to silence it when
there are no errors.

Signed-off-by: Ryan Keane <the.ra2.ifv@gmail.com>
2024-06-16 16:44:45 -07:00
Stan Grishin
d7d1743c83 unbound: pull in adblock-fast generated adb_list
* adblock-fast can generate the compatible adb_list-file, but it's
  only pulled if net/adblock installed, this patch also pulls in the
  adb_list file if net/adblock-fast is installed.
* also bump PKG_RELEASE

Signed-off-by: Stan Grishin <stangri@melmac.ca>
2024-04-21 13:58:39 +00:00
Jan Klos
558cbcac46 unbound: update to 1.19.3
Signed-off-by: Jan Klos <jan@klos.xyz>
2024-03-18 21:26:51 +01:00
Paul Donald
b8e6c2d4fc unbound: spell fix
Closes openwrt/luci#6993

Signed-off-by: Paul Donald <newtwen@gmail.com>
2024-03-17 09:22:05 +08:00
Jan Klos
64da1fe3c6 unbound: bump release
Signed-off-by: Jan Klos <jan@klos.xyz>
2024-03-17 09:11:51 +08:00
Jan Klos
f5195eb213 unbound: add file parameter to service instance
that way, procd does not needlessly restart unbound on triggers when
everything remains the same - changes in non-default included
configuration files will not be registered, however

Signed-off-by: Jan Klos <jan@klos.xyz>
2024-03-17 09:11:51 +08:00
Jan Klos
d06c08b0ec unbound: remove date/time from config headers
so that procd can decide whether to restart unbound based on config
file changes

Signed-off-by: Jan Klos <jan@klos.xyz>
2024-03-17 09:11:51 +08:00
S. Brusch
35ba14e50c unbound: update to latest upstream release version 1.19.1
Maintainer: @EricLuehrsen
Fixes: CVE-2023-50387, CVE-2023-50868
Release notes: https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
Run tested: BPi-R3, mediatek/filogic, OpenWrt 23.05.2
Signed-off-by: S. Brusch <ne20002@gmx.ch>
2024-02-18 19:30:22 +01:00
Julien Cassette
8d60419251 unbound: fix create_host_record_from_host error when dns is not set
The function `create_host_record_from_host` fails if the `dns` option
is not set in the host entry.
This sets a default to the `dns` variable in order to fix this error.

Fixes: #22691

Signed-off-by: Julien Cassette <julien.cassette@gmail.com>
2023-11-22 13:19:00 +01:00
Eric Luehrsen
183f166279 unbound: update to 1.19.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2023-11-13 10:52:05 +08:00
Julien Cassette
b4a31f92de unbound: create extra host records from DHCP static leases
The "Extra DNS" option allows to create records from the DHCP
"Hostnames" configuration entries.
This allows to create such records from the DHCP "Static leases"
configuration entries too.

Fixes: #22593

Signed-off-by: Julien Cassette <julien.cassette@gmail.com>
2023-11-13 10:52:05 +08:00
Eric Luehrsen
03f70dcfd5 unbound: update to 1.18.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2023-09-09 10:05:22 +02:00
Ted Hess
2a71e17ca1 Unbound: Silence SSL unexpected eof messages
Refs: https://github.com/NLnetLabs/unbound/issues/812
      https://github.com/NLnetLabs/unbound/issues/846

This is a backport of: https://github.com/NLnetLabs/unbound/commit/d7e7761
and can be removed with the next release/update of the Unbound package

Signed-off-by: Ted Hess <thess@kitschensync.net>
2023-08-21 16:01:11 -04:00
Josef Schlehofer
97e69ec89c unbound: update to version 1.17.1
- Refreshed one patch
- Removed deprecated AUTORELEASE

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2023-02-10 15:25:35 +01:00
Mark Mentovai
33581043d2 unbound: fix local_subnet for IPv6 addresses that contain a port
This prevents a forwarding server named like ::1@5453 from being added
to unbound.conf as a forward-host instead of the correct forward-addr.
forward-host requires the name to be resolved, which is impossible in
the absence of another nameserver. Thus, forwarding-only configurations
referencing only the IPv6 loopback address with a port number were
broken.

Signed-off-by: Mark Mentovai <mark@mentovai.com>
2022-12-20 14:33:04 +08:00
Eric Luehrsen
6bc0293a73 unbound: update to 1.17.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2022-11-21 18:58:11 +08:00
Rob Ekl
781a74bb85 unbound: update control cert uci processing
Signed-off-by: Rob Ekl <ekl.rob@gmail.com>
2022-10-09 21:39:43 +02:00
Josef Schlehofer
027533f9a2 unbound: update to version 1.16.3
Changelog: https://www.nlnetlabs.nl/projects/unbound/download/#unbound-1-16-3
- Fixes: CVE-2022-3204

Refreshed one patch

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-09-25 12:25:59 +02:00
Pascal Ernster
2179432991 unbound: update to 1.16.2, fix CVE-2022-30698, CVE-2022-30699
Maintainer: @EricLuehrsen
Compile tested: x86/64
Run tested: x86/64
Description: Update to 1.16.2, fix CVE-2022-30698 and CVE-2022-30699.

Signed-off-by: Pascal Ernster <git@hardfalcon.net>
2022-08-02 23:43:45 +02:00
Pascal Ernster
e702a66058 unbound: update to 1.16.1
Maintainer: @EricLuehrsen
Compile tested: realtek/rtl838x, x86/64
Run tested: realtek/rtl838x, x86/64
Description: Update to 1.16.1

Signed-off-by: Pascal Ernster <git@hardfalcon.net>
2022-07-19 12:29:19 +03:00
Stijn Segers
695e0dbaa4 unbound: update to 1.16.0
Signed-off-by: Stijn Segers <foss@volatilesystems.org>
2022-06-19 00:44:36 -06:00
Josef Schlehofer
2abe98e134 unbound: update to version 1.15.0
Refresh patch

Signed-off-by: Josef Schlehofer <pepe.schlehofer@gmail.com>
2022-02-11 17:11:44 +01:00
Eric Luehrsen
824aa45133 unbound: update to 1.14.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2021-12-10 10:50:14 +01:00
Ansuel Smith
212eddb92b unbound: backport fix for permission denied error
Currently there is a problem with log spam when ipv6 network
is dropped. Fix this by backporting a patch to silence these errors
when verbose logging is not enabled.

Signed-off-by: Ansuel Smith <ansuelsmth@gmail.com>
2021-09-08 16:30:47 -04:00
Eric Luehrsen
17c25269d7 unbound: update to 1.3.2
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2021-08-17 02:24:37 -04:00
Felix Fietkau
cc1d0aa3d2 unbound: fix build on non-linux systems
Override places that call uname to detect target features

Signed-off-by: Felix Fietkau <nbd@nbd.name>
2021-06-16 12:59:00 +02:00
Rosen Penev
94858ece31 Merge pull request #15474 from ja-pa/unbound-ttl-neg
unbound: add cache-max-negative-ttl config option
2021-05-07 15:55:52 -07:00
Peter van Dijk
1bcc98ef90 unbound: fix typo in assist name of https-dns-proxy
I left the old version in, in case users have configs that already correct for this error.

Signed-off-by: Peter van Dijk <peter.van.dijk@powerdns.com>
2021-04-25 16:16:23 +02:00
Jan Pavlinec
9296409e88 unbound: add cache-max-negative-ttl config option
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2021-04-20 12:22:42 +02:00
Eric Luehrsen
890cfb3857 unbound: update to 1.13.1
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2021-02-22 19:08:33 +01:00
Ilya Lipnitskiy
5d8d4fbbcb treewide: Run refresh on all packages
The crude loop I wrote to come up with this changeset:

  find -L package/feeds/packages/ -name patches | \
  sed 's/patches$/refresh/' | sort | xargs make

Signed-off-by: Ilya Lipnitskiy <ilya.lipnitskiy@gmail.com>
2021-02-20 16:02:15 -08:00
Eric Luehrsen
79e3a32656 unbound: update to 1.13.0
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-12-04 11:31:34 -05:00
Eric Luehrsen
658c27ea97 unbound: clean up interface interpretation in UCI
DNS flag day 2020, software should reflect the minimum EDNS 1232 bytes.
Added iface_wan and iface_lan to control internal DNS assignemnts and
to control what is local service ACL. Interface wild cards are not
explicitly set so that they can be customized in extended conf.

Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-11-04 19:25:08 -05:00
Eric Luehrsen
2680dc239a unbound: update to 1.1.12
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-11-04 19:25:08 -05:00
Eric Luehrsen
b97cdaf612 unbound: improve odhcpd rapid update robustness
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-09-05 10:04:48 -04:00
Jan Pavlinec
2eacaacff3 unbound: add option for dnstap support
Signed-off-by: Jan Pavlinec <jan.pavlinec@nic.cz>
2020-09-03 17:01:04 +02:00
Eric Luehrsen
f8ba0fe7bf unbound: follow resolv.conf.auto to new location
Signed-off-by: Eric Luehrsen <ericluehrsen@gmail.com>
2020-08-07 01:30:52 -04:00