knot-resolver-module-dnstap-5.7.4-1.el8> 6 6_ ܉3!y덏%!E/֡f0 !E/֡<u7 ;^/ )8@<&֏ =B  {#L~ҥ`3 [|3z\ZAa ӋC42u+zqoĄ1?n{ ׎#"R zB=ҹ.P_,25b9f5279cebe019a8a92842e7e08a8d7ca0a86955993682bb15a4cde25b0b00faf4ef67b3cd4116582199131040ee84b8aee31du$'R>ԟ>=}?}d$ * J<@O^o ~    , l|dL(8M9M:oMGzHzIz Xz$Yz,\zD]zT^zbzd|e|f|"l|$t|@u|Pv|`w}x}y} }T}X}}}Cknot-resolver-module-dnstap5.7.41.el8dnstap module for Knot Resolverdnstap module for Knot Resolver supports logging DNS responses to a unix socket in dnstap format using fstrm framing library. This logging is useful if you need effectively log all DNS traffic.f(buildhw-a64-24.iad2.fedoraproject.orgFedora ProjectFedora ProjectGPL-3.0-or-laterFedora ProjectUnspecifiedhttps://www.knot-resolver.cz/linuxaarch64:AAf(f(f(f(5f8ee85ac8bc40bb7cb451830ce1ea54daea17995b99f461719120e457a3dd30../../../../usr/lib64/knot-resolver/kres_modules/dnstap.sorootrootrootrootrootrootrootrootknot-resolver-5.7.4-1.el8.src.rpmknot-resolver-module-dnstapknot-resolver-module-dnstap(aarch-64)@@@@@@@@@@@@    @knot-resolverld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libfstrm.so.0()(64bit)libfstrm.so.0(LIBFSTRM_0.2.0)(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libgcc_s.so.1(GCC_3.3.1)(64bit)libprotobuf-c.so.1()(64bit)libprotobuf-c.so.1(LIBPROTOBUF_C_1.0.0)(64bit)libuv.so.1()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rtld(GNU_HASH)5.7.4-1.el83.0.4-14.6.0-14.0-15.2-14.14.3ff_f De̫@dd@ck@c,N@cbx@b0aՈ@acamaa6aGa@`+`e`<@_ܙ_@_m_l@_k8_Wr@_ @^z^@^l@^^:@^1s^.]]ʞ](]@]]2@]9]%@\t@\T4\73\[<@[z@[b@[H@[;e@ZZZZZz@Zg#ZOhZNYm@Yx@YdYdX-XCXX@X6@X6@X@X0>W#W@W@WM|W+5WV@Jakub Ružička - 5.7.4-1Jakub Ružička - 5.7.3-1Jakub Ružička - 5.7.2-1Jakub Ružička - 5.7.1-1Jakub Ružička - 5.7.0-2Jakub Ružička - 5.7.0-1Jakub Ružička - 5.6.0-1Jakub Ružička - 5.5.3-1Jakub Ružička - 5.5.2-1Jakub Ružička - 5.5.1-1Jakub Ružička - 5.5.0-1Jakub Ružička - 5.4.4-1Jakub Ružička - 5.4.3-1Jakub Ružička - 5.4.2-1Jakub Ružička - 5.4.1-2Jakub Ružička - 5.4.1-1Jakub Ružička - 5.4.0-1Jakub Ružička - 5.3.2-1Jakub Ružička - 5.3.1-1Jakub Ružička - 5.3.0-1Jakub Ružička - 5.2.1-1Jakub Ružička 5.2.0-1Jakub Ružička 5.1.3-4Jakub Ružička 5.1.3-3Jakub Ružička 5.1.3-2Jakub Ružička 5.1.3-1Fedora Release Engineering - 5.1.2-2Tomas Krizek - 5.1.2-1Tomas Krizek - 5.1.1-1Tomas Krizek - 5.1.0-1Tomas Krizek - 5.0.1-2Tomas Krizek - 5.0.1-1Fedora Release Engineering - 5.0.0-2Tomas Krizek - 5.0.0-1Tomas Krizek - 4.3.0-1Tomas Krizek - 4.2.2-2Tomas Krizek - 4.2.2-1Tomas Krizek - 4.2.1-1Tomas Krizek - 4.2.0-1Fedora Release Engineering - 4.1.0-2Tomas Krizek - 4.1.0-1Tomas Krizek - 4.0.0.-1Fedora Release Engineering - 3.2.1-2Tomas Krizek - 3.2.1-1Tomas Krizek - 3.2.0-1Tomas Krizek - 3.1.0-1Tomas Krizek - 3.0.0-1Tomas Krizek - 2.4.1-1Fedora Release Engineering - 2.4.0-2Tomas Krizek - 2.4.0-1Tomas Krizek - 2.3.0-1Tomas Krizek - 2.2.0-1Tomas Krizek - 2.1.1-1Tomas Krizek - 2.1.0-1Fedora Release Engineering - 1.5.3-1.1Tomas Krizek - 1.5.3-1Tomas Krizek - 1.5.0-2Petr Špaček - 1.5.0-1Petr Spacek - 1.3.2-1Fedora Release Engineering - 1.3.1-1.1Petr Spacek - 1.3.1-2Petr Spacek - 1.3.1-1Petr Spacek - 1.2.5-1Petr Spacek - 1.2.4-1Petr Spacek - 1.2.3-1Fedora Release Engineering - 1.2.0-2.1Petr Spacek - 1.2.0-2Petr Spacek - 1.2.0Petr Spacek - 1.2.0-rc1Peter Robinson 1.1.1-3Igor Gnatenko - 1.1.1-2Jan Vcelak - 1.1.1-1Jan Vcelak - 1.1.0-1Jan Vcelak - 1.0.0-1Jan Vcelak - 1.0.0-0.3.4f463d7Jan Vcelak - 1.0.0-0.2.79a8440Jan Vcelak - 1.0.0-0.1.beta3- New upstream version 5.7.4- New upstream version 5.7.3- New upstream version 5.7.2- New upstream version 5.7.1- Rebuilt for Knot DNS 3.3- New upstream version 5.7.0- update to upstream version 5.6.0- update to upstream version 5.5.3- update to upstream version 5.5.2- update to upstream version 5.5.1- update to upstream version 5.5.0 - update upstream signing keys- update to upstream version 5.4.4- update to upstream version 5.4.3- update to upstream version 5.4.2- rebuild for Knot DNS 3.1- update to upstream version 5.4.1- update to upstream version 5.4.0- update to upstream version 5.3.2- update to upstream version 5.3.1- update to upstream version 5.3.0 - add dnstap module subpackage - required Knot DNS >= 2.9- update to upstream version 5.2.1- update to upstream version 5.2.0 - sync packaging from upstream- rebuild for new bodhi update- rebuild for Knot DNS 3.0.0- rebuild for Knot DNS 3.0.0- update to upstream version 5.1.3- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild- update to upstream version 5.1.2- update to upstream version 5.1.1 (fixes CVE-2020-12667)- update to upstream version 5.1.0 - make spec compatible with EPEL 8 (rhbz#1783252) - support documentation build with Sphinx v3.0.0+ (rhbz#1823534)- add patch to fix strict aliasing (!971) until next release- update to upstream version 5.0.1 - ensure kres-cache-gc.service is restarted on upgrade- Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild- update to new upstream version 5.0.0 - removed systemd socket files (no longer supported) - add upgrade scriptlets for 5.x - remove lua-sec, lua-socket, lua-filesystem dependencies - create tmpfiles dirs with macro- update to new upstream version 4.3.0 - make config directory read-only for knot-resolver, relocate root.keys to /var/lib - http module now depends on the exact same binary version of knot-resolver- rebuild for libknot10 (Knot DNS 2.9.1)- update to new upstream version 4.2.2- update to new upstream version 4.2.1- update to new upstream version 4.2.0 - added lua-psl dependency for policy.slice() functionality- Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild- update to new upstream version 4.1.0 - add kres-cache-gc.service- rebase to new upstream release 4.0.0 - bump Knot DNS libraries to 2.8 (ABI compat) - use new upstream build system - meson - add knot-resolver-module-http package along with new lua dependecies- Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_RebuildKnot Resolver 3.2.1 (2019-01-10) ================================ Bugfixes -------- - trust_anchors: respect validity time range during TA bootstrap (!748) - fix TLS rehandshake handling (!739) - make TLS_FORWARD compatible with GnuTLS 3.3 (!741) - special thanks to Grigorii Demidov for his long-term work on Knot Resolver! Improvements ------------ - improve handling of timeouted outgoing TCP connections (!734) - trust_anchors: check syntax of public keys in DNSKEY RRs (!748) - validator: clarify message about bogus non-authoritative data (!735) - dnssec validation failures contain more verbose reasoning (!735) - new function trust_anchors.summary() describes state of DNSSEC TAs (!737), and logs new state of trust anchors after start up and automatic changes - trust anchors: refuse revoked DNSKEY even if specified explicitly, and downgrade missing the SEP bit to a warningKnot Resolver 3.2.0 (2018-12-17) ================================ New features ------------ - module edns_keepalive to implement server side of RFC 7828 (#408) - module nsid to implement server side of RFC 5001 (#289) - module bogus_log provides .frequent() table (!629, credit Ulrich Wisser) - module stats collects flags from answer messages (!629, credit Ulrich Wisser) - module view supports multiple rules with identical address/TSIG specification and keeps trying rules until a "non-chain" action is executed (!678) - module experimental_dot_auth implements an DNS-over-TLS to auth protocol (!711, credit Manu Bretelle) - net.bpf bindings allow advanced users to use eBPF socket filters Bugfixes -------- - http module: only run prometheus in parent process if using --forks=N, as the submodule collects metrics from all sub-processes as well. - TLS fixes for corner cases (!700, !714, !716, !721, !728) - fix build with -DNOVERBOSELOG (#424) - policy.{FORWARD,TLS_FORWARD,STUB}: respect net.ipv{4,6} setting (!710) - avoid SERVFAILs due to certain kind of NS dependency cycles, again (#374) this time seen as 'circular dependency' in verbose logs - policy and view modules do not overwrite result finished requests (!678) Improvements ------------ - Dockerfile: rework, basing on Debian instead of Alpine - policy.{FORWARD,TLS_FORWARD,STUB}: give advantage to IPv6 when choosing whom to ask, just as for iteration - use pseudo-randomness from gnutls instead of internal ISAAC (#233) - tune the way we deal with non-responsive servers (!716, !723) - documentation clarifies interaction between policy and view modules (!678, !730) Module API changes ------------------ - new layer is added: answer_finalize - kr_request keeps ::qsource.packet beyond the begin layer - kr_request::qsource.tcp renamed to ::qsource.flags.tcp - kr_request::has_tls renamed to ::qsource.flags.tls - kr_zonecut_add(), kr_zonecut_del() and kr_nsrep_sort() changed parameters slightlyKnot Resolver 3.1.0 (2018-11-02) ================================ Incompatible changes -------------------- - hints.use_nodata(true) by default; that's what most users want - libknot >= 2.7.2 is required Improvements ------------ - cache: handle out-of-space SIGBUS slightly better (#197) - daemon: improve TCP timeout handling (!686) Bugfixes -------- - cache.clear('name'): fix some edge cases in API (#401) - fix error handling from TLS writes (!669) - avoid SERVFAILs due to certain kind of NS dependency cycles (#374)Knot Resolver 3.0.0 (2018-08-20) ================================ Incompatible changes -------------------- - cache: fail lua operations if cache isn't open yet (!639) By default cache is opened *after* reading the configuration, and older versions were silently ignoring cache operations. Valid configuration must open cache using `cache.open()` or `cache.size =` before executing cache operations like `cache.clear()`. - libknot >= 2.7.1 is required, which brings also larger API changes - in case you wrote custom Lua modules, please consult https://knot-resolver.readthedocs.io/en/latest/lib.html#incompatible-changes-since-3-0-0 - in case you wrote custom C modules, please see compile against Knot DNS 2.7 and adjust your module according to messages from C compiler - DNS cookie module (RFC 7873) is not available in this release, it will be later reworked to reflect development in IEFT dnsop working group - version module was permanently removed because it was not really used by users; if you want to receive notifications abou new releases please subscribe to https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-resolver-announce Bugfixes -------- - fix multi-process race condition in trust anchor maintenance (!643) - ta_sentinel: also consider static trust anchors not managed via RFC 5011 Improvements ------------ - reorder_RR() implementation is brought back - bring in performace improvements provided by libknot 2.7 - cache.clear() has a new, more powerful API - cache documentation was improved - old name "Knot DNS Resolver" is replaced by unambiguous "Knot Resolver" to prevent confusion with "Knot DNS" authoritative serverKnot Resolver 2.4.1 (2018-08-02) ================================ Security -------- - fix CVE-2018-10920: Improper input validation bug in DNS resolver component (security!7, security!9) Bugfixes -------- - cache: fix TTL overflow in packet due to min_ttl (#388, security!8) - TLS session resumption: avoid bad scheduling of rotation (#385) - HTTP module: fix a regression in 2.4.0 which broke custom certs (!632) - cache: NSEC3 negative cache even without NS record (#384) This fixes lower hit rate in NSEC3 zones (since 2.4.0). - minor TCP and TLS fixes (!623, !624, !626)- Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_RebuildKnot Resolver 2.4.0 (2018-07-03) ================================ Incompatible changes -------------------- - minimal libknot version is now 2.6.7 to pull in latest fixes (#366) Security -------- - fix a rare case of zones incorrectly dowgraded to insecure status (!576) New features ------------ - TLS session resumption (RFC 5077), both server and client (!585, #105) (disabled when compiling with gnutls < 3.5) - TLS_FORWARD policy uses system CA certificate store by default (!568) - aggressive caching for NSEC3 zones (!600) - optional protection from DNS Rebinding attack (module rebinding, !608) - module bogus_log to log DNSSEC bogus queries without verbose logging (!613) Bugfixes -------- - prefill: fix ability to read certificate bundle (!578) - avoid turning off qname minimization in some cases, e.g. co.uk. (#339) - fix validation of explicit wildcard queries (#274) - dns64 module: more properties from the RFC implemented (incl. bug #375) Improvements ------------ - systemd: multiple enabled kresd instances can now be started using kresd.target - ta_sentinel: switch to version 14 of the RFC draft (!596) - support for glibc systems with a non-Linux kernel (!588) - support per-request variables for Lua modules (!533) - support custom HTTP endpoints for Lua modules (!527)Knot Resolver 2.3.0 (2018-04-23) ================================ Security -------- - fix CVE-2018-1110: denial of service triggered by malformed DNS messages (!550, !558, security!2, security!4) - increase resilience against slow lorris attack (security!5) Bugfixes -------- - validation: fix SERVFAIL in case of CNAME to NXDOMAIN in a single zone (!538) - validation: fix SERVFAIL for DS . query (!544) - lib/resolve: don't send unecessary queries to parent zone (!513) - iterate: fix validation for zones where parent and child share NS (!543) - TLS: improve error handling and documentation (!536, !555, !559) Improvements ------------ - prefill: new module to periodically import root zone into cache (replacement for RFC 7706, !511) - network_listen_fd: always create end point for supervisor supplied file descriptor - use CPPFLAGS build environment variable if set (!547)Knot Resolver 2.2.0 (2018-03-28) ================================ New features ------------ - cache server unavailability to prevent flooding unreachable servers (Please note that caching algorithm needs further optimization and will change in further versions but we need to gather operational experience first.) Bugfixes -------- - don't magically -D_FORTIFY_SOURCE=2 in some cases - allow large responses for outbound over TCP - fix crash with RR sets with over 255 recordsKnot Resolver 2.1.1 (2018-02-23) ================================ Bugfixes -------- - when iterating, avoid unnecessary queries for NS in insecure parent. This problem worsened in 2.0.0. (#246) - prevent UDP packet leaks when using TLS forwarding - fix the hints module also on some other systems, e.g. Gentoo.- New upstream release 2.1.0 Knot Resolver 2.1.0 (2018-02-16) ================================ Incompatible changes -------------------- - stats: remove tracking of expiring records (predict uses another way) - systemd: more chages in default unit files (TODO) - ta_sentinel: implement protocol draft-ietf-dnsop-kskroll-sentinel-01 (our draft-ietf-dnsop-kskroll-sentinel-00 implementation had inverted logic) - libknot: require version 2.6.4 or newer to get bugfixes for DNS-over-TLS Bugfixes -------- - detect_time_jump module: don't clear cache on suspend-resume (#284) - stats module: fix stats.list() returning nothing, regressed in 2.0.0 - policy.TLS_FORWARD: refusal when configuring with multiple IPs (#306) - cache: fix broken refresh of insecure records that were about to expire - fix the hints module on some systems, e.g. Fedora (came back on 2.0.0) - build with older gnutls (conditionally disable features) - fix the predict module to work with insecure records & cleanup code Knot Resolver 2.0.0 (2018-01-31) ================================ Incompatible changes -------------------- - systemd: change unit files to allow running multiple instances, deployments with single instance now must use `kresd@1.service` instead of `kresd.service`; see kresd.systemd(8) for details - systemd: the directory for cache is now /var/cache/knot-resolver - unify default directory and user to `knot-resolver` - directory with trust anchor file specified by -k option must be writeable - policy module is now loaded by default to enforce RFC 6761; see documentation for policy.PASS if you use locally-served DNS zones - drop support for alternative cache backends memcached, redis, and for Lua bindings for some specific cache operations - REORDER_RR option is not implemented (temporarily) New features ------------ - aggressive caching of validated records (RFC 8198) for NSEC zones; thanks to ICANN for sponsoring this work. - forwarding over TLS, authenticated by SPKI pin or certificate. policy.TLS_FORWARD pipelines queries out-of-order over shared TLS connection Beware: Some resolvers do not support out-of-order query processing. TLS forwarding to such resolvers will lead to slower resolution or failures. - trust anchors: you may specify a read-only file via -K or --keyfile-ro - trust anchors: at build-time you may set KEYFILE_DEFAULT (read-only) - ta_sentinel module implements draft ietf-dnsop-kskroll-sentinel-00, enabled by default - serve_stale module is prototype, subject to change - extended API for Lua modules Bugfixes -------- - fix build on osx - regressed in 1.5.3 (different linker option name)- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild- New upstream release 1.5.3 Knot Resolver 1.5.3 (2018-01-23) ================================ Bugfixes -------- - fix the hints module on some systems, e.g. Fedora. Symptom: `undefined symbol: engine_hint_root_file` Knot Resolver 1.5.2 (2018-01-22) ================================ Security -------- - fix CVE-2018-1000002: insufficient DNSSEC validation, allowing attackers to deny existence of some data by forging packets. Some combinations pointed out in RFC 6840 sections 4.1 and 4.3 were not taken into account. Bugfixes -------- - memcached: fix fallout from module rename in 1.5.1 Knot Resolver 1.5.1 (2017-12-12) ================================ Incompatible changes -------------------- - script supervisor.py was removed, please migrate to a real process manager - module ketcd was renamed to etcd for consistency - module kmemcached was renamed to memcached for consistency Bugfixes -------- - fix SIGPIPE crashes (#271) - tests: work around out-of-space for platforms with larger memory pages - lua: fix mistakes in bindings affecting 1.4.0 and 1.5.0 (and 1.99.1-alpha), potentially causing problems in dns64 and workarounds modules - predict module: various fixes (!399) Improvements ------------ - add priming module to implement RFC 8109, enabled by default (#220) - add modules helping with system time problems, enabled by default; for details see documentation of detect_time_skew and detect_time_jump- add doc package - configure tarball signature verification - add root.hints file - use upstream systemd unit files, paths and user name - migrate configuration to /etc/knot-resolver - use user knot-resolver - store cache in /var/cache/knot-resolver - use systemd alias knot-resolver -> kresd- New upstream release 1.5.0 Knot Resolver 1.5.0 (2017-11-02) ================================ Bugfixes -------- - fix loading modules on Darwin Improvements ------------ - new module ta_signal_query supporting Signaling Trust Anchor Knowledge using Keytag Query (RFC 8145 section 5); it is enabled by default - attempt validation for more records but require it for fewer of them (e.g. avoids SERVFAIL when server adds extra records but omits RRSIGs) Knot Resolver 1.4.0 (2017-09-22) ================================ Incompatible changes -------------------- - lua: query flag-sets are no longer represented as plain integers. kres.query.* no longer works, and kr_query_t lost trivial methods 'hasflag' and 'resolved'. You can instead write code like qry.flags.NO_0X20 = true. Bugfixes -------- - fix exiting one of multiple forks (#150) - cache: change the way of using LMDB transactions. That in particular fixes some cases of using too much space with multiple kresd forks (#240). Improvements ------------ - policy.suffix: update the aho-corasick code (#200) - root hints are now loaded from a zonefile; exposed as hints.root_file(). You can override the path by defining ROOTHINTS during compilation. - policy.FORWARD: work around resolvers adding unsigned NS records (#248) - reduce unneeded records previously put into authority in wildcarded answers Knot Resolver 1.3.3 (2017-08-09) ================================ Security -------- - Fix a critical DNSSEC flaw. Signatures might be accepted as valid even if the signed data was not in bailiwick of the DNSKEY used to sign it, assuming the trust chain to that DNSKEY was valid. Bugfixes -------- - iterate: skip RRSIGs with bad label count instead of immediate SERVFAIL - utils: fix possible incorrect seeding of the random generator - modules/http: fix compatibility with the Prometheus text format Improvements ------------ - policy: implement remaining special-use domain names from RFC6761 (#205), and make these rules apply only if no other non-chain rule appliesNew upstream release: Knot Resolver 1.3.2 (2017-07-28) ================================ Security -------- - fix possible opportunities to use insecure data from cache as keys for validation Bugfixes -------- - daemon: check existence of config file even if rundir isn't specified - policy.FORWARD and STUB: use RTT tracking to choose servers (#125, #208) - dns64: fix CNAME problems (#203) It still won't work with policy.STUB. - hints: better interpretation of hosts-like files (#204) also, error out if a bad entry is encountered in the file - dnssec: handle unknown DNSKEY/DS algorithms (#210) - predict: fix the module, broken since 1.2.0 (#154) Improvements ------------ - embedded LMDB fallback: update 0.9.18 -> 0.9.21- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- build experimental command line interface "kresc"New upstream release: Knot Resolver 1.3.1 (2017-06-23) ================================ Bugfixes -------- - modules/http: fix finding the static files (bug from 1.3.0) - policy.FORWARD: fix some cases of CNAMEs obstructing search for zone cuts Knot Resolver 1.3.0 (2017-06-13) ================================ Security -------- - Refactor handling of AD flag and security status of resource records. In some cases it was possible for secure domains to get cached as insecure, even for a TLD, leading to disabled validation. It also fixes answering with non-authoritative data about nameservers. Improvements ------------ - major feature: support for forwarding with validation (#112). The old policy.FORWARD action now does that; the previous non-validating mode is still avaliable as policy.STUB except that also uses caching (#122). - command line: specify ports via @ but still support # for compatibility - policy: recognize 100.64.0.0/10 as local addresses - layer/iterate: *do* retry repeatedly if REFUSED, as we can't yet easily retry with other NSs while avoiding retrying with those who REFUSED - modules: allow changing the directory where modules are found, and do not search the default library path anymore. Bugfixes -------- - validate: fix insufficient caching for some cases (relatively rare) - avoid putting "duplicate" record-sets into the answer (#198) Knot Resolver 1.2.6 (2017-04-24) ================================ Security -------- - dnssec: don't set AD flag for NODATA answers if wildcard non-existence is not guaranteed due to opt-out in NSEC3 Improvements ------------ - layer/iterate: don't retry repeatedly if REFUSED Bugfixes -------- - lib/nsrep: revert some changes to NS reputation tracking that caused severe problems to some users of 1.2.5 (#178 and #179) - dnssec: fix verification of wildcarded non-singleton RRsets - dnssec: allow wildcards located directly under the root - layer/rrcache: avoid putting answer records into queries in some cases- new upstream relase + security: layer/validate: clear AD if closest encloser proof has opt-outed NSEC3 (#169) + security: layer/validate: check if NSEC3 records in wildcard expansion proof has an opt-out + security: dnssec/nsec: missed wildcard no-data answers validation has been implemented + fix: trust anchors: Improve trust anchors storage format (#167) + fix: trust anchors: support non-root TAs, one domain per file + fix: policy.DENY: set AA flag and clear AD flag + fix: lib/resolve: avoid unnecessary DS queries + fix: lib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted + fix: layer/iterate: During packet classification (answer vs. referral) don't analyze AUTHORITY section in authoritative answer if ANSWER section contains records that have been requested + enhancement: modules/dnstap: a DNSTAP support module (Contributed by Vicky Shrestha) + enhancement: modules/workarounds: a module adding workarounds for known DNS protocol violators + enhancement: layer/iterate: fix logging of glue addresses + enhancement: kr_bitcmp: allow bits=0 and consequently 0.0.0.0/0 matches in view and renumber modules. + enhancement: modules/padding: Improve default padding of responses (Contributed by Daniel Kahn Gillmor) + enhancement: New kresc client utility (experimental; don't rely on the API yet)- new upstream release + security: Knot Resolver 1.2.0 and higher could return AD flag for insecure answer if the daemon received answer with invalid RRSIG several times in a row. + fix: layer/iterate: some improvements in cname chain unrolling + fix: layer/validate: fix duplicate records in AUTHORITY section in case + fix: of WC expansion proof + fix: lua: do *not* truncate cache size to unsigned + fix: forwarding mode: correctly forward +cd flag + fix: fix a potential memory leak + fix: don't treat answers that contain DS non-existance proof as insecure + fix: don't store NSEC3 and their signatures in the cache + fix: layer/iterate: when processing delegations, check if qname is at or below new authority + enhancement: modules/policy: allow QTRACE policy to be chained with other policies + enhancement: hints.add_hosts(path): a new property + enhancement: module: document the API and simplify the code + enhancement: policy.MIRROR: support IPv6 link-local addresses + enhancement: policy.FORWARD: support IPv6 link-local addresses + enhancement: add net.outgoing_{v4,v6} to allow specifying address to use for connections- new upstream release + security: a cached negative answer from a CD query would be reused to construct response for non-CD queries, resulting in Insecure status instead of Bogus. + fix: lua: make the map command check its arguments + fix: -k argument processing to avoid out-of-bounds memory accesses + fix: lib/resolve: fix zonecut fetching for explicit DS queries + fix: hints: more NULL checks + fix: TA bootstrapping for multiple TAs in the IANA XML file + fix: Disable storing GLUE records into the cache even in the + fix: (non-default) QUERY_PERMISSIVE mode + fix: iterate: skip answer RRs that don't match the query + fix: layer/iterate: some additional processing for referrals + fix: lib/resolve: zonecut fetching error was fixed- Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild- rebuild against knot-2.4.0- new upstream release: + fix: reworked DNSSEC Validation, that fixes several know problems with less standard DNS configurations + fix: the resolver was setting AD flag when running in a forwarding mode + fix: correctly return RCODE=NOTIMPL on meta-queries and non IN class queries + fix: crash in hints module when hints file was empty + fix: non-lowercase hints + features: optional EDNS(0) Padding support for DNS over TLS + features: support for debugging DNSSEC with CD bit + features: DNS over TLS is now able to create ephemeral certs on the runtime (Thanks Daniel Kahn Gilmore for contributing to DNS over TLS implementation in Knot Resolver.) + features: configurable minimum and maximum TTL (default 6 days) + features: configurable pseudo-random reordering of RR sets + features: new module 'version' that can call home and report new versions and security vulnerabilities to the log file- Update to latest upstream version - Fix packaging bug: depend on proper Lua library versions - Allow automatic trust anchor management to work- Add ExclusiveArch for architectures with LuaJIT- Rebuild for LuaJIT 2.1.0- new upstream release: + fix name server fallback in case some of the servers are unreachable- new upstream release: + RFC7873 DNS Cookies + RFC7858 DNS over TLS + Metrics exported in Prometheus + DNS firewall module + Explicit CNAME target fetching in strict mode + Query minimisation improvements + Improved integration with systemd- final release- update to latest git version - re-enable unit-test- update to latest git version - fix package review issues- initial package5.7.4-1.el85.7.4-1.el8.build-id4bc6e1bd8d3e974131cf4fb76774cc30c72964a9dnstap.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/4b//usr/lib64/knot-resolver/kres_modules/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpioxz2aarch64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=4bc6e1bd8d3e974131cf4fb76774cc30c72964a9, stripped RR RRR RR RR RRRRhttps://bugz.fedoraproject.org/knot-resolverutf-84296970fe6edfe02f87c3331c32c8b75f86698182e43d1c3d6006c3fa9090bb7?07zXZ !#,6] b2u jӫ`(y0n%Avq@nQ#2!#S,?r=K؃$yr'DR ae=6-1$xEDq-J'woJ %]z լ6_Xs9Έ8 b<s(厇1s`bэV=-'g)f(0(Li vZ1?M,w xO<hWhJ`3OTrQf/$GV͔PLS-4|>cqyV8z BߪJԿwN^(͓ӹoVFmVqciVe>r \yU[XVxkyc Fzc nKrβFY!@k0 6ݺ" kʾ.J.YSQ*)eMe:U&{fu>fv=|؅Th sl34'(Kl&{ʕj~2XkGk 8`TG}k|ǡ{T{q Q7thBLѤ/7HRև1?Xr!AzfTP}<@< +zh֖6V skALUB4sjYԻC0q9dYgu]#jl4Vy giIF%=p F bS ݂qn@#hb{gO03`X+NstLxO2$Ka #vJcwOr)a.s"۷>i{@B?#wݒ-clj\ E;UXnc!*C<]} +Sݺx(.˶7TS$v?yԨ|<ɫ1XnKhP5a`RjQ0UԬ0s)@ŏf{lzg%5yG<]9DxBS r]Gl&5}@e; !ّNL.wB)UϐKưEO!lz!'>͓ UrDzSpȇ䙙]Xo crő>O{D}̢U{d|m:l- 4GX˃Hchm#'\pf%EG* ?OKEݩk"$ԷO"1NYf|j˖@ZLH̏[HE*uGG}1> TK(4LNabgEW/txJlfO? $" !X` ME7Z`Lכւ "8Cgx> (gi^>N_Sw-6GjŪ Pі9Cp f٠BG7Iqһfݾz_j Lq'ڤ#hX$װxlH?Vn QdY"Ovl>ΥTDzs9kGII7~l&V21X&1Խ0b?^WRo="b8}Tgb *O2\,!N'zP!2R0/~Ri!J_T`-ojhE=S ^ze'uu7NEQ'[*(㝯TgƳ;($]~.t7aD s8ɜ Rej새:;\ mZ`qz9JKtFnH*Q1 x*8'܁@Y&X ΜDQW+٥b#Pw%7ob*Jth/!@BKNowgJ՗YYx@Lƺ]:kd[Y;"=k{-U!^!%۷S'%#.AC+ZAhi"-\?o)ﯙ *GwY%޾+)v2*i57;FA"ZR`QURՐO.rXߝx q0݇2 &OƳ z p3RYwİdiv^icm/dU:'Ul9e@@e}<:x{MRKvWJTᙳe_GÏxkq:HyVe\XRd3@^xPjs_9FkCu`to/{.qBDˌ,%t,+AAKk}<^!gޙUU :&LEC,8 }g*!p>AS>)>>Z8 qbÓ=?f9-Dd LXf /jb !E_eLa8}+{@g-Njl+e 75Wx{D污P1B}_e5Z*੏˸w '&>XF"&mVfv4Iщ{W:zPc+ ʛ@$G*XZp*/dHg[QI2.]5Z=G`w(Ku0n ]G^g0Эph%6c aT66dzڂb qnD:2ߧf-^(NJЗ8bE8ǒn_ar¬9κjQۃBgTI5\Y\v:A~ t\ǟ'R;ulJz^1:P>XJF8r<^Q֩>o5YbT& , w= "Œ||=90I0X`B;~7UB{tYgJ^n#t5pl/Ʀi o+= jvf犲DsKJA |uj5ÒFɰWA";,*O$Z6T NKȻ!Fi"hޞ1N2)=PR[K<_okβ$֧ dF%h^BL$D]fgз,WZ:n9zv31Z%]' -9 ^¿ކ\-7#LSFFpxL ߨӀeZrؖi&Jʂ%7nUKfv-N׷?CEn)KHuB O41i;PrtǬ}}ԇg?Y%܂^|rG9dS%-W yWBjR&VB,iyZ"+!P̖ ~(ATØef2E暯ݱL$[vߤo6K˹p(y腷͚h͏ACsN) &H C6kK;5#C`p ~Y] ɤ>Oٰy`Gun ~v#$nnlCNt?Bgqm!;|Q}\,Ϻzz#/i#֮)2' ý{> EgN$޺`h}8*|#Ñ5D/)'gNOsQT*XG+ʰ~E+~G]PuBQga:Q,w/`??_pd(U׊`PXO 6IoQ*5!}H2jbʞ,6tcP~42vUȔe[D'QIunUJCM.ZZG> 0p: IųîJi)C]CۿfxH-=Gp$%i9;פUݧ$%}2je膒͑?GAcR|5 E%; Fk N;2rcPoLUo 8n9T4<2Kby_)sɷXـBцKy++BJӠ!i#>&tkfo"Pԑ 3[E&dAuQ1xtY;'\oӟNvt !N3IV]U~ }3E!mO&nf@lR"eD5C77r͔x!4pR 3) >tP.3Jx)m"_Nߋ%Èod?iY7 ca#Г{f'$u X[-%SyBmr_]Z,֥!Hc8(*.),_gYhY9:8CtKJ\"Rr-? =6}"<žL5-g F#5!0"`=ao(1<ؐ+1i(>0[N$4,!baG`Do{%1SVM=5΀aD~ow]o bk(DwZ.z H \٦HQ/F~/ޕ=7jIЇ+w> Uu*zQ76$*,;b଴%"z{߁Tv lӓztVJm. 8&A*_PUBT˝NcUGBv@72uf%H5 o"63rmױHS7F96I=_*"~ e5Shp/g){2(OiKcPo6꫗Q 'H' f12ԟKyj |hYid.DO,3I_p̄>PBWcO{dϣ#mu$}H6#_5Ѫ̽{vSxC-&m `oDP)`.V+=9"63GUɊJ)gC yM9bkhL÷{wݣUiOܥO ^WPn79b9M'sǔOze0+j=`a+‚)el:!2(.$o ' X\h" %=?ުC}˩HNŮM<1ц/l¸jHA;. s ҁB#ܑGH$#'avFH%E}'$4u3E'ZpMo,nEi?(\j.|w,ߜ87H|4M/vrDTmh醧)}c q/R.V\|VU%ϕ;3 >U,POMG45<%L!&O_9հ_nvl͋W4y+.qKRdSy@yn3JEq3Flp.n_ ǩMtY J@8˄5&n:4!~1"g( Agi>UKe65 wއn}:R0,M jUr-ٯe)_FU-Zn ~M053N^ٽ 1ox!Ҳ0쓂 #%Y ߨ`DydA",PG*x-mK7҅G˴-KXZxv!oٳeKr 囚 6P?7l%itwk$Vmsa{m,5r\xpT`eo2jf@c`@ xOd0=O\dh˅7jt?p!|K+Y1SҲx:Y5 岼;xyvH8zQD1a4@[Z1z6@+9`@!8vFe6:B\0geڦ9 |6=Ƚ\.tǪf_xt2EM ݷe,!@qB}m X8w?]Ih! 3 s>D"( lr-$,϶) YZ;S <]J:]pMx?q#I.f'njcʧƃVW3 a:pڠq?tn`VO"?‘LIU $`шx[8y؉x[d3q碡X%uQlϬB7ΉB ظB4%oF\t)/ՃC hl%pd&&gu.G+Cb[3@q\R|)&f,tbW\1MRS gAri&uRצl%ՔKzNv89/nW/G}Jb 'fD#K9$TmDKOn Ȕ[E#hlI l)Cz =#11]_}ʸln[Z` )Qѷc# P1qRMLM엣cZ)`)Ƒ6~j]!]:Ih3:1-pKVVBX@YQT5 ?{L2A\0{U)%tȗ;tY&yR|l^}Ul(uʨ q/_$\7&aqg[ "K$ U5TG؝aDGC\I*i`Lt۟KqpvWG,K⒮kA.9ɥCf!mvur obZR]gu!  =b>8S]A[0HV[5x~Ufm20Of=+ųzA_>ӲBZv7vlCOaBSMwO\dt8> -uZ 1~<4]y|0hrȤڪƺ@c[ǝ`WkZ\_ѰeAa3e:/x)cE[>9n>%\y5 Vj$U#Os/rK;p+oÿJ=)`O3HulT\ʩkyvt|)*01&( O׾ϼS 2v &?(WFbtUa1ELT* O,-uԉ㴫װ"Ni@p urkqmlBy V)hcB3^bG+a(|t兹 'X6͊bZbS_zC,5j"ǂ>[^wKw!3]kWm:68Fk5fR(+A. Iؠ|ϿJEk^3~kW}_cB#ndl)KXaW ˾yWWAnY zbm-tO"'Gtlۋ( 'Hg]a_淁m\ M&ضih;QD:IX,oipӣUt7xSUR x>aO6vTl`_m 8GwNj]B FXi3bp CIZfڀE"A~Ms5PVvnMER' t0]odEO[ddر5K+3h3ELԾ1gphvC?),1:}ܰ?ŒJeP=WFf7v ~|o 9ߒXrCjU7y4i&+J&__Md]~GrgszHbFuE>uuTB%u0a s6C>U]z-懕,o|:NN&,4l:֏8A 5>'M#(Ap4xX6s{Ʋ_TlaK!B!Gӱp!"Fتj ~+qba@kɪy/- k9%>ꔕp|1Ȭ Yb" y׏ ^o&4$237㄀̒HmFlZ +8;!wHe:Wy"ݪp Ok' & = P&bn $ś] n>_[vN{=)kbImV6ӈn :s;9`'wFws4OzQ6LUO4B̤ٮ~k\Da{ Dbdέ29J\v->.ps'0BG& Xb h[Qf9<;N*3:=t>ά? h{ۧaF%fC!,8}|sSqRTjC 2b:gB^gje70eVJMct m^q"O]o^v(Cbf(ux˰ _Ơz҂O U:C?4RT¼G4` #˹ % H҃&ƱgDfX^E}9EYIS0?U߶}m/&Nk?|6m˼/y6DJ v/<>D] U,%MI`3N W9SIhئӥ_O6^uz[4܌>\ivDyΛ3C?cfh@m@U7M|<y]0OZ?i b`b8I[0)$_"Herhsav!``C[E]%4(5R-ً_7r)b8jF1APQǟL^5?\#|g+[ [ ?yrjGO2xw>E&P*qAx{I-y}M&*|w knԍXE!7/+pJ1:OOU:;"R"y^f/܂K76]ؔuXmiY{|;IΨ71x,cwD.y| %pVC&\)sXJ>JH9AɝOE@Z?)=摱>.o rIOXQ k0Qe1U[]16Nd4NU#|ׇl3Ssp]Ct0)T}H0 @K|3Т~Psʶ]B8Ѵ}' _&16k;Y$)P5gJiqD7W#R0Jc:fќV<)K]Ey*֠jiὈpA(^s~]3٧m%#rڦ;oIbqӀanB]l>Nu 9TWI t͎pOD.ٜTJ)ژ1J]Y*3.022qngLJMlELҊ1W4-1hNk^vÝMoM4 GB2#xf~3ݱ͙L}&_ȴKיŏ{O9@eÁ287E`C 65N"[ͫҿ 4sJB\-r+I 8ׇJyJvןiiƂcnX#: YZ