From nobody Thu Mar 14 13:17:38 2024 X-Original-To: ports-bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TwSbm0dSbz5D040 for ; Thu, 14 Mar 2024 13:17:40 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4TwSbl6ggvz4j09 for ; Thu, 14 Mar 2024 13:17:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1710422259; a=rsa-sha256; cv=none; b=ck5q0z9KxtJtkod4FoETtXC7pZ8mt4Ki0XhisyfRn3gCeFyKkKn0OzWrOIM3DkybO3XSEr WWLmx5wZKdCoeqymQgrRU7tuy4XovN4hUmJE7sAhAsmZgAZ5jr2LQRiayXfTkfI+9aN8gj 2AP9xk4wk4ASX1pZx5cXamfPKYS5BMxXMk/N190ykuOsfbOiY4yE7IFek794DtGoAMeEVU ZY8PakL84JrB1X5FQlF01FxWw++rh3E3jtD/OUoAHNzRFZH99hcS/4sI3BJ5zyBoeXPQ8u 93b7yxxdR2foe1Nmp/Z/bhUayfgRnky76e2VsD/oNFFQaCpDVvo908X4UPKO3w== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1710422259; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=zjiavbmKLdLbDzRmg3OevsqxZOb4Ua2R789x4JonOQk=; b=WuR9D6Zxr57YLKBOPM/etcYht21pufHJY1/Ez9sDqEsnBW1vcSQNs+CI3BDFh4Uc5UOjAI yOmex2+ZMENEe2D+NliU3hIbDkBb/bujo2HDZKN1MZDPr8R07o0A3P+ebPq2eYA8hCr86X NiS1UCc0hrdmeTyEvduFMK2/ERkU+2Vk9TRQTbDTPgsXT3sVBR789Focl1OkBx3ufNnUCo UqDnKwnen/S35jO4LTUW/GTFvuJrWLJCMGkaohKk+QTvlGa+x+vUW9cPOjreq/dTOQ8/jq ix89D1HHHOU7CN35q2GH3z0m164yDS5lGKc09uEH4lx6rhzdXFQG3UW38u/8+Q== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4TwSbl6HzKzT7d for ; Thu, 14 Mar 2024 13:17:39 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 42EDHdOk005929 for ; Thu, 14 Mar 2024 13:17:39 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 42EDHdfH005927 for ports-bugs@FreeBSD.org; Thu, 14 Mar 2024 13:17:39 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 277686] dns/unbound: Update to 1.19.3 Date: Thu, 14 Mar 2024 13:17:38 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: jaap@NLnetLabs.nl X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: ports-bugs@FreeBSD.org X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: flagtypes.name attachments.created Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Ports bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-ports-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports-bugs@freebsd.org X-BeenThere: freebsd-ports-bugs@freebsd.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D277686 Jaap Akkerhuis changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #249156| |maintainer-approval+ Flags| | --- Comment #3 from Jaap Akkerhuis --- Created attachment 249156 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D249156&action= =3Dedit patch to upgrade [Patch by maintainer] This release has a number of bug fixes. The CNAME synthesized for a DNAME record uses the original TTL, of the DNAME record, and that means it can be cached for the TTL, instead of 0. There is a fix that when a message was stored in cache, but one of the RRsets was not updated due to cache policy, it now restricts the message TTL if the cache version of the RRset has a shorter TTL. It avoids a bug where the message is not expired, but its contents is expired. For dnstap, it logs type DoH and DoT correctly, if that is used for the message. The b.root-servers.net address is updated in the default root hints. When performing retries for failed sends, a retry at a smaller UDP size is now not performed when that attempt is not actually smaller, and at defaults, since the flag day changes, it is the same size. This makes it skip the step, it is useless because there is no reduction in size. Clients with a valid DNS Cookie will bypass the ratelimit, if one is set. The value from ip-ratelimit-cookie is used for these queries. Furthermore there is a fix to make correct EDE Prohibited answers for access control denials, and a fix for EDNS client subnet scope zero answers. For more details, see https://github.com/NLnetLabs/unbound/releases/tag/release-1.19.3 --=20 You are receiving this mail because: You are the assignee for the bug.=