Hi RayG, >From the unit test, a sample output if rpz-log is enabled: info: RPZ applied [rpz.example.com] a. nxdomain 127.0.0.1@53 a. TXT IN
It is applied to the query 'a' here, of type txt, from localhost. And the action, or action-override, is nxdomain. With rpz-log enabled, verbosity 0 is enough to see that, or more. So verbosity does not matter. Best regards, Wouter On 02/02/2021 18:06, RayG wrote: > Hi Wouter, > > I am assuming that the RPZ issue I had on v1.13.0 is included in the fixes > but I could not see something that registered with me in the notes you put > out. > > Given that when I look at the URLHaus web site and pick a few names at random > from the list I do get an NXDOMAIN response from Unbound. > > I was expecting the when this happened I would see in the log file some > reference to the fact the NXDOMAIN was returned due to an RPZ entry? > > If this is correct what verbosity level is required to see the entries? > > Do you have any log examples to show it is working correctly please? > > rpz: # MyResponsePolicyZones.conf > name: "URLHaus" > zonefile: "C:\ProgramData\Unbound\Logs\urlhaus.zone" > url: "https://urlhaus.abuse.ch/downloads/rpz/" > rpz-log: yes > rpz-log-name: "URLHausRPZ" > rpz-action-override: nxdomain > > Thanks > > RayG > > -----Original Message----- > From: RayG <rgs...@btinternet.com> > Sent: 02 February 2021 16:31 > To: 'Wouter Wijngaards' <wou...@nlnetlabs.nl>; unbound-us...@nlnetlabs.nl > Subject: RE: Unbound 1.13.1rc1 pre-release > > Hi Wouter, > > OK that seems to have fixed things - we are now running - lets see what > happens now... > > Thanks for the quick fixes. > > RayG > > -----Original Message----- > From: Wouter Wijngaards <wou...@nlnetlabs.nl> > Sent: 02 February 2021 16:27 > To: RayG <rgs...@btinternet.com>; unbound-us...@nlnetlabs.nl > Subject: Re: Unbound 1.13.1rc1 pre-release > > Hi RayG, > > Fixed this in the commit > https://github.com/NLnetLabs/unbound/commit/46939294710d24a37f9f838141f26e6b063b01f3 > > Thanks for the report! I updated the link with the installer to a new > installer with a root.key file that has the right contents. > www.nlnetlabs.nl/~wouter/unbound_setup_1.13.1_20210202.exe > www.nlnetlabs.nl/~wouter/unbound-1.13.1_20210202.zip > > Best regards, Wouter > > On 02/02/2021 16:38, RayG wrote: >> Hi Wouter, >> >> A bit further forward but it still will not run. >> >> The reason being that the root.key file has a zero length. It has the >> correct info when 1.13.0 is running. >> >> unbound_setup_1.13.1_20210202 corrupts the file. >> >> C:\Program Files\Unbound>unbound-checkconf.exe >> [1612280164] unbound-checkconf[9652:0] error: failed to read >> C:\Program Files\Unbound\root.key [1612280164] >> unbound-checkconf[9652:0] error: error reading auto-trust-anchor-file: >> C:\Program Files\Unbound\root.key [1612280164] unbound-checkconf[9652:0] >> error: validator: error in trustanchors config [1612280164] >> unbound-checkconf[9652:0] error: validator: could not apply configuration >> settings. >> [1612280164] unbound-checkconf[9652:0] fatal error: bad config for >> validator module >> >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] >> notice: init module 0: respip >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] >> notice: init module 1: validator >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] >> error: failed to read C:\Program Files\Unbound\root.key >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] >> error: error reading auto-trust-anchor-file: C:\Program >> Files\Unbound\root.key >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] >> error: validator: error in trustanchors config >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] error: >> validator: could not apply configuration settings. >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] >> error: module init for module validator failed >> 02/02/2021 15:33:52 C:\Program Files\Unbound\unbound.exe[4548:0] fatal >> error: failed to setup modules >> >> RayG >> -----Original Message----- >> From: Wouter Wijngaards <wou...@nlnetlabs.nl> >> Sent: 02 February 2021 15:17 >> To: RayG <rgs...@btinternet.com>; unbound-us...@nlnetlabs.nl >> Subject: Re: Unbound 1.13.1rc1 pre-release >> >> Hi RayG, >> >> Here is a build for today's fix >> www.nlnetlabs.nl/~wouter/unbound_setup_1.13.1_20210202.exe >> www.nlnetlabs.nl/~wouter/unbound-1.13.1_20210202.zip >> and .asc pgp signature and .sha256 sum files. >> >> Best regards, Wouter >> >> On 02/02/2021 15:44, RayG wrote: >>> Hi Wouter, >>> >>> Thanks >>> >>> I'll have to wait until you next build the Windows installer. >>> >>> RayG >>> >>> -----Original Message----- >>> From: Wouter Wijngaards <wou...@nlnetlabs.nl> >>> Sent: 02 February 2021 14:09 >>> To: RayG <rgs...@btinternet.com>; unbound-us...@nlnetlabs.nl; >>> maintain...@nlnetlabs.nl >>> Subject: Re: Unbound 1.13.1rc1 pre-release >>> >>> Hi RayG, >>> >>> This seems to be because of a default stack protector in mingw. Fix >>> includes libssp in the libunbound/ directory of the zipfile, and >>> attempts to statically link with it in the unbound executable. It is >>> applied to the repository in commits >>> https://github.com/NLnetLabs/unbound/commit/aa8dfe94d31e11c19897444b9 >>> 5 >>> 5af6ac10aec1cd >>> https://github.com/NLnetLabs/unbound/commit/f9a1ac3f0b1a415d8085e113d >>> 4 >>> 4797e62c436a52 >>> https://github.com/NLnetLabs/unbound/commit/18840665bcbb28c9de07bc3b2 >>> 0 >>> 157a0dde13f8fd >>> >>> Best regards, Wouter >>> >>> On 02/02/2021 13:39, RayG wrote: >>>> V1.13.1rc1 will not run on Windows X64 (20H2) >>>> >>>> The error is: >>>> "the code execution cannot proceed because libssp-0.dll was not found" >>>> >>>> Reinstalling the application does not help, >>>> >>>> Reverting to v1.13.0 >>>> >>>> RayG >>>> -----Original Message----- >>>> From: Wouter Wijngaards <wou...@nlnetlabs.nl> >>>> Sent: 02 February 2021 07:47 >>>> To: unbound-us...@nlnetlabs.nl; maintain...@nlnetlabs.nl >>>> Subject: Unbound 1.13.1rc1 pre-release >>>> >>>> Hi, >>>> >>>> Unbound 1.13.1rc1 pre-release is available >>>> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.1rc1.tar.gz >>>> sha256 >>>> c652c0a35165c97962f0cd503902b95096b3f3252d1bf9cefe5ab9e4910e4fec >>>> pgp >>>> https://nlnetlabs.nl/downloads/unbound/unbound-1.13.1rc1.tar.gz.asc >>>> >>>> >>>> This release contains a number of bug fixes. There is added support for >>>> the EDNS Padding option (RFC7830 and RFC8467), and the EDNS NSID option >>>> (RFC 5001). Unbound control has added commands to enable and disable rpz >>>> processing. Reply callbacks have a start time passed to them that can be >>>> used to calculate time, these are callbacks for response processing. With >>>> the option serve-original-ttl the TTL served in responses is the original, >>>> not counted down, value, for when in front of authority service. >>>> >>>> Features >>>> - Merge PR #375 by fhriley: Add rpz_enable and rpz_disable commands >>>> to unbound-control. >>>> - Merge PR #391 from fhriley: Add start_time to reply callbacks so >>>> modules can compute the response time. >>>> - Fix #397: [Feature request] add new type always_null to local-zone >>>> similar to always_nxdomain. >>>> - Support for RFC5001: DNS Name Server Identifier (NSID) Option >>>> with the nsid: option in unbound.conf >>>> - Padding of queries and responses with DNS over TLS as specified in >>>> RFC7830 and RFC8467. >>>> - Merge PR #275 from Roland van Rijswijk-Deij: Add feature to return the >>>> original instead of a decrementing TTL ('serve-original-ttl') >>>> >>>> Bug Fixes >>>> - Fix #358: Squelch udp connect 'no route to host' errors on low >>>> verbosity. >>>> - Fix #360: for the additionally reported TCP Fast Open makes TCP >>>> connections fail, in that case we print a hint that this is >>>> happening with the error in the logs. >>>> - Fix #356: deadlock when listening tcp. >>>> - Fix unbound-dnstap-socket to not use log routine from interrupt >>>> handler and not print so frequently when invoked in sequence. >>>> - Fix on windows to ignore connection failure on UDP, unless verbose. >>>> - make depend. >>>> - Fix #371: unbound-control timeout when Unbound is not running. >>>> - Fix to squelch permission denied and other errors from remote host, >>>> they are logged at higher verbosity but not on low verbosity. >>>> - Merge PR #335 from fobser: Sprinkle in some static to prevent >>>> missing prototype warnings. >>>> - Merge PR #373 from fobser: Warning: arithmetic on a pointer to void >>>> is a GNU extension. >>>> - Fix missing prototypes in the code. >>>> - Fix error cases when udp-connect is set and send() returns an error >>>> (modified patch from Xin Li @delphij). >>>> - For #376: Fix that comm point event is not double removed or double >>>> added to event map. >>>> - iana portlist updated. >>>> - Fix #385: autoconf 2.70 impacts unbound build >>>> - Fix #379: zone loading over HTTP appears to have buffer issues. >>>> - Merge PR #395 from mptre: add missing null check. >>>> - Fix #387: client-subnet-always-forward seems to effectively bypass >>>> any caching? >>>> - For #391: use struct timeval* start_time for callback information. >>>> - For #391: fix indentation. >>>> - For #391: more double casts in python start time calculation. >>>> - Add comment documentation. >>>> - Fix clang analysis warning. >>>> - Fix so local zone types always_nodata and always_deny can be used >>>> from the config file. >>>> - Merge #399 from xiangbao227: The lock of lruhash table should >>>> unlocked after markdel entry. >>>> - Fix for #93: dynlibmodule link fix for Windows. >>>> - Fix for #93: dynlibmodule import library is named libunbound.dll.a. >>>> - Merge #402 from fobser: Implement IPv4-Embedded addresses according >>>> to RFC6052. >>>> - Fix #404: DNS query with small edns bufsize fail. >>>> - Fix declaration before statement and signed comparison warning in >>>> dns64. >>>> - Fix TTL of SOA record for negative answers (localzone and >>>> authzone data) to be the minimum of the SOA TTL and the SOA.MINIMUM. >>>> - Fix compile of unbound-dnstap-socket without dnstap installed. >>>> - Merge PR #355 from noloader: Make ICANN Update CA and DS Trust Anchor >>>> static data. >>>> - Ignore cache blacklisting when trying to reply with expired data from >>>> cache (#394). >>>> - Merge PR #408 from fobser: Prevent a few more yacc clashes. >>>> - Annotate that we ignore the return value of if_indextoname. >>>> - Fix to use correct type for label count in rpz routine. >>>> - Fix empty clause warning in config_file nsid parse. >>>> - Fix to use correct type for label count in ipdnametoaddr rpz routine. >>>> - Fix empty clause warning in edns pass for padding. >>>> - Fix for doxygen 1.8.20 compatibility. >>>> - Attempt to fix NULL keys in the reuse_tcp tree; relates to #411. >>>> >>>> >>>> Best regards, Wouter >>>> >>>> >>> >> > > >