NLnet Labshttps://nlnetlabs.nl/2026-03-04T07:35:16.845901+01:00NSD 4.14.1 released2026-02-24T12:00:00+01:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2026-02-24:/news/2026/Feb/24/nsd-4.14.1-released/<p>Today, we released version 4.14.1 of the authoritative DNS nameserver NSD.</p>
<p>The previous release promised reduced memory footprint from refactored RDATA storage (and it did for the vast majority of cases), but just after the release, we received a report that NSD was consuming more memory for specific …</p><p>Today, we released version 4.14.1 of the authoritative DNS nameserver NSD.</p>
<p>The previous release promised reduced memory footprint from refactored RDATA storage (and it did for the vast majority of cases), but just after the release, we received a report that NSD was consuming more memory for specific kind of zones (with RRsets consisting of many RRs).
This release has that addressed so that NSD now consumes less memory in all cases and circumstances.
A blog post highlighting these memory reductions is available at:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/smaller-faster-nsds-refactored-rdata-storage-and-compile-time-memory-reduction-options/">https://blog.nlnetlabs.nl/smaller-faster-nsds-refactored-rdata-storage-and-compile-time-memory-reduction-options/</a></li>
</ul>
<p>Other than that, this release contains bug fixes, among others some that emerged with the new RDATA storage code from the previous release.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-14-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.14.1.tar.gz">Direct Download</a></li>
</ul>
Krill 0.15.1 ‘Contains Adult Language’ Released2026-01-19T15:00:00+01:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2026-01-19:/news/2026/Jan/19/krill-0.15.1-released/<p>We have just published the latest release of Krill, versions 0.15.1
‘Contains Adult Language.’</p>
<p>Krill is a daemon for running delegated RPKI, featuring a Certificate
Authority and a publication server that allows you to create and publish
signed statements about routing intent.</p>
<p>This release fixes a bug introduced …</p><p>We have just published the latest release of Krill, versions 0.15.1
‘Contains Adult Language.’</p>
<p>Krill is a daemon for running delegated RPKI, featuring a Certificate
Authority and a publication server that allows you to create and publish
signed statements about routing intent.</p>
<p>This release fixes a bug introduced in release 0.15.0 which causes CAs
not to clear certification requests with their parents when they receive
a new certificate. This causes the CA to re-request a new certificate every
time it contacts the parent which by default happens once a day. Another
consequence is that this blocks key rolls from progressing.</p>
<p>Because of these issues, we <strong>strongly encourage users of Krill 0.15.0 to
upgrade</strong> at their earliest convenience.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://krill.docs.nlnetlabs.nl/en/stable/">Krill manual</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.15.1">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill GitHub repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Rotonda 0.5.1 released2026-01-09T14:00:00+01:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2026-01-09:/news/2026/Jan/09/rotonda-0.5.1-released/<p>We are delighted to announce a new minor release of Rotonda, version 0.5.1.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP and MRT. Rotonda …</p><p>We are delighted to announce a new minor release of Rotonda, version 0.5.1.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP and MRT. Rotonda collects
this information in an in-memory database.</p>
<p>This release adds some features to the HTTP/JSON API.</p>
<p>There have been some smaller changes and improvements. The full list of
changes is available in the <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda/releases/tag/v0.4.1">release notes</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://community.nlnetlabs.nl/c/rotonda/5">Rotonda Community</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda">Rotonda Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rotonda.docs.nlnetlabs.nl/">Rotonda Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/projects/routing/about/">NLnet Labs Routing Tools</a></li>
</ul>
New OpenPGP keys for release signing and vulnerability reporting2025-12-09T15:00:00+01:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2025-12-09:/news/2025/Dec/09/keyroll-2025/<p>We are performing a routine roll of our software signing and vulnerability reporting OpenPGP keys.</p>
<p>From January 1st 2026, releases of ldns, NSD and Unbound will be signed with the following OpenPGP key:</p>
<pre class="code literal-block">
User ID: NLnet Labs releases signing key G2 <[email protected]>
Key ID: A144 323D EAAC DF45 …</pre><p>We are performing a routine roll of our software signing and vulnerability reporting OpenPGP keys.</p>
<p>From January 1st 2026, releases of ldns, NSD and Unbound will be signed with the following OpenPGP key:</p>
<pre class="code literal-block">
User ID: NLnet Labs releases signing key G2 <[email protected]>
Key ID: A144 323D EAAC DF45
Fingerprint: 2310 1869 0C4D 903E F419 146A A144 323D EAAC DF45
</pre>
<p>The new key is available from <a class="reference external" href="proxy.php?url=/signing-keys">https://nlnetlabs.nl/signing-keys</a>.</p>
<p>Effective immediately, our security entry point to report security vulnerabilities will switch to the following OpenPGP key:</p>
<pre class="code literal-block">
User ID: NLnet Labs security G2 <[email protected]>
Key ID: BAE5 570A 6390 ADE6
Fingerprint: 9461 F444 EAC6 A4FE E985 BEC6 BAE5 570A 6390 ADE6
</pre>
<p>This key is available from <a class="reference external" href="proxy.php?url=/security-report">https://nlnetlabs.nl/security-report</a>.</p>
NSD 4.14.0 released2025-12-04T12:00:00+01:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2025-12-04:/news/2025/Dec/04/nsd-4.14.0-released/<p>Today, we released version 4.14.0 of the authoritative DNS nameserver NSD.</p>
<p>NSD 4.14.0 comes with refactored RDATA storage, reducing the memory footprint of NSD.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-14-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.14.0.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.24.2 released2025-11-26T00:00:00+01:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2025-11-26:/news/2025/Nov/26/unbound-1.24.2-released/<p>We are pleased to announce the release of version 1.24.2 of the Unbound
recursive DNS resolver.</p>
<p>This security release provides an additional fix for CVE-2025-11411.</p>
<p>Promiscuous NS RRSets that complement DNS replies in the authority
section can be used to trick resolvers to update their delegation
information for …</p><p>We are pleased to announce the release of version 1.24.2 of the Unbound
recursive DNS resolver.</p>
<p>This security release provides an additional fix for CVE-2025-11411.</p>
<p>Promiscuous NS RRSets that complement DNS replies in the authority
section can be used to trick resolvers to update their delegation
information for the zone.
Usually these RRSets are used to update the resolver's knowledge of the
zone's name servers.
If a malicious actor is able to attach such records in a reply (i.e.,
spoofed packet, fragmentation attack) he would be able to poison
Unbound's cache for the delegation point.</p>
<p>Unbound 1.24.1 included a fix that scrubs unsolicited NS RRSets (and
their respective address records) from replies mitigating the possible
poison effect.</p>
<p>Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets
(and their respective address records) from YXDOMAIN and non-referral nodata
replies as well, mitigating the possible poison effect.</p>
<p>We would like to thank TaoFei Guo from Peking University, Yang Luo and JianJun
Chen from Tsinghua University for discovering and responsibly disclosing the
partial mitigation of CVE-2025-11411 in Unbound 1.24.1.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-24-2">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.24.2.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2025-11411.txt">CVE acknowledgement statement</a></li>
</ul>
Unbound 1.24.1 released2025-10-22T00:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2025-10-22:/news/2025/Oct/22/unbound-1.24.1-released/<p>We are pleased to announce the release of version 1.24.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2025-11411.</p>
<p>Several multi-vendor cache poisoning vulnerabilities have been
discovered in caching resolvers for non-DNSSEC protected data.</p>
<p>Unbound is vulnerable for some of these cases that could lead to …</p><p>We are pleased to announce the release of version 1.24.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2025-11411.</p>
<p>Several multi-vendor cache poisoning vulnerabilities have been
discovered in caching resolvers for non-DNSSEC protected data.</p>
<p>Unbound is vulnerable for some of these cases that could lead to
domain hijacking.</p>
<p>Promiscuous NS RRSets that complement DNS replies in the authority
section can be used to trick resolvers to update their delegation
information for the zone.
Usually these RRSets are used to update the resolver's knowledge of the
zone's name servers.
If a malicious actor is able to attach such records in a reply (i.e.,
spoofed packet, fragmentation attack) he would be able to poison
Unbound's cache for the delegation point.</p>
<p>Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and
their respective address records) from replies mitigating the possible
poison effect.</p>
<p>We would like to thank Yuxiao Wu, Yunyi Zhang, Baojun Liu and Haixin
Duan from Tsinghua University for discovering and responsibly disclosing
the vulnerability.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-24-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.24.1.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2025-11411.txt">CVE acknowledgement statement</a></li>
</ul>
Routinator 0.15.1 ‘Ain’t No Country Club Either’ released2025-10-07T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2025-10-07:/news/2025/Oct/07/routinator-0.15.1-released/<p>We are pleased to announce the latest release of Routinator, version
0.15.1 ‘Ain’t No Country Club Either.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP …</p><p>We are pleased to announce the latest release of Routinator, version
0.15.1 ‘Ain’t No Country Club Either.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fixes two issues that surfaced in 0.15.0.</p>
<p>The new optimistic initial validation run succeeded even if no trust anchor
certificates were stored for a TAL because this is the expected behaviour
for a regular validation run. This would result in the data for this trust
anchor missing in the first data set produced. This is now fixed: if there
are not stored trust anchor certificates for a TAL, the initial run is
aborted and a normal run is started.</p>
<p>Additionally, when we added additional restrictions to the systemd unit
files shipped with the binary packages, we added <cite>PrivateUsers=yes</cite>. This
has the somewhat unexpected side effect that Routinator couldn’t bind to
privileged ports, i.e., ports below 1024, for the RTR or HTTP servers. This
release thus removes this setting from the unit files.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Cascade 0.1.0-alpha ‘Globen' released2025-10-07T11:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2025-10-07:/news/2025/Oct/07/cascade-0.1.0-released/<p>We are pleased to announce the first release of Cascade, version 0.1.0-alpha
‘Globen’.</p>
<p>Cascade is a purpose-built, standalone DNSSEC signer, shaped by the
real-world demands of TLD operators. Written from the ground up in Rust for
safety, stability and speed, Cascade will be the next generation DNSSEC
signing …</p><p>We are pleased to announce the first release of Cascade, version 0.1.0-alpha
‘Globen’.</p>
<p>Cascade is a purpose-built, standalone DNSSEC signer, shaped by the
real-world demands of TLD operators. Written from the ground up in Rust for
safety, stability and speed, Cascade will be the next generation DNSSEC
signing solution. For 15 years OpenDNSSEC served the DNSSEC community as
a trusted DNSSEC signer. With the <a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/news/2025/Oct/03/opendnssec-eol-announcement/">end-of-life announcement of OpenDNSSEC</a>
the future begins here with Cascade, a DNSSEC signer updated for a new era of
DNSSEC signing.</p>
<p>As an alpha release please do <em>not</em> use this in production. Our goal with
this release is to enable operators to try out Cascade and to gather feedback.
With a first production ready version expected in the first half of 2026, your
feedback is key and will shape the development of Cascade as we steam ahead.</p>
<p>From the start we are offering packages for installation on major operating
systems and documentation to guide you. Cascade is a work-in-progress but
is already capable of signing to match your workflow including automatic
or manual key rollovers, built-in approval gates that let you run your own
scripts to prevent a bad zone escaping into the wild, and with support for
both on-disk and HSM signing keys.</p>
<p>And of course as with all our products we will offer paid support contracts
for Cascade whether to help you migrate or be there if you need us.</p>
<p>Read all about the vision behind Cascade in our earlier <a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/cascade">blog post</a>,
and get started today with our packages and documentation. If the
documentation doesn't answer your question or give you the guidance you need,
keep checking back, Cascade is being actively developed and documented. Even
better, let us know what we're missing by opening a GH issue or sending an
email to <a class="reference external" href="proxy.php?url=mailto:[email protected]">[email protected]</a> and we'll get right
on it.</p>
<p>To try out Cascade right now follow the installation instructions in the
<a class="reference external" href="proxy.php?url=https://cascade.docs.nlnetlabs.nl/en/latest/installation.html">manual</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/cascade">Cascade launch announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://cascade.docs.nlnetlabs.nl">Cascade documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://packages.nlnetlabs.nl/">Cascade packages</a></li>
<li><a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/services/contracts/">Support services</a></li>
</ul>
End-of-Life Roadmap for OpenDNSSEC2025-10-03T14:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2025-10-03:/news/2025/Oct/03/opendnssec-eol-announcement/<p>We would like to inform our users and the wider DNS community about the planned End-of-Life (EOL) timeline for OpenDNSSEC. Operators are encouraged to start planning replacement. We will offer Cascade, a new DNSSEC signer, as a drop-in successor.</p>
<p>OpenDNSSEC has served the community for many years as a trusted …</p><p>We would like to inform our users and the wider DNS community about the planned End-of-Life (EOL) timeline for OpenDNSSEC. Operators are encouraged to start planning replacement. We will offer Cascade, a new DNSSEC signer, as a drop-in successor.</p>
<p>OpenDNSSEC has served the community for many years as a trusted DNSSEC signer. Since its first release in 2010, it pioneered automated DNSSEC key management and zone signing, and inspired other software projects to adopt similar functionality. Over time, however, operational requirements and best practices have evolved. The architectural choices made more than 15 years ago now make it increasingly difficult to maintain and extend OpenDNSSEC. We have decided that our resources and development efforts are better focused on building the next generation of DNSSEC signing solutions.</p>
<p>To ensure we continue to provide a reliable, modern, and efficient DNSSEC signing solution, we are developing Cascade, our new DNSSEC signer.</p>
<div class="section" id="timeline">
<h2>Timeline</h2>
<ul class="simple">
<li>3 October 2025 (today): Formal announcement of OpenDNSSEC End-of-Life.</li>
<li>October 2025 – October 2027:<ul>
<li>Ongoing support for OpenDNSSEC.</li>
<li>Critical bug fixes and security updates.</li>
<li>No new features will be developed.</li>
</ul>
</li>
<li>October 2027: OpenDNSSEC reaches its official End-of-Life. No further updates or support will be provided.</li>
</ul>
</div>
<div class="section" id="transition-to-cascade">
<h2>Transition to Cascade</h2>
<p>We encourage users to begin evaluating Cascade, our upcoming DNSSEC signing solution:</p>
<ul class="simple">
<li>Alpha release available: October 2025</li>
<li>Production-ready release: First half of 2026</li>
</ul>
<p>Cascade is being developed as a modern, efficient, and maintainable DNSSEC signing solution [1]. It builds on our experience with OpenDNSSEC while offering a stronger foundation for the future.</p>
<p>Before writing a single line of code for Cascade, we interviewed 16 Top Level Domain operators and other members of the DNS community about their requirements and wishes. You can read more about this in the linked article [2].</p>
<p>One of the key takeaways from these interviews is the desire to have a purpose-built, standalone DNSSEC signer, rather than a full authoritative server with signing capabilities. The result is an architecture that offers flexible deployment, sensible defaults, tight control over the signing process and, most of all, observability — ensuring you will know what the pipeline is doing and why, and what you can expect to happen next. Lastly, a key part of the project is offering comprehensive documentation [3] and an easy migration path from OpenDNSSEC to Cascade, with guidance and support services available from the first release onward.</p>
<p>We will present the Cascade prototype and give a live demo at the OARC 45 meeting on Tuesday, 7 October [4].</p>
<p>We sincerely thank the community, contributors, and users who have supported and improved OpenDNSSEC over the years. Your trust and feedback have been invaluable, and we hope the alpha release of Cascade offers a starting point for continuing this collaboration.</p>
</div>
<div class="section" id="contact-and-resources">
<h2>Contact and Resources</h2>
<p>For questions, bug reports, or support:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=mailto:[email protected]">[email protected]</a></li>
</ul>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/cascade/">https://blog.nlnetlabs.nl/cascade/</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/dnssec-operations-in-2026-what-keeps-16-tlds-up-at-night/">https://blog.nlnetlabs.nl/dnssec-operations-in-2026-what-keeps-16-tlds-up-at-night/</a></li>
<li><a class="reference external" href="proxy.php?url=https://cascade.docs.nlnetlabs.nl/">https://cascade.docs.nlnetlabs.nl/</a></li>
<li><a class="reference external" href="proxy.php?url=https://indico.dns-oarc.net/event/55/contributions/1186/">https://indico.dns-oarc.net/event/55/contributions/1186/</a>.</li>
</ul>
</div>
Rotonda 0.5.0 ‘Mosaïque Public’ released2025-09-30T21:00:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2025-09-30:/news/2025/Sep/30/rotonda-0.5.0-released/<p>We are delighted to announce a new release of Rotonda, version 0.5.0
‘Mosaïque Public’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP and MRT …</p><p>We are delighted to announce a new release of Rotonda, version 0.5.0
‘Mosaïque Public’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP and MRT. Rotonda collects
this information in an in-memory database.</p>
<p>This release introduces a new version of <cite>roto</cite>, that can use more data from
the context of the BMP/BGP sessions.</p>
<p>The HTTP api is redesigned to be more consistent and feature more endpoints.
Filters for the HTTP API can be based on user-degined <cite>roto</cite> functions.</p>
<p>Also, in <cite>roto</cite> scripts, a new metrics object is introduced, enabling
user-defined counters/gauges for the /metrics Prometheus endpoint.</p>
<p>There have been some smaller changes and improvements. The full list of
changes is available in the <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda/releases/tag/v0.4.1">release notes</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda">Rotonda Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rotonda.docs.nlnetlabs.nl/">Rotonda Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/projects/routing/about/">NLnet Labs Routing Tools</a></li>
</ul>
Routinator 0.15.0 ‘This Ain’t No Disco’ released2025-09-30T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2025-09-30:/news/2025/Sep/30/routinator-0.15.0-released/<p>We are pleased to announce the latest release of Routinator, version
0.15.0 ‘This Ain’t No Disco’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow …</p><p>We are pleased to announce the latest release of Routinator, version
0.15.0 ‘This Ain’t No Disco’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>Perhaps the most visible change in this release is that by default there will
be significantly less information logged.</p>
<p>We’ve seen regular questions by users who aren’t intimately familiar with the
inner workings of RPKI and got worried by messages about expired certificates
etc., not realising that they are all normal and there is nothing they can or
should do about it.</p>
<p>Starting with this version, Routinator will not log these messages any more
but rather collect them and make them available in the status HTTP endpoints.
We also structure them by repository or publication point, so it will be
much easier to see what exactly went wrong, for instance, when fetching an
RRDP repository.</p>
<p>If you don’t like this new behaviour and would rather see everything logged
as previously, the new <tt class="docutils literal"><span class="pre">log-repository-issues</span></tt> command line and config file
option will allow you to switch back.</p>
<p>In addition, we’ve done quite a few performance improvements. When Routinator
is started in server mode, it now first does an “optimistic” intial run. It
will only use stored data from previous runs and thus have a data set
available within a few dozen seconds. In order to avoid accidentally creating
an incorrect dataset, it will abort this initial run if data is requested that
hasn’t been requested previously, e.g., because a TAL was added, and start a
regular validation run.</p>
<p>We also changed the defaults for RRDP timeouts which allows Routinator to
discover non-responsive RRDP servers much quicker. This roughly halved update
durations in our tests.</p>
<p>As always, there are an number of additional improvements and fixes in
this release. You can read all the details in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.15.0">release notes</a></p>
<p>We would like to thank Zizhi Shang, Zhechao Lin, Jiahao Cao, Yangyang Wang,
Mingwei Xu of the Institute for Network Sciences and Cyberspace (INSC),
Tsinghua University as well as Niklas Vogel of Goethe University Frankfurt
and ATHENE for reporting issues fixed in this release.</p>
<p>In case you are using our binary packages, with this version we added
packages for recently released Debian 13 and RHEL. They will be available
via our <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/packages/">package repository</a>.</p>
<p>Finally, we have added a
<a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/en/stable/threat-model.html">threat model</a>
to the documentation, in which we describe the security assumptions Routinator's design is based on.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.24.0 released2025-09-18T10:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2025-09-18:/news/2025/Sep/18/unbound-1.24.0-released/<p>We are pleased to announce the release of version 1.24.0 of the Unbound
recursive DNS resolver.</p>
<p>This release features increased defaults, <cite>num.valops</cite> statistic,
unbound-control <cite>cache_lookup</cite>, and bug fixes.</p>
<p>The default value increase for <cite>num-queries-per-thread</cite> is to make
saturation of the task queue more resource intensive and less …</p><p>We are pleased to announce the release of version 1.24.0 of the Unbound
recursive DNS resolver.</p>
<p>This release features increased defaults, <cite>num.valops</cite> statistic,
unbound-control <cite>cache_lookup</cite>, and bug fixes.</p>
<p>The default value increase for <cite>num-queries-per-thread</cite> is to make
saturation of the task queue more resource intensive and less
practical. Thanks to Shiming Liu, Network and Information Security
Lab, Tsinghua University for the report.</p>
<p>The default value increase for <cite>so-sndbuf</cite> is to mitigate a cross-layer
issue where the UDP socket send buffers are exhausted waiting for
ARP/NDP resolution. Thanks to Reflyable for the report.</p>
<p>To help the server start more easily, the setsockopt for sndbuf buffer
size prints a warning instead of a failure to start the server if it
can not set the buffer size.</p>
<p>Various cache -slabs options are auto-configured if not specified
in the config file. It uses a power of two close to the number of
threads. When the option is specified in the config file that value
is used instead.</p>
<p>An extra statistic is added to track the number of signature validation
operations by the validator, <cite>num.valops</cite>.</p>
<p>The unbound-control <cite>cache_lookup</cite> command prints cache information for
names in the domain given. This prints similar to dump_cache, but only
names under the zone(s) specified. Because of that it locks the caches
for a much shorter time, and this is good for server responsiveness.</p>
<p>The <cite>sock-queue-timeout</cite> option is adapted to work on FreeBSD as well
as Linux.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-24-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.24.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.13.0 released2025-09-03T15:00:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2025-09-03:/news/2025/Sep/03/nsd-4.13.0-released/<p>Today, we released version 4.13.0 of the authoritative DNS nameserver NSD.</p>
<p>NSD 4.13.0 now comes with the features <cite>--enable-bind8-stats</cite>, <cite>--enable-zone-stats</cite>, <cite>--enable-ratelimit</cite>, <cite>--enable-dnstap</cite> enabled by default, reducing confusion when using the same version of NSD packaged by different distributions with different configure options.</p>
<p>Additionally, NSD 4.13 …</p><p>Today, we released version 4.13.0 of the authoritative DNS nameserver NSD.</p>
<p>NSD 4.13.0 now comes with the features <cite>--enable-bind8-stats</cite>, <cite>--enable-zone-stats</cite>, <cite>--enable-ratelimit</cite>, <cite>--enable-dnstap</cite> enabled by default, reducing confusion when using the same version of NSD packaged by different distributions with different configure options.</p>
<p>Additionally, NSD 4.13.0 contains experimental support for AF_XDP sockets as described in an earlier post that can be enabled using the <cite>--enable-xdp</cite> configure option.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-13-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.13.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/experimental-support-for-af_xdp-sockets-in-nsd/">Experimental support for AF_XDP sockets in NSD</a></li>
</ul>
Krill 0.15.0 ‘But I Digress’ Released2025-08-12T15:00:00+02:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2025-08-12:/news/2025/Aug/12/krill-0.15.0-released/<p>We are pleased to announce the release of Krill, versions 0.15.0 ‘But I
Digress.’</p>
<p>Krill is a daemon for running delegated RPKI, featuring a Certificate
Authority and a publication server that allows you to create and publish
signed statements about routing intent.</p>
<p>This release primarily contains a lot …</p><p>We are pleased to announce the release of Krill, versions 0.15.0 ‘But I
Digress.’</p>
<p>Krill is a daemon for running delegated RPKI, featuring a Certificate
Authority and a publication server that allows you to create and publish
signed statements about routing intent.</p>
<p>This release primarily contains a lot of changes under the hood – refactoring
of code and update of dependencies – most of which shouldn’t be visible to
users. There are, however, two breaking changes that may be important.</p>
<p>First, we refactored command line parsing of the <tt class="docutils literal">krillc</tt> and <tt class="docutils literal">krillta</tt>
tools. As a result, the options that are common to all subcommands have
shifted to before the subcommand. This concerns the <tt class="docutils literal"><span class="pre">--server</span></tt>, <tt class="docutils literal"><span class="pre">--token</span></tt>,
<tt class="docutils literal"><span class="pre">--format</span></tt> and <tt class="docutils literal"><span class="pre">--api</span></tt> options. If you have written scripts that use
<tt class="docutils literal">krillc</tt> or <tt class="docutils literal">krillta</tt>, you may have to adjust them.</p>
<p>Secondly, the configuration for multi-user authentication with OpenID Connect
has changed. We unfortunately had to do this because a library we have been
using has not been updated in a long time and doesn’t work any more. The good
news is that we think the new scheme is much simpler and configuration should
be easier. It is, however, not quite as flexible as the old scheme. If the
new scheme doesn’t work for your use case, please let us know!</p>
<p>More details of the new OpenID Connect configuration can be found in the
<a class="reference external" href="proxy.php?url=https://krill.docs.nlnetlabs.nl/en/v0.15.0/multi-user/openid-connect-provider.html">manual</a>.</p>
<p>In addition, we have replaced downloading the full RISwhois file for ROA
analysis with calls to an API. This will decrease the memory usage of Krill
since it doesn’t need to hold the content of the entire file in memory. If
you don’t want your Krill to use this API run by us, you can disable the use
entirely or run your own version of the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/roto-api">Roto API</a>.</p>
<p>Finally, there have been a number of smaller changes. The complete list
can be found in the <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.15.0">release notes</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://krill.docs.nlnetlabs.nl/en/stable/">Krill manual</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.15.0">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill GitHub repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.23.1 released2025-07-16T00:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2025-07-16:/news/2025/Jul/16/unbound-1.23.1-released/<p>We are pleased to announce the release of version 1.23.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2025-5994.</p>
<p>A multi-vendor cache poisoning vulnerability named "Rebirthday Attack"
has been discovered in caching resolvers that support EDNS Client Subnet
(ECS).
Unbound is also vulnerable when compiled with …</p><p>We are pleased to announce the release of version 1.23.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2025-5994.</p>
<p>A multi-vendor cache poisoning vulnerability named "Rebirthday Attack"
has been discovered in caching resolvers that support EDNS Client Subnet
(ECS).
Unbound is also vulnerable when compiled with ECS support, i.e.,
<tt class="docutils literal"><span class="pre">--enable-subnet</span></tt>, AND configured to send ECS information along with
queries to upstream name servers, i.e., at least one of the
<a class="reference external" href="proxy.php?url=https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html#unbound-conf-ecs-send-client-subnet">send-client-subnet</a>,
<a class="reference external" href="proxy.php?url=https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html#unbound-conf-ecs-client-subnet-zone">client-subnet-zone</a> or
<a class="reference external" href="proxy.php?url=https://unbound.docs.nlnetlabs.nl/en/latest/manpages/unbound.conf.html#unbound-conf-ecs-client-subnet-always-forward">client-subnet-always-forward</a> options is used.</p>
<p>A malicious actor can then exploit the Rebirthday Attack in two steps.
First, send queries to Unbound that would result in segregated ECS
outbound traffic from Unbound for a single domain.
Second, send non-ECS poisonous replies to Unbound trying to guess the
DNS transaction ID before the real answer from the upstream name server
arrives.</p>
<p>Unbound version 1.23.1 includes a fix that disregards replies that came
back without ECS when ECS was expected. Instead it creates a non-ECS sub
query, that could be aggregated with other such queries, to explicitly
query for the non-ECS authoritative answer.
The re-introduced query aggregation then defeats the Rebirthday Attack.</p>
<p>We would like to thank Xiang Li (AOSP Lab, Nankai University) for
discovering and responsibly disclosing the vulnerability.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-23-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.23.1.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2025-5994.txt">CVE acknowledgement statement</a></li>
</ul>
Rotonda 0.4.1 ‘Melolontha²’ released2025-05-20T14:30:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2025-05-20:/news/2025/May/20/rotonda-0.4.1-released/<p>We are delighted to announce a new release of Rotonda, version 0.4.1
‘Melolontha²’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP and MRT. Rotonda …</p><p>We are delighted to announce a new release of Rotonda, version 0.4.1
‘Melolontha²’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP and MRT. Rotonda collects
this information in an in-memory database.</p>
<p>Rotonda uses a strongly typed, compiled language, called <cite>roto</cite>
for filtering and creating policies, among others. We're proud
to see our <cite>roto</cite> featured on the front page of <a class="reference external" href="proxy.php?url=https://news.ycombinator.com/item?id=44050222">Hacker News</a>!</p>
<p>This release introduces two new <cite>roto</cite> filters that can act on RPKI Route
Origin Validation information from an RPKI validator, like Routinator or
rpki-client.</p>
<p>In the <cite>roto</cite> filter language users can now specify lists of ASNs that are
compiled in the filter.</p>
<p>There have been some smaller changes and improvements. The full list of
changes is available in the <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda/releases/tag/v0.4.1">release notes</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda">Rotonda Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rotonda.docs.nlnetlabs.nl/">Rotonda Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/projects/routing/about/">NLnet Labs Routing Tools</a></li>
</ul>
RTRTR 0.3.2 ‘Based on a True Story’ released2025-05-06T17:00:00+02:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2025-05-06:/news/2025/May/06/rtrtr-0.3.2-released/<p>We are happy to announce the latest release of RTRTR, version 0.3.2
‘Based on a True Story.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for RPKI …</p><p>We are happy to announce the latest release of RTRTR, version 0.3.2
‘Based on a True Story.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for RPKI such as
centralised RPKI validators that dispatch data to local caching RTR
servers.</p>
<p>This version adds support for ASPA to the RTR and JSON units and targets.</p>
<p>In addition, it fixes a number of smaller issues. You can find the full
list in
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr/releases/tag/v0.3.2">release notes.</a></p>
<p>More information about RTRTR including installation instructions
can be found in the new
<a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/en/stable/">RTRTR Manual</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/en/stable/">RTRTR Manual</a>.</li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr">RTRTR Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/">RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Rotonda 0.4.0 ‘Bold and undaunting Youth’ released2025-04-24T14:30:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2025-04-24:/news/2025/Apr/24/rotonda-0.4.0-released/<p>We are happy to announce a new release of Rotonda, version 0.4.0 ‘Bold and
undaunting Youth’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP …</p><p>We are happy to announce a new release of Rotonda, version 0.4.0 ‘Bold and
undaunting Youth’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP, BGP and MRT. Rotonda collects
this information in an in-memory database.</p>
<p>This release features a first implementation of the RTR component, that allows
Rotonda to receive Route Origin Validation information from RPKI validator
software, like Routinator, or rpki-client.</p>
<p>Furthermore, this release uses a new version of <cite>Roto</cite> (the Rotonda filter
programming language) compiler, which features a module system, and optional
types.</p>
<p>Internally, preparations have been made to start storing routing information both in-memory and on-disk. Stay tuned.</p>
<p>There have been many smaller changes and improvements. The full list of
changes is available in the <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda/releases/tag/v0.4.0">release notes</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda">Rotonda Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rotonda.docs.nlnetlabs.nl/">Rotonda Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/projects/routing/about/">NLnet Labs Routing Tools</a></li>
</ul>
NSD 4.12.0 released2025-04-24T10:30:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2025-04-24:/news/2025/Apr/24/nsd-4.12.0-released/<p>Today, we released version 4.12.0 of the authoritative DNS nameserver NSD.</p>
<p>This release introduces Prometheus metrics that can be configured with
enable-metrics (see nsd.conf(5)).</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-12-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.12.0.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.23.0 released2025-04-24T10:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2025-04-24:/news/2025/Apr/24/unbound-1.23.0-released/<p>We are pleased to announce the release of version 1.23.0 of the Unbound
recursive DNS resolver.</p>
<p>This release features changed defaults, fast reload, redis replica,
DNS Error Reporting, and bug fixes.</p>
<p>The fast reload is a feature that is listed as experimental. With
<cite>unbound-control fast_reload</cite> the server can …</p><p>We are pleased to announce the release of version 1.23.0 of the Unbound
recursive DNS resolver.</p>
<p>This release features changed defaults, fast reload, redis replica,
DNS Error Reporting, and bug fixes.</p>
<p>The fast reload is a feature that is listed as experimental. With
<cite>unbound-control fast_reload</cite> the server can read the new config in
a thread, and when done only briefly pauses the server to update the
settings. This uses double memory, for like zones from disk or config
that is loaded. It only pauses the server, for like less than a second,
so DNS service is not interrupted by the reload of config. A lot of
config items can be changed, but not all. It has options to print
more information, or memory usage, and there is a list of config
options in the man page.</p>
<p>The redis replica support allows for a redis backend to use a redis
replica. The read commands are sent to the redis replica host, while
the write commands are sent to the redis server. So with several
replicas there can be more readers that all write to the redis server.</p>
<p>With DNS error reporting, RFC9567, enabled with
<cite>dns-error-reporting: yes</cite>, this uses the error reporting agent to send
failure reports to. The number of error reporting queries is output in
the statistics as <cite>num.dns_error_reports</cite>.</p>
<p>Some defaults are changed in this release. The <cite>resolver.arpa.</cite> and
<cite>service.arpa.</cite> zones are added to the default locally served zones,
this can be disabled with a nodefault local zone. The default for
<cite>max-global-quota</cite> has changed to 200, after operational feedback.
The defaults from RFC8767 are used by <cite>serve-expired-client-timeout</cite>
on 1800 milliseconds and <cite>serve-expired-ttl</cite> on 86400 seconds. If
Unbound is compiled with edns subnet, the default for module-config
is no longer altered, so that compilation with subnet does not
interfere when the server does not use subnet. When edns subnet needs
to be enabled, <cite>module-config: "subnetcache validator iterator"</cite> should
be explicitly set as configuration in the <cite>server:</cite> section.</p>
<p>If edns subnet is enabled, the default for
module-config is no longer altered, so that compilation with subnet
does not interfere when the server does not use subnet. When edns subnet
is in use, also <cite>module-config: "subnetcache validator iterator"</cite> should
be set as configuration in the <cite>server:</cite> section.</p>
<p>The RC2 has fixes for building on Solaris and portability to Windows,
and fixes a memory leak for DoH.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-23-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.23.0.tar.gz">Directly download the source package</a></li>
</ul>
The Phone Book of the Internet2025-04-01T12:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2025-04-01:/news/2025/Apr/01/phonebook-of-the-internet/<p>In light of a recent motion of the Dutch parliament <a class="reference external" href="proxy.php?url=https://www.tweedekamer.nl/kamerstukken/moties/detail?id=2025D10896&did=2025D10896">[1]</a>, keeping with the trend of internet centralisation and considering the general state of the world <a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/doc/rfc9518/">[2]</a>, we are bringing the full DNS chain to a doormat close to you*. (Re-)introducing <a class="reference external" href="proxy.php?url=https://librarysearch.hillsdale.edu/discovery/fulldisplay?docid=alma991001728799707081&context=L&vid=01HC_INST:01HC_INST&lang=en&adaptor=Local%20Search%20Engine&query=sub,exact,Computer%20networks,AND&mode=advanced&offset=0">[3]</a> The Phone Book of the Internet.</p>
<p>Whenever …</p><p>In light of a recent motion of the Dutch parliament <a class="reference external" href="proxy.php?url=https://www.tweedekamer.nl/kamerstukken/moties/detail?id=2025D10896&did=2025D10896">[1]</a>, keeping with the trend of internet centralisation and considering the general state of the world <a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/doc/rfc9518/">[2]</a>, we are bringing the full DNS chain to a doormat close to you*. (Re-)introducing <a class="reference external" href="proxy.php?url=https://librarysearch.hillsdale.edu/discovery/fulldisplay?docid=alma991001728799707081&context=L&vid=01HC_INST:01HC_INST&lang=en&adaptor=Local%20Search%20Engine&query=sub,exact,Computer%20networks,AND&mode=advanced&offset=0">[3]</a> The Phone Book of the Internet.</p>
<p>Whenever something doesn't work, it's generally the DNS <a class="reference external" href="proxy.php?url=https://isitdns.com/">[4]</a>. Modern organisations need a contingency plan for when that happens. We resolved the A-records of domain names you probably want to use, resolved them for you, and compiled them into a convenient<sup>[citation needed]</sup> booklet that can be used fully locally, even without power. Think of it as a bound version of <a class="reference external" href="proxy.php?url=/projects/unbound/about">Unbound</a>.</p>
<p>And when the domain name you need is not in the booklet, you can always <a class="reference external" href="proxy.php?url=https://www.youtube.com/watch?v=szlnM3kD-Bo">call our DNS resolver</a> on <a class="reference external" href="proxy.php?url=tel:+31853695573">+31 (0)85 369 5573</a>.</p>
<p><a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/~koen/phonebook-of-the-internet.pdf">Download your copy of the Phone Book of the Internet here</a></p>
<p>* We now have printing facilities: <a class="reference external" href="proxy.php?url=https://www.boekenbestellen.nl/shop/winkelwagen/add/1/72875/1">buy it here</a> (sold effectively at cost) or get the source files yourself <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/~koen/phonebook/">here</a>.</p>
<img alt="A picture of the phone book of the internet laying on a printer" src="proxy.php?url=/static/images/phonebook-of-the-internet2.jpg"/>
Routinator 0.14.2 ‘Roll Initiative!’ released2025-03-04T15:00:00+01:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2025-03-04:/news/2025/Mar/04/routinator-0.14.2-released/<p>We are pleased to announce the latest release of Routinator, version
0.14.2 ‘Roll Initiative!’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release updates …</p><p>We are pleased to announce the latest release of Routinator, version
0.14.2 ‘Roll Initiative!’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release updates the bundled Routinator UI package to version 0.4.5
which fixes an issue that caused the UI to fetch its data from NLnet Lab’s
test installation rather than the actual Routinator instance it belongs
to.</p>
<p>If you are using the bundled Routinator UI via the web interface, we suggest
to upgrade to this version to access your own validated data.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.14.1 ‘Black Cats and Voodoo Dolls’ released2025-01-22T15:00:00+01:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2025-01-22:/news/2025/Jan/22/routinator-0.14.1-released/<p>We are pleased to announce the latest release of Routinator, version
0.14.1 ‘Black Cats and Voodoo Dolls.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow …</p><p>We are pleased to announce the latest release of Routinator, version
0.14.1 ‘Black Cats and Voodoo Dolls.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fixes a crash when the file names of a manifest’s file list
contain illegal characters. The issue has
<a class="reference external" href="proxy.php?url=/downloads/routinator/CVE-2025-0638.txt">CVE-2025-0639</a>
assigned. We would like to thank Haya Schulmann and Niklas Vogel of Goethe
University Frankfurt/ATHENE Center for notifying us about this
vulnerability.</p>
<p>In addition, the release improves the memory consumption of the new RRDP
storage introduced in version 0.14.0 which tended to grow rather large over
time. It should now end up with much less overhead. We will continue to keep
an eye on how it develops long term and do further tweaks if necessary.</p>
<p>Further, standardisation of ASPA has progressed far enough in the IETF that
we feel comfortable to include it in Routinator. You still have to
explicitly set <tt class="docutils literal"><span class="pre">enable-aspa:</span> true</tt> in your config file or use the
<tt class="docutils literal"><span class="pre">--enable-aspa</span></tt> command line option to actually enable it.</p>
<p>Back in version 0.10.2 we disabled GZIP support for the RRDP collector as
there were multiple issues with malicious GZIP files leading to memory
exhaustion. We have now implemented a number of counter-measures that make
us confident to re-enable support.</p>
<p>As always, there have been many smaller changes and improvements.
The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.14.1">release notes</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.11.1 released2025-01-18T12:00:00+01:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2025-01-18:/news/2025/Jan/18/nsd-4.11.1-released/<p>Today, we released version 4.11.1 of the authoritative DNS nameserver NSD.</p>
<p>NSD version 4.11.0 had a serious bug in which applying updates to zones (and other modifications that require a reload, such as adding and deleting zones), could stop entirely after reception of a broken or …</p><p>Today, we released version 4.11.1 of the authoritative DNS nameserver NSD.</p>
<p>NSD version 4.11.0 had a serious bug in which applying updates to zones (and other modifications that require a reload, such as adding and deleting zones), could stop entirely after reception of a broken or corrupted update via zone transfer.
We believe that this broken state would appear as one of the NSD processes consuming 100% CPU.
Version 4.11.1 has this corrected as well as some other smaller non-critical bugs.</p>
<p>Many thanks to the people at SUNET and netnod (Fredrik and Arvid and all the others) that helped us to get to the bottom of this critical issue!</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-11-1">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.11.1.tar.gz">Direct Download</a></li>
</ul>
NSD 4.11.0 released2024-12-12T12:00:00+01:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2024-12-12:/news/2024/Dec/12/nsd-4.11.0-released/<p>Updated 2025-01-18: THIS VERSION HAS A SERIOUS BUG.
Please upgrade to NSD 4.11.1 at the earliest opportunity.</p>
<p>Today, we released version 4.11.0 of the authoritative DNS nameserver NSD.</p>
<p>Version 4.11.0 sees various small features and bugfixes.</p>
<p>One notable feature is that configuration can be …</p><p>Updated 2025-01-18: THIS VERSION HAS A SERIOUS BUG.
Please upgrade to NSD 4.11.1 at the earliest opportunity.</p>
<p>Today, we released version 4.11.0 of the authoritative DNS nameserver NSD.</p>
<p>Version 4.11.0 sees various small features and bugfixes.</p>
<p>One notable feature is that configuration can be reloaded and evaluated on SIGHUP, when enabled with the new "reload-config" option.
Also, DNS cookie secrets will be reevaluated from config too.</p>
<p>One notable bugfix is to process and apply non transfer tasks before transfer tasks during reloads.
Before, non transfer tasks (such as adding or deleting zones) would be lost when batched together with a transfer task that would fail to apply.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-11-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.11.0.tar.gz">Direct Download</a></li>
</ul>
Rotonda 0.2.0 ‘Happy Fuzzballs’ released2024-11-21T16:30:00+01:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2024-11-21:/news/2024/Nov/21/rotonda-0.2.0-released/<p>We are super happy to announce a new - the second - release of Rotonda,
version 0.2.0 ‘Happy Fuzzballs’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP …</p><p>We are super happy to announce a new - the second - release of Rotonda,
version 0.2.0 ‘Happy Fuzzballs’.</p>
<p>Rotonda is a programmable, analytical BGP engine, that allows users to gather
routing data from various sources, such as routers, routing software and
files, and over various protocols, such as BMP and BGP and collect them into
an in-memory database.</p>
<p>This release is for the most part a refactor of large parts of the internals
of Rotonda, resulting in increased performance, and a greatly reduced memory
footprint.</p>
<p>One notable improvement is the replacement of the <cite>Roto</cite> (the Rotonda filter
programming language) compiler and virtual machine with a compiler that
compiles <cite>Roto</cite> code down to machine code. <cite>Roto</cite> source code can be compiled
by a running Rotonda application and can be inserted into the hot-path of the
data flow. This new compilation process greatly improves performance.</p>
<p>A new (but still experimental) feature is the possibility to import mrt files,
and load them into the in-memory database.</p>
<p>There have been many smaller changes and improvements. The full list of
changes is available in the <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda/releases/tag/v0.2.0">release notes</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rotonda">Rotonda Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rotonda.docs.nlnetlabs.nl/">Rotonda Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/projects/routing/about/">NLnet Labs Routing Tools</a></li>
</ul>
Unbound 1.22.0 released2024-10-17T11:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2024-10-17:/news/2024/Oct/17/unbound-1.22.0-released/<p>We are pleased to announce the release of version 1.22.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has an option to harden against unverified glue, it
is enabled with <cite>harden-unverified-glue: yes</cite>. It was contributed
by Karthik Umashankar from Microsoft. This protects Unbound against
bad glue, that is …</p><p>We are pleased to announce the release of version 1.22.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has an option to harden against unverified glue, it
is enabled with <cite>harden-unverified-glue: yes</cite>. It was contributed
by Karthik Umashankar from Microsoft. This protects Unbound against
bad glue, that is out of zone, by performing a lookup for it.
Because it uses the original information as a last resort if nothing
works, it should not give lookup failures, and add protection.</p>
<p>There are options to configure the scrubbing for NS records and
the CNAME scrubbing and the max global quota lookup limit from
previous security fix releases. They can be configured with the
options <cite>iter-scrub-ns</cite>, <cite>iter-scrub-cname</cite> and <cite>max-global-quota</cite>.</p>
<p>For redis use, with cachedb, it is possible to specify the
timeout for the initial connection separately from the timeout
for commands. With the options <cite>redis-command-timeout: 20</cite> and
<cite>redis-connect-timeout: 200</cite> they can be set separately, for
a longer connect attempt, but a short command timeout to keep
resolution faster.</p>
<p>It is possible to log with ISO8601 format with <cite>log-time-iso: yes</cite>
this also logs time in milliseconds. Useful if the server writes to
file, syslog may have its own format.</p>
<p>DNS over QUIC is support is added, if compiled with libngtcp2 and
with the openssl+quic that it uses. Use <cite>--with-libngtcp2</cite> for that,
and enable it with <cite>quic-port: 853</cite>. There is a post about it
on <a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/dns-over-quic-in-unbound">https://blog.nlnetlabs.nl/dns-over-quic-in-unbound</a> [that is to
appear after the release].</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-22-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/dns-over-quic-in-unbound">DNS over QUIC in Unbound</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.22.0.tar.gz">Directly download the source package</a></li>
</ul>
Unbound 1.21.1 released2024-10-03T00:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2024-10-03:/news/2024/Oct/03/unbound-1.21.1-released/<p>We are pleased to announce the release of version 1.21.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2024-8508.</p>
<p>A vulnerability has been discovered in Unbound when handling replies
with very large RRsets that Unbound needs to perform name compression
for.</p>
<p>Malicious upstreams responses with very …</p><p>We are pleased to announce the release of version 1.21.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2024-8508.</p>
<p>A vulnerability has been discovered in Unbound when handling replies
with very large RRsets that Unbound needs to perform name compression
for.</p>
<p>Malicious upstreams responses with very large RRsets can cause Unbound
to spend a considerable time applying name compression to downstream
replies. This can lead to degraded performance and eventually denial of
service in well orchestrated attacks.</p>
<p>Unbound version 1.21.1 introduces a hard limit on the number of name
compression calculations it is willing to do per packet.
Packets that need more compression will result in semi-compressed
packets or truncated packets, even on TCP for huge messages, to avoid
locking the CPU for long.</p>
<p>This change should not affect normal DNS traffic.</p>
<p>We would like to thank Toshifumi Sakaguchi for discovering and
responsibly disclosing the vulnerability.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-21-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.21.1.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2024-8508.txt">CVE acknowledgement statement</a></li>
</ul>
Unbound 1.21.0 released2024-08-15T10:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2024-08-15:/news/2024/Aug/15/unbound-1.21.0-released/<p>We are pleased to announce the release of version 1.21.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has a fix for the CAMP and CacheFlush issues. They have a
low severity for Unbound, since it does not affect Unbound so much.</p>
<p>The Compositional Amplification (CAMP) type of …</p><p>We are pleased to announce the release of version 1.21.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has a fix for the CAMP and CacheFlush issues. They have a
low severity for Unbound, since it does not affect Unbound so much.</p>
<p>The Compositional Amplification (CAMP) type of attacks can lead to DoS
attacks against DNS servers. In Unbound legitimate client requests to
the resolvers under typical workload are not directly affected by CAMP
attacks. However we introduce a global quota for 128 outgoing packets
per query (and it's subqueries) that is never reset to prevent the
combination of CAMP with other amplification attacks in the future. We
would like to thank Huayi Duan, Marco Bearzi, Jodok Vieli, and Cagin
Tanir from NetSec group, ETH Zurich for discovering and notifying us
about the issue.</p>
<p>The CacheFlush type of attacks (NSCacheFlush, CNAMECacheFlush) try to
evict cached data by utilizing rogue zones and a steady rogue stream to
a resolver. Based on the zone, the stream, the configured cache size
and the legitimate traffic, Unbound could experience a degradation of
service if a useful entry is evicted and Unbound needs to resolve again.
As a mitigation to the NSCacheFlush attack Unbound is setting a limit
of 20 RRs in an NS RRset. We would like to thank Yehuda Afek, Anat
Bremler-Barr, Shoham Danino and Yuval Shavitt (Tel-Aviv University and
Reichman University) for discovering and notifying us about the issue.</p>
<p>Other fixes in this release are bug fixes. Also the unbound control
commands that flush the cache can clear both the memory and cachedb
module cache. The ipset module can use BSD pf tables. The new option
<cite>dnstap-sample-rate: 100</cite> can be used to log 1/N messages, for use in
high volume server environments where the log server does not keep up.</p>
<p>The new DNSSEC key for the root, 38696 from 2024 has been added. It is
added to the default root keys in unbound-anchor. The content can be
inspected with <cite>unbound-anchor -l</cite>. Older versions of Unbound can keep
up with the root key with <cite>auto-trust-anchor-file</cite> that has RFC5011
key rollover. Also unbound-anchor can fetch the keys from the website
with a certificate if needed.</p>
<p>For cookie secrets, it is possible to perform rollover. The file
with cookie secret in use and the staging secret is configured
with <cite>cookie-secret-file</cite>. With the remote control the rollover can be
performed, add_cookie_secret, activate_cookie_secret, drop_cookie_secret
and print_cookie_secrets can be used for that.</p>
<p>Compared to the RC1, the release has a fix for module loading on Windows,
and a spelling correction.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-21-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.21.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.10.1 released2024-08-02T12:00:00+02:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2024-08-02:/news/2024/Aug/02/nsd-4.10.1-released/<p>Today, we released version 4.10.1 of the authoritative DNS nameserver NSD.</p>
<p>Version 4.10.1 consists primarily of bug fixes.</p>
<p>@bilias implemented mutual TLS authentication for zone transfers.
Please consult the nsd.conf manual for details on the newly introduced
configuration options tls-auth-port and tls-auth-xfr-only.</p>
<p>Michael Orlitzky provided …</p><p>Today, we released version 4.10.1 of the authoritative DNS nameserver NSD.</p>
<p>Version 4.10.1 consists primarily of bug fixes.</p>
<p>@bilias implemented mutual TLS authentication for zone transfers.
Please consult the nsd.conf manual for details on the newly introduced
configuration options tls-auth-port and tls-auth-xfr-only.</p>
<p>Michael Orlitzky provided integration for the OpenRC init system.</p>
<p>Version 4.10.0 was the first release to integrate simdzone. Build
issues on OpenBSD releases before 5.6, Gentoo and Solaris have been
reported and fixed. The fallback parser, used on systems that lack
SSE4.2 and AVX2 instruction sets, contained some bugs with regards to
state keeping and under certain circumstances a use after free bug was
encountered in buffer management.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-10-1">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.10.1.tar.gz">Direct Download</a></li>
</ul>
Krill 0.13.2 and 0.14.5 Released2024-06-27T15:00:00+02:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2024-06-27:/news/2024/Jun/27/krill-0.13.2-0.14.5-released/<p>We are pleased to announce the two releases of Krill, versions 0.13.2 ‘Be
kind, rewind’ and 0.14.5 ‘Who dis? New Phone.’</p>
<p>Krill is a daemon for running delegated RPKI, featuring a Certificate
Authority and a publication server that allows you to create and publish
signed statements …</p><p>We are pleased to announce the two releases of Krill, versions 0.13.2 ‘Be
kind, rewind’ and 0.14.5 ‘Who dis? New Phone.’</p>
<p>Krill is a daemon for running delegated RPKI, featuring a Certificate
Authority and a publication server that allows you to create and publish
signed statements about routing intent.</p>
<p>These two releases fix an issue that causes Krill to panic if a CA with
multiple parents and children has one of its parents removed, causing the
children to try and revoke their certificates for that parent. This is
relevant for Krill instances under NIC.br that themselves have children.</p>
<p>In addition, the releases update the HTTP library to avoid a possible
denial-of-service attack described in <a class="reference external" href="proxy.php?url=https://rustsec.org/advisories/RUSTSEC-2024-0332">RUSTSEC-2024-0332</a>. If you are exposing Krill’s HTTP server
directly to the Internet without a reverse proxy such as Nginx in between, we
advise to update at your earliest convenience.</p>
<p>Version 0.14.5 in addition fixes an issue with encoding empty CRLs and
empty RRDP deltas as well as a possible freeze when trying to access the
RIS data while it is being downloaded. It also adds support for overriding
the manifest number for trust anchor CAs.</p>
<p>The complete list of changes can be found in the release notes for
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.13.2">0.13.2</a>
and <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.14.5">0.14.5</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.12.1">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.14.0 ‘You Must Gather Your Party Before Venturing Forth’ released2024-06-20T15:00:00+02:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2024-06-20:/news/2024/Jun/20/routinator-0.14.0-released/<p>We are pleased to announce the latest release of Routinator, version
0.14.0 ‘You Must Gather Your Party Before Venturing Forth.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to …</p><p>We are pleased to announce the latest release of Routinator, version
0.14.0 ‘You Must Gather Your Party Before Venturing Forth.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>For this release, we revamped how Routinator stores the local copy of RRDP
repositories. Previously, each object in the repository was stored in its
own file on the local file system. Because repositories consist of lots of
very small objects, there was always a risk of running out of inodes –
resulting in a confusing “No space left on device” error message. Now, we
store all the objects in a single file which will avoid running
out of inodes and should also save some disk space.</p>
<p>Our friends at <a class="reference external" href="proxy.php?url=https://tweedegolf.nl/">Tweede Golf</a> helped us revamp
the Routinator UI and rewrote it using React only. While at it we streamlined
the build system so it doesn’t require downloading assets during build any
more.</p>
<p>This release updates one of our dependencies in response to a
<a class="reference external" href="proxy.php?url=https://rustsec.org/advisories/RUSTSEC-2024-0332.html">security advisory</a>
related to the HTTP server. If you are running Routinator allowing direct
access to its HTTP server from the Internet (i.e., not with a reverse proxy
in between), we suggest to upgrade to this version.</p>
<p>As always, there have been many smaller changes and improvements.
The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.14.0">release notes</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.10.0 released2024-06-13T12:00:00+02:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2024-06-13:/news/2024/Jun/13/nsd-4.10.0-released/<p>Today, we released version 4.10.0 of the authoritative DNS nameserver NSD.</p>
<p>Version 4.10.0 integrates simdzone and drops the Flex+Bison zone
parser.</p>
<p>NSD used a Flex+Bison based zone parser since version 1.4.0. The parser
served NSD well, but zones have increased in size …</p><p>Today, we released version 4.10.0 of the authoritative DNS nameserver NSD.</p>
<p>Version 4.10.0 integrates simdzone and drops the Flex+Bison zone
parser.</p>
<p>NSD used a Flex+Bison based zone parser since version 1.4.0. The parser
served NSD well, but zones have increased in size and zone loading
performance has been problematic for some users.</p>
<p>With the integration of simdzone
(<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/simdzone">https://github.com/NLnetLabs/simdzone</a>),
performance of loading zones and IXFRs is drastically improved. Quick
measurements show improvements ranging anywhere from 3.8x to 1.6x,
depending on zone size and database type, though the improvements will
be less noticable for NSEC3 zones due to pre-hashing.</p>
<p>simdzone leverages SIMD instructions in modern CPUs to improve
throughput. Right now SSE4.2 and AVX2 instruction sets are supported,
other instruction sets will use the fallback implementation, which
still is a decent improvement over the Flex+Bison based parser.</p>
<p>The release has additional fixes from the release candidate. The
parse of lowercase type names is fixed and the x86_64 variable is
set to no for other machines.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-10-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.10.0.tar.gz">Direct Download</a></li>
</ul>
RTRTR 0.3.0 ‘Filmed Before a Live Studio Audience’ released2024-06-06T17:00:00+02:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2024-06-06:/news/2024/Jun/06/rtrtr-0.3.0-released/<p>We are happy to announce the latest release of RTRTR, version 0.3.0
‘Filmed Before a Live Studio Audience.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for …</p><p>We are happy to announce the latest release of RTRTR, version 0.3.0
‘Filmed Before a Live Studio Audience.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for RPKI such as
centralised RPKI validators that dispatch data to local caching RTR
servers.</p>
<p>This version introduces a new <tt class="docutils literal">"merge"</tt> unit that merges the data from
all its source units into a single set rather than only using a single
source as the <tt class="docutils literal">"any"</tt> unit does now.</p>
<p>In addition, there are more configuration options for the HTTP client used
by the <tt class="docutils literal">"json"</tt> unit. This allows for instance to use a proxy
for all HTTP request. The <tt class="docutils literal">"json"</tt> unit and target now also support
conditional HTTP requests, making it cheaper to check for updates more often.</p>
<p>The RTR timer values can now be configured for the <tt class="docutils literal">"rtr"</tt> target rather
than being hard-wired. The <tt class="docutils literal">"rtr"</tt> target now can also produce detailed
per-client metrics if enabled similar to what Routinator’s RTR server already
does.</p>
<p>Under the hood, there were some architectural changes that should avoid
RTRTR sometimes missing the first update during startup.</p>
<p>The complete list of changes available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr/releases/tag/v0.3.0">release notes.</a></p>
<p>More information about RTRTR including installation instructions
can be found in the new
<a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/en/stable/">RTRTR Manual</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/en/stable/">RTRTR Manual</a>.</li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr">RTRTR Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/">RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Gezocht: Voorzitter voor de Raad van Toezicht2024-05-17T17:00:00+02:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2024-05-17:/news/2024/May/17/rvt-voorzitter-gezocht/<p><em>Wij zoeken per 1 juli 2024 een nieuwe voorzitter voor onze Raad van Toezicht (RvT) vanwege het aflopen van de termijn van onze huidige voorzitter.</em></p>
<div class="section" id="over-nlnet-labs">
<h2>Over NLnet Labs</h2>
<p>NLnet Labs is een stichting, opgericht in 1999. Onze missie is het ontwikkelen van open-source software en open protocolstandaarden voor het internet …</p></div><p><em>Wij zoeken per 1 juli 2024 een nieuwe voorzitter voor onze Raad van Toezicht (RvT) vanwege het aflopen van de termijn van onze huidige voorzitter.</em></p>
<div class="section" id="over-nlnet-labs">
<h2>Over NLnet Labs</h2>
<p>NLnet Labs is een stichting, opgericht in 1999. Onze missie is het ontwikkelen van open-source software en open protocolstandaarden voor het internet en het uitvoeren van toegepast onderzoek op deze gebieden. We richten ons specifiek op twee kerncomponenten van het internet: het Domain Name System en het routeringssysteem. Het doel van ons werk is de robuustheid, veiligheid en betrouwbaarheid van het internet te verhogen en de privacy van de gebruikers te waarborgen.</p>
<p>Onze DNS-software wordt gebruikt in de hele internetindustrie, van de DNS root servers in het hart van het internet, tot DNS-servers van Top-Level Domain (TLD) operators en ISPs, tot kleine embedded systems. Dit geldt ook voor beveiligingssoftware voor het routingsysteem die het internet en de netwerken van grote bedrijven helpt beschermen. We durven dan ook wel te zeggen dat de kern van het internet voor een flink deel op onze software draait.</p>
<p>We realiseren onze missie samen met belangrijke internetspelers van over de hele wereld. Voorbeelden zijn de Internet Engineering Task Force Force (IETF), de Regional Internet Registries (RIR's), de Internet Corporation for Assigned Names and Numbers (ICANN), toonaangevende operators van TLD's (Top Level Domains) zoals .nl en .com, de International Standards Organisation (ISO), de Internet Society (ISOC), grote network operators zoals Comcast, devicebouwers zoals Apple en individuele onderzoekers.</p>
<p>NLnet Labs speelt een leidende rol in het promoten van technologieën die het vertrouwen, de veiligheid, privacy en schaalbaarheid verhogen en die bijdragen aan het mondiale karakter van het internet, met name voor het DNS en routing. We pionieren met deze nieuwe technologieën, helpen toekomstige standaarden te definiëren en bouwen prototypes. Onze omgeving ziet ons alom als toonaangevende DNS- en routingexperts en als een belangrijke stakeholder in het ontwikkelen en gebruiken van open standaarden en open software.</p>
<p>We overbruggen daarnaast de kloof tussen de academische wereld en de industrie door deel te nemen aan onderzoeksprojecten en we introduceren oplossingen die zowel praktisch als innovatief zijn. We adviseren over beleidsbeslissingen van internetorganisaties en overheden die van invloed zijn op de veiligheid en privacy van internetgebruikers overal ter wereld en op de stabiliteit van het internet zelf. Onze technische expertise en advies wordt algemeen erkend door beleidsmakers.</p>
<p>Onze ontwikkelaars en onderzoekers vormen samen een 'leane' organisatie van ongeveer 16 mensen, met minimale managementoverhead. We trekken getalenteerde mensen aan die een verschil willen maken voor de veiligheid en openheid van het internet, met een diep geloof in open source en open standaarden.</p>
<div class="section" id="topstructuur-van-nlnet-labs">
<h3>Topstructuur van NLnet Labs</h3>
<p>NLnet Labs kent een eenhoofdig statutaire directie. Het heeft daarnaast een managementteam, waar naast de directeur-bestuurder ook de directeur productontwikkeling (niet-statutaire directeur) deel van uitmaakt.</p>
</div>
</div>
<div class="section" id="taken-en-verantwoordelijkheden-van-de-voorzitter">
<h2>Taken en verantwoordelijkheden van de voorzitter</h2>
<p>De voorzitter heeft tot taak de vergaderingen van de RvT te leiden en is voor de bestuurder en andere betrokkenen het eerst aanspreekpunt binnen de RvT. De voorzitter zorgt ervoor dat de RvT tijdig de juiste inhoudelijke discussies voert en bewaakt tegelijkertijd de sociale cohesie in de RvT. De voorzitter stuurt in discussies op een goede balans tussen risicobeheersing, proces en technische inhoud. De voorzitter coacht en adviseert daarnaast de bestuurder en overlegt regelmatig met de bestuurder buiten de RvT-vergaderingen om, bijvoorbeeld om vergaderingen voor te bereiden of om tussentijds te overleggen over lopende dossiers. De tijdsinvestering van de voorzitter is daarmee hoger dan die van de overige RvT-leden.</p>
<p>Daarnaast vinden we de volgende kenmerken belangrijk:</p>
<ul class="simple">
<li>Ervaring als eindverantwoordelijke in het (semi-) publieke domein</li>
<li>Ervaring met toezichthoudende functies in het private en (semi-) publieke domein</li>
<li>Inzicht en overzicht ten aanzien van de taken en functie van de RvT en bestuurder en de interactie die plaats dient te vinden tussen deze</li>
<li>Bij voorkeur ervaring met non-profitorganisaties en kennis van de internetindustrie</li>
</ul>
<p>Persoonlijk profiel:</p>
<ul class="simple">
<li>Leiderschap: beschikt over de persoonlijkheid en achtergrond om met autoriteit en natuurlijk gezag de voorzittersfunctie te vervullen en de RvT als geheel goed te laten functioneren. Onderkent de verschillen in belangen, behoeften en persoonlijkheden, verzekert de inbreng van elk der leden en neemt een leidende rol in doordachte besluitvorming van de RvT. Realiseert een doeltreffende samenwerking binnen de RvT en tussen de bestuurder. Handhaaft op consistente wijze algemeen aanvaarde sociale en ethische normen in woord en gedrag. Combineert autoriteit en senioriteit met toegankelijkheid en laagdrempeligheid.</li>
<li>Omgevingsbewustzijn: volgt en kent maatschappelijke ontwikkelingen, nationaal en internationaal, politieke ontwikkelingen en andere omgevingsfactoren. Begrijpt het maatschappelijk en economisch belang van het werk van NLnetlabs en de belangen van de diverse stakeholders. Heeft affiniteit met technologie en internet.</li>
<li>Vertegenwoordiging: beschikt over de eigenschappen en uitstraling om de RvT extern te vertegenwoordigen en een rol in het belang van NLnet Labs te vervullen.</li>
<li>Interactie met bestuurder: is eerste aanspreekpunt voor de bestuurder en coacht de bestuurder waar nodig om de doelen en ambities van NLnet Labs te realiseren, de interactie met de RvT en de bestuurder te helpen zichzelf verder te ontwikkelen.</li>
</ul>
<p>De voorzitter van de RvT leidt de selectie en benoeming van nieuwe RvT-leden, voert jaarlijkse plannings-, functionerings-, en beoordelingsgesprekken met de bestuurder en leidt de jaarlijkse zelfevaluatie. Deze taken verricht de voorzitter samen met een of meer andere RvT-leden.</p>
</div>
<div class="section" id="over-de-rvt-van-nlnet-labs">
<h2>Over de RvT van NLnet Labs</h2>
<p>De taken van de RvT van NLnet Labs volgen uit de wet, de statuten van de stichting en het reglement van de RvT. De leden van de RvT verrichten hun werkzaamheden in onafhankelijkheid (zonder last of ruggespraak).</p>
<p>De RvT staat de bestuurder terzijde om de ambities en doelstellingen van NLnet Labs te realiseren. De raad houdt toezicht op de algemene strategie, het beleid, de besluitvorming en de algemene gang van zaken, inclusief het functioneren van de organisatie in haar maatschappelijke context. De uitgangspunten daarbij zijn de statuten, het RvT-reglement en het strategisch plan van NLnet Labs.</p>
<p>Onderling vertrouwen tussen de RvT en bestuurder vormt de basis voor het goed functioneren van het bestuderingsmodel.</p>
</div>
<div class="section" id="algemene-kenmerken-van-de-leden-raad-van-toezicht">
<h2>Algemene kenmerken van de leden raad van toezicht</h2>
<p>Met het oog op een goede uitoefening van toezicht op de stichting NLnet Labs en de daaraan verbonden groepsmaatschappijen (in de zin van artikel 2:24b Burgerlijk Wetboek) hebben de leden van Raad van Toezicht (RvT) in ieder geval de volgende kenmerken:</p>
<ul class="simple">
<li>Ruime professionele ervaring (als eindverantwoordelijke), maatschappelijk of binnen hun vakgebied eminent en van onbesproken gedrag.</li>
<li>De meerderheid van de RvT-leden beschikt over ruime bestuurlijke kennis en ervaring op (inter)nationaal niveau, waaronder in ieder geval de voorzitter.</li>
<li>In staat een juist evenwicht te houden tussen betrokkenheid en in de volle breedte van de verantwoordelijkheden toezicht houden op afstand.</li>
<li>Affiniteit met het werkveld, de doelstelling van NLnet Labs en het krachtenveld waarin zij opereert (zie statuten en strategisch plan), het internet, opensource software en ICT in het algemeen.</li>
<li>Richten zich bij de vervulling van hun taak naar het belang van NLnet Labs met in het achterhoofd de belangen van de mondiale, Europese en Nederlandse internetgemeenschap.</li>
<li>Fungeren autonoom ten behoeve van de stichting en stellen het belang van de stichting boven (de specifieke belangen van) een andere partij, groepering of stroming. Leden treden dus uitdrukkelijk niet op als (directe) vertegenwoordigers of afgezanten van een specifieke partij, groepering of stroming. Hebben geen onverenigbare belangen, posities of relaties.</li>
<li>In staat de benodigde tijd en energie te investeren.</li>
</ul>
</div>
<div class="section" id="samenstelling-en-profielschets-van-de-raad-van-toezicht">
<h2>Samenstelling en profielschets van de raad van toezicht</h2>
<p>De RvT beschikt over een breed pallet aan ervaring, deskundigheid en vaardigheden die relevant zijn voor het werk van NLnet Labs. De leden vormen gezamenlijk een brede en afgewogen afspiegeling van de relevante partijen uit de mondiale, Europese en Nederlandse internetgemeenschap en hun belangen. De RvT heeft zo voldoende specifieke kennis om haar toezichthoudende rol te vervullen en de directie met raad en daad bij te staan.</p>
<p>De leden van de RvT hebben onder andere verstand van DNS en routing, open source software engineering, productontwikkeling, financiën en juridische zaken. Sommige RvT-leden combineren meerdere profielen tegelijk.</p>
<p>Een overzicht van de huidige leden van de RvT staat hier: <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/organisation/">https://nlnetlabs.nl/organisation/</a></p>
</div>
<div class="section" id="vergaderingen">
<h2>Vergaderingen</h2>
<p>De RvT vergadert 6 keer per jaar: 1 reguliere vergaderingen per kwartaal, een strategiesessie en een zelf-evaluatie. De RvT stelt de data en locaties aan het eind van het vorige kalenderjaar vast.</p>
</div>
<div class="section" id="ondersteuning">
<h2>Ondersteuning</h2>
<p>De voorzitter van de Raad van Toezicht wordt bijgestaan door een managementassistent. Deze assistent helpt bij het inplannen van afspraken, voorbereiden van de agenda voor de vergaderingen van de Raad van Toezicht en het bewaken van de planning & control.</p>
</div>
Unbound 1.20.0 released2024-05-08T10:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2024-05-08:/news/2024/May/08/unbound-1.20.0-released/<p>We are pleased to announce the release of version 1.20.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has a fix for the DNSBomb issue CVE-2024-33655. This has a
low severity for Unbound, since it makes Unbound complicit in targeting
others, but does not affect Unbound so much …</p><p>We are pleased to announce the release of version 1.20.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has a fix for the DNSBomb issue CVE-2024-33655. This has a
low severity for Unbound, since it makes Unbound complicit in targeting
others, but does not affect Unbound so much.</p>
<p>To mitigate the issue new configuration options are introduced.
The options <cite>discard-timeout: 1900</cite>, <cite>wait-limit: 1000</cite>
and <cite>wait-limit-cookie: 10000</cite> are enabled by default. They limit the
number of outstanding queries that a querier can have. This limits
the reply pulse, and make Unbound less favorable for the issue.
With the config <cite>wait-limit-netblock</cite> and <cite>wait-limit-cookie-netblock</cite>
the parameters can be fine tuned for specific destinations.
More information on the attack and Unbound's mitigations are
presented further down.</p>
<p>Other fixes in this release are that Unbound no longer follows symlinks
when truncating the pidfile. Unbound also does not chown the pidfile,
this is for safety reasons. There are also a number of fixes for RPZ, in
handling CNAMEs. There is a memory leak fix for the edns client subnet
cache. For DNSSEC validation a case is fixed when the query is of type
DNAME. The unbound-anchor program is fixed to first write to a temporary
file, before replacing the original. This handles disk full situations,
and because of it unbound-anchor needs permission to create that file,
in the same directory as the original file. There is also a fix for
IP_DONTFRAG, to disable fragmentation instead of the opposite.</p>
<p>The option <cite>cache-min-negative-ttl</cite> can be used to set the minimum TTL
for negative responses in the cache. It complements existing options to
set the maximum ttl for negative responses and to set the minimum and
maximum ttl but not specifically for negative responses.</p>
<p>The option <cite>cachedb-check-when-serve-expired</cite> option makes Unbound use
cachedb to check for expired responses, when <cite>serve-expired</cite> is enabled,
and cachedb is used. It is enabled by default.</p>
<p>The <cite>-q</cite> option for unbound-checkconf can be added to silence it when
there are no errors.</p>
<div class="section" id="the-dnsbomb-vulnerability-cve-2024-33655">
<h2>The DNSBomb vulnerability CVE-2024-33655.</h2>
<div class="section" id="summary">
<h3>Summary</h3>
<p>The DNSBomb attack, via specially timed DNS queries and answers, can
cause a Denial of Service on resolvers and spoofed targets.</p>
<p>Unbound itself is not vulnerable for DoS, rather it can be used to take
part in a pulsing DoS amplification attack.</p>
<p>Unbound 1.20.0 includes fixes so the impact of the DoS from Unbound
is significantly lower than it used to be and making the attack, and
Unbound's participation, less tempting for attackers.</p>
</div>
<div class="section" id="affected-products">
<h3>Affected products</h3>
<p>Unbound up to and including 1.19.3.</p>
</div>
<div class="section" id="description">
<h3>Description</h3>
<p>The DNSBomb attack works by sending low-rate spoofed queries for a
malicious zone to Unbound. By controlling the delay of the malicious
authoritative answers, Unbound slowly accumulates pending answers for
the spoofed addresses. When the authoritative answers become available
to Unbound at the same time, Unbound starts serving all the accumulated
queries. This results into large-sized, concentrated response bursts to
the spoofed addresses.</p>
<p>From version 1.20.0 on, Unbound introduces a couple of configuration
options to help mitigate the impact.
Their complete description can be found in the included manpages but
they are also briefly listed here together with their default values for
convenience:</p>
<ul class="simple">
<li>discard-timeout: 1900
After 1900 ms a reply to the client will be dropped.
Unbound would still work on the query but refrain from replying in
order to not accumulate a huge number of "old" replies.
Legitimate clients retry on timeouts.</li>
<li>wait-limit: 1000
wait-limit-cookie: 10000
Limits the amount of client queries that require recursion
(cache-hits are not counted) per IP address. More recursive queries
than the allowed limit are dropped. Clients with a valid EDNS Cookie
can have a different limit, higher by default.
wait-limit: 0 disables all wait limits.</li>
<li>wait-limit-netblock
wait-limit-cookie-netblock
These do not have a default value but they can fine grain
configuration for specific netblocks. With or without EDNS Cookies.</li>
</ul>
<p>The options above are trying to shrink the DNSBomb window so that the
impact of the DoS from Unbound is significantly lower than it used to be
and making the attack, and Unbound's participation, less tempting for
attackers.</p>
</div>
<div class="section" id="acknowledgements">
<h3>Acknowledgements</h3>
<p>We would like to thank Xiang Li from the Network and Information
Security Lab of Tsinghua University for discovering and disclosing the
attack.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-20-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.20.0.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2024-33655.txt">CVE acknowledgement statement</a></li>
</ul>
</div>
</div>
Domain 0.10.0 released2024-04-29T15:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2024-04-29:/news/2024/Apr/29/domain-0.10.0-released/<p>We are pleased to announce the release of version 0.10.0 of <em>domain,</em>
our Rust crate for interacting with the Domain Name System (DNS).</p>
<p>This release is the result of the first three months of increased focus on
the library. We have written more about our plans for the …</p><p>We are pleased to announce the release of version 0.10.0 of <em>domain,</em>
our Rust crate for interacting with the Domain Name System (DNS).</p>
<p>This release is the result of the first three months of increased focus on
the library. We have written more about our plans for the <em>domain</em> crate and
what’s in store for this and the following years back in January in a
<a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/domain-dns-building-blocks-for-rust-application-developers/">blog post.</a></p>
<div class="section" id="breaking-changes">
<h2>Breaking Changes</h2>
<p>While we are adding many new features, we are also taking the opportunity to
improve and clean up the existing code. This unfortunately means a number of
breaking changes for current users of the crate. We tried to collect as many
of those as possible in this release with the hope that we will not have to
do big breaking changes again in the foreseeable future.</p>
<p>While most of these changes should have only limited impact on your code,
there are two that might require somewhat more extensive search-and-replace.</p>
<p>For one, we decided to bite the bullet and rename all references to domain
name from <tt class="docutils literal">Dname</tt> to just <tt class="docutils literal">Name</tt>. This resolves a very confusing conflict
between our domain name type <tt class="docutils literal">Dname</tt> and the <tt class="docutils literal">DNAME</tt> record type. For
consistency, we renamed all occurrences of <tt class="docutils literal">Dname</tt> in type and function
names. Not only is <tt class="docutils literal">Dname</tt> now just <tt class="docutils literal">Name</tt>, but there now also are
<tt class="docutils literal">RelativeName</tt> instead of <tt class="docutils literal">RelativeDname</tt> and the <tt class="docutils literal">ToName</tt> trait
instead of the <tt class="docutils literal">ToDname</tt> trait.</p>
<p>While at it, we also changed what is now the <tt class="docutils literal"><span class="pre">ToName::to_name</span></tt> method to
follow the usual pattern of <tt class="docutils literal"><span class="pre">ToName::try_to_name</span></tt> for builder types with
a limited buffer that can error out and <tt class="docutils literal"><span class="pre">ToName::to_name</span></tt> for unlimited
builders. This change might cause somewhat confusing error messages but will
save you an unwrap in many cases.</p>
<p>The second big change is that we changed how we represent the
IANA-registered DNS parameters like <tt class="docutils literal">Rtype</tt> or <tt class="docutils literal">Class</tt>. Previously they
were enums with an <tt class="docutils literal">Int(_)</tt> variant for unknown values. This choice was
made way back when associated constants weren’t available yet but made it
always tricky to guarantee that the <tt class="docutils literal">Int(_)</tt> variant really only contained
unknown values.</p>
<p>We now changed all those types in the <tt class="docutils literal"><span class="pre">base::iana</span></tt> to structs wrapping the
underlying integer type and represent the registered values as associated
constants. This has the nice side-effect that they are now all-caps like
they are in most of the registries. E.g., the <tt class="docutils literal">DNAME</tt> record type is now
<tt class="docutils literal"><span class="pre">Rtype::DNAME</span></tt> rather than <tt class="docutils literal"><span class="pre">Rtype::Dname</span></tt>.</p>
<p>There are a number of additional changes. We’ve fixed scanning, formatting,
and serialization of <tt class="docutils literal">CharStr</tt> and TXT record data to be more consistent.
We cleaned up error types everywhere which now hide internal error details
and only provide enum variants where a differentiation between error cases
is meaningful to the caller. For all the changes, please check the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/domain/releases/tag/v0.10.0">release notes.</a></p>
</div>
<div class="section" id="new-features">
<h2>New Features</h2>
<p>This release also sees the first three new features added to the crate.
Since we consider them experimental at this point – we want to gain
experience with the designs we’ve chosen and change them if necessary –,
we decided to introduce the notion of “unstable features.” The idea is that
these features may contain breaking changes even in minor releases to keep
the frequency of breaking releases at a lower rate. If you want to use these
features, you might want to use a specific version in your <tt class="docutils literal">Cargo.toml</tt>.</p>
<p>The first of these new features is <tt class="docutils literal"><span class="pre">unstable-client-transport</span></tt> which adds
the client side of sending DNS messages over UDP, TCP, and TLS. These
transports can either be used individually or combined into a “redundant
transport” that tries and picks the best available destination.</p>
<p>The second feature <tt class="docutils literal"><span class="pre">unstable-server-transport</span></tt> is the server counterpart
and provides the ability to receive and process DNS requests. It is built on
a <tt class="docutils literal">Service</tt> concept that should sound familiar if you’ve used Hyper
before. It also provides a configurable middleware that let’s you choose
which server features you want to support.</p>
<p>Finally, we have the <tt class="docutils literal"><span class="pre">unstable-zonetree</span></tt> feature which provides the
machinery for representing DNS zones, as well as an in-memory representation
of a zone. Such a zone can be loaded from a zonefile – although we don’t
have implementations for all record types yet – and can be used with the
server transport to implement a simple authoritative server.</p>
</div>
<div class="section" id="other-additions-and-bug-fixes">
<h2>Other Additions and Bug Fixes</h2>
<p>Beyond these big things, the release also contains quite a few small
additions and bug fixes. Please see the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/domain/releases/tag/v0.10.0">release notes</a> for details.</p>
</div>
<div class="section" id="acknowledgment">
<h2>Acknowledgment</h2>
<p>We would like to thank <a class="reference external" href="proxy.php?url=https://www.sovereigntechfund.de/">Sovereign Tech Fund</a> for funding this work as well as
everyone who has contributed to <em>domain</em> in the past and everyone who has
used it!</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/domain">Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/domain-dns-building-blocks-for-rust-application-developers/">“Domain – DNS Building Blocks for Application Developers”</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/domain/about/">NLnet Labs *domain* page</a></li>
</ul>
</div>
NSD 4.9.1 released2024-04-04T14:56:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2024-04-04:/news/2024/Apr/04/nsd-4.9.1-released/<p>Today, we released version 4.9.1 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes the builds scripts in the release of version 4.9.0.</p>
<p>Version 4.9.0 adds support for DNS Catalog Zones (RFC 9432) version "2".</p>
<p>Both producer and consumer roles for catalog zones are …</p><p>Today, we released version 4.9.1 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes the builds scripts in the release of version 4.9.0.</p>
<p>Version 4.9.0 adds support for DNS Catalog Zones (RFC 9432) version "2".</p>
<p>Both producer and consumer roles for catalog zones are implemented, but
only a single consumer zone is allowed. The "coo" property, relevant
when multiple consumer zones can be configured, is therefore not
supported. The "group" property is. Consult the nsd.conf man page for
details on how to configure and use catalog zones.</p>
<p>Thanks to Fredrik Pettai from Sunet for providing feedback and testing
DNS Catalog Zones.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-9-1">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.9.1.tar.gz">Direct Download</a></li>
</ul>
NSD 4.9.0 released2024-04-03T16:37:00+02:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2024-04-03:/news/2024/Apr/03/nsd-4.9.0-released/<p>Today, we released version 4.9.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds support for DNS Catalog Zones (RFC 9432) version "2".</p>
<p>Both producer and consumer roles for catalog zones are implemented, but
only a single consumer zone is allowed. The "coo" property, relevant
when multiple consumer …</p><p>Today, we released version 4.9.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds support for DNS Catalog Zones (RFC 9432) version "2".</p>
<p>Both producer and consumer roles for catalog zones are implemented, but
only a single consumer zone is allowed. The "coo" property, relevant
when multiple consumer zones can be configured, is therefore not
supported. The "group" property is. Consult the nsd.conf man page for
details on how to configure and use catalog zones.</p>
<p>Thanks to Fredrik Pettai from Sunet for providing feedback and testing
DNS Catalog Zones.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-9-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.9.0.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.19.3 released2024-03-14T10:00:00+01:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2024-03-14:/news/2024/Mar/14/unbound-1.19.3-released/<p>We are pleased to announce the release of version 1.19.3 of the Unbound
recursive DNS resolver.</p>
<p>This release has a number of bug fixes. The CNAME synthesized for a
DNAME record uses the original TTL, of the DNAME record, and that means
it can be cached for the …</p><p>We are pleased to announce the release of version 1.19.3 of the Unbound
recursive DNS resolver.</p>
<p>This release has a number of bug fixes. The CNAME synthesized for a
DNAME record uses the original TTL, of the DNAME record, and that means
it can be cached for the TTL, instead of 0.</p>
<p>There is a fix that when a message was stored in cache, but one of the
RRsets was not updated due to cache policy, it now restricts the message
TTL if the cache version of the RRset has a shorter TTL. It avoids a
bug where the message is not expired, but its contents is expired.</p>
<p>For dnstap, it logs type DoH and DoT correctly, if that is used for
the message.</p>
<p>The b.root-servers.net address is updated in the default root hints.</p>
<p>When performing retries for failed sends, a retry at a smaller UDP size
is now not performed when that attempt is not actually smaller, and at
defaults, since the flag day changes, it is the same size. This makes
it skip the step, it is useless because there is no reduction in size.</p>
<p>Clients with a valid DNS Cookie will bypass the ratelimit, if one is
set. The value from ip-ratelimit-cookie is used for these queries.</p>
<p>Furthermore there is a fix to make correct EDE Prohibited answers for
access control denials, and a fix for EDNS client subnet scope zero
answers.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-19-3">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.19.3.tar.gz">Directly download the source package</a></li>
</ul>
Unbound 1.19.2 released2024-03-07T00:00:00+01:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2024-03-07:/news/2024/Mar/07/unbound-1.19.2-released/<p>We are pleased to announce the release of version 1.19.2 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2024-1931.</p>
<p>NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1
contain a vulnerability that can cause denial of service by a certain …</p><p>We are pleased to announce the release of version 1.19.2 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes CVE-2024-1931.</p>
<p>NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1
contain a vulnerability that can cause denial of service by a certain
code path that can lead to an infinite loop.</p>
<p>Unbound 1.18.0 introduced a feature that removes EDE records from
responses with size higher than the client's advertised buffer size.
Before removing all the EDE records however, it would try to see if
trimming the extra text fields on those records would result in an
acceptable size while still retaining the EDE codes.
Due to an unchecked condition, the code that trims the text of the EDE
records could loop indefinitely.
This happens when Unbound would reply with attached EDE information on a
positive reply and the client's buffer size is smaller than the needed
space to include EDE records.</p>
<p>The vulnerability can only be triggered when the 'ede: yes' option is
used; non default configuration.</p>
<p>From version 1.19.2 on, the code is fixed to avoid looping indefinitely.</p>
<p>We would like to thank Fredrik Pettai and Patrik Lundin from SUNET for
notifying us about the issue and working with us to identify the
vulnerability.</p>
<p>For a full list of changes, binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-19-2">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.19.2.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2024-1931.txt">CVE acknowledgement statement</a></li>
</ul>
Routinator 0.13.2 ‘Existential Funk’ released2024-02-26T15:00:00+01:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2024-02-26:/news/2024/Feb/26/routinator-0.13.2-released/<p>Today we released version 0.13.2 ‘Existential Funk’ of Routinator.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fixes an issue in the RTR …</p><p>Today we released version 0.13.2 ‘Existential Funk’ of Routinator.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fixes an issue in the RTR server that can be exploited remotely
to cause Routinator to exit. We advise all users of Routinator that provide
a public RTR service to upgrade to this release at their earliest convenience.</p>
<p>The issue, assigned
<a class="reference external" href="proxy.php?url=/downloads/routinator/CVE-2024-1622.txt">CVE-2024-1622</a>,
is caused when an incoming RTR connection is closed again very
quickly. In this case Routinator’s RTR server mistakenly considers the RTR
listener socket as failed and exits.</p>
<p>We would like to thank Yohei Nishimura, Atsushi Enomoto and Ruka Miyachi
of Internet Multifeed Co., Japan for discovering and reporting this issue.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/rpki/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.19.1 released2024-02-13T13:00:00+01:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2024-02-13:/news/2024/Feb/13/unbound-1.19.1-released/<p>We are pleased to announce the release of version 1.19.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes two DNSSEC validation vulnerabilities:
CVE-2023-50387 (referred here as the KeyTrap vulnerability) and CVE-2023-50868
(referred here as the NSEC3 vulnerability).</p>
<p>The KeyTrap vulnerability works by using a combination of …</p><p>We are pleased to announce the release of version 1.19.1 of the Unbound
recursive DNS resolver.</p>
<p>This security release fixes two DNSSEC validation vulnerabilities:
CVE-2023-50387 (referred here as the KeyTrap vulnerability) and CVE-2023-50868
(referred here as the NSEC3 vulnerability).</p>
<p>The KeyTrap vulnerability works by using a combination of Keys (also colliding
Keys), Signatures and number of RRSETs on a malicious zone.
Answers from that zone can force a DNSSEC validator down a very CPU intensive
and time costly validation path.</p>
<p>The NSEC3 vulnerability uses specially crafted responses on a malicious zone
with multiple NSEC3 RRSETs to force a DNSSEC validator down a very CPU
intensive and time costly NSEC3 hash calculation path.</p>
<p>Both can force Unbound to spend an enormous time (comparative to regular
traffic) validating a single specially crafted DNSSEC response while everything
else is on hold for that thread. A trivially orchestrated attack could render
all threads busy with such responses leading to denial of service.</p>
<p>From version 1.19.1 on, Unbound introduces suspension on DNSSEC response
validations that seem to require more attempts than Unbound is willing to make
per response validation run. Suspension means that Unbound will continue with
other work before resuming a suspended validation offering CPU time between
validation resumptions to other tasks. There is a backoff timer when
suspending which is further influenced by the number of suspends already used
and the amount of work currently in Unbound.</p>
<p>The introduced builtin limits in Unbound are:</p>
<ul class="simple">
<li>Max 4 DNSSEC key collissions are allowed when building chain of trust.
More than that without a secure key treats the delegation as bogus.</li>
<li>8 validation attempts per RRSET (combination of keys + signatures).
If more are needed and Unbound has yet to find a valid signature
the RRSET is treated as bogus.</li>
<li>More than 8 validation attempts per answer will suspend validation.</li>
<li>8 NSEC3 hash calculations are allowed before suspension. More than that will
suspend validation.</li>
<li>The limit of total suspensions is 16 after which the query will error
out. Any completed RRSET validations populate the cache for use in
future queries.</li>
</ul>
<p>While under attack Unbound could show higher CPU load because of the needed
validations but the suspend strategy would guarantee the CPU is not locked on
any particular validation task.</p>
<p>We would like to thank Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael
Waidner from the German National Research Center for Applied Cybersecurity
ATHENE for discovering and responsibly disclosing the KeyTrap vulnerability.</p>
<p>We would like to thank Petr Špaček from ISC for discovering and responsibly
disclosing the NSEC3 vulnerability.</p>
<p>To learn further about the vulnerabilities and the coordination process,
we encourage you to read ISC's blog post titled
<a class="reference external" href="proxy.php?url=https://www.isc.org/blogs/2024-bind-security-release/">BIND 9 Security Release and Multi-Vendor Vulnerability Handling</a>.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-19-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.19.1.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2023-50387_CVE-2023-50868.txt">CVE acknowledgement statement</a></li>
</ul>
Routinator 0.13.1 ‘Aziz, Light!’ released2024-01-24T15:00:00+01:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2024-01-24:/news/2024/Jan/24/routinator-0.13.1-released/<p>We are pleased to announce the latest release of Routinator, version
0.13.1 ‘Aziz, Light!’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release includes …</p><p>We are pleased to announce the latest release of Routinator, version
0.13.1 ‘Aziz, Light!’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release includes a number of smaller fixes and improvements before
a the next release will see some major changes.</p>
<p>We have fixed the <tt class="docutils literal">dump</tt> command’s inability to deal with missing
directories, accept private key files labelled “EC PRIVATE KEY” for the
HTTP and RTR TLS configuration, and now log error output of the rsync
command immediately rather than collecting it and logging it all at once,
possibly overwhelming syslog.</p>
<p>For a fill list of changes, please have a look at the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.13.1">release notes</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/rpki/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.8.0 released2023-12-06T10:00:00+01:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2023-12-06:/news/2023/Dec/06/nsd-4.8.0-released/<p>Today, we released version 4.8.0 of the authoritative DNS nameserver NSD.</p>
<p>This release introduces PROXYv2 support and faster statistics gathering,
removes the database option and fixes bugs.</p>
<p>The proxy protocol support is an implementation of PROXYv2 for NSD.
It can be configured with <cite>proxy-protocol-port: portnum</cite> with the port …</p><p>Today, we released version 4.8.0 of the authoritative DNS nameserver NSD.</p>
<p>This release introduces PROXYv2 support and faster statistics gathering,
removes the database option and fixes bugs.</p>
<p>The proxy protocol support is an implementation of PROXYv2 for NSD.
It can be configured with <cite>proxy-protocol-port: portnum</cite> with the port
number of the interface on which proxy traffic is handled. The
interface can support proxy traffic for UDP, TCP and TLS.</p>
<p>The removal of the "database: nsd.db" option removes unneeded code. It
stored secondary zones in binary format. Zone files are used instead.
This turns out to be about the same speed, for file access, and use
much less memory. Plain text is also easier to deal with when inspecting
the contents. Intended improvements in zone parser speed are expected
to further enhance the performance, making it faster than the binary
database.</p>
<p>The option to turn the database off with "" was introduced in 4.1.7
in 2015. It is now removed, and the 'database:' option is ignored for
backwards compatibility, also the commandline '-f' option is ignored for
backwards compatibility. This means NSD can start even though the option
is present, and can then transfer zones from the primary and serve them.</p>
<p>Statistics are processed faster. NSD now uses shared memory to convey
the statistics from the server processes to the xfrd process. This is
faster, and also works while a reload is in progress. The statistics are
no longer written over the command pipes between processes, and so do
not wait for the processes. It is similar to how zone-stats have been
implemented. It works for both stats and stats_noreset.</p>
<p>Thanks to Sunet for sponsoring the proxy protocol, and providing
useful feedback in the early testing of the proxy protocol.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-8-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.8.0.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.19.0 released2023-11-08T11:00:00+01:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2023-11-08:/news/2023/Nov/08/unbound-1.19.0-released/<p>We are pleased to announce the release of version 1.19.0 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes a number of bugs, and adds some smaller features.
The <cite>redis-logical-db</cite> option and <cite>cachedb-no-store</cite> option can be used
for cachedb configuration. The <cite>disable-edns-do</cite> option can be used for
working …</p><p>We are pleased to announce the release of version 1.19.0 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes a number of bugs, and adds some smaller features.
The <cite>redis-logical-db</cite> option and <cite>cachedb-no-store</cite> option can be used
for cachedb configuration. The <cite>disable-edns-do</cite> option can be used for
working around broken network parts. For DNS64 there is fallback to
plain AAAA when no A record exists.</p>
<p>There is a bug fix that when the UDP interface keeps returning that
sending is not possible, unbound does not loop endlessly and waits
for the condition to go away.</p>
<p>Resource records of type A and AAAA that are an inappropriate length
are removed from responses. This hardens against bad content.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-19-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.19.0.tar.gz">Directly download the source package</a></li>
</ul>
Routinator 0.13.0 ‘Should Have Started This in a Screen’ released2023-09-21T15:00:00+02:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2023-09-21:/news/2023/Sep/21/routinator-0.13.0-released/<p>We are pleased to announce the latest release of Routinator, version
0.13.0 ‘Should Have Started This in a Screen.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the …</p><p>We are pleased to announce the latest release of Routinator, version
0.13.0 ‘Should Have Started This in a Screen.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release was intended to bring support for ASPA to Routinator. But then
the ASPA profile changed and there is a chance this will happen again. This could possibly
leave users with an outdated version.</p>
<p>So, while ASPA support for the current draft version of ASPA is
implemented in this Routinator release, it isn’t enabled by default. It
consequently isn’t enabled in the Docker images and binary packages we
provide either.</p>
<p>If you want to try out ASPA, you will have to build your own Routinator
version from sources enabling the <tt class="docutils literal">apsa</tt> feature. This is described in
detail in the <a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/en/stable/building.html">manual</a> but the upshot is that you need to install Rust and then install
Routinator via</p>
<div class="highlight"><pre><span></span>cargo install --locked --features aspa routinator
</pre></div>
<p>In addition, there have been many smaller changes all over the code.
The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.13.0">release notes</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.12.2 ‘Brutti, sporchi e cattivi’ released2023-09-13T15:00:00+02:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2023-09-13:/news/2023/Sep/13/routinator-0.12.2-released/<p>Today we have released version 0.12.2 of Routinator.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fixes two issues in Routinator that can …</p><p>Today we have released version 0.12.2 of Routinator.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fixes two issues in Routinator that can be exploited
remotely by rogue RPKI CAs and repositories. We therefore advise all
users of Routinator to upgrade to this release at their earliest
convenience.</p>
<p>The first issue, <a class="reference external" href="proxy.php?url=/downloads/routinator/CVE-2023-39915.txt">CVE-2022-39915</a>,
can lead to Routinator crashing when trying to decode certain illegal RPKI
objects.</p>
<p>The second issue, <a class="reference external" href="proxy.php?url=/downloads/routinator/CVE-2023-39916.txt">CVE-2022-39916</a>,
only affects users that have the <tt class="docutils literal"><span class="pre">rrdp-keep-responses</span></tt> option enabled
which allows storing all received RRDP responses on disk. Because the file
name for these responses is derived from the URI and the path wasn’t checked
properly, a RRDP URI could be constructed that results in the response
stored outside the directory, possibly overwriting existing files.</p>
<p>We would like to thank Haya Shulman, Donika Mirdita and Niklas Vogel for
discovering and reporting these issues.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.18.0 released2023-08-30T11:00:00+02:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2023-08-30:/news/2023/Aug/30/unbound-1.18.0-released/<p>We are pleased to announce the release of version 1.18.0 of the Unbound
recursive DNS resolver.</p>
<p>This release adds DNS cookies downstream, support to respond with EDE
error codes from cache, NAT64 support, and the capability to use a
socket queue timeout to discard old packets, and other …</p><p>We are pleased to announce the release of version 1.18.0 of the Unbound
recursive DNS resolver.</p>
<p>This release adds DNS cookies downstream, support to respond with EDE
error codes from cache, NAT64 support, and the capability to use a
socket queue timeout to discard old packets, and other features and bug
fixes.</p>
<p>The downstream DNS server cookies are from RFC7873 and RFC9018, it
is turned on with <cite>answer-cookie: yes</cite>. It generates a random cookie
secret, but for anycast setups the cookie secret can be configured with
<cite>cookie-secret: "128bithex"</cite> with the same value as the other instances.
Non cookie traffic can be disallowed with the <cite>allow_cookie</cite> acl option
for access-control. Queries with valid cookie bypass the ordinary
ratelimit, but a ratelimit can be configured for cookie queries
with <cite>ip-ratelimit-cookie: 100</cite>. The statistics has counters for
<cite>query_cookie_valid</cite> and <cite>query_cookie_client</cite> and
<cite>query_cookie_invalid</cite>.</p>
<p>When queries come in with CD flag, a DNSSEC validation EDE can be
returned, with information regarding a failure. EDE error information
is also stored in the cache with the query responses. There is also EDE
error information stored for the cachedb and the subnetcache.</p>
<p>There is NAT64 support, that is enabled with <cite>do-nat64: yes</cite>. The
NAT64 prefix can be configured too, if not the default
<cite>nat64-prefix: 64:ff9b::0/96</cite>. This is useful for an IPv6 only
host where Unbound is running, so that Unbound can use NAT64 to
connect to IPv4 servers.</p>
<p>The new default for the maximum UDP response size is 1232, with
<cite>max-udp-size: 1232</cite>. This is similar to other resolvers. The new
default is smaller and that makes it harder to get large responses.
Thanks to Xiang Li, from NISL Lab, Tsinghua University.</p>
<p>There is a new option <cite>harden-unknown-additional: yes</cite>. This removes
unknown records from the authority and additional section. This stops
unknown records from being copied from the upstream to the downstream
client, potentially exposing those clients to the extra records. Default
is no, because it could hamper future protocol developments that want to
add records. Thanks to Xiang Li, from NISL Lab, Tsinghua University.</p>
<p>With the <cite>sock-queue-timeout: 3</cite> option kernel timestamps are turned on
for UDP queries, and old packets are dropped. Queries that have waited
in the socket buffer for a long time are then discarded, and is useful
if the host was not running for a while. The statistics has
<cite>num.queries_timed_out</cite> and <cite>query.queue_time_us.max</cite> counters.</p>
<p>The local-zone type <cite>block_a</cite> is for when queries to IPv4 have to be
stopped to force IPv6 usage. It stops type A queries with nodata, and
transparently allows other queries.</p>
<p>The redis server can be contacted over a unix socket with
<cite>redis-server-path: "/var/lib/redis/redis-server.sock"</cite>. The redis
server password can be configured with
<cite>redis-server-password: "password"</cite>.</p>
<p>The number of hashtable collisions is logged in the statistics counters
<cite>msg.cache.max_collisions</cite> and <cite>rrset.cache.max_collisions</cite>. It can be
used to monitor for mistakes where the wrong or same hash value occurs
too frequently.</p>
<p>The repository does not have the bison and flex generated output in it,
so these tools are necessary to compile from a checkout, the tarball
distribution contains pregenerated files and can use either those files
or bison and flex tools on the compile system.</p>
<p>If kernel timestamps are enabled, with the sock-queue-timeout option,
they are also used to set the time for dnstap logs.</p>
<p>There is a yocto compatible init script available in the contrib
directory of the source code, <cite>unbound.init_yocto</cite>.
The number of cachedb hits from cache is output in <cite>num.query.cachedb</cite>.
There is support for the dohpath parameter for the SVCB record type.
Prefetch is supported for subnet cache entries.
Detection of the python paths on the system has been expanded.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-18-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.18.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.7.0 released2023-06-07T10:00:00+02:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2023-06-07:/news/2023/Jun/07/nsd-4.7.0-released/<p>Today, we released version 4.7.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds a script for bash autocompletion for nsd-control. Also
nsd-control can be configured to use unencrypted operation also when
compiled without openssl. There is also a systemd service unit example
file contributed. The dnstap log …</p><p>Today, we released version 4.7.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds a script for bash autocompletion for nsd-control. Also
nsd-control can be configured to use unencrypted operation also when
compiled without openssl. There is also a systemd service unit example
file contributed. The dnstap log service can be contacted over TCP, with
the <cite>dnstap-ip: ip</cite> option. It is also possible to use TLS, with
<cite>dnstap-tls</cite>, it is enabled by default, and can be configured with the
<cite>dnstap-server-name</cite>, <cite>dnstap-cert-bundle</cite>, <cite>dnstap-client-key-file</cite> and
<cite>dnstap-client-cert-file</cite> options. The configure option
<cite>--enable-root-server</cite> is obsolete, it is no longer used and defaults to
on. In addition, the build file should support multicore build with
flex and bison more easily.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-7-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.7.0.tar.gz">Direct Download</a></li>
</ul>
Krill 0.12.1 'Safety Belts' Released2023-01-17T12:30:00+01:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2023-01-17:/news/2023/Jan/17/krill.0.12.1-released/<p>This release introduces two fixes for the Krill Publication Server. If you
only use Krill as an RPKI Certificate Authority and publish elsewhere, e.g.
in an RPKI Publication Server provided by your RIR or NIR, then there is no
need to update to this release.</p>
<p>Firstly, this release fixes …</p><p>This release introduces two fixes for the Krill Publication Server. If you
only use Krill as an RPKI Certificate Authority and publish elsewhere, e.g.
in an RPKI Publication Server provided by your RIR or NIR, then there is no
need to update to this release.</p>
<p>Firstly, this release fixes <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/downloads/krill/CVE-2023-0158.txt">CVE-2023-0158</a>.
This CVE describes an exposure where remote attackers could cause Krill to
crash if it is used as an RPKI Publication Server and if its "/rrdp" endpoint
is accessible over the public internet.</p>
<p>Note that servers are not affected if the advice in
<a class="reference external" href="proxy.php?url=https://krill.docs.nlnetlabs.nl/en/stable/publication-server.html#synchronise-repository-data">our documentation</a>
was followed and a separate web server is used to serve the RRDP data.</p>
<p>Secondly, locking was added in this release to ensure that updates to the
repository content are always applied sequentially. This fixes a concurrency
issue introduced in Krill 0.12.0 that could result in rejecting an update
from a publishing CA. In such cases the affected update would not be visible
for RPKI validators, until a later publication attempt would be successful.</p>
<p>We advise that users upgrade to this version of Krill if they use it as their
RPKI Publication Server. We also continue to recommend that a separate web
server is used for serving the RRDP data.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.12.1">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.17.1 released2023-01-12T10:00:00+01:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2023-01-12:/news/2023/Jan/12/unbound-1.17.1-released/<p>We are pleased to announce the release of version 1.17.1 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes a number of bugs. There are also new configuration
options that by default do not change the existing behaviour of Unbound.</p>
<p>With <cite>statistics-inhibit-zero</cite> the printout of zero values by …</p><p>We are pleased to announce the release of version 1.17.1 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes a number of bugs. There are also new configuration
options that by default do not change the existing behaviour of Unbound.</p>
<p>With <cite>statistics-inhibit-zero</cite> the printout of zero values by stats can
be controlled. Similarly with <cite>max-sent-count</cite> and <cite>max-query-restarts</cite>
the iterator behaviour can be controlled. The maximum CNAME chain length
that is accepted can be changed by increasing the <cite>max-query-restarts</cite>
number. This takes more time to follow those elements.</p>
<p>The keep-cache option allows reloads to change configuration whilst
keeping the cache memory intact, making the cache hot for good response
times after the change has completed.</p>
<p>The release contains an additional fix for service downgrade due to
wrong hash values for wildcards in a hyperlocal zone, that was reported
by Sergey Kacheev.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-17-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.17.1.tar.gz">Directly download the source package</a></li>
</ul>
Routinator 0.12.1 ‘Plan uw reis in de app’ released2023-01-04T15:00:00+01:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2023-01-04:/news/2023/Jan/04/routinator-0.12.1-released/<p>We are pleased to announce the latest release of Routinator, version
0.12.1 ‘Plan uw reis in de app.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP …</p><p>We are pleased to announce the latest release of Routinator, version
0.12.1 ‘Plan uw reis in de app.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fixes a small number of minor issues. Most importantly, the
<tt class="docutils literal"><span class="pre">extra-tals-dir</span></tt> option introduced for the new TAL handling in version
0.12.0 is now also considered when it appears in the config file which
accidentally wasn’t the case. In addition, the TLS-enabled servers for
both HTTP and RTR now also accept private keys formatted as PKCS#1 RSA keys
rather than only accepting PKCS#8 keys.</p>
<p>For a fill list of changes, please have a look at the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.12.1">release notes</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.12.0 ‘Brutalism and Gardening’ released2022-11-10T15:00:00+01:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2022-11-10:/news/2022/Nov/10/routinator-0.12.0-released/<p>We are pleased to announce the latest release of Routinator, version
0.12.0 ‘Brutalism and Gardening.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release …</p><p>We are pleased to announce the latest release of Routinator, version
0.12.0 ‘Brutalism and Gardening.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release completely revamps the initialisation. After ARIN has dropped
their requirements to explicitly acknowledge their Relying Party Agreement
before using the ARIN TAL, the explicit <tt class="docutils literal">init</tt> command to install the
TALs is not really necessary any more and has been dropped. Instead, starting
with this release, the TALs can be selected through a number of command line
or configuration file options.</p>
<p>By default, Routinator will now use the TALs of the five RIRs which are
included in the Routinator binary. This is what most networks using RPKI
want to use and means for them no initialisation is necessary at all any
more. In particular, users of Docker images can now just run an image
without having to perform any additional steps.</p>
<p>Options exist to disable the use of these built-in TALs (<tt class="docutils literal"><span class="pre">--no-rir-tals</span></tt>),
select additional built-in TALs such as those of test beds (<tt class="docutils literal"><span class="pre">--tal</span></tt>)) or
read additional TAL files from a directory (<tt class="docutils literal"><span class="pre">--extra-tals-dir</span></tt>).</p>
<p>Note that when installing Routinator 0.12.0 using a Debian or RPM package
you may get a warning saying "Package distributor has shipped an updated
version". This is because the <tt class="docutils literal"><span class="pre">--tal-dir</span></tt> option is deprecated. Routinator
will ignore this option, so keeping the current file is fine.</p>
<p>In addition, Routinator now provides much more detailed information why an
object was rejected and log the reason. This will make it easier to debug
issues.</p>
<p>As always, there a many additional improvements and fixes.
The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.12.0">release notes</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.6.1 released2022-11-10T10:00:00+01:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2022-11-10:/news/2022/Nov/10/nsd-4.6.1-released/<p>Today, we released version 4.6.1 of the authoritative DNS nameserver NSD.</p>
<p>This release has a couple of bug fixes. The alpn is set for dns over
tls connections. And the SVCB type supports the dohpath parameter.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-6-1">downloads page …</a></p><p>Today, we released version 4.6.1 of the authoritative DNS nameserver NSD.</p>
<p>This release has a couple of bug fixes. The alpn is set for dns over
tls connections. And the SVCB type supports the dohpath parameter.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-6-1">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.6.1.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.17.0 released2022-10-13T10:00:00+02:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2022-10-13:/news/2022/Oct/13/unbound-1.17.0-released/<p>We are pleased to announce the release of version 1.17.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has new interface acl configuration options. These
allow access-control actions, per interface. Also tags, and views
can be configured per interface, queries over the interface are
answered with these tags …</p><p>We are pleased to announce the release of version 1.17.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has new interface acl configuration options. These
allow access-control actions, per interface. Also tags, and views
can be configured per interface, queries over the interface are
answered with these tags and views. It is configured with the
options <cite>interface-action</cite>, <cite>interface-tag</cite>, <cite>interface-tag-action</cite>,
<cite>interface-tag-data</cite> and <cite>interface-view</cite>. If there is also an
access-control setting for the query, this overrides the interface
settings for that query.</p>
<p>The PROXYv2 protocol is supported. It can be configured with the
<cite>proxy-protocol-port: portno</cite> option. It is used to convey the
IP addresses of clients that connect via a proxy to Unbound.</p>
<p>There are also fixes for a number of bugs. In some cases a
blocking wait on a socket could happen, and this has been
fixed. If the upstream sends a TC flag, erroneously, the reply
is ignored and retried. When under load, with the new
NRDelegation fixes from the previous release, there are
mitigations to continue target discovery. There is also a fix
for possible loops in the tcp reuse code.</p>
<p>The release version differs from the RC1, there is a bugfix
for the proxy protocol for tcp read when no proxied addresses
are provided.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-17-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.17.0.tar.gz">Directly download the source package</a></li>
</ul>
Unbound 1.16.3 released2022-09-21T12:00:00+02:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2022-09-21:/news/2022/Sep/21/unbound-1.16.3-released/<p>We are pleased to announce the release of version 1.16.3 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes <a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2022-3204.txt">CVE-2022-3204</a>
'Non-Responsive Delegation Attack'. It was reported by Yehuda Afek from
Tel-Aviv University and Anat Bremler-Barr and Shani Stajnrod from Reichman
University.</p>
<p>This fixes for better performance when under …</p><p>We are pleased to announce the release of version 1.16.3 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes <a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2022-3204.txt">CVE-2022-3204</a>
'Non-Responsive Delegation Attack'. It was reported by Yehuda Afek from
Tel-Aviv University and Anat Bremler-Barr and Shani Stajnrod from Reichman
University.</p>
<p>This fixes for better performance when under load, by cutting opportunistic
queries for nameserver discovery and DNSKEY prefetching, and limiting the
number of times a delegation point can look in the cache for missing records.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-16-3">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.16.3.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/">Unbound security advisories page</a></li>
</ul>
Routinator 0.11.3 released2022-09-13T15:00:00+02:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2022-09-13:/news/2022/Sep/13/routinator-0.11.3-released/<p>We have just released Routinator 0.11.3. This release fixes a vulnerability
present in Routinator 0.9.0 up to and including 0.11.2 which causes Routinator
to exit if it encounters invalid data in RRDP snapshot or delta files. We
have assigned CVE-2022-3029 to this issue.</p>
<p>Due …</p><p>We have just released Routinator 0.11.3. This release fixes a vulnerability
present in Routinator 0.9.0 up to and including 0.11.2 which causes Routinator
to exit if it encounters invalid data in RRDP snapshot or delta files. We
have assigned CVE-2022-3029 to this issue.</p>
<p>Due to a mistake in error handling, data in RRDP snapshot and delta files that
isn't correctly base 64 encoded is treated as a fatal error and causes
Routinator to exit.</p>
<p>Worst case impact of this vulnerability is denial of service for the RPKI
data that Routinator provides to routers. This may stop your network from
validating route origins based on RPKI data. This vulnerability does not
allow an attacker to manipulate RPKI data. We are not aware of exploitation
of this vulnerability at this point in time.</p>
<p>Starting with release 0.11.3, Routinator handles encoding errors by rejecting
the snapshot or delta file and continuing with validation. In case of an
invalid delta file, it will try using the snapshot instead. If a snapshot file
is invalid, the update of the repository will fail and an update through rsync
is attempted.</p>
<p>We would like to thank Donika Mirdita and Haya Shulman from Fraunhofer SIT
and ATHENE for discovering and notifying us about this issue.</p>
<p><strong>All users of Routinator 0.9.0 up to and including 0.11.2 are encouraged to upgrade to Routinator 0.11.3 at their earliest convenience.</strong></p>
<p>The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.11.3">release notes.</a> Instructions on how to upgrade can be found in the
<a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/en/stable/installation.html#updating">manual.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
ldns 1.8.3 quickfix release2022-08-15T00:00:00+02:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2022-08-15:/news/2022/Aug/15/ldns-1.8.3-released/<p>Version 1.8.2 of ldns had a crash bug when creating packets with an EDNS OPT resource record without options. For example when just setting the DO bit (DNSSEC OK) or when specifying a larger UDP payload size.</p>
<p>This quick fix release has this resolved. Also the unit tests …</p><p>Version 1.8.2 of ldns had a crash bug when creating packets with an EDNS OPT resource record without options. For example when just setting the DO bit (DNSSEC OK) or when specifying a larger UDP payload size.</p>
<p>This quick fix release has this resolved. Also the unit tests have been reviewed and updated to catch this in the future before release.</p>
<p>Compared to the 1.8.1 release, this release has some bugfixes and a few new features, most notably:</p>
<ul>
<li><p class="first">Since draft-ietf-dnsop-svcb-https will become RFC now anytime soon,
SVCB and HTTPS RR types are now compiled by default.</p>
</li>
<li><p class="first">Functionality for parsing and printing of EDNS0 Options.</p>
<p>The list of options in a packet can be accessed via a new function:
ldns_pkt_edns_get_option_list(ldns_pkt *packet). The list can be
further manipulated with functions as described in edns.h. Finally
the options can be converted to presentation format with
ldns_edns_option_list2buffer_str() from host2str.h.</p>
<p>drill will now also print EDNS0 options in a parsed format.</p>
</li>
</ul>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.8.3.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://raw.githubusercontent.com/NLnetLabs/ldns/1.8.3/Changelog">Changes</a></li>
</ul>
ldns 1.8.2 released2022-08-12T00:00:00+02:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2022-08-12:/news/2022/Aug/12/ldns-1.8.2-released/<p>I am pleased to announce that version 1.8.2 of ldns is now available.
Besides some bugfixes, this release also has a few new features, most
notably:</p>
<ul>
<li><p class="first">Since draft-ietf-dnsop-svcb-https will become RFC now anytime soon,
SVCB and HTTPS RR types are now compiled by default.</p>
</li>
<li><p class="first">Functionality for parsing and …</p></li></ul><p>I am pleased to announce that version 1.8.2 of ldns is now available.
Besides some bugfixes, this release also has a few new features, most
notably:</p>
<ul>
<li><p class="first">Since draft-ietf-dnsop-svcb-https will become RFC now anytime soon,
SVCB and HTTPS RR types are now compiled by default.</p>
</li>
<li><p class="first">Functionality for parsing and printing of EDNS0 Options.</p>
<p>The list of options in a packet can be accessed via a new function:
ldns_pkt_edns_get_option_list(ldns_pkt *packet). The list can be
further manipulated with functions as described in edns.h. Finally
the options can be converted to presentation format with
ldns_edns_option_list2buffer_str() from host2str.h.</p>
<p>drill will now also print EDNS0 options in a parsed format.</p>
</li>
</ul>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.8.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://raw.githubusercontent.com/NLnetLabs/ldns/1.8.2/Changelog">Changes</a></li>
</ul>
Unbound 1.16.2 released2022-08-01T14:00:00+02:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2022-08-01:/news/2022/Aug/01/unbound-1.16.2-released/<p>We are pleased to announce the release of version 1.16.2 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes the novel ghost domain issues CVE-2022-30698 and
CVE-2022-30699. They were reported by Xiang Li from the Network and
Information Security Lab of Tsinghua University.</p>
<p>Other than that there are …</p><p>We are pleased to announce the release of version 1.16.2 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes the novel ghost domain issues CVE-2022-30698 and
CVE-2022-30699. They were reported by Xiang Li from the Network and
Information Security Lab of Tsinghua University.</p>
<p>Other than that there are some bug fixes, and an option to configure the
max retransmit timeout, <cite>infra-cache-max-rtt</cite>. If left at default it does
not make any change.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-16-2">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.16.2.tar.gz">Directly download the source package</a></li>
</ul>
Unbound 1.16.1 released2022-07-11T11:00:00+02:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2022-07-11:/news/2022/Jul/11/unbound-1.16.1-released/<p>We are pleased to announce the release of version 1.16.1 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes a number of bugs. The number of nxdomains encountered
when looking up a nameserver is not counted as such when the lookup was
from cache. Also parent side queries …</p><p>We are pleased to announce the release of version 1.16.1 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes a number of bugs. The number of nxdomains encountered
when looking up a nameserver is not counted as such when the lookup was
from cache. Also parent side queries are not created when the addresses
are lame or already in cache. This solves lookup problems of domains
with a lot of nxdomains, and that have parent-child differences.</p>
<p>Algorithms that are not supported are disabled when the system OpenSSL
does not provide them, for FIPS OpenSSL installations.</p>
<p>Unbound sets <cite>IP_BIND_ADDRESS_NO_PORT</cite> socket option on outgoing tcp
sockets to make the port space larger that can be used. The number of
outgoing udp packets is collected in the <cite>num.query.udpout</cite> statistic.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-16-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.16.1.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.6.0 released2022-06-30T10:00:00+02:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2022-06-30:/news/2022/Jun/30/nsd-4.6.0-released/<p>Today, we released version 4.6.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds the zone verification support from the CreDNS code.
There are also some bug fixes in the ixfr out code.</p>
<p>Zone verification can start a verifier program that reads the new zone
data. It can …</p><p>Today, we released version 4.6.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds the zone verification support from the CreDNS code.
There are also some bug fixes in the ixfr out code.</p>
<p>Zone verification can start a verifier program that reads the new zone
data. It can reject the update. Or process the new zone data. The intent
is for a DNSSEC verifier to inspect the zone before it is passed on with
zone transfer or served to clients.</p>
<p>The zone verification can be enabled with <cite>enable: yes</cite> in the verify
section in nsd.conf. You can then list the interfaces the NSD listens on
while the verifier is active, so it can send queries for the new zone
contents. With <cite>verify-zones: yes</cite> zones are verified by default. The
command that is executed can be set with the <cite>verifier: ldns-verify-zone</cite>
option. With <cite>verifier-count</cite> the max number of concurrent verifiers can
be set. With the <cite>verifier-feed-zone: yes</cite> option the zone can be input
on stdin to the verifier program. A timeout to stop the verifier can be
set with the <cite>verifier-timeout</cite> option.</p>
<p>Per zone options can also be set for a pattern or for a zone, for zone
verification. With <cite>verify-zone</cite> the zone verification can be enabled
per zone. The <cite>verifier</cite> can be set per zone. And the <cite>verifier-feed-zone</cite>
and <cite>verifier-timeout</cite> options can be controlled per zone.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-6-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.6.0.tar.gz">Direct Download</a></li>
</ul>
RTRTR 0.2.2 released2022-06-13T12:00:00+02:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2022-06-13:/news/2022/Jun/13/rtrtr-0.2.2-released/<p>We have just released RTRTR 0.2.2.</p>
<p>This release fixes a one bug and two issues that were
introduced in the 0.2 series. <strong>All users of RTRTR 0.2.0 and 0.2.1 are
advised to upgrade.</strong></p>
<p>The more severe of those is that RTRTR starts to …</p><p>We have just released RTRTR 0.2.2.</p>
<p>This release fixes a one bug and two issues that were
introduced in the 0.2 series. <strong>All users of RTRTR 0.2.0 and 0.2.1 are
advised to upgrade.</strong></p>
<p>The more severe of those is that RTRTR starts to introduce duplicate
records in the output, both RTR and JSON over time, causing routers to
reject the data.</p>
<p>Second, there were some formatting errors in the JSON output.</p>
<p>This release has fixed both these issues.</p>
<p>The complete list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr/releases/tag/v0.2.2">release notes.</a></p>
<p>More information about RTRTR, as well as including installation instructions
can be found in the
<a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/">RTRTR Manual</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/en/stable/">RTRTR Manual</a>.</li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr">RTRTR Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/">RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.16.0 released2022-06-02T14:00:00+02:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2022-06-02:/news/2022/Jun/02/unbound-1.16.0-released/<p>We are pleased to announce the release of version 1.16.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has EDE support, for extended EDNS error reporting,
it fixes unsupported ZONEMD algorithms to load, and has more bug fixes.</p>
<p>The EDE errors can be turned on by <cite>ede: yes …</cite></p><p>We are pleased to announce the release of version 1.16.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has EDE support, for extended EDNS error reporting,
it fixes unsupported ZONEMD algorithms to load, and has more bug fixes.</p>
<p>The EDE errors can be turned on by <cite>ede: yes</cite>, it is default disabled.
Validation errors and other errors are then reported. If you also want
stale answers for expired responses to have an error code, the option
<cite>ede-serve-expired: yes</cite> can be used.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-16-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.16.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.5.0 released2022-05-13T10:00:00+02:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2022-05-13:/news/2022/May/13/nsd-4.5.0-released/<p>Today, we released version 4.5.0 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a couple of minor bugs and adds IXFR out
functionality. With this functionality NSD can respond to IXFR queries
and serve IXFR transfers downstream.</p>
<p>It is default disabled, that means it does not store …</p><p>Today, we released version 4.5.0 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a couple of minor bugs and adds IXFR out
functionality. With this functionality NSD can respond to IXFR queries
and serve IXFR transfers downstream.</p>
<p>It is default disabled, that means it does not store IXFR contents for
zones by default. The response on the wire is different, also with IXFR
disabled, because it is now supported, and thus also for those zones a
reply is served, that no differential data is available.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-5-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.5.0.tar.gz">Direct Download</a></li>
</ul>
Routinator 0.11.2 released2022-04-20T15:00:00+02:002026-03-04T07:35:16.832919+01:00NLnet Labstag:nlnetlabs.nl,2022-04-20:/news/2022/Apr/20/routinator-0.11.2.released/<p>We have just released Routinator 0.11.2 which fixes an issue causing
the integrated RTR server to not always report the complete set of
withdrawn VRPs and router keys to a router. This could cause a router to
possibly retain withdrawn VRPs or router keys for some time.</p>
<p>This …</p><p>We have just released Routinator 0.11.2 which fixes an issue causing
the integrated RTR server to not always report the complete set of
withdrawn VRPs and router keys to a router. This could cause a router to
possibly retain withdrawn VRPs or router keys for some time.</p>
<p>This issue was introduced in version 0.11.0 with BGPsec router key support.</p>
<p><strong>All users of Routinator 0.11.0 or 0.11.1 are encouraged to upgrade
to Routinator 0.11.2.</strong></p>
<p>The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.11.2">release notes.</a> Instructions on how to upgrade can be found in the
<a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/en/stable/installation.html#updating">manual.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.11.1 released2022-04-07T15:00:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2022-04-07:/news/2022/Apr/07/routinator-0.11.1-released/<p>We are pleased to announce the latest release of Routinator, version
0.11.1.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release improves the output …</p><p>We are pleased to announce the latest release of Routinator, version
0.11.1.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release improves the output of the dump command by stripping the
internal header of objects retrieved via RRDP before copying them and
adds the stored trust anchor certificates to the output.</p>
<p>In addtion, there a few bug fixes.</p>
<p>The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.11.1">release notes.</a></p>
<p>Starting with this version, we are publishing binary packages for Ubuntu
22.04 via our <a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/en/stable/installation.html#binary-packages">package repository.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.11.0 released2022-02-28T15:00:00+01:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2022-02-28:/news/2022/Feb/28/routinator-0.11.0-released/<p>We are pleased to announce the latest release of Routinator, version
0.11.0.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release adds TLS support …</p><p>We are pleased to announce the latest release of Routinator, version
0.11.0.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release adds TLS support to both the built-in RTR and HTTP
servers. It also adds support for validating and distributing BGPsec
router keys. Since support for these keys in RTR hasn’t been widely
tested, it will be initially disabled and needs to be activated via the
new <tt class="docutils literal"><span class="pre">enable-bgpsec</span></tt> command line and config file option.</p>
<p>Some smaller features have been added as well, such as a new <tt class="docutils literal">slurm</tt>
output format that produces JSON files following the local exception
files defined in RFC 8416, and the ability to to select VRPs with more
specific prefixes in the vrps command and from the HTTP server.</p>
<p>As always, there a few additional improvements and fixes.
The full list of changes is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.11.0">release notes</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.4.0 released2022-02-17T10:00:00+01:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2022-02-17:/news/2022/Feb/17/nsd-4.4.0-released/<p>Today, we released version 4.4.0 of the authoritative DNS nameserver NSD.</p>
<p>This release changes the memory allocation for outgoing zonetransfers,
and this reduces the memory footprint. The defaults for the amounts are
the same as before, but there are config options to configure the memory
usage. There are …</p><p>Today, we released version 4.4.0 of the authoritative DNS nameserver NSD.</p>
<p>This release changes the memory allocation for outgoing zonetransfers,
and this reduces the memory footprint. The defaults for the amounts are
the same as before, but there are config options to configure the memory
usage. There are also bug fixes.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-4-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.4.0.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.15.0 released2022-02-10T10:00:00+01:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2022-02-10:/news/2022/Feb/10/unbound-1.15.0-released/<p>We are pleased to announce the release of version 1.15.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has bug fixes for crashes that happened on heavy network
usage. The default for the <cite>aggressive-nsec</cite> option has changed, it is now
enabled.</p>
<p>The ratelimit logic had to be reworked …</p><p>We are pleased to announce the release of version 1.15.0 of the Unbound
recursive DNS resolver.</p>
<p>This release has bug fixes for crashes that happened on heavy network
usage. The default for the <cite>aggressive-nsec</cite> option has changed, it is now
enabled.</p>
<p>The ratelimit logic had to be reworked for the crash fixes. As a result,
there are new options to control the behaviour of ratelimiting.
The <cite>ratelimit-backoff</cite> and <cite>ip-ratelimit-backoff</cite> options can be used to
control how severe the backoff is when the ratelimit is exceeded.</p>
<p>The <cite>rpz-signal-nxdomain-ra</cite> option can be used to unset the RA flag, for
NXDOMAIN answers from RPZ. That is used by some clients to detect that
the domain is externally blocked. The RPZ option <cite>for-downstream</cite> can be
used like for auth zones, this allows the RPZ zone information to be queried.
That can be useful for monitoring scripts.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-15-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.15.0.tar.gz">Directly download the source package</a></li>
</ul>
RTRTR 0.2.0 ‘Arts and Crafts and Tactical Gear’ released2022-01-19T12:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2022-01-19:/news/2022/Jan/19/rtrtr-0.2.0-released/<p>We are happy to announce the latest release of RTRTR, version 0.2.0
‘Arts and Crafts and Tactical Gear.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for …</p><p>We are happy to announce the latest release of RTRTR, version 0.2.0
‘Arts and Crafts and Tactical Gear.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for RPKI such as
centralised RPKI validators that dispatch data to local caching RTR
servers.</p>
<p>This version introduces a new <tt class="docutils literal">"slurm"</tt> unit that can be used to modify
the RPKI data set using local exception files as defined in
<a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/rfc8416">RFC 8416</a>.</p>
<p>In addition, RTRTR can now speak RTR-over-TLS both as a client through
the new <tt class="docutils literal"><span class="pre">"rtr-tls"</span></tt> unit as well as a server through the target with
the same type name.</p>
<p>As always, there have been a number of smaller changes and improvements.
Most important of these is perhaps that RTRTR’s <tt class="docutils literal">"json"</tt> unit now
understands the modified JSON format produced by newer versions of
<a class="reference external" href="proxy.php?url=https://www.rpki-client.org/">rpki-client</a>.</p>
<p>The complete list of changes available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr/releases/tag/v0.2.0">release notes.</a></p>
<p>More information about RTRTR including installation instructions
can be found in the new
<a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/en/stable/">RTRTR Manual</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://rtrtr.docs.nlnetlabs.nl/en/stable/">RTRTR Manual</a>.</li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr">RTRTR Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/">RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.3.9 released2021-12-09T10:00:00+01:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2021-12-09:/news/2021/Dec/09/nsd-4.3.9-released/<p>Today, we released version 4.3.9 of the authoritative DNS nameserver NSD.</p>
<p>This release contains a small number of bug fixes. The reconfig failure
is fixed for cpu-affinity config re-read. Version repository and
continuous integration files are removed from the sourcecode tarball.</p>
<p>You can get source packages of this …</p><p>Today, we released version 4.3.9 of the authoritative DNS nameserver NSD.</p>
<p>This release contains a small number of bug fixes. The reconfig failure
is fixed for cpu-affinity config re-read. Version repository and
continuous integration files are removed from the sourcecode tarball.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-9">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.9.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.14.0 released2021-12-09T10:00:00+01:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2021-12-09:/news/2021/Dec/09/unbound-1.14.0-released/<p>We are pleased to announce the release of version 1.14.0 of the Unbound
recursive DNS resolver.</p>
<p>This release contains bug fixes and a full set of RPZ triggers and actions
that are supported. This works with RPZ zones, configured with <cite>rpz:</cite>.</p>
<p>It is possible to selectively enable use …</p><p>We are pleased to announce the release of version 1.14.0 of the Unbound
recursive DNS resolver.</p>
<p>This release contains bug fixes and a full set of RPZ triggers and actions
that are supported. This works with RPZ zones, configured with <cite>rpz:</cite>.</p>
<p>It is possible to selectively enable use of TCP for stub zones and
forward zones, without having enable it server wide, by enabling it
with the <cite>stub-tcp-upstream: yes</cite> and <cite>forward-tcp-upstream: yes</cite> options.</p>
<p>The added contrib/Dockerfile.tests from ziollek can be used to setup
a Docker environment to run tests in. The documentation is in the
doc/README.tests file.</p>
<p>If openssl it installed with different versions, you can set the location
as <cite>--with-ssl=/usr/include/openssl11</cite> and it then detects the use of the
lib dir split off in /usr/lib64/openssl11 with regex. This is useful if
to pass to configure if openssl is installed in such a manner.</p>
<p>The option <cite>outbound-msg-retry</cite> can be used to select the number of retries
when a non-positive response is received. It is best left at default, but
when the upstream is known to not need retries, it can be lowered, because
in that case the upstream is performing the retry for non-positive responses.</p>
<p>The domain <cite>home.arpa.</cite> is set by default as blocked, as per RFC8375. If you
want to use it, unblock it with a local-zone nodefault statement, or use
another type of local-zone to override it with your choice.</p>
<p>In the config it is possible to enter IPv6 scope-id values with interface
names, instead of a number, for link-local addresses.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-14-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.14.0.tar.gz">Directly download the source package</a></li>
</ul>
ldns 1.8.1 released2021-12-03T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2021-12-03:/news/2021/Dec/03/ldns-1.8.1-released/<p>This is a quickfix release fixing bugs that had 1.8.0 installing incorrectly.
Compared to the 1.7.1 release, this release has many bugfixes and also a few new features, most notably:</p>
<ul class="simple">
<li>ZONEMD support in ldns-signzone and ldns-verify-zone</li>
<li>Draft implementation of the SVCB and HTTPS RR types.
Use …</li></ul><p>This is a quickfix release fixing bugs that had 1.8.0 installing incorrectly.
Compared to the 1.7.1 release, this release has many bugfixes and also a few new features, most notably:</p>
<ul class="simple">
<li>ZONEMD support in ldns-signzone and ldns-verify-zone</li>
<li>Draft implementation of the SVCB and HTTPS RR types.
Use --enable-rrtype-svcb-https with configure to compile with these supported.</li>
</ul>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.8.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://raw.githubusercontent.com/NLnetLabs/ldns/1.8.1/Changelog">Changes</a></li>
</ul>
ldns 1.8.0 released2021-11-26T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2021-11-26:/news/2021/Nov/26/ldns-1.8.0-released/<p>Besides many bugfixes, this release also has a few new features:</p>
<ul class="simple">
<li>ZONEMD support in ldns-signzone and ldns-verify-zone</li>
<li>Draft implementation of the SVCB and HTTPS RR types.
Use --enable-rrtype-svcb-https with configure to compile with these supported.</li>
</ul>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.8.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://raw.githubusercontent.com/NLnetLabs/ldns/1.8.0/Changelog">Changes</a></li>
</ul>
Routinator 0.10.2 ‘Skuffet, men ikke overrasket’ released2021-11-09T15:00:00+01:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2021-11-09:/news/2021/Nov/09/routinator-0.10.2-released/<p>We are pleased to announce the latest release of Routinator, version
0.10.2 ‘Skuffet, men ikke overrasket.’</p>
<p>This release is part of a Coordinated Vulnerability Disclosure for
vulnerabilities in RPKI relying party implementations conducted by
the University of Twente and the National Cyber Security Centre of the
Netherlands (NCSC-NL …</p><p>We are pleased to announce the latest release of Routinator, version
0.10.2 ‘Skuffet, men ikke overrasket.’</p>
<p>This release is part of a Coordinated Vulnerability Disclosure for
vulnerabilities in RPKI relying party implementations conducted by
the University of Twente and the National Cyber Security Centre of the
Netherlands (NCSC-NL). It provides fixes for three issues, CVE-2021-43172,
CVE-2021-43173 and CVE-2021-43174, that allow malicious RRDP repositories
to either stall validation or cause Routinator to run out of memory.</p>
<p>For more information on the issues, see the
<a class="reference external" href="proxy.php?url=/projects/routing/security-advisories/">RPKI security advisories.</a>.
The full list of changes in this release is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.10.2">release notes.</a>.</p>
<p>None of these fixes change Routinator's behaviour. All users are encouraged to
update to this version.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.3.8 released2021-10-12T10:00:00+02:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2021-10-12:/news/2021/Oct/12/nsd-4.3.8-released/<p>Today, we released version 4.3.8 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a crash bug in delegation answers, and fixes
in NSEC3 answers. Also compile fixes for OpenSSL. The OpenSSL 3.0
API is supported.</p>
<p>The Mutual TLS feature allows for client authentication for XFR-over-TLS
connections …</p><p>Today, we released version 4.3.8 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a crash bug in delegation answers, and fixes
in NSEC3 answers. Also compile fixes for OpenSSL. The OpenSSL 3.0
API is supported.</p>
<p>The Mutual TLS feature allows for client authentication for XFR-over-TLS
connections, use the <cite>client-cert</cite>, <cite>client-key</cite> and <cite>client-key-pw</cite> options
to set up the certificate that NSD then uses to connect to the upstream
server to download the zone with.</p>
<p>The default for DNS Cookies is updated. It is now off to
stop wrong behaviour in mixed server deployments.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-8">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.8.tar.gz">Direct Download</a></li>
</ul>
Routinator 0.10.1 ‘That's No Moon’ released2021-09-20T15:00:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2021-09-20:/news/2021/Sep/20/routinator-0.10.1-released/<p>We are happy to announce the latest release of Routinator, version
0.10.1 ‘That's No Moon.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release …</p><p>We are happy to announce the latest release of Routinator, version
0.10.1 ‘That's No Moon.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release of Routinator introduces major new user-interface
features. It now allows users to validate prefixes against ASNs
found in BGP announcements. Next to that it allows users to lookup
related prefixes for the prefix they're searching for. These
related prefixes can be more- or less-specific prefixes, routed in
BGP or prefixes that are allocated by one of the five RIRs
(Regional Internet Registries).</p>
<p>The user interface can now also be run completely separately from
Routinator itself. It now has its own Github repository.
See the <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator-ui/blob/main/README.md">README</a> for details on how to run this interface
stand-alone.</p>
<p>The full list of changes is as always available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.10.1">release notes.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator-ui">Routinator-ui Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.10.0 ‘Through Many Dangers, Toils, and Snares’ released2021-08-23T15:00:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2021-08-23:/news/2021/Aug/23/routinator-0.10.0-released/<p>We are happy to announce the latest release of Routinator, version
0.10.0 ‘Through Many Dangers, Toils, and Snares.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP …</p><p>We are happy to announce the latest release of Routinator, version
0.10.0 ‘Through Many Dangers, Toils, and Snares.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>In Routinator 0.9.0 we changed the way we store the local copy of the
repository. An unfortunate side effect was that it increased the memory
consumption of Routinator rather dramatically. As we were unhappy with
that, we rewrote the storage system again and with this release we are
back at previous levels.</p>
<p>In addition, we implemented a number of smaller quality of life
improvements and fixed a few other issues.</p>
<p>The full list of changes is as always available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.10.0">release notes.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.13.2 released2021-08-12T10:00:00+02:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2021-08-12:/news/2021/Aug/12/unbound-1.13.2-released/<p>We are pleased to announce the release of version 1.13.2 of the Unbound
recursive DNS resolver.</p>
<p>The release contains a bugfix to fix the make install of the python module
after build changes introduced in this release rc1.</p>
<p>This release contains a number of bug fixes. There is …</p><p>We are pleased to announce the release of version 1.13.2 of the Unbound
recursive DNS resolver.</p>
<p>The release contains a bugfix to fix the make install of the python module
after build changes introduced in this release rc1.</p>
<p>This release contains a number of bug fixes. There is a crash fix for
broken internal structures in stream reuse, that is used when many TCP
or TLS upstream connections are made. Also a number of features are added.</p>
<p>The ZONEMD support allows verification of downloaded authority zone files
with the zonemd hash. It can be enabled with the <cite>zonemd-check</cite> option.
It implements RFC8976. With <cite>zonemd-permissive-mode</cite> it is possible to try out
the functionality without withholding the zone if the checks fail. With
<cite>zonemd-reject-absence</cite> the zonemd record becomes a requirement for a zone.</p>
<p>It is possible to use interface names for the <cite>control-interface</cite> as well,
it was already possible for the <cite>interface</cite>, but now also for the remote
control functionality. It allows the user to config the interface with the
interface name, like 'eth0', instead of an IP address.</p>
<p>It is possible to configure the persistent TCP connection, with the options
<cite>max-reuse-tcp-queries</cite> and <cite>tcp-reuse-timeout</cite>. These also apply to TLS
reused connections.</p>
<p>The local zone types <cite>always_null</cite>, <cite>always_nodata</cite> and <cite>always_deny</cite> work
inside the local zones that are defined inside a view.</p>
<p>The log servfail error message now includes more information, it attempts
to add an IP address and information about the one of the last failures
that is associated with that query.</p>
<p>With the option <cite>tcp-auth-query-timeout</cite>, the time to wait for queries
to upstream authority servers can be configured, for TCP and TLS queries.</p>
<p>It is possible to configure unbound with <cite>--with-deprecate-rsa-1024</cite>, that
stops the use of RSA 1024 keys. That makes unbound work with certain FIPS
installations that do not allow such calls to the crypto API. If the
option is enabled, Unbound treats RSA keys with an insufficiently sized
key as not supported. Responses with unsupported crypto are marked insecure.</p>
<p>The NSEC3 maximum iterations are lowered to 150. This is the new default
setting. This puts this in line with other DNS implementations. If the
iterations count is exceeded the response becomes insecure.</p>
<p>The number of validator retries when there is a DNSSEC failure can be
configured with the <cite>val-max-restart</cite> option.</p>
<p>The RR types SVCB and HTTPS are supported according to the draft
specification. The syntax can be used in local zones and zone files,
and debug output. The types themselves were already supported on the
wire the RFC3597 unknown RR type support.</p>
<p>The HTTP user agent header can be configured or elided, to
avoid printing the version of type of the software running on the
server, with the options <cite>http-user-agent</cite> and <cite>hide-http-user-agent</cite>.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-13-2">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.13.2.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.3.7 released2021-07-22T16:00:00+02:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2021-07-22:/news/2021/Jul/22/nsd-4.3.7-released/<p>Today, we released version 4.3.7 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a crash in dnstap. New features are XoT which
provides AXFR and IXFR over TLS, and DNS Cookies support and SVCB and
HTTPS RR type support.</p>
<p>For zone transfer TLS can be turned on …</p><p>Today, we released version 4.3.7 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a crash in dnstap. New features are XoT which
provides AXFR and IXFR over TLS, and DNS Cookies support and SVCB and
HTTPS RR type support.</p>
<p>For zone transfer TLS can be turned on by specifying the tls-auth-name
in the request-xfr config option, like
<cite>request-xfr: 192.0.2.1 NOKEY ns.example.com</cite>.
With the tls-cert-bundle option, in the server section, the list of
certificates for authenticating the transfers over TLS can be configured.</p>
<p>The DNS cookies can be turned on or off with the <cite>answer-cookie</cite> option,
and instead of a randomly generated secret, for anycast or loadbalanced
deployment, the secret can be configured with <cite>cookie-secret</cite> or
<cite>cookie-secret-file</cite> and rollover of the cookie secret can be performed
with the nsd-control commands <cite>add_cookie_secret</cite>, <cite>activate_cookie_secret</cite>
and <cite>drop_cookie_secret</cite>, using the cookie-secret-file.</p>
<p>The SVCB and HTTPS RR type support mean that in zone files the syntax
for these RR types can be used and is written when a zone is downloaded.
In previous versions the unknown RR type support code provided a
fallback syntax in zone files and on the wire functionality for these types.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-7">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.7.tar.gz">Direct Download</a></li>
</ul>
Routinator 0.9.0 ‘Raptor Bash for Life’ released2021-07-03T15:00:00+02:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2021-07-03:/news/2021/Jul/03/routinator-0.9.0-released/<p>We are happy to announce the latest release of Routinator, version
0.9.0 ‘Raptor Bash for Life.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This …</p><p>We are happy to announce the latest release of Routinator, version
0.9.0 ‘Raptor Bash for Life.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fundamentally changes how Routinator maintains the local
copy of the RPKI cache. It now separately keeps track of the raw data
retrieved from the RPKI repositories and the last known set of
correctly published files. This allows Routinator to deal more robustly
with partial or erroneous updates – it can now just keep using the
previously published set until the repository is fixed (or the objects
expire). The price for this greater robustness is increased storage size and RAM
usage. At time of writing, about 1.3 GB of disk space is used. If you were
running Routinator on an very barebones system, e.g. 1GB total RAM, you
should now give it 2GB.</p>
<p>For RRDP and this known good data set we switched from storing data
directly in the file system to using a key-value database.</p>
<p>Routinator now keeps track of many more metrics.
Detailed numbers are available for each object type both on a per-TAL
and – new – per-repository basis. If you’re using Prometheus, it
should pick up these new metrics right away. They are also shown in the
bundled UI.</p>
<p>Two important things require an action from you:</p>
<ul class="simple">
<li>The previously available per-trust anchor metrics have been renamed
to fit with the new naming scheme. They can now be found under the
prefix <tt class="docutils literal">routinator_ta</tt> and use the label <tt class="docutils literal">name</tt> (instead of the
previously used <tt class="docutils literal">tal</tt>) for the individual trust anchors.</li>
<li>LACNIC has published a new Trust Anchor Locator (TAL). We recommend
to reinitialise your TALs after upgrading to Routinator 0.9.0 with
the <tt class="docutils literal">routinator init <span class="pre">--force</span></tt> command. We also bundle additional
TALs for various test setups that are only installed on request.
A list of these is available through <tt class="docutils literal">routinator init <span class="pre">--list-tals</span></tt>.</li>
</ul>
<p>In addition, we added many new features and improved existing ones. A
full list of all these is available in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.9.0">release notes</a>
and the completely overhauled <a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">documentation</a>.</p>
<p>And finally, good new for users running Centos 7 and 8. Starting with this
release, we are publishing binary packages for these distributions in
addition to the already available Debian packages via our package
repository. More
details can be found in the
<a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/en/stable/installation.html">installation instructions</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://routinator.docs.nlnetlabs.nl/">Routinator Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
tsuNAME vulnerability and Unbound2021-05-10T17:00:00+02:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2021-05-10:/news/2021/May/10/tsuname-vulnerability-and-unbound/<p>Last week, SIDN Labs, InternetNZ and USC/ISI researchers announced the
vulnerability called tsuNAME <a class="reference external" href="proxy.php?url=https://tsuname.io/">[1]</a>. With the analysis of the impact of
tsuNAME, the researchers have also evaluated a number of open source DNS
software, including Unbound. In their research they have assessed that
Unbound is not vulnerable to the …</p><p>Last week, SIDN Labs, InternetNZ and USC/ISI researchers announced the
vulnerability called tsuNAME <a class="reference external" href="proxy.php?url=https://tsuname.io/">[1]</a>. With the analysis of the impact of
tsuNAME, the researchers have also evaluated a number of open source DNS
software, including Unbound. In their research they have assessed that
Unbound is not vulnerable to the tsuNAME attack <a class="reference external" href="proxy.php?url=https://tsuname.io/advisory.pdf">[2]</a> (Section 5.1).</p>
<div class="section" id="cyclic-dependencies-in-name-servers">
<h2>Cyclic dependencies in name servers</h2>
<p>With the design and implementation of Unbound, the specific case of
cyclic dependencies in name servers for a domain was already considered.
<a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/doc/html/rfc1536#section-2">[RFC1536]</a> also mentions recursion bugs in Section 2 of the document.</p>
<p>In a so-called exploration phase, Unbound will discover name servers
for a domain name and caches the results of the NS record lookups.
In this exploration phase, Unbound has implemented both cycle detection
and for the TTL of the cached NS records it will not send any further
queries to upstream servers. This behaviour prevents further lookups
and annuls a potential tsuNAME attack, and as such Unbound cannot be made
instrumental in facilitating a DDoS attack on authoritative name servers.</p>
</div>
<div class="section" id="related-links">
<h2>Related links</h2>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://tsuname.io/">[1] tsuNAME Public Disclosure</a></li>
<li><a class="reference external" href="proxy.php?url=https://tsuname.io/advisory.pdf">[2] tsuNAME Public Disclosure and Security Advisory</a></li>
<li><a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/doc/html/rfc1536#section-2">[RFC1536] Common DNS Implementation Errors and Suggested Fixes, October 1993</a></li>
</ul>
</div>
OpenDNSSEC 2.1.9 released2021-05-06T13:45:00+02:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2021-05-06:/news/2021/May/06/opendnssec-2.1.9-released/<p>This release contains two changes that avoid some problems with certain
HSM configuration, one of them is SoftHSMv2 in database back-end mode.
This can lead to temporarily not being able to sign zones, hence
upgrading is really recommended. It does not occur on all systems
and configurations though.</p>
<p>The 2 …</p><p>This release contains two changes that avoid some problems with certain
HSM configuration, one of them is SoftHSMv2 in database back-end mode.
This can lead to temporarily not being able to sign zones, hence
upgrading is really recommended. It does not occur on all systems
and configurations though.</p>
<p>The 2.1.9 release is available immediately from the download site.</p>
<div class="section" id="issues">
<h2>Issues</h2>
<ul class="simple">
<li>OPENDNSSEC-955: Prevent concurrency between certain valid PKCS#11 HSM operations to avoid some keys to be (transiently) unavailable.</li>
<li>OPENDNSSEC-956: Harden signing procedure to still sign zones for which there are unused keys specified in the zone which are unavailable.</li>
</ul>
</div>
<div class="section" id="download">
<h2>Download</h2>
<p>For OpenDNSSEC 2.1.9 download and additional information:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.opendnssec.org/2021/05/opendnssec-2-1-9/">OpenDNSSEC 2.1.9 release announcement</a></li>
</ul>
</div>
NSD 4.3.6 released2021-04-06T14:00:00+02:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2021-04-06:/news/2021/Apr/06/nsd-4.3.6-released/<p>Today, we released version 4.3.6 of the authoritative DNS nameserver NSD.</p>
<p>This release contains a bug fix for a zone file parse failure for text
records. The release also adds the feature to print a local address, if
the address is configured, in dnstap logs. The interface for …</p><p>Today, we released version 4.3.6 of the authoritative DNS nameserver NSD.</p>
<p>This release contains a bug fix for a zone file parse failure for text
records. The release also adds the feature to print a local address, if
the address is configured, in dnstap logs. The interface for nsd-control
can be specified with an interface name. The zone that was parse
successfully can be printed with the nsd-checkzone <cite>-p</cite> option. Also added
is support to emit DNS extended errors via the EDNS option from RFC8914.
It is possible to stop queries for certain zones, depending on IP
address and TSIG key, with the new <cite>allow-query</cite> option, for zones that do
not need to be queried, like meta zones with configuration information.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-6">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.6.tar.gz">Direct Download</a></li>
</ul>
Discontinuing the 1-Click Apps for Krill2021-02-25T12:30:00+01:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2021-02-25:/news/2021/Feb/25/krill-1-click-app-discontinued/<p>About one year ago we introduced a 1-Click App for Krill on the AWS Marketplace
and DigitalOcean Marketplace. It was introduced in a time when installing
and configuring Krill involved quite some steps. The goal was to allow operators
to get started with Krill quickly, to gain operational experience with …</p><p>About one year ago we introduced a 1-Click App for Krill on the AWS Marketplace
and DigitalOcean Marketplace. It was introduced in a time when installing
and configuring Krill involved quite some steps. The goal was to allow operators
to get started with Krill quickly, to gain operational experience with delegated
RPKI.</p>
<p>Since then, we have introduced Debian and Ubuntu packages for Krill on the NLnet
Labs package repository, which will soon offer RPM packages as well. We also
offer a Docker container image and a public RPKI testbed. All these solutions
have significantly reduced the need for the 1-Click Apps. Nowadays, getting
started with Krill is as simple as <tt class="docutils literal">apt install krill</tt> and opening the Krill
user interface in a browser.</p>
<p>As a result, we are discontinuing the AWS Marketplace and the DigitalOcean
Marketplace 1-Click Apps. Existing installations will keep working, but will no
longer receive updates.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
OpenDNSSEC 2.1.8 released2021-02-23T16:20:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2021-02-23:/news/2021/Feb/23/opendnssec-2.1.8-released/<p>This release of 2.1.8 fixes a number of bugs related to the purging of
keys, a potential denial of service vulnerability in some installations,
and a few rare but nasty potential crashes. Earlier versions of OpenDNSSEC
2.1 might not have all keys purged from the HSM if …</p><p>This release of 2.1.8 fixes a number of bugs related to the purging of
keys, a potential denial of service vulnerability in some installations,
and a few rare but nasty potential crashes. Earlier versions of OpenDNSSEC
2.1 might not have all keys purged from the HSM if instructed to do
so. Since this is now done automatically this is worth pointing out that
this was a bug and old keys will be permanently removed from the HSM.</p>
<p>Special thanks to the people who helped us make OpenDNSSEC better and
better, they are as always mentioned in the NEWS file. Two of the bugs
were only traceable with their help.</p>
<p>The 2.1.8 release is available immediately from the download site.</p>
<div class="section" id="issues">
<h2>Issues</h2>
<ul class="simple">
<li>OPENDNSSEC-954: Upgrade autoconf/automake configuration chain for version 2.69/1.16.2.</li>
<li>SUPPORT-261: Fix to crash when using ods-enforcer set-policy command.</li>
<li>OPENDNSSEC-953: Fix to crash in case zone file not present while getting a signconf update and state flush command.
<em>Thanks to Stefan Ubbink from SIDN for the co-operation in this fix.</em></li>
<li>OPENDNSSEC-951: Modify the purging of keys, to make it automatic to purge keys from the HSM.
<em>Thanks to Stefan Ubbink from SIDN for the co-operation in this fix.</em></li>
<li>OPENDNSSEC-950: Fix that caused crash when signer was offline for a prolonged period (but the enforcer wasn’t) in the middle of a ZSK roll.</li>
<li>OPENDNSSEC-952: memory leak in when receiving NOTIFY for non-existent zone.
<em>Thanks to Sébastien Tisserant for reporting.</em></li>
</ul>
</div>
<div class="section" id="download">
<h2>Download</h2>
<p>For OpenDNSSEC 2.1.8 download and additional information:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.opendnssec.org/2021/02/opendnssec-2-1-8/">OpenDNSSEC 2.1.8 release announcement</a></li>
</ul>
</div>
Unbound 1.13.1 released2021-02-09T10:00:00+01:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2021-02-09:/news/2021/Feb/09/unbound-1.13.1-released/<p>We are pleased to announce the release of version 1.13.1 of the Unbound
recursive DNS resolver.</p>
<p>This release contains a number of bug fixes. There is added support
for the EDNS Padding option (RFC7830 and RFC8467), and the EDNS NSID
option (RFC 5001). Unbound control has added commands …</p><p>We are pleased to announce the release of version 1.13.1 of the Unbound
recursive DNS resolver.</p>
<p>This release contains a number of bug fixes. There is added support
for the EDNS Padding option (RFC7830 and RFC8467), and the EDNS NSID
option (RFC 5001). Unbound control has added commands to enable and
disable rpz processing. Reply callbacks have a start time passed to
them that can be used to calculate time, these are callbacks for
response processing. With the option <cite>serve-original-ttl</cite> the TTL served
in responses is the original, not counted down, value, for when in
front of authority service.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-13-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.13.1.tar.gz">Directly download the source package</a></li>
</ul>
Routinator 0.8.3 ‘Like and Subscribe’ released2021-02-02T15:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2021-02-02:/news/2021/Feb/02/routinator-0.8.3-released/<p>We are happy to announce the latest release of Routinator, version
0.8.3 ‘Like and Subscribe.’*</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>While we …</p><p>We are happy to announce the latest release of Routinator, version
0.8.3 ‘Like and Subscribe.’*</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>While we are still hard at work for the next big release of Routinator,
we have a treat for Routinator users that aren’t routers: The very
first version of a lightweight user interface.</p>
<div class="figure align-center">
<img alt="The Routinator user interface" src="proxy.php?url=https://nlnetlabs.nl/static/images/routinator-ui-validity-checker.png" style="width: 100%;"/>
</div>
<p>The user interface provides two main functions. First, it displays
statistics from the last validation run Routinator has performed.
Secondly, you can use the user interface to verify the RPKI origin
validation status of an AS Number and IP Prefix combination.</p>
<p>Verifying the validation status can be done by entering an existing BGP
announcement or an ASN and prefix of your choice, for example for an
announcement you're planning to do. The returned RPKI validity state
will be Valid, Invalid or Not Found and is based on the current set of
Validated ROA Payloads (VRPs) in the cache. Routinator will provide an
overview of all VRPs that led to the result, along with the reason for
the outcome.</p>
<p>This UI is available via the regular HTTP interface at the "/"
endpoint and requires access to /api and /ui (in case you use a reverse
proxy). It was built using Vue.js as Javascript framework, Element as
UI framework and queries the existing Routinator API. It is maintained
as a
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator-ui/">separate project on Github</a>.</p>
<p>The new UI is the only change in this release. So, if you are not
interested in it, you can safely skip it.</p>
<p>You can find more information on Routinator on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
<p>* And hit the bell icon, too!</p>
NSD 4.3.5 released2021-01-26T10:00:00+01:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2021-01-26:/news/2021/Jan/26/nsd-4.3.5-released/<p>Today, we released version 4.3.5 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a number of bugs. It fixes a number of corner
case differences for the output more similar to Bind. The configure
sources are compatible with the new autoconf 2.70.</p>
<p>You can get source …</p><p>Today, we released version 4.3.5 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a number of bugs. It fixes a number of corner
case differences for the output more similar to Bind. The configure
sources are compatible with the new autoconf 2.70.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-5">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.5.tar.gz">Direct Download</a></li>
</ul>
RTRTR 0.1.1 ‘Death Metal Karaoke‘ released2020-12-11T12:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2020-12-11:/news/2020/Dec/11/rtrtr-0.1.1-released/<p>We are happy to announce the second release of RTRTR, version 0.1.1
‘Death Metal Karaoke.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for RPKI such as …</p><p>We are happy to announce the second release of RTRTR, version 0.1.1
‘Death Metal Karaoke.’</p>
<p>RTRTR is a tool to collect RPKI data from one or more sources in
multiple formats and dispatch it onwards. It provides the means to
implement multiple distribution architectures for RPKI such as
centralised RPKI validators that dispatch data to local caching RTR
servers.</p>
<p>With this version, RTRTR supports collecting data from upstream RTR
servers as well as from JSON documents fetched via HTTP or read from
local files. If multiple sources are defined, it can fail over to
another source if its currently used source becomes unavailable. Data
can be dispatched either via RTR or as JSON via HTTP.</p>
<p>RTRTR is still in early development. We are planning to add support for
more data formats in the future. In addition, we plan to add secure
transport channels for RTR.</p>
<p>You more information about RTRTR including installation instructions on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/rtrtr">RTRTR Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/">RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.8.2 ‘Once More, with Feeling’ released2020-12-09T15:00:00+01:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2020-12-09:/news/2020/Dec/09/routinator-0.8.2-released/<p>We are happy to announce the latest release of Routinator, version
0.8.2 ‘Once More, with Feeling.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This …</p><p>We are happy to announce the latest release of Routinator, version
0.8.2 ‘Once More, with Feeling.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release adjusts the validation behaviour of Routinator. As the
rules proposed by
<a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/doc/draft-ietf-sidrops-6486bis/">draft-ietf-sidrops-6486bis</a>
and implemented by Routinator since version 0.8.0 turned out to be too
strict, validation has been relaxed again. A CA is now only rejected and
all its objects ignored if the manifest or CRL are invalid or if any of
the objects listed on the manifest are either missing or have a different
hash. Previously, a CA was rejected entirely if objects themselves where
invalid for any reason, including cases such as expired child certificates.</p>
<p><strong>All users of Routinator 0.8.0 and 0.8.1 are encouraged to upgrade to this
release.</strong></p>
<p>You can find the complete list of changes in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.8.2">release notes</a>
and more information on Routinator on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.13.0 released2020-12-03T10:00:00+01:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2020-12-03:/news/2020/Dec/03/unbound-1.13.0-released/<p>We are pleased to announce the release of version 1.13.0 of the Unbound
recursive DNS resolver.</p>
<p>This version has fixes to connect for UDP sockets, slowing down potential
ICMP side channel leakage. The fix can be controlled with the option
<cite>udp-connect: yes</cite>, it is enabled by default.</p>
<p>Additionally …</p><p>We are pleased to announce the release of version 1.13.0 of the Unbound
recursive DNS resolver.</p>
<p>This version has fixes to connect for UDP sockets, slowing down potential
ICMP side channel leakage. The fix can be controlled with the option
<cite>udp-connect: yes</cite>, it is enabled by default.</p>
<p>Additionally CVE-2020-28935 is fixed, this solves a problem where the
pidfile is altered by a symlink, and fails if a symlink is encountered.
See <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt">https://nlnetlabs.nl/downloads/unbound/CVE-2020-28935.txt</a> for more
information.</p>
<p>New features are upstream TCP and TLS query reuse, where a channel is
reused for several queries. And <cite>http-notls-downstream: yesno</cite> for
unencrypted DoH, useful for back end support servers. The option
<cite>infra-keep-probing</cite> can be used to probe hosts that are down more
frequently.</p>
<p>The options <cite>edns-client-string</cite> and <cite>edns-client-string-opcode</cite> can be used
to add an EDNS option with the specified string in queries towards servers,
with the servers specified by IP address. It replaces the <cite>edns-client-tag</cite>
option.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-13-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.13.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.3.4 released2020-12-01T13:30:00+01:002026-03-04T07:35:16.827919+01:00NLnet Labstag:nlnetlabs.nl,2020-12-01:/news/2020/Dec/01/nsd-4.3.4-released/<p>Today, we released version 4.3.4 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes CVE-2020-28935, this solves a problem where the
pidfile is altered by a symlink, and fails if a symlink is encountered.
See <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/downloads/nsd/CVE-2020-28935.txt">https://nlnetlabs.nl/downloads/nsd/CVE-2020-28935.txt</a> for more information.</p>
<p>Also there are …</p><p>Today, we released version 4.3.4 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes CVE-2020-28935, this solves a problem where the
pidfile is altered by a symlink, and fails if a symlink is encountered.
See <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/downloads/nsd/CVE-2020-28935.txt">https://nlnetlabs.nl/downloads/nsd/CVE-2020-28935.txt</a> for more information.</p>
<p>Also there are bug fixes and the syntax of the RR type ZONEMD can be
used in zonefiles.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-4">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.4.tar.gz">Direct Download</a></li>
</ul>
Routinator 0.8.1 ‘Pure as New York Snow’ released2020-11-30T15:00:00+01:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2020-11-30:/news/2020/Nov/30/routinator-0.8.1-released/<p>We are happy to announce the latest release of Routinator, version
0.8.1 ‘Pure as New York Snow.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow …</p><p>We are happy to announce the latest release of Routinator, version
0.8.1 ‘Pure as New York Snow.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release is a bug fix release correcting issues found in 0.8.0.</p>
<p>First, when using local exceptions (also called SLURM), VRPs matched by a
prefix filter were still added to the final data set. <strong>If you are using
local exceptions to filter VRPs, you should upgrade to 0.8.1.</strong></p>
<p>Second, the prefix validation feature available via the <tt class="docutils literal">validation</tt>
command and the <tt class="docutils literal">/validity</tt> HTTP endpoint accidentally matched host
prefixes with an idendical bit pattern to a covering, less specific VRP,
thus marking such prefixes as valid.</p>
<p>Finally, we introduced two inconsistencies in new config file options added
in 0.8.0. The config key for <tt class="docutils literal"><span class="pre">unknown-objects</span></tt> was using an underscore
instead of a dash and the value for <tt class="docutils literal"><span class="pre">rtr-tcp-keepalive</span></tt> was expected to be
a string rather than an integer value. Both these have been fixed. However,
the previous config key and value type are still accepted until 0.9.0.</p>
<p>You can find the complete list of changes in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.8.1">release notes</a>
and more information on Routinator on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Introducing JDR2020-11-19T16:45:00+01:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2020-11-19:/news/2020/Nov/19/introducing-jdr/<p>We've launched the first version of JDR, our hosted tool to check anything in
the RPKI. While not yet 100% feature complete, we think it already offers useful
insights to operators and implementors, and moreover, we would like their input
and ideas for further developments of JDR. In <a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/introducing-jdr/">this blogpost …</a></p><p>We've launched the first version of JDR, our hosted tool to check anything in
the RPKI. While not yet 100% feature complete, we think it already offers useful
insights to operators and implementors, and moreover, we would like their input
and ideas for further developments of JDR. In <a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/introducing-jdr/">this blogpost</a> we go into some of the mechanics
and goals of our tool, but for the impatient, have a go at
<a class="reference external" href="proxy.php?url=https://jdr.nlnetlabs.nl">https://jdr.nlnetlabs.nl</a>!</p>
SAD DNS and NLnet Labs DNS software2020-11-18T11:09:00+01:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2020-11-18:/news/2020/Nov/18/saddns/<p>During the recent ACM CCS conference 2020, researchers presented a clever new variant of DNS cache poisoning attack that they call "SAD DNS". This attack is yet more proof that DNS cache poisoning remains a threat, and all the more reason to invest in the only real protection against this …</p><p>During the recent ACM CCS conference 2020, researchers presented a clever new variant of DNS cache poisoning attack that they call "SAD DNS". This attack is yet more proof that DNS cache poisoning remains a threat, and all the more reason to invest in the only real protection against this type of attack: deploying DNSSEC.</p>
<p>In our blogpost, we explain what you need to know about SAD DNS, and what it means for NLnet Labs DNS software:</p>
<blockquote>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/sad-dns-side-channel-attack-and-unbound/">SAD DNS and NLnet Labs DNS software</a></li>
</ul>
</blockquote>
Krill 0.8.1 'The Gentle Art' Released2020-11-17T12:30:00+01:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2020-11-17:/news/2020/Nov/17/krill.0.8.1-released/<p>We are happy to introduce Krill 0.8.1 'The Gentle Art'. This release is less
restrictive when creating ROAs, while still providing enough guidance to
accurately reflect your routing intent.</p>
<p>Krill automatically downloads BGP announcement information from <a class="reference external" href="proxy.php?url=https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris">RIPE RIS</a>
and uses this to analyse the known BGP announcements for …</p><p>We are happy to introduce Krill 0.8.1 'The Gentle Art'. This release is less
restrictive when creating ROAs, while still providing enough guidance to
accurately reflect your routing intent.</p>
<p>Krill automatically downloads BGP announcement information from <a class="reference external" href="proxy.php?url=https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris">RIPE RIS</a>
and uses this to analyse the known BGP announcements for the address space on
your resource certificate(s). This allows Krill to show the RPKI validation
status of your announcements, warn about possible issues, and do some
suggestions on ROAs you may want to create or remove.</p>
<p>Krill 0.8.1 recognises the following 'States' in its analysis:</p>
<table class="docutils">
<thead>
<tr><th class="head">State</th>
<th class="head">Explanation</th>
</tr>
</thead>
<tbody>
<tr><td>NOT FOUND</td>
<td>This announcement is not covered by any of your ROAs</td>
</tr>
<tr><td>INVALID ASN</td>
<td>The prefix for this announcement is covered by one or more of your ROAs. However, none of those ROAs allow announcements of this prefix by this ASN.</td>
</tr>
<tr><td>INVALID LENGTH</td>
<td>The ASN for this announcement is covered by one or more of your ROAs. However, the prefix is more specific than allowed.</td>
</tr>
<tr><td>SEEN</td>
<td>This is a ROA you created which allows at least one known BGP announcement. Note it may also disallow one or more other announcements. You can show details if you click on the '>' icon.</td>
</tr>
<tr><td>TOO PERMISSIVE</td>
<td>This ROA uses the max length field to allow multiple announcements, but Krill does not see <em>all</em> most specific announcements in its BGP information.</td>
</tr>
<tr><td>REDUNDANT</td>
<td>This is a ROA you created which is included in full by at least one other ROA you created. I.e. you have a ROA for the same ASN, covering this prefix and including the maximum length.</td>
</tr>
<tr><td>NOT SEEN</td>
<td>This is a ROA you created but it does not cover any known announcements. This may be a ROA you created for a backup or planned announcement. On the other hand, this could also be a stale ROA in which case it is better to remove it.</td>
</tr>
<tr><td>DISALLOWING</td>
<td>This is a ROA for which no allowed announcements are seen, yet it <strong>disallows</strong> one or more announcements. If this is done on purpose it may be better to create a ROA for ASN 0 instead.</td>
</tr>
<tr><td>AS0</td>
<td>This is a ROA you created for a prefix with ASN 0. Since ASN 0 cannot occur in BGP such ROAs are effectively used to disallow announcements of prefixes on the global BGP table.</td>
</tr>
<tr><td>REDUNDANT (AS0)</td>
<td>An AS0 ROA is considered redundant in case you have at least one ROA covering the entire prefix for a real ASN. In such cases this ROA does not provide any further protection on top of that existing ROA.</td>
</tr>
</tbody>
</table>
<p>In addition to this we have included some small improvements for the Krill
Publication Server. To install Krill 0.8.1 you can use Cargo, the Rust package
manager, or use the packages for Debian and Ubuntu we provide on
<a class="reference external" href="proxy.php?url=https://packages.nlnetlabs.nl">https://packages.nlnetlabs.nl</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.8.1">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NLnet Labs becomes a CVE Numbering Authority (CNA)2020-10-28T18:00:00+01:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2020-10-28:/news/2020/Oct/28/nlnetlabs-becomes-cve-numbering-authority/<p>We are delighted to announce that NLnets Labs joins over 140 other leading
technology organisations authorised to be a Common Vulnerabilities and
Exposures (CVE) Numbering Authority (CNA).</p>
<p><a class="reference external" href="proxy.php?url=https://cve.mitre.org/about/index.html">Common Vulnerabilities and Exposures (CVE)</a>
is an international, cybersecurity, community effort that maintains a list of
standarised common identifiers for publicly disclosed cybersecurity …</p><p>We are delighted to announce that NLnets Labs joins over 140 other leading
technology organisations authorised to be a Common Vulnerabilities and
Exposures (CVE) Numbering Authority (CNA).</p>
<p><a class="reference external" href="proxy.php?url=https://cve.mitre.org/about/index.html">Common Vulnerabilities and Exposures (CVE)</a>
is an international, cybersecurity, community effort that maintains a list of
standarised common identifiers for publicly disclosed cybersecurity
vulnerabilities and exposures.
<a class="reference external" href="proxy.php?url=https://cve.mitre.org/cve/cna.html">CVE Numbering Authorities (CNAs)</a> are
organisations from around the world that are authorised to assign CVE numbers
to vulnerabilities affecting products within their distinct, agreed-upon scope,
for inclusion in first-time public announcements of new vulnerabilities.</p>
<p>We are joining this community effort to help address the CVE Program's
primary challenge to satisfy the demand for timely, accurate CVE number
assignments and the evolving state of vulnerability management.
By being a CNA we will be able to:</p>
<ul class="simple">
<li>Streamline vulnerability disclosure processes;</li>
<li>Assign CVE numbers without having to share embargoed information with another CNA;</li>
<li>Control the CVE publication release process for vulnerabilities in our scope (NLnet Labs products).</li>
</ul>
<p>You can read about our disclosure policy and how to contact us securely at our
<a class="reference external" href="proxy.php?url=/security-report/">security report page</a>. Security advisories for all the
products can be found <a class="reference external" href="proxy.php?url=/support/security-advisories/">here</a> or at each
product's own page.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://cve.mitre.org/news/archives/2020/news.html#October282020_NLnet_Labs_Added_as_CVE_Numbering_Authority_CNA">MITRE announcement</a></li>
</ul>
Krill 0.8.0 'The Art of ROA Maintenance' Released2020-10-28T13:30:00+01:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2020-10-28:/news/2020/Oct/28/krill.0.8.0-released/<p>We are happy to introduce Krill 0.8.0 'The Art of ROA Maintenance'. In this version we have added further refinements to the ROA management interface to give users the confidence that their authorisations accurately reflect their BGP announcements.</p>
<p>The first of these improvements are warnings about ROAs that …</p><p>We are happy to introduce Krill 0.8.0 'The Art of ROA Maintenance'. In this version we have added further refinements to the ROA management interface to give users the confidence that their authorisations accurately reflect their BGP announcements.</p>
<p>The first of these improvements are warnings about ROAs that are too permissive, meaning that they allow more announcements than what is seen in BGP. This encourages users to apply best operational practices. Secondly, Krill will not allow the creation of redundant ROAs, or ROAs that would make other ones redundant. Lastly, there is now support for AS0 ROAs, which are explicit statements that specify which prefixes should never be seen on the public Internet.</p>
<p>The backend has several improvements and refinements as well, such as allowing aggregation of ROAs to lower the number of objects, and improved reporting on communication with parents and repository. To make Krill more resilient, we have added recovery functionality in case data on disk is incomplete due to for example a full disk or failed system. In relation to this, we now ensure Krill stops in case data cannot be written to disk to prevent inconsistent states. Lastly, Krill does a full re-synchronisation with its parents and the repository on startup.</p>
<p>With this release we have also started to operate a Krill testbed service. The testbed offers both a parent CA and a repository. As such you can just run a Krill instance, on a laptop even, without the need to operate real infrastructure for testing.</p>
<p>It allows you to register any resources for your Child CA, allowing you to test with your real resources. Because this testbed uses its own TEST Trust Anchor — ROAs created here will not end up being used by production routers.</p>
<p>You can find the test service here:
<a class="reference external" href="proxy.php?url=https://testbed.rpki.nlnetlabs.nl/">https://testbed.rpki.nlnetlabs.nl/</a></p>
<p>To install Krill 0.8.0 you can use Cargo, the Rust package manager, or use the packages for Debian and Ubuntu we provide on <a class="reference external" href="proxy.php?url=https://packages.nlnetlabs.nl">https://packages.nlnetlabs.nl</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/testing----123-delegated-rpki/">"Testing .. 123 Delegated RPKI"</a>, blog post on the RPKI testbed service</li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.8.0">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.8.0 ‘Strikes and Gutters, Ups and Downs’ released2020-10-19T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2020-10-19:/news/2020/Oct/19/routinator-0.8.0-released/<p>We are happy to announce the latest release of Routinator, version
0.8.0 ‘Strikes and Gutters, Ups and Downs.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP …</p><p>We are happy to announce the latest release of Routinator, version
0.8.0 ‘Strikes and Gutters, Ups and Downs.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release brings major changes to the way Routinator validates the
objects published in the RPKI repository. It mostly follows the rules
proposed by <a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/doc/draft-ietf-sidrops-6486bis/">draft-ietf-sidrops-6486bis</a>
currently discussed in the SIDROPS working group of the IETF.</p>
<p>The most important change is that if any object published by a CA is found
to be invalid, the entire CA – including all its objects – is rejected.
This means that none of its ROAs are included nor are any of its child CAs
even being looked at. This avoids a possible situation where a legitimate
route is being marked as RPKI invalid because only a subset of the ROAs
covering its prefix were considered valid and used. This change resolves
CVE-2020-17366.</p>
<p>Even with this revised strategy such an invalidation of a valid route can,
however, still occur if the covering ROAs are spread over multiple CAs via
a parent of a rejected CA. In order to avoid these cases, this release
contains an experimental feature we dubbed ’filtering of unsafe VRPs.’ It
can be enabled via the <tt class="docutils literal"><span class="pre">--unsafe-vrps=reject</span></tt> option and will cause all
VRPs overlapping any address prefix delegated to a rejected CA to be
filtered out of the final VRP set.</p>
<p>This feature is disabled by default since we aren’t quite sure of the
potential impact of such a filter in practice. To gain some practical
insights, Routinator will log all the VRPs it would have filtered if the
feature were enabled.</p>
<p>The rules proposed by the draft also suggest to consider any stale
manifests and CRLs to be invalid. Routinator now follows this proposal by
changing the default for the <tt class="docutils literal"><span class="pre">--stale</span></tt> option to <tt class="docutils literal">reject</tt>.</p>
<p>There are, however, two diversions from the current form of the proposal.
For one, consensus has not been reached on the proposed strategy
to reject any object of an unknown type as this has consequences on
introducing new object types to the RPKI. Routinator will instead check that
unknown objects are published and have a hash digest corresponding to that
stated in the manifest and accept (and subsequently ignore) them if they
do.</p>
<p>The proposal also suggests to use previously valid data from a CA that is
rejected if such data is available and would still be valid. Unfortunately,
the current repository synchronization strategy implemented in Routinator
overwrites all previous data when fetching from upstream. This reuse will
be addressed in the next release.</p>
<p>In addition to these big changes, there are a number of small changes. You
can read about all of them in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.8.0">release notes</a>.</p>
<p>Finally, users of Debian and Ubuntu might be interested in our unofficial
package archive which now also contains packages for Routinator. See
<a class="reference external" href="proxy.php?url=https://packages.nlnetlabs.nl/">packages.nlnetlabs.nl</a> for more
information.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.3.3 released2020-10-08T09:00:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2020-10-08:/news/2020/Oct/08/nsd-4.3.3-released/<p>Today, we released version 4.3.3 of the authoritative DNS nameserver NSD.</p>
<p>This release contains the DNS Flag Day 2020 fixes. This sets the
default EDNS buffer size to 1232, that should reduce fragmentation.
<a class="reference external" href="proxy.php?url=https://dnsflagday.net/2020/">https://dnsflagday.net/2020/</a></p>
<p>There is a new feature where it is possible to list …</p><p>Today, we released version 4.3.3 of the authoritative DNS nameserver NSD.</p>
<p>This release contains the DNS Flag Day 2020 fixes. This sets the
default EDNS buffer size to 1232, that should reduce fragmentation.
<a class="reference external" href="proxy.php?url=https://dnsflagday.net/2020/">https://dnsflagday.net/2020/</a></p>
<p>There is a new feature where it is possible to list an interface by
name. This pulls in the IP addresses associated with the interface
at server start.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-3">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.3.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.12.0 released2020-10-08T09:00:00+02:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2020-10-08:/news/2020/Oct/08/unbound-1.12.0-released/<p>We are pleased to announce the release of version 1.12.0 of the Unbound
recursive DNS resolver.</p>
<p>This release contains the DNS Flag Day 2020 changes. This sets the default EDNS buffer size to 1232, that should reduce fragmentation.
<a class="reference external" href="proxy.php?url=https://dnsflagday.net/2020/">https://dnsflagday.net/2020/</a></p>
<p>There is inclusive language in the …</p><p>We are pleased to announce the release of version 1.12.0 of the Unbound
recursive DNS resolver.</p>
<p>This release contains the DNS Flag Day 2020 changes. This sets the default EDNS buffer size to 1232, that should reduce fragmentation.
<a class="reference external" href="proxy.php?url=https://dnsflagday.net/2020/">https://dnsflagday.net/2020/</a></p>
<p>There is inclusive language in the configuration. There is <cite>caps-exempt</cite>, <cite>ipsecmod-allow</cite> and <cite>primary</cite> server options for auth-zones. The older terms are accepted to keep configuration working.</p>
<p>DNS-over-HTTPS is supported in this release. The DoH is enabled when Unbound is compiled with the nghttp2 library, with <cite>configure --with-libnghttp2</cite>. Then have an interface on the https port, that can be configured with the <cite>https-port</cite> option. Also have a cert and key available with the <cite>tls-service-key</cite> and <cite>tls-service-pem</cite> options. Further settings can be configured for the <cite>http-endpoint</cite>, <cite>http-max-streams</cite>, <cite>http-query-buffer-size</cite>, <cite>http-response-buffer-size</cite> and <cite>http-nodelay</cite> options. The max streams sets the maximum concurrent streams, the buffer size options the number of bytes in buffers, and the nodelay option can turn on TCP_NODELAY for DNS-over-HTTPS service. In the statistics the memory used is reported in <cite>mem.http.query_buffer</cite> and <cite>mem.http.response_buffer</cite>. The number of queries is reported in <cite>num.query.https</cite>, they are also included in the tcp and tls counts because https uses TLS and TCP.</p>
<p>The DLV options and code to handle DLV lookups have been removed from the code base. The DLV repository is empty nowadays, it has been decommissioned.</p>
<p>There is a new feature where it is possible to use interface names to bind to the IP addresses on that interface. It pulls in the addresses at the start of the server, if the addresses change, use the existing freebind and other socket options to register for addresses before they appear, or the interface-automatic option that copies them from queries to answers with ancillary data.</p>
<p>There is a new option for the edns-tag draft specification. It can be enabled if you need the tentative implementation to add those tags to outgoing messages.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-12-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.12.0.tar.gz">Directly download the source package</a></li>
</ul>
Unbound 1.11.0 released2020-07-27T11:00:00+02:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2020-07-27:/news/2020/Jul/27/unbound-1.11.0-released/<p>We are pleased to announce the release of version 1.11.0 of the Unbound
recursive DNS resolver.</p>
<p>This release contains a number of bug fixes. Also new features are introduced. The configure --with-dynlibmodule enables dynamic library support that can have code modules function like the python library scripts. It …</p><p>We are pleased to announce the release of version 1.11.0 of the Unbound
recursive DNS resolver.</p>
<p>This release contains a number of bug fixes. Also new features are introduced. The configure --with-dynlibmodule enables dynamic library support that can have code modules function like the python library scripts. It allows to load multiple dynlib instances. The new <cite>include-toplevel: <file or wildcard></cite> configuration option allows to include a directory with config files where every config file does not modify the config section for the later files so that the include order is idempotent. This makes it much easier to drop files into a config snippet directory in etc and manage that set of config files, without for example one config file starting a stub section and creating parse errors in another config file with server options.</p>
<p>The <cite>rrset-roundrobin</cite> option is now default to yes. This is more in line with what users expect. The KSK-2010 has been removed from our default key set output. The option <cite>prefer-ip4</cite> can be used to prefer ip4 over ip6 when reputation for the ip6 netblock is shared with other users.</p>
<p>There is also a dnstap implementation inside Unbound. This removes the dependency on the libfstrm library. The protobuf library is still used.
The fstrm protocol code resides in <cite>dnstap/dnstap_fstrm.h</cite> and <cite>dnstap/dnstap_fstrm.c</cite>. This contains a brief definition of what unbound needs.</p>
<p>The <cite>make unbound-dnstap-socket</cite> builds a debug tool, unbound-dnstap-socket. It can listen, accept multiple DNSTAP streams and print information. Commandline options control it.</p>
<p>Unbound can reconnect if the unix domain socket file socket is closed. This uses exponential backoff after which it uses a one second timer to throttle cpu down. There is also support to use TCP and TLS for connecting to the log server. There are new config options to turn them on, in the <cite>dnstap</cite> section in the man page and example config file. <cite>dnstap-ip</cite> with IP address of server for TCP or TLS use. <cite>dnstap-tls</cite> to turn on TLS. And <cite>dnstap-tls-server-name</cite>, <cite>dnstap-tls-cert-bundle</cite>, <cite>dnstap-tls-client-key-file</cite> and <cite>dnstap-tls-client-cert-file</cite> to configure the certificates for server authentication and client authentication, or leave at <cite>""</cite> to not use that. With <cite>dnstap-bidirectional</cite> the frame streams can be set to bidirectional or unidirectional connection mode.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-11-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.11.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.3.2 released2020-07-14T14:00:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2020-07-14:/news/2020/Jul/14/nsd-4.3.2-released/<p>Today, we released version 4.3.2 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a number of bugs, and adds options to
set <cite>log-only-syslog</cite> and <cite>min-expire-time</cite> in nsd.conf and <cite>nsd -v</cite>
for configure line and library versions.</p>
<p>You can get source packages of this version from the …</p><p>Today, we released version 4.3.2 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a number of bugs, and adds options to
set <cite>log-only-syslog</cite> and <cite>min-expire-time</cite> in nsd.conf and <cite>nsd -v</cite>
for configure line and library versions.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-2">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.2.tar.gz">Direct Download</a></li>
</ul>
Krill 0.7.2 'Small Bites' Released2020-06-29T13:30:00+02:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2020-06-29:/news/2020/Jun/29/krill.0.7.2-released/<p>This release fixes an issue where <a class="reference external" href="proxy.php?url=http://www.ris.ripe.net/dumps/">BGP RIS Dump</a> files that were not properly retrieved would
cause a thread to choke. As this can lead to lock poisoning this type of event
could cause other Krill processes to stop functioning properly. All users of
Krill 0.7.0 and 0 …</p><p>This release fixes an issue where <a class="reference external" href="proxy.php?url=http://www.ris.ripe.net/dumps/">BGP RIS Dump</a> files that were not properly retrieved would
cause a thread to choke. As this can lead to lock poisoning this type of event
could cause other Krill processes to stop functioning properly. All users of
Krill 0.7.0 and 0.7.1 are advised to upgrade.</p>
<p>In addition to this bugfix, Krill now also speaks German.</p>
<div class="figure align-center">
<img alt="Krill user interface in German" src="proxy.php?url=https://nlnetlabs.nl/static/images/krill/krill-ui-german.png"/>
<p class="caption">Zertifizierungsstellen</p>
</div>
<p>You can read more about Krill's ROA management based on BGP announcements in our
<a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/krill-gains-powerful-roa-management-based-on-bgp-routing/">blog post</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.7.2">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Krill 0.7.1 'Sobremesa' Released2020-06-25T13:30:00+02:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2020-06-25:/news/2020/Jun/25/krill.0.7.0-released/<p>We are incredibly excited that six months after the first release of Krill it
already powers delegated RPKI for over 150 organisations. Today we are launching
Krill 0.7.1 'Sobremesa', the biggest update yet of our open source RPKI
Certificate Authority software. This version lets you create and maintain …</p><p>We are incredibly excited that six months after the first release of Krill it
already powers delegated RPKI for over 150 organisations. Today we are launching
Krill 0.7.1 'Sobremesa', the biggest update yet of our open source RPKI
Certificate Authority software. This version lets you create and maintain Route
Origin Authorisations (ROAs) based on your BGP announcements. This makes it
incredibly easy to manage ROAs.</p>
<p>Krill already lets you manage and publish ROAs seamlessly across multiple
Regional Internet Registries. Now Krill will also tell you what the effect is of
all ROAs that you created, indicating which announcements seen in BGP are
authorised and which ones are not, along with the reason. This ensures your ROAs
accurately reflect your intended routing at all times.</p>
<div class="figure align-center">
<img alt="Krill ROA Management" src="proxy.php?url=https://nlnetlabs.nl/static/images/krill/krill-roa-management.png"/>
<p class="caption">A concise overview of all your ROAs and BGP announcements with your address space</p>
</div>
<p>All status and validity information is clearly displayed in the user interface,
giving you an immediate insight into which ROAs and BGP announcements require
your attention. Announcements with an Invalid or NotFound state can be
authorised with just a few clicks and will be published immediately. Krill will
also inform you if there are any ROAs that don't seem to affect any
announcements at all, allowing for easy housekeeping.</p>
<p>In addition to all of this new functionality, we now also provide <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases">Krill
packages</a> for recent Debian and
Ubuntu releases and we added a Dutch translation for the UI.</p>
<p>Please ensure you follow the <a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/install-and-run.html#krill-upgrades">upgrade instructions</a>
to safely run the latest version. If you run the Krill 1-Click App through the
<a class="reference external" href="proxy.php?url=https://marketplace.digitalocean.com/apps/krill?refcode=cab39584666c">DigitalOcean Marketplace</a> or the
<a class="reference external" href="proxy.php?url=https://aws.amazon.com/marketplace/pp/B0886F8GNJ">AWS Marketplace</a> you can
simply run <tt class="docutils literal">krillmanager upgrade</tt> to install the latest release.</p>
<p>You can read more about these new features in our <a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/krill-gains-powerful-roa-management-based-on-bgp-routing/">blog
post</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/krill-gains-powerful-roa-management-based-on-bgp-routing/">Blog post</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.7.1 ‘Moonlight and Love Songs’ released2020-06-16T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2020-06-16:/news/2020/Jun/16/routinator-0.7.1-released/<p>We are happy to announce the latest release of Routinator, version
0.7.1 ’Moonlight and Love Songs.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>While …</p><p>We are happy to announce the latest release of Routinator, version
0.7.1 ’Moonlight and Love Songs.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>While this release is primarily a maintenance release, updating the versions
of the libraries used, it brings one interesting change: The TALs included
now contain HTTPS URIs for the trust anchor certificates of four of the five
RIRs.</p>
<p>Originally, the trust anchor certificates – like everything else in RPKI –
were downloaded using rsync. With RRDP now allowing to download RPKI data
using HTTPS and option was added in RFC 8630 allow downloading the trust
anchor certificates directly via HTTPS. Routinator is supported this since
version 0.6 and now all four RIRs that support RRDP have also published their
trust anchor certificate via HTTPS.</p>
<p>Consequently, we have updated the TALs that come with Routinator to include
the HTTPS URIs for these locations. Starting with the release, Routinator will
also prefer HTTPS URIs over rsync URIs unless the use of RRDP has been
disabled.</p>
<p>Since Routinator uses the TALs stored on disk, you will need to re-install the
set of TALs using the command <tt class="docutils literal">routinator init <span class="pre">-f</span></tt> in order for the new URIs
to become effective.</p>
<p>You can find the complete list of changes in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.7.1">release notes</a>
and more information on Routinator on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Researching a New NSD Database: Adaptive Radix Tree2020-06-11T10:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2020-06-11:/news/2020/Jun/11/adaptive-radix-nametree/<p>NLnet Labs' authoritative nameserver NSD currently supports two
different data structures for its main memory database: red-black
tree en radix tree. Both data structures have their strengths and
weaknesses, red-black tree implementation is more memory efficient
and the radix tree is more performant (faster). Jeroen Koekkoek
explores a new data …</p><p>NLnet Labs' authoritative nameserver NSD currently supports two
different data structures for its main memory database: red-black
tree en radix tree. Both data structures have their strengths and
weaknesses, red-black tree implementation is more memory efficient
and the radix tree is more performant (faster). Jeroen Koekkoek
explores a new data structure for NSD database, namely adaptive
radix tree. This data structure was proposed in 2013 and is designed
for modern computer systems for which it offers great performance
and space efficiency.</p>
<p>Jeroen has written a blog post where he introduces the adaptive
radix tree and details how the data structure can be used for a
nametree and what design decisions have been made to fit the nametree
on modern CPUs with SIMD instruction support.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/adapting-radix-trees/">Blog post</a></li>
</ul>
Unbound 1.10.1 released2020-05-19T10:00:00+02:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2020-05-19:/news/2020/May/19/unbound-1.10.1-released/<p>We are pleased to announce the release of version 1.10.1 of the Unbound
recursive DNS resolver.</p>
<p>This release fixes CVE-2020-12662 and CVE-2020-12663.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-10-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.10.1.tar.gz">Directly download the source package</a></li>
</ul>
Krill 0.6.0 'Go with the Flow' Released2020-05-18T13:30:00+02:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2020-05-18:/news/2020/May/18/krill.0.6.2-released/<p>A few days ago we released Krill 0.6.0 'Go with the Flow'. The most visible
change in this release is that the embedded user interface now includes French,
Greek and Spanish translations.</p>
<div class="figure align-center">
<img alt="It's all Greek to me!" src="proxy.php?url=https://nlnetlabs.nl/static/images/krill-greek.png"/>
<p class="caption">The Krill user interface in Greek</p>
</div>
<p>The vast majority of the work went into making Krill …</p><p>A few days ago we released Krill 0.6.0 'Go with the Flow'. The most visible
change in this release is that the embedded user interface now includes French,
Greek and Spanish translations.</p>
<div class="figure align-center">
<img alt="It's all Greek to me!" src="proxy.php?url=https://nlnetlabs.nl/static/images/krill-greek.png"/>
<p class="caption">The Krill user interface in Greek</p>
</div>
<p>The vast majority of the work went into making Krill use Rust's asynchronous
code. We migrated from actix-web to Hyper. Hyper is a fast, safe and fully
asynchronous web framework which has a lot of momentum behind it. This change
also meant that we needed to ensure that Krill itself uses safe asynchronous
code whenever it connects to a remote system, like a parent or repository, or
in case of the CLI the Krill API itself.</p>
<p>In addition to this we improved the history API to ensure that Krill will no
longer use an excessive amount of history in cases where a CA has a long
history. The API is still subject to change, and therefore we will only
document this in future. In the meantime however, the CLI may be used to show
the history of your CA.</p>
<p>Since releasing Krill 0.6.0 we discovered that a problem could arise as a result
of the Krill Repository Server deleting RRDP snapshot files as soon as a new
notification file is published. This leads to issues in case a cached
notification file is served to validators. As a result, we have also released
version 0.6.1 and 0.6.2 in quick succession to ensure that old snapshot files
are kept for 10 minutes.</p>
<p>Please ensure you follow the <a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/getting-started.html#upgrade">upgrade instructions</a> to
safely run the latest version. If you run the Krill 1-Click App through the
<a class="reference external" href="proxy.php?url=https://marketplace.digitalocean.com/apps/krill?refcode=cab39584666c">DigitalOcean Marketplace</a> or the
<a class="reference external" href="proxy.php?url=https://aws.amazon.com/marketplace/pp/B0886F8GNJ">AWS Marketplace</a> you can
simply run <tt class="docutils literal">krillmanager upgrade</tt> to install the latest release.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.6.0">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Krill available on the AWS Marketplace2020-05-11T10:00:00+02:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2020-05-11:/news/2020/May/11/krill-rpki-aws-marketplace-1-click-app/<p>We are excited to announce that Krill is available as a <a class="reference external" href="proxy.php?url=https://aws.amazon.com/marketplace/pp/B0886F8GNJ">1-Click App on the
AWS Marketplace</a>.</p>
<p>The Krill 1-Click App brings together all of the puzzle pieces needed to
administer and run an RPKI Certificate Authority and publication server in the
AWS cloud. It allows you to easily set …</p><p>We are excited to announce that Krill is available as a <a class="reference external" href="proxy.php?url=https://aws.amazon.com/marketplace/pp/B0886F8GNJ">1-Click App on the
AWS Marketplace</a>.</p>
<p>The Krill 1-Click App brings together all of the puzzle pieces needed to
administer and run an RPKI Certificate Authority and publication server in the
AWS cloud. It allows you to easily set up Delegated RPKI with one or more
Regional or National Internet Registries and seamlessly manage ROAs for all
address space as a single pool. You can choose to publish ROAs yourself
using the included NGINX and rsync servers, or publish with a third party.</p>
<p>The Krill 1-Click App builds on Docker and Gluster to scale from one of the
smallest virtual machines to a fleet of AWS EC2 instances behind an AWS Elastic
Load Balancer, adding availability and capacity for both RRDP and rsync clients,
or use Content Delivery Network edge caching of RRDP content.</p>
<p>You can also get insights by streaming metrics from the provided monitoring
endpoints to Prometheus and by using Fluentd outputs to send logs to targets
such as Amazon S3 or a log analysis provider of your choice. The included Krill
Manager setup wizard gets you up and running quickly using an optional,
automatically managed Let's Encrypt TLS certificate.</p>
<p>Watch the introduction video to the Krill 1-Click App on YouTube.</p>
<div style="position: relative; width: 100%; height: 0;
padding-bottom: 56.25%; margin-bottom: 20px;">
<iframe allow="accelerometer; autoplay; encrypted-media; gyroscope;
picture-in-picture" allowfullscreen="" frameborder="0" src="proxy.php?url=https://www.youtube.com/embed/ihbMTAy6vLQ" style="position: absolute; top: 0; left: 0; width: 100%; height:
100%;"></iframe>
</div><p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/krillmanager/index.html">Krill Manager Documentation</a></li>
</ul>
Routinator 0.7.0 ‘Your Time Starts … Now’ released2020-05-06T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2020-05-06:/news/2020/May/06/routinator-0.7.0-released/<p>We are happy to announce the latest release of Routinator, version
0.7.0 ’Your Time Starts … Now.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>The …</p><p>We are happy to announce the latest release of Routinator, version
0.7.0 ’Your Time Starts … Now.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>The most important changes in this release are internal. We’ve updated
the processing and server logic to the advances made in the Rust ecosystem
for easier parallel processing often called ’async/await.’ With this work
completed, we believe that there are no major hurdles left towards a stable
1.0 release of Routinator.</p>
<p>We have also tightened the rules for validation of RPKI objects based on
community feedback. Routinator now discards CRLs that are mentioned on
certificates and are present in the repository but fail to appear on their
manifests or don’t match their manifest hash. This results in these objects
being invalid.</p>
<p>An option was added to change how Routinator deals with stale CRLs and
manifests. Stale here means that they have been promised to be updated by
now but that hasn’t happened. Until now, Routinator logged a warning and
used them anyway. You can now select between rejecting, warning, and
quietly accepting these objects via the new <tt class="docutils literal"><span class="pre">--stale</span></tt> option.</p>
<p>Finally, there are a few additional niceties: Routinator now can produce
output for Bird and Bird 2 and all output formats are now available via the
HTTP server. We have also optimized memory consumption quite a bit.</p>
<p>You can find the complete list of changes in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.7.0">release notes</a>
and more information on Routinator on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.3.1 released2020-04-16T11:05:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2020-04-16:/news/2020/Apr/16/nsd-4.3.1-released/<p>Today, we released version 4.3.1 of the authoritative DNS nameserver NSD.</p>
<p>This release fixes a number of bugs, and fixes a bug for FreeBSD start.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-1">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.1.tar.gz">Direct Download</a></li>
</ul>
Krill available on the DigitalOcean Marketplace2020-04-14T10:00:00+02:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2020-04-14:/news/2020/Apr/14/krill-digitalocean-marketplace-1-click-app/<p>We are delighted to announce that Krill is now available as a 1-Click App on the
DigitalOcean Marketplace.</p>
<p>It was already easy to get started with Krill, our RPKI Certificate Authority
and publication server software, as you could install and run it from a clean
system with just seven commands …</p><p>We are delighted to announce that Krill is now available as a 1-Click App on the
DigitalOcean Marketplace.</p>
<p>It was already easy to get started with Krill, our RPKI Certificate Authority
and publication server software, as you could install and run it from a clean
system with just seven commands.</p>
<p>Now we're taking ease of use and powerful management to the next level. The
1-Click App on the DigitalOcean Marketplace doesn't just deploy Krill, but adds
NGINX, Rsyncd, Docker, Gluster, automated TLS configuration, Prometheus
monitoring, log streaming and clustering capabilities out-of-the-box. A $5 a
month DigitalOcean Droplet is fine for most workloads, but you can scale up in a
few simple steps.</p>
<p>These capabilities are made possible by Krill Manager, a tool for running Krill
as a highly available scalable service with integration points for monitoring
and log analysis. Krill Manager offers an automated setup wizard and is able to
upgrade itself, as well as the components that it manages such as Krill, NGINX
and Rsync.</p>
<p>Watch the introduction video to the Krill 1-Click App on YouTube. It walks
through deploying the package on a Droplet, automatically requesting a Let's
Encrypt certificate, setting up delegated RPKI under an RIR and publishing ROAs
on our own server in just 6 minutes, real-time.</p>
<div style="position: relative; width: 100%; height: 0;
padding-bottom: 56.25%; margin-bottom: 20px;">
<iframe allow="accelerometer; autoplay; encrypted-media; gyroscope;
picture-in-picture" allowfullscreen="" frameborder="0" src="proxy.php?url=https://www.youtube.com/embed/qunvH2t6rqU" style="position: absolute; top: 0; left: 0; width: 100%; height:
100%;"></iframe>
</div><p><a class="reference external" href="proxy.php?url=https://marketplace.digitalocean.com/apps/krill?action=deploy&refcode=cab39584666c&utm_source=nlnetlabs&utm_campaign=newspost">Try out the Krill 1-Click App by clicking this link</a>.
For first time users, the link contains a referral code which gives you $100
60-day credit.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/krillmanager/index.html">Krill Manager Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.3.0 released2020-03-17T11:05:00+01:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2020-03-17:/news/2020/Mar/17/nsd-4.3.0-released/<p>Today, we released version 4.3.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds CPU affinity. By pinning a server process to a
specific CPU, having a separate network card also for that CPU, and
an interface address also for that server process, the throughput is
increased. This …</p><p>Today, we released version 4.3.0 of the authoritative DNS nameserver NSD.</p>
<p>This release adds CPU affinity. By pinning a server process to a
specific CPU, having a separate network card also for that CPU, and
an interface address also for that server process, the throughput is
increased. This increases performance of the nameserver.</p>
<p>Sparse TSIG signing support is removed, to comply with the latest TSIG
standard update draft.</p>
<p>There is a feature to drop update queries, with opcode UPDATE,
with nsd.conf option <cite>drop-updates</cite>.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-3-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.3.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/tuning-nsd-for-even-better-performance/">"Tuning NSD for even better performance", a blog post by Jeroen Koekkoek</a></li>
</ul>
Krill 0.5.0 'Serve no Turf' Released2020-02-25T12:30:00+01:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2020-02-25:/news/2020/Feb/25/krill.0.5.0-released/<p>We are very excited about introducing Krill 0.5.0 'Serve No Turf'. This release
is a major step forward for the project, improving the installation, onboarding,
interoperability and usability of Krill.</p>
<p>The most prominent change you will notice is that Krill now offers a
multi-language user interface, allowing you …</p><p>We are very excited about introducing Krill 0.5.0 'Serve No Turf'. This release
is a major step forward for the project, improving the installation, onboarding,
interoperability and usability of Krill.</p>
<p>The most prominent change you will notice is that Krill now offers a
multi-language user interface, allowing you to set up a Certificate Authority,
perform the parent exchanges with one or more Regional and National Internet
Registries, configure a publication server and manage Route Origin
Authorisations (ROAs).</p>
<p>The UI is managed as a separate open source project, named Lagosta. It uses
Vue.js as Javascript framework and Element as UI framework. The first release,
Lagosta 0.1.0 'Fritto Misto', offers everything to get started with Krill. You
can expect the UI to evolve heavily over time, including ROA suggestions,
tagging and alerts. The user interface is compiled as static HTML and JS, which
is bundled in the Krill package. We're proud that this addition resulted in just
an 8MB increase of memory usage, making Krill still completely capable of
running on minimalist hardware such as a Raspberry Pi.</p>
<p>But the UI is not the only major change in version 0.5.0. The documentation
received an overhaul, clearly laying out every aspect of the software. Krill can
now be installed from a new Linux machine in just seven steps, greatly
simplifying the process. You can them immediately start using it using either
the UI, CLI or API. Lastly, Krill now also offers a Prometheus monitoring end
point.</p>
<p>Finally, we ironed out some interoperability issues with ARIN and APNIC,
ensuring Krill works reliably with all RIRs. We wish to thank Cynthia Revström
for the fantastic help she provided in ironing out some issues we found when
setting up Krill under ARIN.</p>
<p>You can find out more about the development and features in our blog post.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.5.0">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/evolving-krill/">Evolving Krill - A blog post about the latest features in Krill 0.5.0</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/lagosta">Lagosta Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.10.0 released2020-02-20T14:00:00+01:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2020-02-20:/news/2020/Feb/20/unbound-1.10.0-released/<p>We are pleased to announce the release of version 1.10.0 of the Unbound
recursive DNS resolver.</p>
<p>The 1.10.0 release has RPZ support and serve stale functionality
according to draft draft-ietf-dnsop-serve-stale-10. And a number of
other, smaller, features, and bug fixes.</p>
<p>The DNS Response Policy Zones (RPZ …</p><p>We are pleased to announce the release of version 1.10.0 of the Unbound
recursive DNS resolver.</p>
<p>The 1.10.0 release has RPZ support and serve stale functionality
according to draft draft-ietf-dnsop-serve-stale-10. And a number of
other, smaller, features, and bug fixes.</p>
<p>The DNS Response Policy Zones (RPZ) functionality makes it possible
to express DNS response policies in a DNS zone. These zones can
be loaded from file or transferred over DNS zone transfers or
HTTP. The RPZ functionality in Unbound is implemented as specified in
draft-vixie-dnsop-dns-rpz-00. Only the QNAME and Response IP Address
triggers are supported. The supported RPZ actions are: NXDOMAIN, NODATA,
PASSTHRU, DROP and Local Data.</p>
<p>Enabling the respip module using <cite>module-config</cite> is required to use
RPZ. Each RPZ zone can be configured using the <cite>rpz</cite> clause. RPZ clauses
are applied in order of configuration. Unbound can get the data from
zone transfer, a zonefile or https url, and more options are documented
in the man page. A minimal RPZ configuration that will transfer the
RPZ zone using AXFR and IXFR can look like:</p>
<div class="highlight"><pre><span></span><span class="nt">server</span><span class="p">:</span>
<span class="w"> </span><span class="nt">module-config</span><span class="p">:</span><span class="w"> </span><span class="s">"respip</span><span class="nv"> </span><span class="s">validator</span><span class="nv"> </span><span class="s">iterator"</span>
<span class="nt">rpz</span><span class="p">:</span>
<span class="w"> </span><span class="nt">name</span><span class="p">:</span><span class="w"> </span><span class="s">"rpz.example.com"</span><span class="w"> </span><span class="c1"># name of the policy zone</span>
<span class="w"> </span><span class="nt">master</span><span class="p">:</span><span class="w"> </span><span class="l l-Scalar l-Scalar-Plain">192.0.2.0</span><span class="w"> </span><span class="c1"># address of the name server to transfer from</span>
</pre></div>
<p>The serve-stale functionality as described in
draft-ietf-dnsop-serve-stale-10 is now supported in unbound.
This allows unbound to first try and resolve a domain name before
replying with expired data from cache. This differs from unbound's
initial serve-expired behavior which attempts to reply with expired
entries from cache without waiting for the actual resolution to finish.
Both behaviors are available and can be configured with the various
serve-expired-* configuration options. <cite>serve-expired-client-timeout</cite> is
the option that enables one or the other.</p>
<p>The DSA algorithms have been disabled by default, this is because of
RFC 8624.</p>
<p>There is a crash fix in the parse of text of type WKS, reported by
X41 D-Sec.</p>
<p>In addition, neg and key caches can be shared with multiple
libunbound contexts, a change that assists unwind. The
<cite>contrib/unbound_portable.service</cite> provides a systemd start file for a
portable setup. The <cite>configure --with-libbsd</cite> option allows the use
of the bsd compatibility library so that it can use the arc4random
from it. The stats in <cite>contrib/unbound_munin_</cite> have <cite>num.query.tls</cite> and
<cite>num.query.tls.resume</cite> added to them. For unbound-control the command
<cite>view_local_datas_remove</cite> is added that removes data from a view.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-10-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.10.0.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/response-policy-zones-in-unbound/">Blog post by Ralph Dolmans on Response Policy Zones in Unbound</a></li>
</ul>
NLnet Labs adopts a Code of Conduct2020-02-10T14:19:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2020-02-10:/news/2020/Feb/10/code-of-conduct/<p>We have adopted a <a class="reference external" href="proxy.php?url=/conduct/">code of conduct for NLnet Labs</a>. As of February 2020, this code of conduct applies to all our projects and our interactions with the community. To explain a little bit more about why we adopted a code of conduct, and how we went about the writing …</p><p>We have adopted a <a class="reference external" href="proxy.php?url=/conduct/">code of conduct for NLnet Labs</a>. As of February 2020, this code of conduct applies to all our projects and our interactions with the community. To explain a little bit more about why we adopted a code of conduct, and how we went about the writing process, we have published a <a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/on-adopting-a-code-of-conduct-for-nlnet-labs/">post on our blog</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/conduct/">NLnet Labs Code of Conduct</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/on-adopting-a-code-of-conduct-for-nlnet-labs/">Blogpost: On adopting a Code of Conduct for NLnet Labs</a></li>
</ul>
OpenDNSSEC 2.1.6 released2020-02-10T11:30:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2020-02-10:/news/2020/Feb/10/opendnssec-2.1.6-released/<p>The OpenDNSSEC 2.1.6 release fixes a number of issues with regard to the key
list that was displayed incorrectly (a regression error in 2.1.5) and
a small memomry leak in the enforcer (which can add up if you bang the
enforcer with a lot of commands …</p><p>The OpenDNSSEC 2.1.6 release fixes a number of issues with regard to the key
list that was displayed incorrectly (a regression error in 2.1.5) and
a small memomry leak in the enforcer (which can add up if you bang the
enforcer with a lot of commands). And also a serious signing error when
using Combined Signing Keys (CSKs); only relevant if you combine KSK and
ZSK in one. CSK users in particular now need this fix. Another nice
fix is a reconnect to a MySQL/MariaDB database for which you do not
have to adjust any database parameters.</p>
<p>The 2.1.6 release is available immediately from the download site.</p>
<p>Fixes</p>
<ul class="simple">
<li>OPENDNSSEC-913: verify database connection upon every use.</li>
<li>OPENDNSSEC-944: bad display of date of next transition (regression).</li>
<li>SUPPORT-250: missing signatures on using combined keys (CSK).</li>
<li>OPENDNSSEC-945: memory leak per command to enforcer.</li>
<li>OPENDNSSEC-946: unclean enforcer exit in case of certain config problems.</li>
<li>OPENDNSSEC-411: set-policy command to change policy of zone (experimental). Requires explicit enforce command to take effect.</li>
</ul>
<p>For OpenDNSSEC 2.1.6 download and additional information:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.opendnssec.org/2020/02/opendnssec-2-1-6/">OpenDNSSEC 2.1.6 release announcement</a></li>
</ul>
In Memory of Bill Manning2020-01-26T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2020-01-26:/news/2020/Jan/26/manning-unbound/<p>We have just learned from friends that Bill Manning died last
night. Bill was a member of the original Unbound design team in 2006,
and as such instrumental for the success of Unbound resolver.</p>
<p>From the doc/requirements.txt document that is distributed with the
Unbound source code:</p>
<blockquote>
The Unbound …</blockquote><p>We have just learned from friends that Bill Manning died last
night. Bill was a member of the original Unbound design team in 2006,
and as such instrumental for the success of Unbound resolver.</p>
<p>From the doc/requirements.txt document that is distributed with the
Unbound source code:</p>
<blockquote>
The Unbound resolver project started by Bill Manning, David Blacka, and
Matt Larson (from the University of California and from Verisign), that
created a Java based prototype resolver called Unbound. The basic
design decisions of clean modules was executed.</blockquote>
<p>See also the full <a class="reference external" href="proxy.php?url=https://nlnetlabs.nl/documentation/unbound/requirements/">requirements.txt</a>.</p>
<p>Rod Van Meter wrote a loving memory:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://rdvlivefromtokyo.blogspot.com/2020/01/bill-manning.html">rdv live from Tokyo — Billing Manning</a></li>
</ul>
Krill 0.4.2 'Finer Things' Released2020-01-06T16:00:00+01:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2020-01-06:/news/2020/Jan/06/krill.0.4.2-released/<p>We would like to kick off the new year with the launch of Krill 0.4.2 'Finer
Things'. This release fixes a bug and introduces usability improvements based on
the experiences users have had with running Krill since the production launch,
several weeks ago.</p>
<p>The bug we fixed revolves …</p><p>We would like to kick off the new year with the launch of Krill 0.4.2 'Finer
Things'. This release fixes a bug and introduces usability improvements based on
the experiences users have had with running Krill since the production launch,
several weeks ago.</p>
<p>The bug we fixed revolves around some adjacent resources being encoded
incorrectly. The fix has been thoroughly tested in production and now, with the
holidays behind us, we can make this available to everyone. We recommend every
user to upgrade.</p>
<p>Another thing we noted is that several users left the publication point of Krill
set to the default of <cite>localhost</cite>. This caused quite some cluttering up of
Relying Party software logs, looking for non-existent certificates and ROAs on
the local file system.</p>
<p>To prevent this, a new CA is now set up without a default repository and one
must be explicitly configured before a parent can be added to a CA. For most
users we recommend that a remote repository is used, e.g. one provided by their
RIR or NIR. Alternatively, you can choose to publish your RPKI objects yourself.</p>
<p>Lastly we have made a number of smaller usability improvements, error handling
and better defaults you can read about in detail in the release notes.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.4.2">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Krill 0.4.1 'Fogo de Krill' Released2019-12-13T15:00:00+01:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2019-12-13:/news/2019/Dec/13/krill.0.4.1-released/<p>We are happy to launch Krill 0.4.1 'Fogo de Krill'. This is a bug fix release
and we recommend everyone running Krill to update to this version.</p>
<p>Krill now powers the RPKI service that Brazilian National Internet Registry
NIC.br offers. During the production launch we uncovered a …</p><p>We are happy to launch Krill 0.4.1 'Fogo de Krill'. This is a bug fix release
and we recommend everyone running Krill to update to this version.</p>
<p>Krill now powers the RPKI service that Brazilian National Internet Registry
NIC.br offers. During the production launch we uncovered a corner case bug where
certain resource sets were handled incorrectly. This has now been resolved. In
addition, we added an additional safety measure to ensure that Krill does not
allow impossible maximum length values for ROAs.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.4.1">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.9.6 released2019-12-12T10:00:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2019-12-12:/news/2019/Dec/12/unbound-1.9.6-released/<p>We are pleased to announce the release of version 1.9.6 of the Unbound
recursive DNS resolver.</p>
<p>This release contains a number of security related fixes, contributed by
X41 D-Sec. They have conducted a security audit of Unbound, funded by
OSTIF. The previous CVEs fixed in 1.9.4 …</p><p>We are pleased to announce the release of version 1.9.6 of the Unbound
recursive DNS resolver.</p>
<p>This release contains a number of security related fixes, contributed by
X41 D-Sec. They have conducted a security audit of Unbound, funded by
OSTIF. The previous CVEs fixed in 1.9.4 and 1.9.5 were the most
important ones, less important fixes and side findings for more robust
code have been included in this release, alongside a normal number of
bug fixes.</p>
<p>The sort order for included config snippets is now ascending by name, it
previously was reversed due to an oversight. Most config snippets do
not depend on the order as they add a stub or forward zone or some
server: section config entries.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-9-6">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.9.6.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.x41-dsec.de/security/research/job/news/2019/12/11/unbound/">X41 D-Sec blog post</a></li>
<li><a class="reference external" href="proxy.php?url=https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/">OSTIF blog post</a></li>
</ul>
Mailing list migration2019-12-12T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2019-12-12:/news/2019/Dec/12/mailing-list-migration/<p>We are migrating our mailing lists over to <a class="reference external" href="proxy.php?url=https://mailmanlists.net">MailmanLists</a>.</p>
<!-- PELICAN_END_SUMMARY -->
<p>On December 16th 2019 all mailing lists will be migrated to MailmanLists. The
opportunity will also be used to move mailing lists to dedicated subdomains.</p>
<ul class="simple">
<li>nlnetlabs.nl lists will be moved to lists.nlnetlabs.nl</li>
<li>lists.opendnssec.org lists will remain …</li></ul><p>We are migrating our mailing lists over to <a class="reference external" href="proxy.php?url=https://mailmanlists.net">MailmanLists</a>.</p>
<!-- PELICAN_END_SUMMARY -->
<p>On December 16th 2019 all mailing lists will be migrated to MailmanLists. The
opportunity will also be used to move mailing lists to dedicated subdomains.</p>
<ul class="simple">
<li>nlnetlabs.nl lists will be moved to lists.nlnetlabs.nl</li>
<li>lists.opendnssec.org lists will remain at lists.opendnssec.org</li>
<li>getdnsapi.net lists will be moved to lists.getdnsapi.net</li>
</ul>
<p>Existing users will be automatically subscribed to the new lists and care is
taken to make the transition as smooth as possible. During the migration
though, mailing lists may be unreachable.</p>
<p>From December 16th 2019 please direct questions to the new lists and ensure
any filters you may have configured are updated to recognize the new address.</p>
NSD 4.2.4 released2019-12-10T13:43:00+01:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2019-12-10:/news/2019/Dec/10/nsd-4.2.4-released/<p>Today, we released version 4.2.4 of the authoritative DNS name server NSD.</p>
<p>This release mainly fixes regressions in the configuration file parser for
the <tt class="docutils literal"><span class="pre">minimal-responses:</span> yesno</tt>, <tt class="docutils literal"><span class="pre">round-robin:</span> yesno</tt> and
<tt class="docutils literal"><span class="pre">log-time-ascii:</span> yesno</tt> options. There are some portability fixes too,
<tt class="docutils literal">make distclean</tt> will now cleanup <tt class="docutils literal">config.h</tt> and a <tt class="docutils literal"><span class="pre">maintainer-clean …</span></tt></p><p>Today, we released version 4.2.4 of the authoritative DNS name server NSD.</p>
<p>This release mainly fixes regressions in the configuration file parser for
the <tt class="docutils literal"><span class="pre">minimal-responses:</span> yesno</tt>, <tt class="docutils literal"><span class="pre">round-robin:</span> yesno</tt> and
<tt class="docutils literal"><span class="pre">log-time-ascii:</span> yesno</tt> options. There are some portability fixes too,
<tt class="docutils literal">make distclean</tt> will now cleanup <tt class="docutils literal">config.h</tt> and a <tt class="docutils literal"><span class="pre">maintainer-clean</span></tt>
target has been added that will also remove the bison and flex output.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-2-4">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.2.4.tar.gz">Direct Download</a></li>
</ul>
Krill 0.4.0 'The Krill Factor' Released2019-12-03T12:00:00+01:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2019-12-03:/news/2019/Dec/03/krill.0.4.0-released/<p>We are incredibly proud to introduce Krill 0.4.0 'The Krill Factor'. This
release is the culmination of one and a half years of designing, building,
testing and documenting our RPKI Certificate Authority (CA) and Publication
Server solution.</p>
<div class="section" id="ready-for-production-use">
<h2>Ready for Production Use</h2>
<p>The first three releases of Krill were …</p></div><p>We are incredibly proud to introduce Krill 0.4.0 'The Krill Factor'. This
release is the culmination of one and a half years of designing, building,
testing and documenting our RPKI Certificate Authority (CA) and Publication
Server solution.</p>
<div class="section" id="ready-for-production-use">
<h2>Ready for Production Use</h2>
<p>The first three releases of Krill were meant to test the implementation. With
Krill 0.4.0 'The Krill Factor', we are confident that the software can be used
reliably with all five Regional Internet Registries (RIRs) and its Route Origin
Authorisations (ROAs) are correctly validated by all Relying Party software
implementations. As a result, NLnet Labs is now running Krill in production
under the RIPE NCC parent CA.</p>
<p>With Krill 0.4.0 'The Krill Factor', operators can now generate and publish RPKI
cryptographic material themselves to authorise their BGP announcements. It
supports running RPKI under all five RIRs simultaneously and transparently, so
if you have IP address space in multiple regions you can manage it as a single
pool. Krill can also delegate to child organisations or customers who, in turn,
run their own CA. The built-in publication server lets operators publish
certificates and ROAs from their own infrastructure. Alternatively, you can use
a third party which offers RPKI publication as a service. In short, all
essential functions to run RPKI yourself using Krill are now available.</p>
</div>
<div class="section" id="future-development">
<h2>Future Development</h2>
<p>Krill can be managed using a Command Line Interface (CLI), as well as an
Application Programming Interface (API). An optional web-based user interface is
currently being developed as a separate project, named Lagosta. With Krill 0.4.0
'The Krill Factor' data storage and the API are now stable, allowing for
seamless updates going forward. This release serves as a starting point for
further development throughout 2020 and beyond, where we will work on features
such as high availability and support for just-in-time authorisations integrated
tightly with internal routing management.</p>
</div>
<div class="section" id="commercial-support">
<h2>Commercial Support</h2>
<p>Starting with Krill 0.4.0 and Routinator 0.6.0 we are offering commercial
support for our RPKI software solutions, in case this is a requirement for your
organisation or if you want to support the future development of the software.
The service-level agreement (SLA) contract and security policy is on par with
our DNS software NSD and Unbound. End of support for the software will be
publicly announced two years in advance. Krill is licensed under the Mozilla
Public License 2.0. Routinator and all libraries that are built to support the
RPKI toolset are licensed under the BSD 3-Clause License.</p>
</div>
<div class="section" id="sustainable-open-source">
<h2>Sustainable Open Source</h2>
<p>Once again, we would like to extend our gratitude to NIC.br, the RIPE NCC
Community Projects Fund, the Dutch National Cyber Security Centre and the
Mozilla Open Source Support Fund for financially supporting the development of
Krill, as well as our Relying Party software package Routinator. In addition,
our thanks go out to DigitalOcean for offering their cloud infrastructure for
our automated test platform, Fastly for their CDN services, as well as Juniper,
Cisco and Nokia for providing us with virtual routers for testing. These
organisations make it possible for us to develop free, open source software in a
sustainable way. Please reach out to us if you want to join this effort.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.4.0">Release notes</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/support/">Commercial Support for RPKI Tools</a></li>
</ul>
</div>
Routinator 0.6.3 ‘That Escalated Fast’ released (Updated)2019-11-28T15:00:00+01:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2019-11-28:/news/2019/Nov/28/routinator-0.6.3-released/<p><em>Updated: This release contained a critical bug that caused Routinator to
completely hang on occasion. We have released</em>
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.6.4">Routinator 0.6.4 ‘Jeepers’</a>
<em>to fix this issue.</em></p>
<p>We are happy to announce the latest release of Routinator, version
0.6.3 ’That Escalated Fast.’</p>
<p>Routinator is an RPKI relying party …</p><p><em>Updated: This release contained a critical bug that caused Routinator to
completely hang on occasion. We have released</em>
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.6.4">Routinator 0.6.4 ‘Jeepers’</a>
<em>to fix this issue.</em></p>
<p>We are happy to announce the latest release of Routinator, version
0.6.3 ’That Escalated Fast.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release primarily fixes an issue where all RRDP requests would time out
in detached server mode, i.e., if server mode is invoked with the <tt class="docutils literal"><span class="pre">-d</span></tt>
option. Because Routinator only falls back to rsync if an RRDP fetch for
a given repository has never succeeded and otherwise uses the data previously
fetched (assuming that the RRDP failure was only of a temporary nature), this
caused the eventual loss of the RIPE and APNIC regions’ ROAs if Routinator
was ever run in a different way before.</p>
<p>But it is not all bleak news, there is a new feature, too. Veit Heller kindly
contributed code to make Routinator reload the TALs and restart validation in
server mode when signal USR1 is sent to it. This can be used both to notify
Routinator of a change in the set of TALs without having to tear down all RTR
sessions as well as kicking off a new validation run before the refresh time
has passed.</p>
<p>You can find the complete list of changes in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.6.3">release notes</a>
and more information on Routinator on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.6.2 ‘Distiller’s Edition’ released2019-11-20T15:00:00+01:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2019-11-20:/news/2019/Nov/20/routinator-0.6.2-released/<p>We are delighted to announce the latest release of Routinator, version
0.6.2 ’Distiller’s Edition.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>There aren …</p><p>We are delighted to announce the latest release of Routinator, version
0.6.2 ’Distiller’s Edition.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>There aren’t any new features in this release. Rather, it is a collection of
bug fixes and minor improvements that have been implemented over the last
weeks. You can read the detailed list of these in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.6.2">release notes.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.2.3 released2019-11-20T08:15:00+01:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2019-11-20:/news/2019/Nov/20/nsd-4.2.3-released/<p>Today, we released version 4.2.3 of the authoritative DNS name server NSD.</p>
<p>This release has log fixes, features of confine-to-zone and startup
management, an implementation changes in the configuration parser and
socket handling code simplifications. The implementation changes make
the parser context aware, which is useful for the …</p><p>Today, we released version 4.2.3 of the authoritative DNS name server NSD.</p>
<p>This release has log fixes, features of confine-to-zone and startup
management, an implementation changes in the configuration parser and
socket handling code simplifications. The implementation changes make
the parser context aware, which is useful for the syntax of (future)
config options. The socket handling code was rewritten to split it
apart in separately handleable routines.</p>
<p>The <tt class="docutils literal"><span class="pre">confine-to-zone:</span> yesno</tt> option from Greg Bock, if enabled stops NSD
from responding with data outside of the zone the query was aimed at.
Answers contain data that comes from one zone only.</p>
<p>The startup management patch for s6 and other service supervisors from
Cameron Nemo can be used to signal readiness notification to them, it is
in contrib. With that there is the new option that an empty pidfile
statement (<tt class="docutils literal">pidfile: ""</tt>) in nsd.conf can be used to run NSD without
having NSD create an nsd.pid file at startup.</p>
<p>There is fix for the sort order of included configuration files with the
<tt class="docutils literal">include:</tt> statement. Due to a programming oversight it was sorted, but
in reverse. Files are now included in the sorted order. Mostly, if
files contain configuration snippets of different zones, or config about
different features, the include order should not matter for them.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-2-3">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.2.3.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.9.5 released2019-11-19T10:00:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2019-11-19:/news/2019/Nov/19/unbound-1.9.5-released/<p>We are pleased to announce the release of version 1.9.5 of the Unbound
recursive DNS resolver.</p>
<p>This release is a fix for vulnerability CVE-2019-18934 that can cause shell
code execution after receiving a specially crafted answer. This issue can only
be triggered when <em>all</em> of the below conditions …</p><p>We are pleased to announce the release of version 1.9.5 of the Unbound
recursive DNS resolver.</p>
<p>This release is a fix for vulnerability CVE-2019-18934 that can cause shell
code execution after receiving a specially crafted answer. This issue can only
be triggered when <em>all</em> of the below conditions are met:</p>
<ul class="simple">
<li>unbound was compiled with <cite>--enable-ipsecmod</cite> support, and</li>
<li>ipsecmod is enabled and used in the configuration (either in the
configuration file or using <tt class="docutils literal"><span class="pre">unbound-control</span></tt>), and</li>
<li>a domain is part of the ipsecmod-whitelist (if ipsecmod-whitelist is
used), and</li>
<li>unbound receives an A/AAAA query for a domain that has an A/AAAA
record(s) <em>and</em> an IPSECKEY record(s) available.</li>
</ul>
<p>The shell code execution can then happen if either the qname or the
gateway field of the IPSECKEY (when gateway type == 3) contain a
specially crafted domain name.</p>
<p>We would like to thank X41 D-Sec for notifying us about this
vulnerability and OSTIF for sponsoring the Unbound security audit.</p>
<p>For a full list of changes and binary and source packages, see the
<a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-9-5">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.9.5.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.x41-dsec.de/security/research/job/news/2019/11/19/unbound/">X41 D-Sec blog post</a></li>
</ul>
Best Paper Award for DNSSEC Root Key Rollover Paper2019-11-08T09:00:00+01:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2019-11-08:/news/2019/Nov/08/imc2019-bestpaper/<p>A team of researchers including two NLnet Labs staff members has won the best paper award at the <a class="reference external" href="proxy.php?url=https://conferences.sigcomm.org/imc/2019">Internet Measurement Conference 2019</a>. Their paper, entitled <em>"Roll, Roll, Roll Your Root"</em> gives an in-depth analysis of the DNSSEC Root KSK Rollover that took place over 2017-2018. It shows that while the …</p><p>A team of researchers including two NLnet Labs staff members has won the best paper award at the <a class="reference external" href="proxy.php?url=https://conferences.sigcomm.org/imc/2019">Internet Measurement Conference 2019</a>. Their paper, entitled <em>"Roll, Roll, Roll Your Root"</em> gives an in-depth analysis of the DNSSEC Root KSK Rollover that took place over 2017-2018. It shows that while the rollover generally did not lead to problems for end users, under the hood, a number of issues occurred that led to worries in the DNS operations community. The paper identifies the causes of these issues, supporting the DNS community in improving implementations and procedures for future rollovers.</p>
<p>The IMC programme committee called the paper <em>"a particularly fine example of a well-executed, well-timed paper"</em> during the award ceremony.</p>
<p>The research team that worked on the paper is a showcase of a strong collaboration between academia and industry. With representatives from the University of Twente, SIDN Labs, NLnet Labs, USC/ISI, RIT and Verisign, the team covered the breadth of the DNS community.</p>
<div class="figure align-center">
<img alt="Representatives of the research team on stage at IMC" src="proxy.php?url=https://nlnetlabs.nl/static/images/IMC2019-0010.jpg"/>
<p class="caption">From left to right: Philippa Gill (TPC chair), Roland van Rijswijk-Deij (NLnet Labs / UTwente), Robert Beverly (TPC chair), Moritz Müller (SIDN Labs / UTwente), Duane Wessels (Verisign), Tijay Chung (RIT), Willem Toorop (NLnet Labs) -- photo credit: Mattijs Jonker (University of Twente)</p>
</div>
<div class="section" id="about-imc-2019">
<h2>About IMC 2019</h2>
<p>The Internet Measurement Conference (IMC) is an annual conference that aims to present top quality work in the area of Internet measurements. IMC 2019 was the 19th edition of the conference and took place October 21-23 in Amsterdam, The Netherlands. The conference was hosted by the University of Twente at the KIT Royal Tropical Institute. NLnet Labs' principal scientist Roland van Rijswijk-Deij was one of the general chairs of the conference, and NLnet Labs was bronze supporter of the conference.</p>
<p>Read more:</p>
<ul class="simple">
<li>Read the paper: <a class="reference external" href="proxy.php?url=https://dl.acm.org/authorize?N695076">Roll, Roll, Roll Your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover</a></li>
<li>View the <a class="reference external" href="proxy.php?url=https://vimeo.com/showcase/6531379/video/369120970#t=1852s">video registration of the presentation</a></li>
<li>Learn more about IMC 2019 on the <a class="reference external" href="proxy.php?url=https://conferences.sigcomm.org/imc/2019">conference website</a></li>
</ul>
</div>
Longitudinal RPKI study presented at IMC 20192019-11-08T08:30:00+01:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2019-11-08:/news/2019/Nov/08/imc2019-rpki/<p>Two NLnet Labs team members, Tim Bruijnzeels and Roland van Rijswijk-Deij, contributed to a longitudinal study of the RPKI ecosystem. The study, presented at the <a class="reference external" href="proxy.php?url=https://conferences.sigcomm.org/imc/2019">Internet Measurement Conference 2019</a>, analyses the development of RPKI since its inception in 2011. The study uses an open data set of all RPKI repositories …</p><p>Two NLnet Labs team members, Tim Bruijnzeels and Roland van Rijswijk-Deij, contributed to a longitudinal study of the RPKI ecosystem. The study, presented at the <a class="reference external" href="proxy.php?url=https://conferences.sigcomm.org/imc/2019">Internet Measurement Conference 2019</a>, analyses the development of RPKI since its inception in 2011. The study uses an open data set of all RPKI repositories collected and made available by RIPE. The most important conclusion from the study is that <em>"RPKI is ready for the big screen"</em> with a significant increase in data quality over the past two years.</p>
<p>The team that worked on this paper was a collaboration between academia and industry, with members from Rochester Institute of Technology, the University of Twente, NLnet Labs, Northeastern University, RIPE NCC, Max Planck Institut für Informatik, University of Maryland, Duke University, Akamai and Cloudflare.</p>
<div class="figure align-center">
<img alt="Tijay Chung presents the paper at IMC" src="proxy.php?url=https://nlnetlabs.nl/static/images/IMC2019-tijay.png"/>
<p class="caption">Tijay Chung (Rochester Institute of Technology) presents the paper at IMC 2019 -- photo credit: Roland van Rijswijk-Deij</p>
</div>
<div class="section" id="about-imc-2019">
<h2>About IMC 2019</h2>
<p>The Internet Measurement Conference (IMC) is an annual conference that aims to present top quality work in the area of Internet measurements. IMC 2019 was the 19th edition of the conference and took place October 21-23 in Amsterdam, The Netherlands. The conference was hosted by the University of Twente at the KIT Royal Tropical Institute. NLnet Labs' principal scientist Roland van Rijswijk-Deij was one of the general chairs of the conference, and NLnet Labs was bronze supporter of the conference.</p>
<p>Read more:</p>
<ul class="simple">
<li>Want to start deploying RPKI? Read more about the <a class="reference external" href="proxy.php?url=/projects/routing/about/">RPKI tools that NLnet Labs develops</a>.</li>
<li>Read the paper: <a class="reference external" href="proxy.php?url=https://dl.acm.org/authorize?N695009">RPKI is Coming of Age: A Longitudinal Study of RPKI Deployment and Invalid Route Origins</a></li>
<li>View the <a class="reference external" href="proxy.php?url=https://vimeo.com/showcase/6531379/video/369121888">video registration of the presentation</a></li>
<li>Learn more about IMC 2019 on the <a class="reference external" href="proxy.php?url=https://conferences.sigcomm.org/imc/2019">conference website</a></li>
</ul>
</div>
OpenDNSSEC 2.1.5 released2019-11-05T11:30:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2019-11-05:/news/2019/Nov/05/opendnssec-2.1.5-released/<p>The previous release fixed an important issue, but unfortunately left
in a memory leak, which this release fixes. This release of 2.1.5 fixes
the memory issue, along with some additional issues primarily relating
to minor migration reporting and configuration.</p>
<p>The 2.1.5 release is available immediately from …</p><p>The previous release fixed an important issue, but unfortunately left
in a memory leak, which this release fixes. This release of 2.1.5 fixes
the memory issue, along with some additional issues primarily relating
to minor migration reporting and configuration.</p>
<p>The 2.1.5 release is available immediately from the download
site. Installations still on the 1.4 release should really upgrade to
this version as it has been tested enough by major players.</p>
<p>Fixes</p>
<ul class="simple">
<li>SUPPORT-245: Resolve memory leak in signer introduced in 2.1.4.</li>
<li>SUPPORT-244: Don’t require Host and Port to be specified in conf.xml
when migrating with a MySQL-based enforcer database backend.</li>
<li>Allow for MySQL database to pre-exist when performing a migration,
and be a bit more verbose during migration.</li>
<li>Fix AllowExtraction tag in configuration file definition.</li>
<li>SUPPORT-242: Skip over EDNS cookie option.</li>
<li>SUPPORT-240: Prevent exit of enforcer daemon upon interrupted
interaction with CLI commands (when having > 1000 zones and aborting
a pipe).</li>
<li>Correct some error messages.</li>
</ul>
<p>For OpenDNSSEC 2.1.5 download and additional information:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.opendnssec.org/2019/11/opendnssec-2-1-5/">OpenDNSSEC 2.1.5 release announcement</a></li>
</ul>
Krill 0.2.0 'Interkrillactic, Planetary' released2019-10-21T11:00:00+02:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2019-10-21:/news/2019/Oct/21/krill.0.2.0-released/<p>We are incredibly happy to introduce Krill version 0.2.0 'Interkrillactic, Planetary'.
Krill is software that allows organisations to run Delegated RPKI under one
or more Regional Internet Registries, i.e. ARIN, APNIC, LACNIC, AFRINIC and RIPE
NCC, offering centralised and automated management of route authorisations.</p>
<p>If you are …</p><p>We are incredibly happy to introduce Krill version 0.2.0 'Interkrillactic, Planetary'.
Krill is software that allows organisations to run Delegated RPKI under one
or more Regional Internet Registries, i.e. ARIN, APNIC, LACNIC, AFRINIC and RIPE
NCC, offering centralised and automated management of route authorisations.</p>
<p>If you are wondering why you didn't see an announcement of version 0.1.0
'A View to a Krill', it's because this release was for us to test the basic
moving parts. This has resulted in a number of changes that are now available
for you to try out and give us feedback on. In the coming weeks, we intend to do
a series of releases to iron out the bugs and stabilise the functionality.</p>
<p>Version 0.2.0 'Interkrillactic, Planetary' was tested thoroughly under the RIPE
NCC, APNIC and LACNIC parent Certificate Authorities, meaning we can successfully
set up the system with a certificate containing our IP address ranges and
Autonomous System Numbers. Testing with ARIN is currently ongoing, with AFRINIC
planned afterwards.</p>
<p>Using the certificate we are now able to generate Route Origin Authorisations (ROAs)
which correctly validate using almost all <a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/tools.html#relying-party-software">Relying Party software packages</a>, including
OctoRPKI, Routinator, FORT Validator, OpenBSD's rpki-client, rcynic and RIPE NCC
RPKI Validator 2.x.</p>
<p>Despite our best efforts, RIPE NCC RPKI Validator 3.1 is currently the only
software which doesn't seem to like our manifests. We will continue to investigate
this issue together with the RIPE NCC and hopefully resolve it in the next release.</p>
<p>In addition to the interoperability testing, we also gave the Command Line Interface
(CLI) a big overhaul, making it easier to use especially for users who manage one
CA only. You can now use environment variables to set defaults for the Krill instance
to connect to and which CA you want to operate on. Lastly, we added the <tt class="docutils literal"><span class="pre">--api</span></tt>
argument which will simply print out the API call that the CLI would have made,
without executing it. We plan to add proper (OpenAPI) documentation for the API,
but for the moment this can help to explore it.</p>
<p>You can read about all the changes in the complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill/releases/tag/v0.2.0">release notes</a>
as well as the <a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">updated documentation</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/krill">Krill Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/krill/index.html">Krill section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.9.4 released2019-10-03T11:30:00+02:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2019-10-03:/news/2019/Oct/03/unbound-1.9.4-released/<p>We are pleased to announce the release of version 1.9.4 of the Unbound recursive DNS resolver.</p>
<p>This release is a fix for vulnerability CVE-2019-16866 that causes a failure when a specially crafted query is received.</p>
<p>We would like to thank X41 D-Sec for notifying us about this
vulnerability …</p><p>We are pleased to announce the release of version 1.9.4 of the Unbound recursive DNS resolver.</p>
<p>This release is a fix for vulnerability CVE-2019-16866 that causes a failure when a specially crafted query is received.</p>
<p>We would like to thank X41 D-Sec for notifying us about this
vulnerability and OSTIF for sponsoring the Unbound security audit.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-9-4">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.9.4.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.x41-dsec.de/security/research/job/news/2019/11/19/unbound/">X41 D-Sec blog post</a></li>
</ul>
NLnet Labs Annual Report 20182019-09-11T14:00:00+02:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2019-09-11:/news/2019/Sep/11/nlnet-labs-annual-report-2018/<p>2018 was a great year for NLnet Labs. Our long running open source projects got
a great number of improvements, we hired new staff members, started a major new
project in the area of inter-domain routing and we increased our focus on research.</p>
<p>We are incredibly proud to be able …</p><p>2018 was a great year for NLnet Labs. Our long running open source projects got
a great number of improvements, we hired new staff members, started a major new
project in the area of inter-domain routing and we increased our focus on research.</p>
<p>We are incredibly proud to be able to all of this work with the support
we receive from the industry and community. You can read all about it in our
Annual Report, which has also received a fresh coat of paint.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/annualreports/annualreport2018.pdf">Annual Report 2018 (PDF)</a></li>
</ul>
Routinator 0.6.0 ‘Pink Sombrero’ released2019-09-10T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2019-09-10:/news/2019/Sep/10/routinator-0.6.0-released/<p>We are jubilant to announce the latest release of Routinator, version
0.6.0 ’Pink Sombrero.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release adds …</p><p>We are jubilant to announce the latest release of Routinator, version
0.6.0 ’Pink Sombrero.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release adds support for the RPKI Repository Delta Protocol (RRDP),
an alternative method of fetching RPKI data that uses
HTTPS instead of rsync. RRDP will speed up synchronisation for frequently
updated repositories, for instance when Routinator is running in server mode.
For the RRDP implementation, most of the internal logic of Routinator
has been rewired. We used this opportunity for extensive refactoring and
cleanup of the code base.</p>
<p>One user visible consequence is that the listeners for RTR and HTTP are now
started immediately instead of waiting until after the first validation run.
They still will report an error message until then, but at least you won’t
have to wonder whether something went wrong anymore.</p>
<p>There have been a few more changes. You can read all about them in the
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.6.0">release notes.</a>
More information on the Routinator can be found on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Unbound 1.9.3 released2019-08-27T10:00:00+02:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2019-08-27:/news/2019/Aug/27/unbound-1.9.3-released/<p>We are pleased to announce the release of version 1.9.3 of the Unbound recursive DNS resolver.</p>
<p>This release has a number of bug fixes. Added is the ipset module, that
helps add ip-addresses that are looked up in a domain to a firewall
ip-address filter. Also, the python …</p><p>We are pleased to announce the release of version 1.9.3 of the Unbound recursive DNS resolver.</p>
<p>This release has a number of bug fixes. Added is the ipset module, that
helps add ip-addresses that are looked up in a domain to a firewall
ip-address filter. Also, the python module has restart next, per-query
data and multiple instance support. The unbound <tt class="docutils literal"><span class="pre">-V</span></tt> option has been
added and it prints the build config.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-9-3">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.9.3.tar.gz">Directly download the source package</a></li>
</ul>
Measuring the Impact of DNS Flag Day2019-08-19T16:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2019-08-19:/news/2019/Aug/19/dns-flag-day-impact/<p>DNS Flag Day was the result of a collaborative effort and agreement of DNS
implementers and DNS resolver operators to commit to no longer providing
workarounds for non-standards-compliant authoritative nameservers as of
1 February 2019.</p>
<p>In the lead up to DNS Flag Day, and as part of the outreach, the …</p><p>DNS Flag Day was the result of a collaborative effort and agreement of DNS
implementers and DNS resolver operators to commit to no longer providing
workarounds for non-standards-compliant authoritative nameservers as of
1 February 2019.</p>
<p>In the lead up to DNS Flag Day, and as part of the outreach, the focus
for measurements has been the authoritative nameservers that needed to
be fixed. In this post, we will take the other perspective and look at
resolvers and resolver implementations — what was resolver behaviour
on the Internet before DNS Flag Day, and how does the uptake of dropping
workarounds disseminate in the wild?</p>
<p>Read the full blog post:</p>
<blockquote>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/measuring-the-impact-of-dns-flag-day/">Measuring the Impact of DNS Flag Day</a></li>
</ul>
</blockquote>
NSD 4.2.2 released2019-08-19T11:15:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2019-08-19:/news/2019/Aug/19/nsd-4.2.2-released/<p>Today, we released version 4.2.2 of the authoritative DNS name server NSD.</p>
<p>This release fixes a number of, smaller, bugs. Several failures are
fixed in the zone file parser, reported by fuzzing from Frederic Cambus.</p>
<p>NSD now warns when a zonefile is parsed with SSHFP records in it …</p><p>Today, we released version 4.2.2 of the authoritative DNS name server NSD.</p>
<p>This release fixes a number of, smaller, bugs. Several failures are
fixed in the zone file parser, reported by fuzzing from Frederic Cambus.</p>
<p>NSD now warns when a zonefile is parsed with SSHFP records in it with
wrong lengths. The record itself is still managed normally, eg. does
not cause the zone to stop loading. They are output into log, but the
warnings are easily visible from the commandline using <tt class="docutils literal"><span class="pre">nsd-checkzone</span></tt>.</p>
<p>The release also fixes a segfault on exit, that originated from a fix
in 4.2.1.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-2-2">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.2.2.tar.gz">Direct Download</a></li>
</ul>
Progressing OpenDNSSEC2019-07-30T16:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2019-07-30:/news/2019/Jul/30/progressing-opendnssec/<p>Since the release of OpenDNSSEC 2 we’ve made incremental updates leading
to the most recent 2.1.4 release. These updates all have been geared
towards ironing out issues and contained only minor improvements. The
frequency of updates has been modest, mostly because because of good news:
we have …</p><p>Since the release of OpenDNSSEC 2 we’ve made incremental updates leading
to the most recent 2.1.4 release. These updates all have been geared
towards ironing out issues and contained only minor improvements. The
frequency of updates has been modest, mostly because because of good news:
we have not seen many bugs that need urgent fixing.</p>
<p>Read more about the details of recent developments in OpenDNSSEC 2.2
and the roadmap with new features in the full blog post:</p>
<blockquote>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://medium.com/nlnetlabs/progressing-opendnssec-a2366a30bb36">Progressing OpenDNSSEC</a></li>
</ul>
</blockquote>
ldns 1.7.1 released2019-07-26T00:00:00+02:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2019-07-26:/news/2019/Jul/26/ldns-1.7.1-released/<p>Besides many bugfixes, this release also has a few new features:</p>
<ul class="simple">
<li>Support for DNSSEC algorithms ED25519 and ED448 when compiled with OpenSSL 1.1.1</li>
<li>An -I option to ldns-notify to specify a source IP address to send to notify from.</li>
<li>Complete OpenSSL engine support with ldns-signzone contributed by Vadim …</li></ul><p>Besides many bugfixes, this release also has a few new features:</p>
<ul class="simple">
<li>Support for DNSSEC algorithms ED25519 and ED448 when compiled with OpenSSL 1.1.1</li>
<li>An -I option to ldns-notify to specify a source IP address to send to notify from.</li>
<li>Complete OpenSSL engine support with ldns-signzone contributed by Vadim Penzin</li>
</ul>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.7.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://raw.githubusercontent.com/NLnetLabs/ldns/release-1.7.1/Changelog">Changes</a></li>
</ul>
Routinator 0.5.0 ‘Why Not Try a Holiday in Sweden This Year?’ released2019-07-18T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2019-07-18:/news/2019/Jul/18/routinator-0.5.0-released/<p>We are rather thrilled to announce the latest release of Routinator,
version 0.5.0 ‘Why Not Try a Holiday in Sweden This Year?’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them …</p><p>We are rather thrilled to announce the latest release of Routinator,
version 0.5.0 ‘Why Not Try a Holiday in Sweden This Year?’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release adds actual RPKI origin validation to Routinator itself.
An address prefix and AS number can now be checked for its RPKI status
on the command line via the new <tt class="docutils literal">validate</tt> command or via the HTTP server.
The latter is done provided in a way compatible with the
<a class="reference external" href="proxy.php?url=https://www.ripe.net/support/documentation/developer-documentation/rpki-validator-api">API provided by the RIPE NCC RPKI Validator</a>.</p>
<p>The release also includes some breaking changes to the Prometheus metrics.
Back when we introduced those, we chose names for the metrics that didn’t
start with a prefix allowing to identify them as being from Routinator.
This is now corrected and all metrics start with <tt class="docutils literal">routinator_</tt>.
While at it, we added new metrics for the rsync commands being run by
Routinator, showing both their exit status codes and how long they took.</p>
<p>In addition, there has been quite a few internal plumbing changes. One more
visible change is that Routinator will now delete the data for rsync modules
that aren’t referenced anymore, keeping the local repository clean and small.</p>
<p>You can read about all the changes in the complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.5.0">release notes.</a>
More information on the Routinator can be found on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.2.1 released2019-07-09T10:00:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2019-07-09:/news/2019/Jul/09/nsd-4.2.1-released/<p>Today, we released version 4.2.1 of the authoritative DNS name server NSD.</p>
<p>This release fixes issues in the stream handling, from 4.2.0, but also
earlier, in the event handling of streams.</p>
<p>The new statistics counters for TLS can give information about how many
incoming DNS over …</p><p>Today, we released version 4.2.1 of the authoritative DNS name server NSD.</p>
<p>This release fixes issues in the stream handling, from 4.2.0, but also
earlier, in the event handling of streams.</p>
<p>The new statistics counters for TLS can give information about how many
incoming DNS over TLS connections for queries have been received.</p>
<p>There are two new options to set the buffer sizes for the network
sockets, this allows an increase for servers that want a bigger size
than the default, which is already an increase over the system default.
Increased buffer size for a network socket helps with traffic spikes.
The options are <tt class="docutils literal"><span class="pre">send-buffer-size</span></tt> and <tt class="docutils literal"><span class="pre">receive-buffer-size</span></tt>, they set their
respective socket options for buffer space.</p>
<p>When an AXFR download is in progress, to a client, and the zone is
updated at that same time, then NSD no longer resets the connection, but
allows that transfer to complete.</p>
<p>The <tt class="docutils literal"><span class="pre">tcp-reject-overflow</span></tt> option can be used to close all connections that
are incoming when the server is full on TCP connections, this stops
those connections from waiting for a spot.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-2-1">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.2.1.tar.gz">Direct Download</a></li>
</ul>
Hackathon @ Africa Internet Summit 20192019-07-04T13:40:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2019-07-04:/news/2019/Jul/04/hackathon-africa-internet-summit-2019/<p>The ISOC African regional bureau has been organizing hackathons at the
last three editions of the Africa Internet Summit in the same spirit as
those of the IETF (hack to support Open Standards development). These
hackathons also have the additional purpose to involve the Africa region
better and more in …</p><p>The ISOC African regional bureau has been organizing hackathons at the
last three editions of the Africa Internet Summit in the same spirit as
those of the IETF (hack to support Open Standards development). These
hackathons also have the additional purpose to involve the Africa region
better and more in work done at the IETF.</p>
<p>I personally (Willem Toorop) love participating in those IETF
hackathons. I really enjoy the combination of collaboration and the
no-nonsense getting your hands dirty ambiance found thereat. I also
love to tell, teach and preach about my passions (i.e. DNS, End-Entity
privacy and security etc.), so I was just thrilled that I was given the
opportunity by ISOC Africa to lead one of the hackathon tracks during
the Africa Internet Summit (AIS) this year.</p>
<p>Read the full blog post:</p>
<blockquote>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/hackathon-africa-internet-summit-2019/">Hackathon @ Africa Internet Summit 2019</a></li>
</ul>
</blockquote>
Unbound 1.9.2 released2019-06-17T11:00:00+02:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2019-06-17:/news/2019/Jun/17/unbound-1.9.2-released/<p>We are pleased to announce the release of version 1.9.2 of the Unbound recursive DNS resolver.</p>
<p>This release contains a number of bug fixes for crashes introduced in
1.9, session ticket code, stream pipeline code, auth zone code and it
also fixes qname minimisation packet scrub failures …</p><p>We are pleased to announce the release of version 1.9.2 of the Unbound recursive DNS resolver.</p>
<p>This release contains a number of bug fixes for crashes introduced in
1.9, session ticket code, stream pipeline code, auth zone code and it
also fixes qname minimisation packet scrub failures.</p>
<p>There is a new python module example. This is an example of a module
that is loaded into unbound that changes DNS messages, and how Unbound
processes them. The example resolves records in multicast DNS, with Avahi.</p>
<p>AXFR over TLS is supported. This uses TLS to connect to the master and
download the AXFR or IXFR. Enable by loading certificates (just like
for other DNS over TLS), and syntax like <tt class="docutils literal">master: "ip#authname"</tt> in
unbound.conf for the auth-zone where you want to use this.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-9-2">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.9.2.tar.gz">Directly download the source package</a></li>
</ul>
DNSSEC Key Management Tools Research Project Awarded2019-06-12T13:40:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2019-06-12:/news/2019/Jun/12/ngi0-pet-dnssectools/<p>NLnet Labs has recently been awarded a grant from the European Commission's NGI0 PET
funding to invest in improving how operators of high-stakes domains (such as top-level
domains) manage their sensitive key material for DNSSEC signing. The outcome of the
project, open source tools and processes for secure key management …</p><p>NLnet Labs has recently been awarded a grant from the European Commission's NGI0 PET
funding to invest in improving how operators of high-stakes domains (such as top-level
domains) manage their sensitive key material for DNSSEC signing. The outcome of the
project, open source tools and processes for secure key management, will enable
operators to strengthen the trust in DNSSEC. This is especially important with the
increasing use of DNSSEC and DANE to secure, e.g., e-mail transport. The project
will run from June 1st until the end of 2019.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/research/projects/">Research Projects at NLnet Labs</a></li>
</ul>
NSD 4.2.0 released2019-06-11T14:20:00+02:002026-03-04T07:35:16.826919+01:00NLnet Labstag:nlnetlabs.nl,2019-06-11:/news/2019/Jun/11/nsd-4.2.0-released/<p>Today, we released version 4.2.0 of the authoritative DNS name server NSD.</p>
<p>This release contains new features, contributed from Sinodun, that
implement TCP fast open support and also support for service on DNS over
TLS.</p>
<p>There is also TLS OCSP stapling support with the <tt class="docutils literal"><span class="pre">tls-service-ocsp</span></tt> option
in nsd …</p><p>Today, we released version 4.2.0 of the authoritative DNS name server NSD.</p>
<p>This release contains new features, contributed from Sinodun, that
implement TCP fast open support and also support for service on DNS over
TLS.</p>
<p>There is also TLS OCSP stapling support with the <tt class="docutils literal"><span class="pre">tls-service-ocsp</span></tt> option
in nsd.conf.</p>
<p>The new option <tt class="docutils literal"><span class="pre">hide-identity</span></tt> can be used in nsd.conf to stop NSD from
responding with the hostname for probe queries that elicit the chaos
class response, this is conform RFC4892.</p>
<p>There is a bug fix for memory leaks during zone file read, with
duplicate records in the zone file.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-2-0">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.2.0.tar.gz">Direct Download</a></li>
</ul>
Routinator 0.4.0 ‘The Bumpy Road to Love’ released2019-06-03T15:00:00+02:002026-03-04T07:35:16.833919+01:00NLnet Labstag:nlnetlabs.nl,2019-06-03:/news/2019/Jun/03/routinator-0.4.0-released/<p>We are euphoric to announce the latest release of Routinator, version 0.4.0
‘The Bumpy Road to Love.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow …</p><p>We are euphoric to announce the latest release of Routinator, version 0.4.0
‘The Bumpy Road to Love.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and makes them available to the
BGP workflow.</p>
<p>This release fundamentally changes the command line options for
running the server and introduces a new way to initialize the local RPKI
repository used by Routinator. If you have been using previous releases,
you will likely have to adjust your tooling. We apologize for this, but
we also feel that the new commands are more intuitive and logical.</p>
<div class="section" id="server-mode">
<h2>Server Mode</h2>
<p>The command for running the server (previously <tt class="docutils literal">rtrd</tt>) is now called
<tt class="docutils literal">server</tt>. It will not detach from the terminal anymore unless
explicitly instructed via the <tt class="docutils literal"><span class="pre">-d</span></tt> option.</p>
<p>When we added HTTP support, we intended it to be for monitoring only.
But it turned out that using HTTP is very useful for integrating Routinator
into existing work flows, so we now make HTTP a first class protocol. Since
this means that users may want to use the server mode without RTR,
Routinator will not listen on any ports by default any more. Instead, you
will have to explicitly choose the protocols, addresses, and ports to listen
on. The options for listening are now more intuitive, too: <tt class="docutils literal"><span class="pre">--rtr</span></tt> for RTR
and <tt class="docutils literal"><span class="pre">--http</span></tt> for HTTP.</p>
</div>
<div class="section" id="initialization">
<h2>Initialization</h2>
<p>Previously, Routinator automatically installed the TALs if the TAL
directory wasn’t present and then stopped because of the missing ARIN TAL.
This made it difficult to automatically install TALs in deployments.</p>
<p>This release replaces the automatic mechanism with a manual procedure that
is invoked by the new <tt class="docutils literal">init</tt> command.</p>
<p>In addition, we have received permission by ARIN to include their TAL. If
you agree with the ARIN Relying Party Agreement, you can now instruct
Routinator to install all TALs without having to download anything.</p>
</div>
<div class="section" id="filtering-of-vrps">
<h2>Filtering of VRPs</h2>
<p>To make up for all these breaking changes, we added filtering of VRPs in
output both via the <tt class="docutils literal">vrps</tt> command and in the HTTP output. Command line
options or HTTP query fields allow limiting the output to those VRPs that
cover a set of address prefixes or are related to a set of ASNs.</p>
<p>As ever, you can read about all the changes in the complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/releases/tag/v0.4.0">release notes</a>
as well as the <a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">updated documentation.</a>
More information on the Routinator can be found on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github.</a></p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://rpki.readthedocs.io/en/latest/routinator/index.html">Routinator section of the RPKI Documentation</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
</div>
NSD and Unbound repositories moving to GitHub on 1 May 20192019-04-19T09:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2019-04-19:/news/2019/Apr/19/nsd-and-unbound-repositories-moving-to-github-on-1-may-2019/<p>We are excited to announce that on the 1st of May 2019, we will migrate the NSD and Unbound repositories to git and use GitHub for maintaining them. We are also going to use the GitHub infrastructure to manage tasks and community contributions, collect user feedback and allow you to …</p><p>We are excited to announce that on the 1st of May 2019, we will migrate the NSD and Unbound repositories to git and use GitHub for maintaining them. We are also going to use the GitHub infrastructure to manage tasks and community contributions, collect user feedback and allow you to report software bugs.</p>
<p>This means that on 1 May 2019, the following will happen for the NSD and Unbound projects:</p>
<ul class="simple">
<li>Our SVN repositories will be made unavailable by replacing the contents of the SVN trunk with a single document pointing to GitHub</li>
<li>Bugzilla, our bug-tracking system, will be switched to read-only</li>
<li>We will accept contributions via a pull request on GitHub</li>
<li>Feature requests and bug reports should be submitted via GitHub issues</li>
</ul>
<p>This change is part of an ongoing effort to unify the experience for our community. Over the next weeks and months, all projects that NLnet Labs manages will be migrated. We are convinced that GitHub offers the best platform to cater to the needs of both our community and our developers.</p>
<p>If you would like to get a head start, you can already start using GitHub for the NSD and Unbound projects today.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/unbound">Unbound Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/nsd">NSD Github repository</a></li>
</ul>
"A First Look at QNAME Minimization" paper wins Best Dataset Award at PAM20192019-03-29T15:19:00+01:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2019-03-29:/news/2019/Mar/29/pam2019-best-dataset-award/<p>Three NLnet Lab rats - Ralph Dolmans, Roland van Rijswijk-Deij and Willem Toorop - worked together with Wouter de Vries (University of Twente), Moritz Müller (SIDN Labs) and Quirin Scheitle (TUM) on the paper <a class="reference external" href="proxy.php?url=/downloads/publications/devries2019.pdf">A First Look at QNAME Minimization in the
Domain Name System</a>.
The paper was awarded the "Best Dataset …</p><p>Three NLnet Lab rats - Ralph Dolmans, Roland van Rijswijk-Deij and Willem Toorop - worked together with Wouter de Vries (University of Twente), Moritz Müller (SIDN Labs) and Quirin Scheitle (TUM) on the paper <a class="reference external" href="proxy.php?url=/downloads/publications/devries2019.pdf">A First Look at QNAME Minimization in the
Domain Name System</a>.
The paper was awarded the "Best Dataset Award" at <a class="reference external" href="proxy.php?url=http://pam2019.niclabs.cl/">PAM2019</a>.</p>
<img alt="Increasing QNAME Minimization support with DNSThought" class="align-center" src="proxy.php?url=https://nlnetlabs.nl/static/images/qnamemin.svg"/>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://labs.ripe.net/Members/wouter_de_vries/make-dns-a-bit-more-private-with-qname-minimisation">Blogpost: Making the DNS More Private with QNAME Minimisation</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.sidnlabs.nl/a/weblog/de-privacy-van-het-dns-verhogen-met-qname-minimisation">Blogpost: De privacy van het DNS verhogen met QNAME minimisation</a></li>
</ul>
Routinator 0.3.2 ‘Bitter and Twisted’ released2019-03-27T12:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2019-03-27:/news/2019/Mar/27/rpki-routinator-0.3.2-released/<p>We are disheartened to announce yet another bugfix release of the Routinator,
version 0.3.2 ‘Bitter and Twisted.‘</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
curious …</p><p>We are disheartened to announce yet another bugfix release of the Routinator,
version 0.3.2 ‘Bitter and Twisted.‘</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
curious researchers alike.</p>
<p>When we moved reading of the TALs to be done only at the start in the last
release, we accidentally made all error messages related to them invisible.
This resulted in Routinator quietly terminating if the TALs were broken.</p>
<p>Additionally, Github user matsm got stung by our RPSL output not being
quite correct. Now IPv6 prefixes are properly provided via a <tt class="docutils literal">route6:</tt>
statement and all lines have Unix-style endings.</p>
<p>You can read about all the changes in this and previous releases in the
complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/blob/v0.3.2/Changelog.md">Changelog</a>.
More information on the Routinator can be found on
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
NSD 4.1.27 released2019-03-25T13:40:00+01:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2019-03-25:/news/2019/Mar/25/nsd-4.1.27-released/<p>Today, we released version 4.1.27 of the authoritative DNS name server NSD.</p>
<p>This release contains improved <tt class="docutils literal"><span class="pre">deny-any</span></tt> responses, and on-the-fly
changes for tsig keys via <tt class="docutils literal"><span class="pre">nsd-control</span></tt>. There is a number of bug fixes
as well.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-27">downloads page</a>.</p>
<p>Related …</p><p>Today, we released version 4.1.27 of the authoritative DNS name server NSD.</p>
<p>This release contains improved <tt class="docutils literal"><span class="pre">deny-any</span></tt> responses, and on-the-fly
changes for tsig keys via <tt class="docutils literal"><span class="pre">nsd-control</span></tt>. There is a number of bug fixes
as well.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-27">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.27.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.9.1 released2019-03-11T10:00:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2019-03-11:/news/2019/Mar/11/unbound-1.9.1-released/<p>We are pleased to announce the release of version 1.9.1 of the Unbound recursive DNS resolver.</p>
<p>This release contains bug fixes for two issues in the out of order
processing introduced in 1.9.0, one where the wrong answer was returned
and a crash bug in file …</p><p>We are pleased to announce the release of version 1.9.1 of the Unbound recursive DNS resolver.</p>
<p>This release contains bug fixes for two issues in the out of order
processing introduced in 1.9.0, one where the wrong answer was returned
and a crash bug in file descriptor handling.</p>
<p>There are fixes for compile on Windows with pythonmod support. You need
to compile the source for that with the option enabled. Start with, eg.
compile on windows itself (with gcc or clang), or crosscompile with
mingw64-configure as the start of the compile run and enable the
pythonmod configure option.</p>
<p>There is also a fix for qname minimisation, that could have skipped a
label-fetch-step when it should not have. This was caused by certain
recursion situations and the subsequent qname minimisation continuation.
Qname minimisation in Unbound is designed to sometimes add several
labels at a time, instead of just adding one label at a time and
performing lookups until the full qname is reached, because certain
names are very long, especially in the IPv6 reverse space. Unbound
performs short steps near the top, in root and TLDs, but then makes
longer label add steps when the name is very long, near the left side of
the qname. This is to keep the lookup latency short.</p>
<p>A new type of local-zone is added, <tt class="docutils literal">inform_redirect</tt>, this acts like both
type inform and type redirect are both used. The answer is logged and
the content of the answer is like type redirect.</p>
<p>For 0x20 capsforid, a canonical sort is used to compare faulty replies.
This removes some cases where the fallback could not figure out the
reply is genuine in several retries.</p>
<p>To make ratelimiting easier, the ratelimit logs print the query name
that triggered the ratelimit message. Not all query names are
supposedly the same, but the query name of the query that made the
ratelimit exceed is printed, and this gives (a single name of) insight
into the nature of the traffic employed. Also the IP-address of the
sender of the query that triggered the upstream ratelimit is printed.
If a recursion exceeds ratelimit, it does not print the IP-address of
the query ultimately responsible for the recursive lookup.</p>
<p>Unbound has ratelimiting for both the clients (the downstream side) and
for traffic sent by unbound to the wider internet (the upstream side).
The ip-ratelimit options limit traffic in packets per client IP. The
ratelimit options limit traffic towards a domain name. The new logging
prints extra information with the log messages for both of them, so that
an inkling of information on some of that traffic is visible straight away.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-9-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.9.1.tar.gz">Directly download the source package</a></li>
</ul>
Routinator 0.3.1 ‘More Intensity’ released2019-03-06T15:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2019-03-06:/news/2019/Mar/06/rpki-routinator-0.3.1-released/<p>We are enthused to announce the latest release of the Routinator,
version 0.3.1 ‘More Intensity.‘</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
curious researchers alike …</p><p>We are enthused to announce the latest release of the Routinator,
version 0.3.1 ‘More Intensity.‘</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
curious researchers alike.</p>
<p>This release ties up some loose ends before some big improvements planned
for the next version. Most importantly, we added a timeout to rsync runs
after a hanging rsync got the entire Routinator RTR daemon stuck. Trust
anchor locators are now only read once when Routinator starts. While this
will make Routinator more robust against accidental file system changes, you
will need now need to restart it if you changed the TALs on purpose.</p>
<p>We fixed a bug where a missing <tt class="docutils literal"><span class="pre">tcp-listen</span></tt> option in the config file would
make Routinator crash in rtrd mode – it will now use the default listen
address 127.0.0.1:3323 as expected.</p>
<p>Finally, we added some more details to the Prometheus metrics introduced in
the last version. These are now given per trust anchor and include not only
the number of VRPs but also of ROAs.</p>
<p>You can read about all the changes in this release in the complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/blob/v0.3.1/Changelog.md">Changelog</a>.
You can find more information on the Routinator
on <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI Tools</a></li>
</ul>
Routinator 0.3.0 ’It’s More Fun at the Zoo’ released2019-02-14T16:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2019-02-14:/news/2019/Feb/14/rpki-routinator-0.3.0-released/<p>We are elated to announce the latest release of the Routinator,
version 0.3.0 ’It’s More Fun at the Zoo’.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to …</p><p>We are elated to announce the latest release of the Routinator,
version 0.3.0 ’It’s More Fun at the Zoo’.</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
curious researchers alike.</p>
<p>This release implements
<a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/rfc8360">RFC 8360</a> which proposes an
alternative mode for dealing with overclaimed resources in certificates. It
promises to make it easier to deal with resources being transfered
away from a holder.</p>
<p>We have also added an HTTP service to <em>rtrd</em> mode. It is intended primarily
for monitoring – it already supports the metrics endpoint for Prometheus –,
but it also allows you to fetch the list of VRPs via your browser. We will
add more extensive monitoring metrics in future releases.</p>
<p>Finally, we fixed a bug where some serial numbers in RTR were all wrong.</p>
<p>You can read about all the changes in this release in the complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/blob/v0.3.0/Changelog.md">Changelog</a>.
You can find more information on the Routinator
on <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI projects</a></li>
</ul>
Unbound 1.9.0 released2019-02-05T10:00:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2019-02-05:/news/2019/Feb/05/unbound-1.9.0-released/<p>We are pleased to announce the release of version 1.9.0 of the Unbound recursive DNS resolver.</p>
<p>This release contains the DNS Flag Day changes for Unbound. See the
reference here, <a class="reference external" href="proxy.php?url=https://dnsflagday.net/">https://dnsflagday.net/</a> . Or this presentation:
<a class="reference external" href="proxy.php?url=https://indico.dns-oarc.net/event/29/contributions/662/attachments/634/1063/EDNS_Flag_Day_-_OARC29.pdf">EDNS Flag Day - OARC29.pdf</a> . The EDNS timeouts are not used to …</p><p>We are pleased to announce the release of version 1.9.0 of the Unbound recursive DNS resolver.</p>
<p>This release contains the DNS Flag Day changes for Unbound. See the
reference here, <a class="reference external" href="proxy.php?url=https://dnsflagday.net/">https://dnsflagday.net/</a> . Or this presentation:
<a class="reference external" href="proxy.php?url=https://indico.dns-oarc.net/event/29/contributions/662/attachments/634/1063/EDNS_Flag_Day_-_OARC29.pdf">EDNS Flag Day - OARC29.pdf</a> . The EDNS timeouts are not used to fallback to nonEDNS queries.</p>
<p>Out of order processing is implemented, for TCP and TLS. It can be
configured with a maximum amount of memory to use to store pending
answers, and the current memory usage is in the statistics output. This
is with <tt class="docutils literal"><span class="pre">stream-wait-size</span></tt> in unbound.conf and <tt class="docutils literal">mem.streamwait</tt> in
unbound-control stats output. Streams that cause the total memory
counted to exceed the maximum are dropped, but it is possible to get a
number of responses with little memory used.</p>
<p>There is also TLS session resumption support, that can be enabled with
the <tt class="docutils literal"><span class="pre">tls-session-ticket-keys</span></tt> option. Together with the already existing
TCP fast open, enabled with <tt class="docutils literal"><span class="pre">--enable-tfo-server</span></tt> <tt class="docutils literal"><span class="pre">--enable-tfo-client</span></tt>,
that enables zero RTT stream reconnections to the server. Make sure to
also increase <tt class="docutils literal"><span class="pre">incoming-num-tcp</span></tt> if you expect a lot of TCP and TLS users.</p>
<p>Options are added to set the TLS ciphers and TLS ciphersuites from
unbound.conf. This can be done with the <tt class="docutils literal"><span class="pre">tls-chiphers</span></tt> and
<tt class="docutils literal"><span class="pre">tls-ciphersuites</span></tt> options.</p>
<p>TLS can be used from libunbound, with the <tt class="docutils literal">ub_ctx_set_tls</tt> config call,
use that together with <tt class="docutils literal">ub_ctx_set_fwd</tt> to select DNS over TLS transport.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-9-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.9.0.tar.gz">Directly download the source package</a></li>
</ul>
Mozilla Open Source Support programme awards grant for the Routinator2019-01-07T10:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2019-01-07:/news/2019/Jan/07/mozilla-open-source-support-moss-programme-awards-grant-for-rpki-routinator/<p>We are incredibly excited to announce that the Mozilla Open Source Support (MOSS) programme has awarded a grant for the development of the Routinator, NLnet Labs’ RPKI Relying Party software that helps make Internet routing more secure.</p>
<p>The MOSS awards programme supports open source projects that contribute to Mozilla’s …</p><p>We are incredibly excited to announce that the Mozilla Open Source Support (MOSS) programme has awarded a grant for the development of the Routinator, NLnet Labs’ RPKI Relying Party software that helps make Internet routing more secure.</p>
<p>The MOSS awards programme supports open source projects that contribute to Mozilla’s work and the health of the Internet. Specifically for the MOSS Mission Partners track, Mozilla looks for projects that are closely aligned with its own mission.</p>
<p>We are also very grateful to the Amsterdam Internet Exchange (AMS-IX), who endorsed us during the application process. AMS-IX was one of the world’s first Internet Exchanges to offer RPKI-based filtering on their route server platform.</p>
<p>With the MOSS award, we will be able to develop the Routinator into a lean, stable and feature-rich RPKI relying party package. Over the course of 2019, we will be providing packages for major Operating Systems, integration with alerting and monitoring services, configuration management, a web-based user interface, a RESTful API and much more.</p>
<p>We also want to take this opportunity to thank Mozilla for their pivotal role in supporting the Rust programming language. The RPKI toolset, which includes the Routinator, is the first major project that we are building exclusively in Rust. At its core Rust is a systems language that combines C level performance with modern high level elements, such as a strong type system, error handling, and concurrency. Besides all this the Rust build system and dependency management system are superb.</p>
<p>Mozilla is the fourth organisation to join in funding the development of our RPKI toolset. This kind of community support is incredibly valuable to a non-profit foundation like ours. It enables us to commit long term resources to the project and build it to the standards that you have come to expect from NLnet Labs.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/routing/routinator/">Routinator project page</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.mozilla.org/en-US/moss/">Mozilla Open Source Support (MOSS) Programme</a></li>
<li><a class="reference external" href="proxy.php?url=https://ams-ix.net/technical/specifications-descriptions/ams-ix-route-servers/falcon-class-route-servers">AMS-IX Falcon class Route Servers</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.rust-lang.org">Rust programming language</a></li>
</ul>
Routinator 0.2.1 ‘Rated R’ released2019-01-04T12:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2019-01-04:/news/2019/Jan/04/rpki-routinator-0.2.1-released/<p>We are stoked to announce the first release of Routinator in 2019,
version 0.2.1 ‘Rated R.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
concerned Internet …</p><p>We are stoked to announce the first release of Routinator in 2019,
version 0.2.1 ‘Rated R.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
concerned Internet citizens.</p>
<p>This release primarily fixes two bugs introduced with the configuration
file support in 0.2.0. For one, Routinator failed to build on 32-bit
systems. Secondly, the code and documentation disagreed on the name of
the default configuration file. After checking back with users, we
settled on <cite>$HOME/.routinator.conf</cite>.</p>
<p>However, since that didn’t seem enough to warrant a release in itself, we
decided to try and make Routinator work on Windows as a bonus. Because of
Rust’s built-in support for Windows, this turned out easier than expected.
You still need to get <cite>rsync</cite>, though, in particular the one coming with
Cygwin.</p>
<p>You can read about all the changes in this release in the complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/blob/master/Changelog.md">Changelog</a>.
You can find more information on the Routinator
on <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI projects</a></li>
</ul>
Dutch National Cyber Security Centre joins in funding NLnet Labs' RPKI toolset development2018-12-18T09:00:00+01:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2018-12-18:/news/2018/Dec/18/dutch-national-cyber-security-centre-ncsc-funds-rpki-toolset-development/<p>The National Cyber Security Centre (NCSC) of the Netherlands has pledged to participate in funding the development of the RPKI toolset by NLnet Labs.</p>
<p>The NCSC is the central information hub and centre of expertise for cyber security in the Netherlands. The NCSC's mission is to contribute to enhancing the …</p><p>The National Cyber Security Centre (NCSC) of the Netherlands has pledged to participate in funding the development of the RPKI toolset by NLnet Labs.</p>
<p>The NCSC is the central information hub and centre of expertise for cyber security in the Netherlands. The NCSC's mission is to contribute to enhancing the resilience of Dutch society in the digital domain, and thus to create a secure, open and stable information society.</p>
<p>We are proud that the NCSC is supporting our efforts to make Internet routing more resilient and secure. The mitigation of Border Gateway Protocol (BGP) hijacking is paramount to ensuring the availability of networks, as well as preventing data redirection and interception.</p>
<p>The NCSC is the third organisation to invest in this project, following Brazilian registry NIC.br and the RIPE NCC Community Projects Fund. With their support, we are able to invest the resources needed to develop, test and release a high quality toolset, comparable to our other projects such as NSD and Unbound.</p>
<p>With community support like this, our non-profit foundation is able to continue and strengthen its long-term mission to invest in research and development, Internet architecture and governance, as well as stability and security in the area of DNS and inter-domain routing.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">RPKI project page</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.ncsc.nl/english">Dutch National Cyber Security Centre website</a></li>
</ul>
Routinator 0.2.0 ‘Instant Gezellig’ released2018-12-12T15:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2018-12-12:/news/2018/Dec/12/rpki-routinator-0.2.0-released/<p>We are exhilarated to announce the latest release of the Routinator,
version 0.2.0 ‘Instant Gezellig.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
curious researchers alike …</p><p>We are exhilarated to announce the latest release of the Routinator,
version 0.2.0 ‘Instant Gezellig.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers and
curious researchers alike.</p>
<p>This release both cleans up the initial release and prepares for new
features to come. Most importantly, we decided to change command line
handling and switched to the ever popular model of requesting actions
via sub-commands. You can now request a list of the validated ROA payload
(aka VRP) via the <tt class="docutils literal">vrps</tt> command and start the RTR server via <tt class="docutils literal">rtrd</tt>.</p>
<p>Instead of repeating options over and over again, you can now put them into
a config file. You can either explicitly pick a file via the <tt class="docutils literal"><span class="pre">-c</span></tt> option
or keep <tt class="docutils literal">.routinator.conf</tt> in your home directory. The config file can
contain all global options and the additional options for the RTR server.
It is a TOML file. A complete example is available in
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/blob/master/etc/routinator.toml">the source repository.</a></p>
<p>Another change is that we adjusted the output formats for the <tt class="docutils literal">vrps</tt>
command to be even closer to those used by the RIPE NCC Validator by adding
trust anchor information. On top of that, Job Snijders contributed a new
output that makes it easier to use Routinator with
<a class="reference external" href="proxy.php?url=http://www.openbgpd.org/">OpenBGPD</a>.</p>
<p>Finally, deployment is now ever so much easier thanks to the Dockerfile
contributed by David Monosov. If you are using Docker, you can now get
Routinator from the Docker Hub simply by:</p>
<pre class="literal-block">
docker pull nlnetlabs/routinator
</pre>
<p>If you have Routinator installed from <em>cargo.io</em>, you can upgrade to the
latest release via:</p>
<pre class="literal-block">
cargo install --force routinator
</pre>
<p>You can read about all the changes in this release in the complete
<a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator/blob/master/Changelog.md">Changelog</a>.
You can find more information on the Routinator
on <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI projects</a></li>
</ul>
Unbound 1.8.3 released2018-12-11T11:42:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2018-12-11:/news/2018/Dec/11/unbound-1.8.3-released/<p>We are pleased to announce the release of version 1.8.3 of the Unbound recursive DNS resolver.</p>
<p>This release fixes crash bug introduced in 1.8.2 in the dns64 processing.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-8-3">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound …</a></li></ul><p>We are pleased to announce the release of version 1.8.3 of the Unbound recursive DNS resolver.</p>
<p>This release fixes crash bug introduced in 1.8.2 in the dns64 processing.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-8-3">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.8.3.tar.gz">Directly download the source package</a></li>
</ul>
OpenINTEL wins Research Data NL Prize2018-12-04T15:19:00+01:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2018-12-04:/news/2018/Dec/04/openintel-rdnl-prize/<p>The <a class="reference external" href="proxy.php?url=https://openintel.nl/">OpenINTEL</a> project that NLnet Labs <a class="reference external" href="proxy.php?url=/news/2018/Nov/12/nlnetlabs-joins-openintel/">recently joined</a> has been <a class="reference external" href="proxy.php?url=https://researchdata.nl/en/news-and-agenda/news/news-item/?tx_news_pi1%5Bnews%5D=179&tx_news_pi1%5Bcontroller%5D=News&tx_news_pi1%5Baction%5D=detail&cHash=e7d6f56ddc225ba2bab41b000d0bb1d2">awarded the Research Data NL Prize</a>. OpenINTEL received the prize for making groundbreaking data on the long-term development of the DNS available for research.</p>
<img alt="Research Data NL Logo" class="align-center" src="proxy.php?url=https://nlnetlabs.nl/static/images/rdnl.png"/>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/the-ongoing-story-of-openintel/">Blogpost: The Ongoing Story of OpenINTEL</a></li>
</ul>
Unbound 1.8.2 released2018-12-04T13:56:00+01:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-12-04:/news/2018/Dec/04/unbound-1.8.2-released/<p>We are pleased to announce the release of version 1.8.2 of the Unbound recursive DNS resolver.</p>
<p>The option <tt class="docutils literal"><span class="pre">so-reuseport</span></tt> is by default disabled on FreeBSD, but it has
support to work on FreeBSD 12 with the REUSEPORT_LB variant, if enabled
in unbound.conf.</p>
<p>The python code in unbound …</p><p>We are pleased to announce the release of version 1.8.2 of the Unbound recursive DNS resolver.</p>
<p>The option <tt class="docutils literal"><span class="pre">so-reuseport</span></tt> is by default disabled on FreeBSD, but it has
support to work on FreeBSD 12 with the REUSEPORT_LB variant, if enabled
in unbound.conf.</p>
<p>The python code in unbound supports python 3.6, but also python 2.7 works.
The python module prints the python exceptions to the log, so that
compatibility problems are more easy to troubleshoot.</p>
<p>Fast server selection options are added that select from the fastest
servers in the available set, with fast-server-num and fast-server-permil
this can be turned on. When enabled the fastest servers are selected,
instead of a random server. Randomness is good for poisoning prevention,
but fast selection can result in faster roundtrips.</p>
<p>The nameserver records in large returned negative responses are scrubbed
out of the packet to avoid fragmentation based DNS cache poisoning,
from a report from T.Suzuki.</p>
<p>The automated test set now has static code analysis of the source code,
this is performed with the clang analyzer.</p>
<p>There is a new option to deny ANY packets, with <tt class="docutils literal"><span class="pre">deny-any:</span> yes</tt> in
unbound.conf. The option unknown-server-time-limit can be used for
cases behind a slow uplink to avoid multiple timeouts on every query to
attain the necessary long timeout length for that uplink.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-8-2">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.8.2.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.1.26 released2018-12-04T11:40:00+01:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2018-12-04:/news/2018/Dec/04/nsd-4.1.26-released/<p>Today, we released version 4.1.26 of the authoritative DNS name server NSD.</p>
<p>This version has DNSTAP support (<a class="reference external" href="proxy.php?url=http://dnstap.info">http://dnstap.info</a>). Use
<tt class="docutils literal"><span class="pre">--enable-dnstap</span></tt> for ./configure to turn it on, then in nsd.conf enable
the dnstap feature with dnstap-enable: yes and set one or more of
dnstap-log-..-messages to …</p><p>Today, we released version 4.1.26 of the authoritative DNS name server NSD.</p>
<p>This version has DNSTAP support (<a class="reference external" href="proxy.php?url=http://dnstap.info">http://dnstap.info</a>). Use
<tt class="docutils literal"><span class="pre">--enable-dnstap</span></tt> for ./configure to turn it on, then in nsd.conf enable
the dnstap feature with dnstap-enable: yes and set one or more of
dnstap-log-..-messages to yes. And set the dnstap socket path in the
config.</p>
<p>The <tt class="docutils literal">reuseport: yes</tt> config option in nsd.conf on FreeBSD 12 can use the
SO_REUSEPORT_LB option that performs performance load balancing.</p>
<p>The <tt class="docutils literal">changezone</tt> command for nsd-control allows to change the pattern
associated with a zone without downtime for the zone, in one operation.
It is otherwise just like a delete and an add for that zone.</p>
<p>Include files from the config file are sorted before inclusion, giving
a stable list of included text.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-26">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.26.tar.gz">Direct Download</a></li>
</ul>
Introducing a new logo family for our DNS projects2018-11-20T13:50:00+01:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2018-11-20:/news/2018/Nov/20/dns-logo-family-launch/<p>Who knew branding could be this much fun? As a small, open source organisation we mostly spend our time on writing code.
But several months ago, we wanted to see if we could replace the generic icons we were using for our projects with some fresh and shiny logos.
It …</p><p>Who knew branding could be this much fun? As a small, open source organisation we mostly spend our time on writing code.
But several months ago, we wanted to see if we could replace the generic icons we were using for our projects with some fresh and shiny logos.
It felt like a fitting cherry on the proverbial cake after launching our new website.</p>
<p>As fate would have it, a <a class="reference external" href="proxy.php?url=https://twitter.com/alexander_band/status/1008697103177134080?s=21">simple tweet</a> from our offices in Amsterdam
resulted in a recommendation all the way from New Zealand to get in touch with a designer in Rotterdam.</p>
<p>Now, after collaborating with <a class="reference external" href="proxy.php?url=http://richardderuijter.com/">Richard de Ruijter</a> for several months, we are absolutely thrilled to introduce
a new logo family for our DNS projects.</p>
<img alt="NSD Logo" class="align-center" src="proxy.php?url=https://nlnetlabs.nl/static/logos/NSD/NSD_FC_Shaded_cropped.svg" style="height: 140px;"/>
<img alt="Unbound Logo" class="align-center" src="proxy.php?url=https://nlnetlabs.nl/static/logos/Unbound/Unbound_FC_Shaded_cropped.svg" style="height: 140px;"/>
<p>We hope you like them as much as we do! We'll be working on updating the website with the new designs over the next few days.</p>
<p>We're already looking forward to working with Richard again to design some awesome logos for our upcoming projects, as well as some other
fun things for the community to look forward to. So make sure you look us up at the next conference!</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/logos/">NLnet Labs Logos page</a></li>
<li><a class="reference external" href="proxy.php?url=https://twitter.com/NLnetLabs/status/1069844334999146501">Get Stickers!</a></li>
</ul>
NLnet Labs joins OpenINTEL2018-11-12T12:00:00+01:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2018-11-12:/news/2018/Nov/12/nlnetlabs-joins-openintel/<p>We're proud to join the OpenINTEL measurement platform.</p>
<p>The goal of OpenINTEL is to capture daily snapshots of
the state of large parts of the global Domain Name System. Because the DNS plays
a key role in almost all Internet services, recording this information allows
OpenINTEL to track changes on …</p><p>We're proud to join the OpenINTEL measurement platform.</p>
<p>The goal of OpenINTEL is to capture daily snapshots of
the state of large parts of the global Domain Name System. Because the DNS plays
a key role in almost all Internet services, recording this information allows
OpenINTEL to track changes on the Internet, and thus its evolution, over longer
periods of time. By performing active measurements, rather than passively
collecting DNS data, the platform builds consistent and reliable time series
of the state of the DNS.</p>
<p>OpenINTEL makes extensive use of the tools provided by NLnet Labs, such as the
Unbound recursive caching resolver and the LDNS DNS library.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.openintel.nl/">OpenINTEL website</a></li>
</ul>
Routinator 0.1.1 ‘Five-second Rule’ release2018-11-05T16:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2018-11-05:/news/2018/Nov/05/rpki-routinator-0.1.1-released/<p>We are slightly embarrassed to announce the first bugfix release of
the Routinator: version 0.1.1 ‘Five-second Rule.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers.</p>
<p>This release …</p><p>We are slightly embarrassed to announce the first bugfix release of
the Routinator: version 0.1.1 ‘Five-second Rule.’</p>
<p>Routinator is an RPKI relying party software that collects and
validates statements made in the Resource Public Key Infrastructure
(RPKI) about allowed route origins and provides them to routers.</p>
<p>This release fixes a bug in the RTR server used by routers to acquire
their set of valid route origins. There are two versions of this
protocol. While Routinator supports both versions, we overlooked that the
message that ends a set of origins (the End of Data PDU) is
different in the two versions. We thus responded with the wrong
message in version 0, leading to at least Juniper routers rightfully
dropping the RTR session.</p>
<p>Many thanks to everyone getting back to us reporting the issue. We very
much appreciate your interest in Routinator! Since there was quite a few
reports, we decided to quickly release this bugfix version.</p>
<p>If you have installed Routinator directly from <em>crates.io,</em> you can
update through:</p>
<pre class="literal-block">
cargo install --force routinator
</pre>
<p>You can find more information on the Routinator, including how to get and
run your own copy, on <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI project</a></li>
</ul>
Routinator 0.1.0 ‘Godspeed!’ released2018-11-01T13:00:00+01:002026-03-04T07:35:16.834919+01:00NLnet Labstag:nlnetlabs.nl,2018-11-01:/news/2018/Nov/01/rpki-routinator-0.1.0-released/<p>We are extremely delighted to announce the very first release
of the Routinator, version 0.1.0 ‘Godspeed!’</p>
<p>In the modern Internet, routing security is becoming increasingly important.
Resource Public Key Infrastructure (RPKI) is a powerful component in
preventing BGP hijacking. The system allows network operators to create
cryptographically validatable …</p><p>We are extremely delighted to announce the very first release
of the Routinator, version 0.1.0 ‘Godspeed!’</p>
<p>In the modern Internet, routing security is becoming increasingly important.
Resource Public Key Infrastructure (RPKI) is a powerful component in
preventing BGP hijacking. The system allows network operators to create
cryptographically validatable statements about their BGP routing intent.
Routinator collects these statements, validates them, and makes them
available to routers to use in the BGP decision making process.</p>
<p>The initial release implements the basic set of functionality: fetching
and validating RPKI data and exposing route origin attestations both as
output and to routers via the RPKI-RTR protocol.</p>
<p>This release is the first step in NLnet Labs’ ongoing effort to provide
open source software covering the entire RPKI spectrum.</p>
<p>You can find more information on the Routinator, including how to get and
run your own copy, on <a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Github</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator Github repository</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">NLnet Labs RPKI projects</a></li>
</ul>
Unbound 1.8.1 released2018-10-08T13:20:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-10-08:/news/2018/Oct/08/unbound-1.8.1-released/<p>We are pleased to announce the release of version 1.8.1 of the Unbound recursive DNS resolver.</p>
<p>This release of Unbound contains a number of bug fixes. A memory leak
in the TLS lookup code is fixed. Leaked requests in the requestlist are
fixed. Lookup failure due to qname …</p><p>We are pleased to announce the release of version 1.8.1 of the Unbound recursive DNS resolver.</p>
<p>This release of Unbound contains a number of bug fixes. A memory leak
in the TLS lookup code is fixed. Leaked requests in the requestlist are
fixed. Lookup failure due to qname minimisation and a lack of IPv6 with
connectivity issues is fixed.</p>
<p>TLS upstream servers are signalled with SNI with the name that is
configured. This allows hosting servers by name on the destination.</p>
<p>Also Unbound is fixed from calling disallowed routines, by using EVP
code, for FIPS OpenSSL.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-8-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.8.1.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.1.25 released2018-09-25T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2018-09-25:/news/2018/Sep/25/nsd-4.1.25-released/<p>Today, we released version 4.1.25 of the authoritative DNS name server NSD.</p>
<p>This release contains mostly just bug fixes. The NSEC3 fixup helps
certain NSEC3 failures, and there is a fix for systemd integration.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-25">downloads page</a>.</p>
<p>Related links …</p><p>Today, we released version 4.1.25 of the authoritative DNS name server NSD.</p>
<p>This release contains mostly just bug fixes. The NSEC3 fixup helps
certain NSEC3 failures, and there is a fix for systemd integration.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-25">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.25.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.8.0 released2018-09-10T14:20:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-09-10:/news/2018/Sep/10/unbound-1.8.0-released/<p>We are pleased to announce the release of version 1.8.0 of the Unbound recursive DNS resolver.</p>
<p>This release has a number of bug fixes, a list of features added and
some defaults changed.</p>
<p>The defaults that are changed enable options that have been introduced
in the past with …</p><p>We are pleased to announce the release of version 1.8.0 of the Unbound recursive DNS resolver.</p>
<p>This release has a number of bug fixes, a list of features added and
some defaults changed.</p>
<p>The defaults that are changed enable options that have been introduced
in the past with an option that defaulted to off, but have proven to
work, improve speed and resilience and we would now recommend to enable
when configuring the server. Still the option exists if you want to
manually specify the feature.</p>
<p>New features include options for unbound-control: auth_zone_reload,
auth_zone_transfer. New counters in the statistics output:
<tt class="docutils literal">num.queries.tls, num.query.subnet, num.query.subnet_cache</tt>. New options
in unbound.conf: <tt class="docutils literal"><span class="pre">dns64-ignore-aaaa,</span> <span class="pre">tcp-idle-timeout,</span>
<span class="pre">edns-tcp-keepalive,</span> <span class="pre">edns-tcp-keepalive-timeout,</span> <span class="pre">tcp-connection-limit,</span>
<span class="pre">stub-no-cache,</span> <span class="pre">forward-no-cache,</span> <span class="pre">log-servfail,</span> <span class="pre">log-local-actions,</span>
<span class="pre">serve-expired-ttl,</span> <span class="pre">serve-expired-ttl-reset</span></tt>. Commandline options <tt class="docutils literal"><span class="pre">-R</span></tt> (use
direct queries) for unbound-anchor, <tt class="docutils literal"><span class="pre">-d</span></tt> (delay) for streamtcp. There is
support for RR type <tt class="docutils literal">SMIMEA</tt>. There is support for EDNS option <tt class="docutils literal">EDNS
KeepAlive</tt>.</p>
<p>The libunbound library has gone up an api version increment because one
of the callback signatures has changed. New information is available to
the callback, existing usage of the function could conceivable get an
upgrade by ignoring the extra function call parameter. For python
scripts, a similar situation, where new information has been made
available to the callback functions, in the form of extra function call
parameters. This information is also available to module callbacks
internally. For python the extra arguments functionality is used to
extend the arguments. The extra information is connection information,
exposing the client's IP address to the callback function and whether
the query failed because of rate limiting.</p>
<p>There are a number of bug fixes for Qname minimisation, and a number of
fixes for auth-zone functionality. And there has been a fix in the
processing of dns64 negative cache entries and a fix about fallthrough
in the view local-zone processing functionality.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-8-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.8.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.1.24 released2018-08-13T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2018-08-13:/news/2018/Aug/13/nsd-4.1.24-released/<p>Today, we released version 4.1.24 of the authoritative DNS name server NSD.</p>
<p>This version has a fix for a bug in resigning zones with different NSEC3
salt, where NSD would not pick up the NSEC3PARAM record, and serve
answers that omit NSEC3 records. NSD is now lenient and …</p><p>Today, we released version 4.1.24 of the authoritative DNS name server NSD.</p>
<p>This version has a fix for a bug in resigning zones with different NSEC3
salt, where NSD would not pick up the NSEC3PARAM record, and serve
answers that omit NSEC3 records. NSD is now lenient and when
NSEC3PARAMs exist that point to nonworking NSEC3 chains, NSD attempts to
find an alternative NSEC3PARAM with NSEC3 records.</p>
<p>It is possible to use <tt class="docutils literal"><span class="pre">nsd-control</span></tt> over a command pipe, without using
TLS, by setting the name of the control socket file. Access permissions
on that file then act as the access control. No TLS is used, because it
is not network traffic, and this is likely faster.</p>
<p>Also systemd support is added for readiness signalling. Enabled with
<tt class="docutils literal"><span class="pre">use-systemd:</span> yes</tt>.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-24">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.24.tar.gz">Direct Download</a></li>
</ul>
Introducing Routinator, a new RPKI Validator2018-08-06T12:30:00+02:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2018-08-06:/news/2018/Aug/06/introducing-routinator-3000-rpki-relying-party-software/<p>NLnet Labs has committed to building a full open source RPKI toolset to help make BGP routing more secure. This work consists of three projects. We will offer a Certificate Authority (CA) package, allowing network operators to run RPKI on their own systems instead of using the hosted platforms offered …</p><p>NLnet Labs has committed to building a full open source RPKI toolset to help make BGP routing more secure. This work consists of three projects. We will offer a Certificate Authority (CA) package, allowing network operators to run RPKI on their own systems instead of using the hosted platforms offered by the five Regional Internet Registries. In addition, we will build a Publication Server, to let operators or a third party publish the certificates and ROAs generated by the CA. Lastly, the toolset includes Relying Party software allowing operators download the global RPKI data set, validate it and use the result in their BGP decision making process.</p>
<p>To kick off this project, we are proud to announce that we have just released experimental Relying Party software called Routinator, written in the Rust programming language. Our mission is to offer a set of software packages that is on par with our other projects such as NSD and Unbound, in terms of quality, feature set and update frequency.</p>
<p><em>Note:</em> if you love this stuff, <a class="reference external" href="proxy.php?url=/careers/culture/">we’re hiring</a>!</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://github.com/NLnetLabs/routinator">Routinator on GitHub</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/introducing-the-routinator-3000/">Routinator blog post</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/about/">RPKI Tools by NLnet Labs</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/routing/project-plan/">RPKI Project Plan</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.rust-lang.org/">The Rust Programming Language</a></li>
</ul>
NSD 4.1.23 released2018-07-30T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2018-07-30:/news/2018/Jul/30/nsd-4.1.23-released/<p>Today, we released version 4.1.23 of the authoritative DNS name server NSD.</p>
<p>NSD versions 4.1.22 and before are vulnerable in comparing TSIG information
and this can be used to discover a TSIG secret.</p>
<p>NSD uses TSIG to protect zone transfers. The TSIG code uses a secret …</p><p>Today, we released version 4.1.23 of the authoritative DNS name server NSD.</p>
<p>NSD versions 4.1.22 and before are vulnerable in comparing TSIG information
and this can be used to discover a TSIG secret.</p>
<p>NSD uses TSIG to protect zone transfers. The TSIG code uses a secret key
to protect the data. The secret key is shared with both sides of the zone
transfer connection. The comparison code in NSD was not time insensitive,
causing the potential for an attacker to use timing information to discover
data about the key contents.</p>
<p>NSD versions from 2.2.0 to 4.1.22 are vulnerable. Upgrade to 4.1.23 or
newer to get the fix.</p>
<p>It was reported by Ondrej Sury (ISC).</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-23">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.23.tar.gz">Direct Download</a></li>
</ul>
DNSSEC trigger 0.172018-06-25T11:10:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2018-06-25:/news/2018/Jun/25/dnssec-trigger-0.17-released/<p>This release of version 0.17 fixes an infinite loop in dnssec-trigger introduced with fixes on the patch on the 0.16 release.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/">DNSSEC trigger project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.17.tar.gz">source</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec_trigger_setup_0.17.exe">install exe</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssectrigger-0.17.dmg">install dmg</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
DNSSEC trigger 0.162018-06-21T14:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2018-06-21:/news/2018/Jun/21/dnssec-trigger-0.16-released/<p>This release has a fix for the reports about .uk.uk. The patchset from Martin Sehnoutka is integrated, it moves functionality from the linux network change script into the dnssec-trigger process.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/">DNSSEC trigger project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.16.tar.gz">source</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec_trigger_setup_0.16.exe">install exe</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssectrigger-0.16.dmg">install dmg</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Unbound 1.7.3 released2018-06-21T10:10:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-06-21:/news/2018/Jun/21/unbound-1.7.3-released/<p>We are pleased to announce the release of version 1.7.3 of the Unbound recursive DNS resolver.</p>
<p>This release fixes a bug in qname minimisation, from 1.7.1, that double
counts CNAMEs and this causes resolution failures because the maximum
CNAME count is hit. This caught attention because …</p><p>We are pleased to announce the release of version 1.7.3 of the Unbound recursive DNS resolver.</p>
<p>This release fixes a bug in qname minimisation, from 1.7.1, that double
counts CNAMEs and this causes resolution failures because the maximum
CNAME count is hit. This caught attention because since 1.7.2 qname
minimisation is enabled by default.</p>
<p>For a local name unix pipe unbound-control setup, with the pathname of the
socket configured in <tt class="docutils literal"><span class="pre">control-interface</span></tt>, Unbound now uses an unencrypted
connection. Permissions can be configured by setting them on the directory
the file is in, unbound creates the file with permissions that allow members
of the group of the user that is configured unbound.conf access. This fix is
also part of NSD nsd-control.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-7-3">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.7.3.tar.gz">Directly download the source package</a></li>
</ul>
Unbound 1.7.2 released2018-06-11T11:40:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-06-11:/news/2018/Jun/11/unbound-1.7.2-released/<p>We are pleased to announce the release of version 1.7.2 of the Unbound recursive DNS resolver. There are a number of bug fixes, but also some features.</p>
<p>This release fixes bugs in DNS-over-TLS for windows, and adds the option for Windows users to use the CA certificates from …</p><p>We are pleased to announce the release of version 1.7.2 of the Unbound recursive DNS resolver. There are a number of bug fixes, but also some features.</p>
<p>This release fixes bugs in DNS-over-TLS for windows, and adds the option for Windows users to use the CA certificates from the Windows cert stores. This can be set with the <tt class="docutils literal"><span class="pre">tls-win-cert:</span> yes</tt> option in unbound.conf.</p>
<p>The code has been updated with a speed up that improves performance for large numbers of incoming TCP and TLS connections. In addition, QNAME minimisation is now enabled by default. Lastly, there is an option to allow to ignore an unset RD bit for access control subnets and always allow recursion to the request.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-7-2">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.7.2.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.1.22 released2018-06-11T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2018-06-11:/news/2018/Jun/11/nsd-4.1.22-released/<p>Today, we released version 4.1.22 of the authoritative DNS name server NSD.</p>
<p>This release fixes a bug where zone transfers would not succeed, because
of an error in the selective NSEC3 allocation (introduced in 4.1.18).</p>
<p>The refuse ANY query feature now sends truncated answers over UDP …</p><p>Today, we released version 4.1.22 of the authoritative DNS name server NSD.</p>
<p>This release fixes a bug where zone transfers would not succeed, because
of an error in the selective NSEC3 allocation (introduced in 4.1.18).</p>
<p>The refuse ANY query feature now sends truncated answers over UDP and
allows TCP queries. This is the same size response on UDP as the
refusal but allows the query to succeed over TCP for genuine queriers
that fallback to that transport mechanism.</p>
<p>The release contains a speed up for TCP processing that should NSD
better at handling large numbers of incoming TCP connections.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-22">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.22.tar.gz">Direct Download</a></li>
</ul>
Putting an End to Workarounds for Broken Software2018-06-07T00:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2018-06-07:/news/2018/Jun/07/putting-an-end-to-workarounds-for-broken-software/<p>The specification of the DNS protocol and its extensions in the IETF,
the implementation of the protocol standards and its compliance, and
the interoperability between DNS name server implementations give rise
of complex interdependencies. For one, the IETF standards sometimes
allow room for different interpretations resulting in slightly varying
behavior …</p><p>The specification of the DNS protocol and its extensions in the IETF,
the implementation of the protocol standards and its compliance, and
the interoperability between DNS name server implementations give rise
of complex interdependencies. For one, the IETF standards sometimes
allow room for different interpretations resulting in slightly varying
behavior in the implementation of the DNS standards. And sometimes
there are different operational realities to be addressed, resulting
in different decisions. But for all, the open-source DNS software
developers address interoperability between their implementations, and
make sure that the users of the DNS software can rely on the correct
behaviour of the individual DNS name servers (authoritative and
recursive).</p>
<p>Unfortunately, a substantial amount of effort and code is spent to
cope with <em>broken</em> DNS software implementations. With broken DNS
software, we mean software that does not comply with the standards in
any interpretation and just fails to behave properly. The net effect
is that the open-source DNS software developers have to deal with the
errors and ignorance of the broken DNS implementations. Put
differently: we have to pay a price in time and code complexity for
the errors of other parties that don't bother to resolve their
incorrect implementation.</p>
<div class="section" id="edns-extension-support">
<h2>EDNS Extension Support</h2>
<p>To signal the start of a joint effort to reduce the code necessary to
implement workarounds in their DNS software, a group of open-source
DNS software developers will discontinue a support for dealing with
broken EDNS support.</p>
<p>From February 1st, 2019 new releases of DNS software from CZ.NIC, ISC,
NLnet Labs, and PowerDNS will drop support and code for the workaround
of non-compliance problems with EDNS standard as specified in
RFC 6891.</p>
<p>EDNS is a mechanism to include optional information in DNS messages.
It is not mandatory to implement. The DNS standards provides
implementations with a way to signal their lack of EDNS support.
However, some implementations choose to react in non-standard ways
when provided with EDNS messages, requiring workarounds for
interoperation. We have deliberately selected to remove these
workarounds to send a clear signal instead of causing a major
disruption.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://dnsflagday.net/">dnsflagday website</a></li>
<li><a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/rfc6891">RFC 6891 - Extension Mechanisms for DNS (EDNS(0))</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.isc.org/blogs/end-to-bandaids/">End to Bandaids for Broken EDNS</a></li>
<li><a class="reference external" href="proxy.php?url=https://en.blog.nic.cz/2018/03/14/together-for-better-stability-speed-and-further-extensibility-of-the-dns-ecosystem/">Together for better stability, speed and further extensibility of
the DNS ecosystem</a></li>
<li><a class="reference external" href="proxy.php?url=https://blog.powerdns.com/2018/03/22/removing-edns-workarounds/">Removing EDNS Workarounds</a></li>
</ul>
</div>
NSD 4.1.21 released2018-05-14T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2018-05-14:/news/2018/May/14/nsd-4.1.21-released/<p>Today, we released version 4.1.21 of the authoritative DNS name server NSD.</p>
<p>This release introduces query type ANY refusal. NSD already has RRL
support that by default throttles queries, and also queries of type ANY.
But an nsd.conf option has been added, this makes NSD refuse queries …</p><p>Today, we released version 4.1.21 of the authoritative DNS name server NSD.</p>
<p>This release introduces query type ANY refusal. NSD already has RRL
support that by default throttles queries, and also queries of type ANY.
But an nsd.conf option has been added, this makes NSD refuse queries of
type ANY.</p>
<p>The <tt class="docutils literal"><span class="pre">tcp-count</span></tt> can be higher. For more tcp service, use something like
<tt class="docutils literal"><span class="pre">tcp-count:</span> 10000</tt> or so. The fix is that tcp connections use (much) less
memory now, than in previous versions.</p>
<p>The memclean option is for memory checkers and code analyzers, without
the option, NSD lets the system remove memory pages with unused
resources on exit of a process, which is much faster.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-21">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.21.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.7.1 released2018-05-03T11:20:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-05-03:/news/2018/May/03/unbound-1.7.1-released/<p>We are pleased to announce the release of version 1.7.1 of the Unbound recursive DNS resolver. There are a number of bug fixes, but also some features.</p>
<p>This release has root key sentinel support, default on, from draft
<tt class="docutils literal"><span class="pre">draft-ietf-dnsop-kskroll-sentinel</span></tt>. The root key sentinel helps the root
key rollover …</p><p>We are pleased to announce the release of version 1.7.1 of the Unbound recursive DNS resolver. There are a number of bug fixes, but also some features.</p>
<p>This release has root key sentinel support, default on, from draft
<tt class="docutils literal"><span class="pre">draft-ietf-dnsop-kskroll-sentinel</span></tt>. The root key sentinel helps the root
key rollover process by providing insight into the distribution of the
key material over the resolver population. For that, the resolver gives
responses indicating which keys are in use by the resolver.</p>
<p>Crypto support for ED448 has been added. ED25519 was already supported
in a previous release. The crypto algorithm code is default turned on
if support is detected at configure time. The openssl 1.1.1 beta
versions have ED448, and also ED25519 support.</p>
<p>For DNS over TLS, the tcp length is sent in the same packet as the tcp
content, for the TLS connections, providing a speed up. Also TLS
authentication can be enabled by specifying the TLS auth name in
<tt class="docutils literal">unbound.conf</tt>. An example config for large public cloud dns over tls
resolvers is this:</p>
<pre class="literal-block">
server:
tls-cert-bundle: "ca-bundle.pem"
forward-zone:
name: "."
forward-addr: "9.9.9.9#dns.quad9.net"
forward-addr: "1.1.1.1#cloudflare-dns.com"
forward-tls-upstream: yes
</pre>
<p>It is possible to have unbound as a TLS server serve TLS on different
ports, with <tt class="docutils literal"><span class="pre">additional-tls-port</span></tt>. Use this to set up dns over tls
service on both ports <tt class="docutils literal">853</tt> and <tt class="docutils literal">443</tt>.</p>
<p>For fast server selection, there are new options <tt class="docutils literal"><span class="pre">low-rtt</span></tt> and
<tt class="docutils literal"><span class="pre">low-rtt-pct</span></tt>. For example set <tt class="docutils literal"><span class="pre">low-rtt-pct:</span> 900</tt> to enable it.
These options are experimental at this time. We are interested in
user experiences, and are intending to look at the expressiveness that
is desired for ease of use and applicability. Also, the <tt class="docutils literal">pct</tt> part of <tt class="docutils literal"><span class="pre">low-rtt-pct</span></tt> is technically the wrong term and we intend to replace it with <tt class="docutils literal">promille</tt> (likely in a future release, together with user experience feedback changes).</p>
<p>There is hiredis support for the cachedb module.</p>
<p>Monitoring of the new agrressive NSEC and auth zone root local copy
features is possible with statistics counters for agressive NSEC and for
auth zone usage. Auth zone supports incoming NOTIFYs, from masters and
from <tt class="docutils literal"><span class="pre">allow-notify</span></tt> hosts. Auth zones can be listed from <tt class="docutils literal"><span class="pre">unbound-control</span></tt>
with their SOA serial number.</p>
<p>Unbound-control <tt class="docutils literal">set_option</tt> and <tt class="docutils literal">get_option</tt> needed different ':'
placement, the current release allows with and without ':' syntax.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-7-1">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.7.1.tar.gz">Directly download the source package</a></li>
<li><a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/draft-ietf-dnsop-kskroll-sentinel">draft-ietf-dnsop-kskroll-sentinel</a></li>
</ul>
Benno Overeinder appointed DNSOP co-chair2018-04-12T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2018-04-12:/news/2018/Apr/12/Benno-Overeinder-DNSOP-Chair/<p>In the IETF, the DNS Operations (DNSOP) Working Group serves as the shepherd of the DNS protocols. It develops guidelines for the operation of DNS software and services as well as the operation of DNS zones. In addition, it has become the starting point for proposed extensions and improvements to …</p><p>In the IETF, the DNS Operations (DNSOP) Working Group serves as the shepherd of the DNS protocols. It develops guidelines for the operation of DNS software and services as well as the operation of DNS zones. In addition, it has become the starting point for proposed extensions and improvements to the DNS protocol itself.</p>
<p>At IETF 101 in London the two current chairs of the DNSOP Working Group, Suzanne Woolf and Tim Wicinski, expressed their desire to have a third chair to help deal with the increasing workload and ongoing proposals.</p>
<!-- PELICAN_BEGIN_SUMMARY -->
<p>IETF Area Director Warren Kumari announced today that Benno Overeinder was appointed DNSOP co-chair.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/wg/dnsop/about/">DNS Operations Working Group</a></li>
<li><a class="reference external" href="proxy.php?url=https://datatracker.ietf.org/meeting/101/materials/minutes-101-dnsop-01">IETF 101 DNSOP WG minutes</a></li>
<li><a class="reference external" href="proxy.php?url=https://mailarchive.ietf.org/arch/msg/dnsop/Mo8eib18hv4jk__rFZsHIePLLns">Announcement by Warren Kumari</a></li>
</ul>
New website launch2018-04-04T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2018-04-04:/news/2018/Apr/04/new-website-launch/<p>We are proud to launch a brand new website for NLnet Labs, with a sleek new logo and fresh content.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Our new home offers a comprehensive overview of the projects we maintain, as well as the research, community and standards work we do. The previous website was getting a bit …</p><p>We are proud to launch a brand new website for NLnet Labs, with a sleek new logo and fresh content.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Our new home offers a comprehensive overview of the projects we maintain, as well as the research, community and standards work we do. The previous website was getting a bit long in the tooth and hard to maintain. That's why we decided to redo everything from scratch and integrate separately maintained domains such as unbound.net. Our goal was to make our projects easy to find and our services easier to understand. We hope you like it.</p>
<p>Instead of using the m4 macro processor to build the site, we're now running it using the Pelican Static Site Generator, allowing us to compose pages in reStructuredText and maintain them using GitLab. In a few days we'll write a blog post on our adventures getting there and our experiences along the way.</p>
<p>If you miss something from the old website or you have suggestions for improvements, please do not hesitate to contact us via <a class="reference external" href="proxy.php?url=mailto:[email protected]">email</a> or <a class="reference external" href="proxy.php?url=https://twitter.com/NLnetLabs">Twitter</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/building-a-new-home-for-nlnet-labs/">Blog post: Building a new home for NLnet Labs</a></li>
</ul>
Unbound 1.7.0 released2018-03-15T00:00:00+01:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-03-15:/news/2018/Mar/15/unbound-1.7.0-released/<p>We are pleased to announce the release of version 1.7.0 of the Unbound recursive DNS resolver. Apart from numerous big fixes, this version introduces some important new features.</p>
<p>Authority zones is an option that makes it possible to transfer an authoritative zone to Unbound. These transfers can happen …</p><p>We are pleased to announce the release of version 1.7.0 of the Unbound recursive DNS resolver. Apart from numerous big fixes, this version introduces some important new features.</p>
<p>Authority zones is an option that makes it possible to transfer an authoritative zone to Unbound. These transfers can happen using either HTTP/HTTPS or using the traditional DNS transfer mechanisms (AXFR and IXFR). The authority zones option can be used to load a copy of the root zone as described in <a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/rfc7706">RFC 7706</a>. Having the root zone loaded in a resolver can potentially decrease the round-trip times. Not having to contact the root servers also enhances privacy.</p>
<p>Also new in Unbound 1.7.0 is the aggressive use of the DNSSEC-validated cache, as described in <a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/rfc8198">RFC 8198</a>. This feature allows Unbound to use cached NSEC records to generate negative answers within a range and positive answers from wildcards. This increases performance, decreases latency and resource utilization on both authoritative and recursive servers, and increases privacy.</p>
<p>Finally, we introduced the <tt class="docutils literal"><span class="pre">dnscrypt-provider-cert-rotated</span></tt> option, kindly contributed by Manu Bretelle. It allows handling multiple cert/key pairs while only distributing some of them. In order to reliably match a client magic with a given key without strong assumption as to how those were generated, we need both key and cert. Likewise, in order to know which ES version should be used. On the other hand, when rotating a cert, it can be desirable to only serve the new cert but still be able to handle clients that are still using the old certs's public key. The <tt class="docutils literal"><span class="pre">dnscrypt-provider-cert-rotated</span></tt> allows to instruct Unbound to not publish the cert as part of the DNS's provider_name's TXT answer.</p>
<p>For a full list of changes and binary and source packages, see the <a class="reference external" href="proxy.php?url=/projects/unbound/download#unbound-1-7-0">download page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.7.0.tar.gz">Directly download the source package</a></li>
</ul>
NSD 4.1.20 released2018-02-20T00:00:00+01:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2018-02-20:/news/2018/Feb/20/nsd-4.1.20-released/<p>Today, we released version 4.1.20 of the authoritative DNS name server NSD.</p>
<p>This version is a bug fix release intended to close two memory leaks.
One leak may occur when reading the data of unknown record types from zone files, while the other may happen when rehashing NSEC3 …</p><p>Today, we released version 4.1.20 of the authoritative DNS name server NSD.</p>
<p>This version is a bug fix release intended to close two memory leaks.
One leak may occur when reading the data of unknown record types from zone files, while the other may happen when rehashing NSEC3 after a zone is transfered or read from a zone file.</p>
<p>You can get source packages of this version from the <a class="reference external" href="proxy.php?url=/projects/nsd/download/#nsd-4-1-20">downloads page</a>.</p>
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/about/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-4.1.20.tar.gz">Direct Download</a></li>
</ul>
Net::DNS 1.15 released2018-02-09T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2018-02-09:/news/2018/Feb/09/net::dns-1.15-released/<p>This release has no bugs resolved nor any new features. Besides some minor code maintenance, this release only adds a Change notice to formalize the retirement of the GOST R 34.11-94 hash algorithm. However, the GOST algorithm will still work when a functional Digest::GOST module is present.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related …</p><p>This release has no bugs resolved nor any new features. Besides some minor code maintenance, this release only adds a Change notice to formalize the retirement of the GOST R 34.11-94 hash algorithm. However, the GOST algorithm will still work when a functional Digest::GOST module is present.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2018/02/09/netdns-1-15-released/">Net::DNS 1.15 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.15.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.15/Changes">Changes</a></li>
</ul>
The peculiar case of NSEC processing using expanded wildcard records2018-01-30T00:00:00+01:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2018-01-30:/news/2018/Jan/30/the-peculiar-case-of-nsec-processing-using-expanded-wildcard-records/<p>We discovered a vulnerability in the processing of wildcard synthesized NSEC records. The result was Unbound, Google public DNS, PowerDNS and Dnsmasq contained a flaw that made it possible to downgrade secure connections. While synthesis of NSEC records is allowed by <a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/rfc4592">RFC 4592</a>, these synthesized owner names should not be …</p><p>We discovered a vulnerability in the processing of wildcard synthesized NSEC records. The result was Unbound, Google public DNS, PowerDNS and Dnsmasq contained a flaw that made it possible to downgrade secure connections. While synthesis of NSEC records is allowed by <a class="reference external" href="proxy.php?url=https://tools.ietf.org/html/rfc4592">RFC 4592</a>, these synthesized owner names should not be used in the NSEC processing. This does, however, happen in Unbound 1.6.7 and earlier versions.</p>
<p>Ralph Dolmans wrote a blog post about the discovery and findings.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/the-peculiar-case-of-nsec-processing-using-expanded-wildcard-records/">Blog post</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/#vulnerability-in-the-processing-of-wildcard-synthesized-nsec-records">Security Advisory</a></li>
</ul>
Bringing DNS Security and Privacy to the End User2018-01-24T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2018-01-24:/news/2018/Jan/24/bringing-dns-security-and-privacy-to-the-end-user/<p>How the getdns API project helps to achieve the goal of DNSSEC validation and DANE authentication at the end-points.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/bringing-dns-security-and-privacy-to-the-end-user/">Blog post</a></li>
</ul>
Unbound 1.6.8 released2018-01-19T00:00:00+01:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2018-01-19:/news/2018/Jan/19/unbound-1.6.8-released/<p>Unbound 1.6.8 fixes <a class="reference external" href="proxy.php?url=/projects/unbound/security-advisories/#vulnerability-in-the-processing-of-wildcard-synthesized-nsec-records">CVE-2017-15105</a>: vulnerability in the processing of wildcard synthesized NSEC records.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.8.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-8">Changes</a></li>
</ul>
NSD 4.1.19 released2017-12-11T00:00:00+01:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2017-12-11:/news/2017/Dec/11/nsd-4.1.19-released/<p>This release fixes IPv6 for the notify sending feature from 4.1.18.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.19.tar.gz">Direct Download</a></li>
</ul>
DNSSEC trigger 0.152017-12-06T00:00:00+01:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2017-12-06:/news/2017/Dec/06/dnssec-trigger-0.15/<p>This release fixes failure to start on OSX and Windows.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/">DNSSEC trigger project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.15.tar.gz">source</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec_trigger_setup_0.15.exe">install exe</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssectrigger-0.15.dmg">install dmg</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
NSD 4.1.18 released2017-11-30T00:00:00+01:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2017-11-30:/news/2017/Nov/30/nsd-4.1.18-released/<p>This release has features for saving memory and faster notification.With --enable-packed, 33% memory savings could be had, or somethingalong that size. Notification of secondary servers happens in parallel,and has faster timeouts. More sockets are used for zone transfers.This speeds up communication with a larger set of servers …</p><p>This release has features for saving memory and faster notification.With --enable-packed, 33% memory savings could be had, or somethingalong that size. Notification of secondary servers happens in parallel,and has faster timeouts. More sockets are used for zone transfers.This speeds up communication with a larger set of servers. Additionallya bug is fixed for dual-loaded parent-and-child zone configured at thesame time, when one of the zones has not loaded properly.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.18.tar.gz">Direct Download</a></li>
</ul>
Privacy: Using DNS-over-TLS with the new Quad9 DNS Service2017-11-20T00:00:00+01:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2017-11-20:/news/2017/Nov/20/privacy:-using-dns-over-tls-with-the-new-quad9-dns-service/<p>Hands-on install & configure of getdns and stubby to use DNS-over-TLS with Quad9 DNS service.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://blog.nlnetlabs.nl/privacy--using-dns-over-tls-with-the-new-quad9-dns-service/">Blog post</a></li>
</ul>
Net::DNS 1.13 released2017-10-18T00:00:00+02:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2017-10-18:/news/2017/Oct/18/net::dns-1.13-released/<p>IDNA queries with Net::LibIDNS2</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2017/10/18/netdns-1-13-released/">Net::DNS 1.13 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.13.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.13/Changes">Changes</a></li>
</ul>
DNSSEC trigger 0.142017-10-10T00:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2017-10-10:/news/2017/Oct/10/dnssec-trigger-0.14/<p>This release fixes install problems on OSX Sierra and High Sierra. The binary packages bundle the just-released unbound 1.6.7 that sends telemetry data about the root trust anchor.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/">DNSSEC trigger project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.14.tar.gz">source</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec_trigger_setup_0.14.exe">install exe</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssectrigger-0.14.dmg">install dmg</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Unbound 1.6.7 released2017-10-10T00:00:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2017-10-10:/news/2017/Oct/10/unbound-1.6.7-released/<p>Unbound 1.6.7 sets the default for trust anchor signaling to yes. Thismakes a query with the key tags of the validation keys when the trustanchor DNSKEY is retrieved.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.7.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-7">Changes</a></li>
</ul>
Akkerhuis inductee Internet Hall of Fame2017-09-19T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2017-09-19:/news/2017/Sep/19/akkerhuis-inductee-internet-hall-of-fame/<p>Jaap Akkerhuis, NLnet Lab's senior research engineer and longtime contributor to the Internet technical community, is inducted into the Internet Hall of Fame. Follow the link below to read more on the background and contributions of Jaap's work in the past 40 year.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/labs/news/jaap-ihof.html">Akkerhuis inductee IHoF2017</a></li>
</ul>
Unbound 1.6.6 released2017-09-18T00:00:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2017-09-18:/news/2017/Sep/18/unbound-1.6.6-released/<p>Unbound 1.6.6 blocks .test and .invalid by default. It has a -p optionto suppress pidfile creation (for startup script integration). And morestats and a shared secret cache for dnscrypt. And bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.6.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-6">Changes</a></li>
</ul>
Sjoera Nas joined NLnet Labs board2017-09-13T00:00:00+02:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2017-09-13:/news/2017/Sep/13/sjoera-nas-joined-nlnet-labs-board/<p>Sjoera Nas joined the board of NLnet Labs. She is an Internet and telecom privacy expert affiliated with Autoriteit Persoonsgegevens (Dutch DPA). We are delighted that she joined the board and will contribute with advice and guidance.</p>
<!-- PELICAN_END_SUMMARY -->
DNSSEC training at APTLD 722017-09-11T00:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2017-09-11:/news/2017/Sep/11/dnssec-training-at-aptld-72/<p>Berry van Halderen and Jaap Akkerhuis will give a two day DNSSEC course during the APTLD 72 meeting in Tbilisi (Sep 12-13). The course will cover DNS fundamentals, DNSSEC building blocks, policies and hands-on with OpenDNSSEC.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://aptld72.ge/agenda/">APTLD 72 Agenda</a></li>
</ul>
Unbound 1.6.5 released2017-08-21T00:00:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2017-08-21:/news/2017/Aug/21/unbound-1.6.5-released/<p>Unbound 1.6.5 fixes RFC5011 Trust Anchor tracking for users that install between September 11 and October 11, 2017.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.5.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-5">Changes</a></li>
</ul>
Net::DNS 1.12 released2017-08-18T00:00:00+02:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2017-08-18:/news/2017/Aug/18/net::dns-1.12-released/<p>Bugfixes and CDS and CDNSKEY printing according to erratum 5049 for RFC8078</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2017/08/18/netdns-1-12-released/">Net::DNS 1.12 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.12.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.12/Changes">Changes</a></li>
</ul>
NSD 4.1.17 released2017-07-21T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2017-07-21:/news/2017/Jul/21/nsd-4.1.17-released/<p>This release has a fix that likely stops zone transfer failures and this release can parse the pre-errata and fixed errata format for deletes in CDS and CDNSKEY records.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.17.tar.gz">Direct Download</a></li>
</ul>
NLnet Labs Annual Report 20162017-06-30T00:00:00+02:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2017-06-30:/news/2017/Jun/30/nlnet-labs-annual-report-2016/<p>We are happy to present NLnet Labs Annual report 2016. In it we present an overview of Labs' various activities and describe their impact.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2016.pdf">Annual Report 2016 (PDF)</a></li>
</ul>
Unbound 1.6.4 released2017-06-27T00:00:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2017-06-27:/news/2017/Jun/27/unbound-1.6.4-released/<p>Unbound 1.6.4 contains key tag signaling RFC8145 support. B root is renumbered in the default root hints. The dnscrypt code supports the chacha cipher. The Unbound DNSSEC validator supports the ED25519 algorithm. The redirect-bogus patch in contrib can send validation failure users to a landing page.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links …</p><p>Unbound 1.6.4 contains key tag signaling RFC8145 support. B root is renumbered in the default root hints. The dnscrypt code supports the chacha cipher. The Unbound DNSSEC validator supports the ED25519 algorithm. The redirect-bogus patch in contrib can send validation failure users to a landing page.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.4.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-4">Changes</a></li>
</ul>
Net::DNS 1.11 released2017-06-26T00:00:00+02:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2017-06-26:/news/2017/Jun/26/net::dns-1.11-released/<p>Maintenance work on IBM OS/390 support, ndots option in /etc/resolv.conf, workaround for hashpairs with cperl >= 5.27, zeroed waiting with bgbusy and EDNS size 512 queries</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2017/06/26/netdns-1-11-released/">Net::DNS 1.11 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.11.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.11/Changes">Changes</a></li>
</ul>
Unbound 1.6.3 released2017-06-13T00:00:00+02:002026-03-04T07:35:16.842919+01:00NLnet Labstag:nlnetlabs.nl,2017-06-13:/news/2017/Jun/13/unbound-1.6.3-released/<p>Unbound 1.6.3 fixes an assertion failure when a malformed packet is received with 0x20 enabled.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.3.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-3">Changes</a></li>
</ul>
Net::DNS 1.10 released2017-05-05T00:00:00+02:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2017-05-05:/news/2017/May/05/net::dns-1.10-released/<p>Bugfixes for Cygwin and MSWin32 environments. EBCDIC support updated. IBM OS/390 support</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2017/05/05/netdns-1-10-released/">Net::DNS 1.10 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.10.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.10/Changes">Changes</a></li>
</ul>
NSD 4.1.16 released2017-04-25T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2017-04-25:/news/2017/Apr/25/nsd-4.1.16-released/<p>This release contains the minimal response nsd.conf option and bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.16.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.6.2 released2017-04-24T00:00:00+02:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2017-04-24:/news/2017/Apr/24/unbound-1.6.2-released/<p>Unbound 1.6.2 has a couple of new features and a list of bug fixes: trustanchor.unbound chaos query, response IP actions, stats from shm, --disable-sha1, dnscrypt support, and edns client subnet support merged in.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-2">Changes</a></li>
</ul>
getdns 1.1.0 released2017-04-13T00:00:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2017-04-13:/news/2017/Apr/13/getdns-1.1.0-released/<p>Functions for serving DNS. Stubby on board!</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/releases/getdns-1-1-0/">Announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/dist/getdns-1.1.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/documentation/spec/">API specification</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/doxygen/">Doxygen documentation</a></li>
</ul>
Net::DNS 1.09 released2017-03-24T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2017-03-24:/news/2017/Mar/24/net::dns-1.09-released/<p>Structured EDNS0 options</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2017/03/24/netdns-1-09-released/">Net::DNS 1.09 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.09.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.09/Changes">Changes</a></li>
</ul>
Unbound 1.6.1 released2017-02-21T00:00:00+01:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2017-02-21:/news/2017/Feb/21/unbound-1.6.1-released/<p>Unbound 1.6.1 has the 2017 root trust anchor in unbound-anchor. The libunbound API has changed slightly, the callback typedef ends in _type. Source IP rate limiting, log-replies, and the release also has other new features and bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-1">Changes</a></li>
</ul>
Net::DNS 1.08 released2017-02-20T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2017-02-20:/news/2017/Feb/20/net::dns-1.08-released/<p>20th Anniversary, UPDATE and EDNS0 options handling for Net::DNS::Nameserver, better ineffective installs detection</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2017/02/20/netdns-1-08-released/">Net::DNS 1.08 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.08.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.08/Changes">Changes</a></li>
</ul>
NSD 4.1.15 released2017-02-16T00:00:00+01:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2017-02-16:/news/2017/Feb/16/nsd-4.1.15-released/<p>This release contains bugfixes, in serial number parsing and nsec3 hash collision reporting.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.15.tar.gz">Direct Download</a></li>
</ul>
getdns 1.0.0 released2017-01-17T00:00:00+01:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2017-01-17:/news/2017/Jan/17/getdns-1.0.0-released/<p>First spec complete implementation of getdns</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/releases/getdns-1-0-0/">Announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/dist/getdns-1.0.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/documentation/spec/">API specification</a></li>
</ul>
Net::DNS 1.07 released2016-12-29T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2016-12-29:/news/2016/Dec/29/net::dns-1.07-released/<p>Bugfixes and general maintenance work</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2016/12/29/netdns-1-07-released/">Net::DNS 1.07 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.07.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.07/Changes">Changes</a></li>
</ul>
ldns 1.7.0 released2016-12-20T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2016-12-20:/news/2016/Dec/20/ldns-1.7.0-released/<p>Bugfixes and maintenance work, DANE verification delegated to OpenSSL functions, OpenSSL 1.1.0 support</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.7.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://git.nlnetlabs.nl/ldns/tree/Changelog?id=release-1.7.0">Changes</a></li>
</ul>
DNSSEC trigger 0.132016-12-15T00:00:00+01:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2016-12-15:/news/2016/Dec/15/dnssec-trigger-0.13/<p>Updated included binaries and installer for OSX.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/">DNSSEC trigger project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.13.tar.gz">source</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec_trigger_setup_0.13.exe">install exe</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssectrigger-0.13.dmg">install dmg</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Unbound 1.6.0 released2016-12-15T00:00:00+01:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2016-12-15:/news/2016/Dec/15/unbound-1.6.0-released/<p>Unbound 1.6.0 has a number of features and bugfixes. More extensibleEDNS support. Views and local-zone tags provide for more feature rich filtering options, with CNAME support. SSL configuration features to turn on DNS over TLS for particular parts of the namespace. There were some bug fixes as well …</p><p>Unbound 1.6.0 has a number of features and bugfixes. More extensibleEDNS support. Views and local-zone tags provide for more feature rich filtering options, with CNAME support. SSL configuration features to turn on DNS over TLS for particular parts of the namespace. There were some bug fixes as well.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.6.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-6-0">Changes</a></li>
</ul>
NSD 4.1.14 released2016-12-08T00:00:00+01:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2016-12-08:/news/2016/Dec/08/nsd-4.1.14-released/<p>This version performs less zone transfer attempts, reducing load on the server. The xfrd state file has a new version number, to store theinformation. The new version of the file is written on exit of the daemon. And bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.14.tar.gz">Direct Download</a></li>
</ul>
A Hybrid System for Automatic Exchanges of Routing Information2016-12-02T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2016-12-02:/news/2016/Dec/02/a-hybrid-system-for-automatic-exchanges-of-routing-information/<p>The exchange of routing information for BGP configurations is a critical functionality that help autonomous systems communicate with each other in an efficient and robust way. In this work, we propose a hybrid system for automatic exchange of routing information. It addresses security and benefits from using a hybrid model …</p><p>The exchange of routing information for BGP configurations is a critical functionality that help autonomous systems communicate with each other in an efficient and robust way. In this work, we propose a hybrid system for automatic exchange of routing information. It addresses security and benefits from using a hybrid model for achieving policy routing information exchange in an efficient way.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2015.pdf">MSc. report (PDF)</a></li>
</ul>
DNS-Based Email Security -- DRAFT2016-11-02T00:00:00+01:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2016-11-02:/news/2016/Nov/02/dns-based-email-security----draft/<p>NLnet Labs contributed to the NIST SP 1800-6 DNS-Based Email Security report. Scenarios and practical instructions to use DNSSEC and DANE to secure email exchange (authentication and encryption of email and mail services).</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://nccoe.nist.gov/projects/building-blocks/secured-email">DNS-Based Secured Email</a></li>
</ul>
NSD 4.1.13 released2016-09-27T00:00:00+02:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2016-09-27:/news/2016/Sep/27/nsd-4.1.13-released/<p>Some features, such as multi master check option that does not upgrade from the first master that answers, but picks the best one. Additional section handling for type SRV. And bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.13.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.5.10 released2016-09-27T00:00:00+02:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2016-09-27:/news/2016/Sep/27/unbound-1.5.10-released/<p>In this release there is a fix for long downtime after connectivity loss, which was a longstanding unsolved issue. Features for tcp, TCPFast Open and timeout pressure to close connections when the tcp connections are getting full. Option to use ipv6 /64 for extra entropy. More bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links …</p><p>In this release there is a fix for long downtime after connectivity loss, which was a longstanding unsolved issue. Features for tcp, TCPFast Open and timeout pressure to close connections when the tcp connections are getting full. Option to use ipv6 /64 for extra entropy. More bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.10.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-10">Changes</a></li>
</ul>
NSD 4.1.12 released2016-09-02T00:00:00+02:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2016-09-02:/news/2016/Sep/02/nsd-4.1.12-released/<p>Fix malformed edns query assertion failure, reported by Michal Kepien (NASK).</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.12.tar.gz">Direct Download</a></li>
</ul>
Net::DNS::SEC 1.03 released2016-08-26T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2016-08-26:/news/2016/Aug/26/net::dns::sec-1.03-released/<p>100% Code coverage in unit tests</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2016/08/26/netdnssec-1-03-released/">Net::DNS::SEC 1.03 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-SEC-1.03.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns-sec/release/1.03/Changes">Changes</a></li>
</ul>
NSD 4.1.11 released2016-08-09T00:00:00+02:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2016-08-09:/news/2016/Aug/09/nsd-4.1.11-released/<p>Fix for unlimited AXFR vuln, for build without IPv6 and serve DS records for co-hosted parent zone, and other fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.11.tar.gz">Direct Download</a></li>
</ul>
NLnet Labs Annual Report 20152016-06-30T00:00:00+02:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2016-06-30:/news/2016/Jun/30/nlnet-labs-annual-report-2015/<p>We are happy to present NLnet Labs Annual report 2015. In it we present an overview of Labs' various activities and describe their impact.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2015.pdf">Annual Report 2015 (PDF)</a></li>
</ul>
NSD 3.2.22 released2016-06-14T00:00:00+02:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2016-06-14:/news/2016/Jun/14/nsd-3.2.22-released/<p>Bug fixes accrued before end of support. Note that 3.2.x has end-of-support.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.22.tar.gz">Direct Download</a></li>
</ul>
NSD 4.1.10 released2016-06-14T00:00:00+02:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2016-06-14:/news/2016/Jun/14/nsd-4.1.10-released/<p>Transport preference for glue, DNAME occlusion, and other bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.10.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.5.9 released2016-06-09T00:00:00+02:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2016-06-09:/news/2016/Jun/09/unbound-1.5.9-released/<p>New IPv6 address for one of the root servers in the default root server configuration. And a number of bug fixes, for CD flags to forwarders, for 0x20 compatibility, for qname-minimisation with DNSSEC.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.9.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-9">Changes</a></li>
</ul>
Net::DNS 1.06 released2016-05-27T00:00:00+02:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2016-05-27:/news/2016/May/27/net::dns-1.06-released/<p>Bugfixes and updated error reporting</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2016/05/27/netdns-1-06-released/">Net::DNS 1.06 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.06.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.06/Changes">Changes</a></li>
</ul>
NSD 4.1.9 released2016-03-15T00:00:00+01:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2016-03-15:/news/2016/Mar/15/nsd-4.1.9-released/<p>Fix crash on upgrade to 4.1.8 in nsd.db read.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.9.tar.gz">Direct Download</a></li>
</ul>
NSD 3.2.21 released2016-03-10T00:00:00+01:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2016-03-10:/news/2016/Mar/10/nsd-3.2.21-released/<p>Fix segv in zone transfer. Note that 3.2.x has end-of-support.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.21.tar.gz">Direct Download</a></li>
</ul>
NSD 4.1.8 released2016-03-10T00:00:00+01:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2016-03-10:/news/2016/Mar/10/nsd-4.1.8-released/<p>Fix segv in zone transfer, nanosecond file timestamps and other fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.8.tar.gz">Direct Download</a></li>
</ul>
Net::DNS 1.05 released2016-03-07T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2016-03-07:/news/2016/Mar/07/net::dns-1.05-released/<p>Bugfixes + SMIMEA support</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2016/03/07/netdns-1-05-released/">Net::DNS 1.05 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.05.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.05/Changes">Changes</a></li>
</ul>
Unbound 1.5.8 released2016-03-02T00:00:00+01:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2016-03-02:/news/2016/Mar/02/unbound-1.5.8-released/<p>Bug fixes, fix unbound-control-setup lines, fix GOST-hash failures, block .onion leakage.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.8.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-8">Changes</a></li>
</ul>
getdns 0.9 released2015-12-31T00:00:00+01:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2015-12-31:/news/2015/Dec/31/getdns-0.9-released/<p>Special New Year's Eve release of getdns. This release brings the implementation on par with the December 2015 version of the specification.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/checksum.html#getdns-0.9.tar.gz">Announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/dist/getdns-0.9.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/spec/">API specification</a></li>
</ul>
NSD 3.2.20 released2015-12-10T00:00:00+01:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2015-12-10:/news/2015/Dec/10/nsd-3.2.20-released/<p>Formerr ratelimits, expired zones are fully fetched, other fixes. Note that 3.2.x has the end-of-support announced.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.20.tar.gz">Direct Download</a></li>
</ul>
NSD 4.1.7 released2015-12-10T00:00:00+01:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2015-12-10:/news/2015/Dec/10/nsd-4.1.7-released/<p>Fix TCP on Linux and other fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.7.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.5.7 released2015-12-10T00:00:00+01:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2015-12-10:/news/2015/Dec/10/unbound-1.5.7-released/<p>Fix a validation failure, newly added qname minimisation option, and other fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.7.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-7">Changes</a></li>
</ul>
DNSSEC trigger 0.13 for OS X 10.11 released2015-12-08T00:00:00+01:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2015-12-08:/news/2015/Dec/08/dnssec-trigger-0.13-for-os-x-10.11-released/<p>Update and correct install on Mac OS X 10.11 (El Capitan) systems.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/">DNSSEC trigger project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssectrigger-0.13_20151208.dmg">Direct Download</a></li>
</ul>
Net::DNS 1.04 released2015-12-08T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2015-12-08:/news/2015/Dec/08/net::dns-1.04-released/<p>Emergency recovery and bugfix release</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2015/12/08/netdns-1-04-released/">Net::DNS 1.04 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.04.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.04/Changes">Changes</a></li>
</ul>
CDAR Root Stability Study commissioned by ICANN2015-12-03T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2015-12-03:/news/2015/Dec/03/cdar-root-stability-study-commissioned-by-icann/<p>NLnet Labs, SIDN and TNO have been commissioned by ICANN to examine the impact of the new gTLD programme on the root server system.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.icann.org/public-comments/cdar-study-plan-2015-12-02-en">Press release</a></li>
</ul>
Net::DNS 1.03 released2015-11-06T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2015-11-06:/news/2015/Nov/06/net::dns-1.03-released/<p>Better TCP support and persistent sockets for bg(send|read|isready) functions</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2015/11/06/netdns-1-03-released/">Net::DNS 1.03 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.03.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.03/Changes">Changes</a></li>
</ul>
NSD 4.1.6 released2015-10-22T00:00:00+02:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2015-10-22:/news/2015/Oct/22/nsd-4.1.6-released/<p>Fix segfault when configured with many interfaces, and fix EDNS bad version response.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.6.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.5.6 released2015-10-20T00:00:00+02:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2015-10-20:/news/2015/Oct/20/unbound-1.5.6-released/<p>Fix occasional segfault in dns64 module and smaller fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.6.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-6">Changes</a></li>
</ul>
Unbound 1.5.5 released2015-10-06T00:00:00+02:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2015-10-06:/news/2015/Oct/06/unbound-1.5.5-released/<p>Algorithm lenience, H root IP, fixes in RFC5011 code and other bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.5.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-5">Changes</a></li>
</ul>
NSD 4.1.5 released2015-09-21T00:00:00+02:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2015-09-21:/news/2015/Sep/21/nsd-4.1.5-released/<p>Fixes flaw in 4.1.4 that served 127.0.0.1 by default instead of 0.0.0.0.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.5.tar.gz">Direct Download</a></li>
</ul>
Net::DNS 1.02 released2015-09-16T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2015-09-16:/news/2015/Sep/16/net::dns-1.02-released/<p>Resolver bugfixes for handling ENTs in delegations</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2015/09/16/netdns-1-02-released/">Net::DNS 1.02 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.02.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.02/Changes">Changes</a></li>
</ul>
Net::DNS::SEC 1.02 released2015-09-16T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2015-09-16:/news/2015/Sep/16/net::dns::sec-1.02-released/<p>Bugfix in unit test</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-SEC-1.02.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns-sec/release/1.02/Changes">Changes</a></li>
</ul>
NSD 4.1.4 released2015-09-09T00:00:00+02:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2015-09-09:/news/2015/Sep/09/nsd-4.1.4-released/<p>Fix fetching expired zones with wrong serial management, fix short NSID responses, URI type.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.4.tar.gz">Direct Download</a></li>
</ul>
Net::DNS::SEC 1.01 released2015-08-03T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2015-08-03:/news/2015/Aug/03/net::dns::sec-1.01-released/<p>Crypto funcs for Net::DNS 1.01 DNSSEC RR's</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2015/08/03/netdnssec-1-01-released/">Net::DNS::SEC 1.01 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-SEC-1.01.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns-sec/release/1.01/Changes">Changes</a></li>
</ul>
getdns 0.3.1 released2015-07-18T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2015-07-18:/news/2015/Jul/18/getdns-0.3.1-released/<p>Bugfixes, native stub DNSSEC validation, lists of transports</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/checksum.html#getdns-0.3.1.tar.gz">Announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/dist/getdns-0.3.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/spec/">API specification</a></li>
</ul>
Unbound 1.5.4 released2015-07-09T00:00:00+02:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2015-07-09:/news/2015/Jul/09/unbound-1.5.4-released/<p>negative cache options, algorithm lenience option, rate limits and bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.4.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-4">Changes</a></li>
</ul>
Net::DNS 1.01 released2015-07-06T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2015-07-06:/news/2015/Jul/06/net::dns-1.01-released/<p>First major release, DNSSEC RR's integrated</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2015/07/06/netdns-1-01-released/">Net::DNS 1.01 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/download/Net-DNS-1.01.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/svn/net-dns/release/1.01/Changes">Changes</a></li>
</ul>
NLnet Labs Annual Report 20142015-06-30T00:00:00+02:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2015-06-30:/news/2015/Jun/30/nlnet-labs-annual-report-2014/<p>We are happy to present NLnet Labs Annual report 2014. In it we present an overview of Labs' various activities and describe their impact.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2014.pdf">Annual Report 2014 (PDF)</a></li>
</ul>
NSD 4.1.3 released2015-06-23T00:00:00+02:002026-03-04T07:35:16.825919+01:00NLnet Labstag:nlnetlabs.nl,2015-06-23:/news/2015/Jun/23/nsd-4.1.3-released/<p>bug fixes, fix when remove child zone, tsig hash algorithms, add long list of zones more easily.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.3.tar.gz">Direct Download</a></li>
</ul>
NSD 3.2.19 released2015-05-28T00:00:00+02:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2015-05-28:/news/2015/May/28/nsd-3.2.19-released/<p>Bugfixes, tsig hashes, CDS, CDNSKEY, DNAME TTL. End-of-life has been announced for NSD 3 support.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.19.tar.gz">Direct Download</a></li>
</ul>
NSD 3 end of support May 20th, 20162015-05-20T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2015-05-20:/news/2015/May/20/nsd-3-end-of-support-may-20th,-2016/<p>With this notification, NLnet Labs makes known the end-of-support for NSD 3. Support for NSD 3 will be continued for one year (date May 20th, 2016).</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=https://open.nlnetlabs.nl/pipermail/nsd-users/2015-May/002100.html">Email announcement</a></li>
</ul>
NSD 4.1.2 released2015-04-14T00:00:00+02:002026-03-04T07:35:16.824919+01:00NLnet Labstag:nlnetlabs.nl,2015-04-14:/news/2015/Apr/14/nsd-4.1.2-released/<p>log level 1 improvements, log notify serial, zone reader crash fixes, integer overflow bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.2.tar.gz">Direct Download</a></li>
</ul>
getdns 0.1.7 released2015-04-08T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2015-04-08:/news/2015/Apr/08/getdns-0.1.7-released/<p>Bugfixes, internal rework and printing of JSON dicts</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/checksum.html#getdns-0.1.7.tar.gz">Announcement</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/dist/getdns-0.1.7.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/spec/">API specification</a></li>
</ul>
Unbound 1.5.3 released2015-03-10T00:00:00+01:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2015-03-10:/news/2015/Mar/10/unbound-1.5.3-released/<p>Fix daemon exit after reload, and Solaris portability.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.3.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-3">Changes</a></li>
</ul>
BGP Route Leaks Analysis2015-03-06T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2015-03-06:/news/2015/Mar/06/bgp-route-leaks-analysis/<p>A route leak is a violation of the policies between the networks involved. In this project, we obtain routing information from differecent sources and make inferences to detect possible route leaks. These potential route leaks have been further investigated on their duration, the type of violation, and the type and …</p><p>A route leak is a violation of the policies between the networks involved. In this project, we obtain routing information from differecent sources and make inferences to detect possible route leaks. These potential route leaks have been further investigated on their duration, the type of violation, and the type and origin of network that caused the leak-detection.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/msc-thesis-wijchers.pdf">MSc. report (PDF)</a></li>
</ul>
Net::DNS 0.83 released2015-02-26T00:00:00+01:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2015-02-26:/news/2015/Feb/26/net::dns-0.83-released/<p>Bug fixes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2015/02/26/netdns-0-83-released/">Net::DNS 0.83 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.83.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.83/Changes">Changes</a></li>
</ul>
Unbound 1.5.2 released2015-02-19T00:00:00+01:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2015-02-19:/news/2015/Feb/19/unbound-1.5.2-released/<p>Fix validation failure, poison issue with harden-glue off, and add RPZ-style 'inform' local-zone, and control over unix pipes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-2">Changes</a></li>
</ul>
Net::DNS::SEC 0.22 released2015-02-11T00:00:00+01:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2015-02-11:/news/2015/Feb/11/net::dns::sec-0.22-released/<p>RRSIG inception and exception in time values, ECDSA and Gost signature creation and verification, Version requirements detection for optional modules</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2015/02/11/netdnssec-0-22-released/">Net::DNS::SEC 0.22 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-SEC-0.22.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns-sec/release/0.22/Changes">Changes</a></li>
</ul>
Akkerhuis selected for DNS Root Zone KSK design team2015-02-05T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2015-02-05:/news/2015/Feb/05/akkerhuis-selected-for-dns-root-zone-ksk-design-team/<p>Jaap Akkerhuis from NLnet Labs has been selected for the DNS Root Zone KSK rollover plan design team.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.icann.org/news/announcement-2-2015-02-04-en">ICANN Announcements</a></li>
</ul>
NSD 4.1.1 released2015-02-03T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2015-02-03:/news/2015/Feb/03/nsd-4.1.1-released/<p>zonestatistics, DNAME's CNAME TTL. Fixes for database growth, spinning, and other bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.1.tar.gz">Direct Download</a></li>
</ul>
Net::DNS 0.82 released2015-01-20T00:00:00+01:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2015-01-20:/news/2015/Jan/20/net::dns-0.82-released/<p>Single bug fix</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2015/01/20/netdns-0-82-released/">Net::DNS 0.82 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.82.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.82/Changes">Changes</a></li>
</ul>
Unbound 1.5.1 released2014-12-08T00:00:00+01:002026-03-04T07:35:16.841919+01:00NLnet Labstag:nlnetlabs.nl,2014-12-08:/news/2014/Dec/08/unbound-1.5.1-released/<p>CVE-2014-8602 denial of service fixed. Crash fix, compile fix. AAAA-filter patch.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-1">Changes</a></li>
</ul>
Unbound 1.5.0 released2014-11-18T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2014-11-18:/news/2014/Nov/18/unbound-1.5.0-released/<p>DNS64, DNSTAP, better random numbers and ub_ctx_add_ta_autr(), num.query.tcpout=value, flush_negative, unblock-lan-zones conf and bug fixes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.5.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-5-0">Changes</a></li>
</ul>
ISC and NLnet Labs Joins Forces2014-11-10T00:00:00+01:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2014-11-10:/news/2014/Nov/10/isc-and-nlnet-labs-joins-forces/<p>ISC and NLnet Labs have signed an agreement to make available a combined Advance Security Notification subscription on their software products.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/labs/news/collaboration-isc.html">Press release</a></li>
</ul>
getdns 0.1.5 beta released2014-10-31T00:00:00+01:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2014-10-31:/news/2014/Oct/31/getdns-0.1.5-beta-released/<p>Bugfixes and Hop-by-hop features for stub resolution</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/">Poject page</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/dist/getdns-0.1.5.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/spec/">API specification</a></li>
</ul>
Net::DNS 0.81 released2014-10-29T00:00:00+01:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-10-29:/news/2014/Oct/29/net::dns-0.81-released/<p>Bug fixes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/10/29/netdns-0-81-released/">Net::DNS 0.81 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.81.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.81/Changes">Changes</a></li>
</ul>
Net::DNS::SEC 0.21 released2014-10-24T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2014-10-24:/news/2014/Oct/24/net::dns::sec-0.21-released/<p>Single bugfix: canonicalize RRSIG's Signer Name</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/10/24/netdnssec-0-21-released/">Net::DNS::SEC 0.21 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-SEC-0.21.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns-sec/release/0.21/Changes">Changes</a></li>
</ul>
Net::DNS 0.80 released2014-09-22T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-09-22:/news/2014/Sep/22/net::dns-0.80-released/<p>Single bugfix: Suppress "Too late to run INIT block ..." warnings</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/09/22/netdns-0-80-released/">Net::DNS 0.80 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.80.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.80/Changes">Changes</a></li>
</ul>
NSD 4.1.0 released2014-09-04T00:00:00+02:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2014-09-04:/news/2014/Sep/04/nsd-4.1.0-released/<p>features for less memory use, faster read/write, wildcard includes. Bugfixes, fixes slowdown after a long time.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.1.0.tar.gz">Direct Download</a></li>
</ul>
getdns 0.1.4 beta released2014-09-03T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2014-09-03:/news/2014/Sep/03/getdns-0.1.4-beta-released/<p>The fourth beta release of an open source implementation of the getdns API specification. This is an collaborative effort with Verisign and No Mountain Software.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/">Poject page</a></li>
<li><a class="reference external" href="proxy.php?url=https://getdnsapi.net/dist/getdns-0.1.4.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.vpnc.org/getdns-api/">API specification</a></li>
</ul>
Wanted: software developer and senior developer/architect2014-09-01T00:00:00+02:002026-03-04T07:35:16.845901+01:00NLnet Labstag:nlnetlabs.nl,2014-09-01:/news/2014/Sep/01/wanted:-software-developer-and-senior-developer/<p>We are looking for a software developer and a senior developer/architect to design and implement Open Source Software used in the heart of the Internet.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/labs/employment/">Employment</a></li>
</ul>
Net::DNS 0.79 released2014-08-22T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-08-22:/news/2014/Aug/22/net::dns-0.79-released/<p>Bug fixes, Android OS support, OPENPGPKEY RR and a Net::DNS::Resolver::Recurse makeover</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/08/22/netdns-0-79-released/">Net::DNS 0.79 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.79.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.79/Changes">Changes</a></li>
</ul>
Net::DNS::SEC 0.20 released2014-08-15T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2014-08-15:/news/2014/Aug/15/net::dns::sec-0.20-released/<p>Single bugfix: parsing of zero NSEC3 salt</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/08/15/netdnssec-0-20-released/">Net::DNS::SEC 0.20 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-SEC-0.20.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns-sec/release/0.20/Changes">Changes</a></li>
</ul>
BGP Evolution Analysis2014-07-31T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2014-07-31:/news/2014/Jul/31/bgp-evolution-analysis/<p>The Internet has been growing rapidly for many years. A logical consequence of the growth trend is the increase in effort to discover reachability and routing information of all the networks. The project investigates the different components which together form the actual update message signal and tries to find a …</p><p>The Internet has been growing rapidly for many years. A logical consequence of the growth trend is the increase in effort to discover reachability and routing information of all the networks. The project investigates the different components which together form the actual update message signal and tries to find a reason behind the growth factor.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/msc-thesis-blankers.pdf">MSc. report (PDF)</a></li>
</ul>
NSD 3.2.18 released2014-07-28T00:00:00+02:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2014-07-28:/news/2014/Jul/28/nsd-3.2.18-released/<p>Bugfix release</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.18.tar.gz">Direct Download</a></li>
</ul>
Net::DNS 0.78 released2014-07-10T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-07-10:/news/2014/Jul/10/net::dns-0.78-released/<p>Primarily bug fixes and multiline printing of TXT rdata</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/07/10/netdns-0-78-released/">Net::DNS 0.78 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.78.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.78/Changes">Changes</a></li>
</ul>
Measuring the Deployment of DNSSEC over the Internet2014-07-02T00:00:00+02:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2014-07-02:/news/2014/Jul/02/measuring-the-deployment-of-dnssec-over-the-internet/<p>The deployment of DNSSEC is measured with the RIPE Atlas infrastructure. The results provide new insight on the distribution of DNSSEC support among resolvers, and notably show that around 90% of resolvers are DNSSEC-aware, and about 30% validate answers.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/report-rp2-canceill.pdf">MSc. report (PDF)</a></li>
</ul>
Net::DNS 0.77 released2014-06-13T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-06-13:/news/2014/Jun/13/net::dns-0.77-released/<p>Fixing recent regressions, introducing an iterator interface to axfr() and more robust and secure resolver configuration processing</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/06/13/netdns-0-77-released/">Net::DNS 0.77 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.77.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.77/Changes">Changes</a></li>
</ul>
NLnet Labs Annual Report 20132014-05-27T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2014-05-27:/news/2014/May/27/nlnet-labs-annual-report-2013/<p>We are happy to present NLnet Labs Annual report 2013. In it we present an overview of Labs' various activities and describe their impact.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2013.pdf">Annual Report 2013 (PDF)</a></li>
</ul>
Net::DNS 0.76 released2014-05-23T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-05-23:/news/2014/May/23/net::dns-0.76-released/<p>OrderedDict([('tt', ['/etc/resolv.conf', 'nameserver']), ('#text', 'This is an emergency release fixing the parsing bug that evaluated only the last line.')])</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/05/23/netdns-0-76-emergency-release/">Net::DNS 0.76 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.76.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.76/Changes">Changes</a></li>
</ul>
Dnssec-Trigger 0.12 released2014-05-22T00:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2014-05-22:/news/2014/May/22/dnssec-trigger-0.12-released/<p>experimental package that provides DNSSEC on personal computers. Bug fixes, ip address change in default config, software update.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.12.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Net::DNS 0.75 released2014-05-08T00:00:00+02:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-05-08:/news/2014/May/08/net::dns-0.75-released/<p>Besides bugfixes zone transfers can now be TSIG verified</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/05/08/netdns-0-75-released/">Net::DNS 0.75 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.75.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.75/Changes">Changes</a></li>
</ul>
Net::DNS::SEC 0.18 released2014-05-08T00:00:00+02:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2014-05-08:/news/2014/May/08/net::dns::sec-0.18-released/<p>Bugfixes and exploit new Net::DNS architecture</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/05/08/netdnssec-0-18-released/">Net::DNS::SEC 0.18 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-SEC-0.18.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns-sec/release/0.18/Changes">Changes</a></li>
</ul>
NSD 4.0.3 released2014-03-14T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2014-03-14:/news/2014/Mar/14/nsd-4.0.3-released/<p>Fix start-stop problems.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.0.3.tar.gz">Direct Download</a></li>
</ul>
NSD 4.0.2 released2014-03-12T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2014-03-12:/news/2014/Mar/12/nsd-4.0.2-released/<p>Fix memory leaks. Fix ipv6 by disable of recvmmsg. REFUSED for nonhosted zones.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.0.2.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.4.22 released2014-03-12T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2014-03-12:/news/2014/Mar/12/unbound-1.4.22-released/<p>no libldns dependency, fix trustanchor full filesystem, fix lenience on validation of nxdomain empty nonterminals</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.22.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-22">Changes</a></li>
</ul>
getdns 0.1.0 beta released2014-02-26T00:00:00+01:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2014-02-26:/news/2014/Feb/26/getdns-0.1.0-beta-released/<p>The first beta release of an open source implementation of the getdns API specification. This is an collaborative effort with Verisign and No Mountain Software.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://getdnsapi.net/">Poject page</a></li>
<li><a class="reference external" href="proxy.php?url=http://getdnsapi.net/dist/getdns-0.1.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.vpnc.org/getdns-api/">API specification</a></li>
</ul>
Open Data Analysis to Retrieve Sensitive Information Regarding National-Centric Critical Infrastructures2014-02-03T00:00:00+01:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2014-02-03:/news/2014/Feb/03/open-data-analysis-to-retrieve-sensitive-information-regarding-national-centric-critical-infrastructures/<p>Open Data repositories store a variety of information from country governments and private sectors. A concern is that with publishing data, sensitive information can be obtained by visual analytic techniques. The report shows that it is possible to retrieve precise locations where critical infrastructures overlap.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/RP45%20Open%20Data%20Analysis%20-%20Critical%20infrastructures.pdf">MSc. report (PDF …</a></li></ul><p>Open Data repositories store a variety of information from country governments and private sectors. A concern is that with publishing data, sensitive information can be obtained by visual analytic techniques. The report shows that it is possible to retrieve precise locations where critical infrastructures overlap.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/RP45%20Open%20Data%20Analysis%20-%20Critical%20infrastructures.pdf">MSc. report (PDF)</a></li>
</ul>
NSD 3.2.17 released2014-01-27T00:00:00+01:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2014-01-27:/news/2014/Jan/27/nsd-3.2.17-released/<p>Bug fixes and CAA RRtype added.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.17.tar.gz">Direct Download</a></li>
</ul>
NSD 4.0.1 released2014-01-27T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2014-01-27:/news/2014/Jan/27/nsd-4.0.1-released/<p>Fix segfaults for type WKS, for NSEC3-IXFRs in a co-hosted parent and child zone situation. CAA, EUI48, EUI64 support. smaller fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.0.1.tar.gz">Direct Download</a></li>
</ul>
Net::DNS 0.74 released2014-01-16T00:00:00+01:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2014-01-16:/news/2014/Jan/16/net::dns-0.74-released/<p>Resolves a pressing bug with TSIG. Support for CAA, EUI48 and EUI64 RR types</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2014/01/16/netdns-0-74-released/">Net::DNS 0.74 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.74.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.74/Changes">Changes</a></li>
</ul>
ldns 1.6.17 released2014-01-10T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2014-01-10:/news/2014/Jan/10/ldns-1.6.17-released/<p>Many bugfixes, All current (draft) RR types implemented, Better ldns-verify-zone performance and Perl5 bindings with the <a class="reference external" href="proxy.php?url=DNS::LDNS">DNS::LDNS</a> module.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.17.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://git.nlnetlabs.nl/ldns/tree/Changelog?id=release-1.6.17">Changes</a></li>
</ul>
Securing the last mile of DNS with CGA-TSIG2014-01-08T00:00:00+01:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2014-01-08:/news/2014/Jan/08/securing-the-last-mile-of-dns-with-cga-tsig/<p>TSIG with shared keys is not scalable as a solution for the DNS last mile problem. CGA-TSIG extends TSIG with CGA so that shared secrets are no longer required. This research investigates the CGA-TSIG proposal by doing a security analysis and by making a PoC implementation in ldns.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links …</p><p>TSIG with shared keys is not scalable as a solution for the DNS last mile problem. CGA-TSIG extends TSIG with CGA so that shared secrets are no longer required. This research investigates the CGA-TSIG proposal by doing a security analysis and by making a PoC implementation in ldns.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/report-rp2-buijsman.pdf">MSc. report (PDF)</a></li>
</ul>
DNSSEC Audit Framework2013-12-30T00:00:00+01:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2013-12-30:/news/2013/Dec/30/dnssec-audit-framework/<p>In collaboration with SWITCH, the .CH and .LI registry, we have created a DNSSEC audit framework, that can be used to conduct a review of your or someone else's DNSSEC implementation.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/dns-audit-framework-1.0.pdf">PDF</a></li>
</ul>
Net::DNS 0.73 released2013-11-29T00:00:00+01:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2013-11-29:/news/2013/Nov/29/net::dns-0.73-released/<p>Bugfixes, TSIG validation and TSIG support for HMAC-SHA1 .. HMAC-SHA512</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2013/11/29/netdns-0-73-released/">Net::DNS 0.73 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.73.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.73/Changes">Changes</a></li>
</ul>
NSD 4.0.0 released2013-10-29T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2013-10-29:/news/2013/Oct/29/nsd-4.0.0-released/<p>New major release with many features: dynamically reconfig to add and remove zones, more TCP support, many more zones loaded, faster speed.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-4.0.0.tar.gz">Direct Download</a></li>
</ul>
NLnet Labs Strategic Plan 20142013-10-09T00:00:00+02:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2013-10-09:/news/2013/Oct/09/nlnet-labs-strategic-plan-2014/<p>This is the first time we post this type of plan publicly. With this plan we intend to communicate who we are and where we are going, it serves the NLnet Labs Board and Staff but also the parties that support our mission and want to contribute financially.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links …</p><p>This is the first time we post this type of plan publicly. With this plan we intend to communicate who we are and where we are going, it serves the NLnet Labs Board and Staff but also the parties that support our mission and want to contribute financially.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/labs/about/Strategic-Plan2014.pdf">Strategic Plan(PDF)</a></li>
</ul>
Unbound 1.4.21 released2013-09-19T00:00:00+02:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2013-09-19:/news/2013/Sep/19/unbound-1.4.21-released/<p>bugfixes, y2038k, add_insecure, more includes, max-udp</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.21.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-21">Changes</a></li>
</ul>
Experiences with MPTCP in an International OpenFlow Network2013-09-03T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2013-09-03:/news/2013/Sep/03/experiences-with-mptcp-in-an-international-openflow-network/<p>Keeping up with the network demand in order to transfer these data sets over the Internet is a challenge. Single links do not have enough capacity anymore. Therefore we need to install more interfaces in the servers and use all available paths in the network. In this paper we describe …</p><p>Keeping up with the network demand in order to transfer these data sets over the Internet is a challenge. Single links do not have enough capacity anymore. Therefore we need to install more interfaces in the servers and use all available paths in the network. In this paper we describe two new technologies that help to optimally use the capacity of all multiple paths simultaneously: OpenFlow and Multipath TCP (MPTCP).</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://tnc2013.terena.org/getfile/872">TNC2013 paper (PDF)</a></li>
</ul>
Discovery and Mapping of the Dutch National Critical IP Infrastructure2013-08-12T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2013-08-12:/news/2013/Aug/12/discovery-and-mapping-of-the-dutch-national-critical-ip-infrastructure/<p>The research project entails the mapping and subsequent analysis of the AS-level interconnections between the organisations active as the Dutch critical infrastructure. One of the conclusions is that the Dutch critical infrastructure organisations are well interconnected but rely a lot on foreign entities for IP transit and even for carrying …</p><p>The research project entails the mapping and subsequent analysis of the AS-level interconnections between the organisations active as the Dutch critical infrastructure. One of the conclusions is that the Dutch critical infrastructure organisations are well interconnected but rely a lot on foreign entities for IP transit and even for carrying potentially sensitive information via web and email services.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/RP2_report_Mapping_the_Dutch_Critical_Infrastructure.pdf">MSc. report (PDF)</a></li>
</ul>
NSD 3.2.16 released2013-07-22T00:00:00+02:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2013-07-22:/news/2013/Jul/22/nsd-3.2.16-released/<p>EUI48 and EUI64 RR types, improvements to RRL, new config options.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.16.tar.gz">Direct Download</a></li>
</ul>
Identifying Patterns in DNS Traffic2013-07-09T00:00:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2013-07-09:/news/2013/Jul/09/identifying-patterns-in-dns-traffic/<p>A visual analytics approach is used on a large set of DNS packet captures to gain insight into ways that authoritative name servers are abused for denial of service attacks. Several tools were developed to identify patterns in DNS queries and responses.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/report-rp2-lexis.pdf">MSc. report (PDF)</a></li>
</ul>
Wanted: Systems engineer2013-06-17T00:00:00+02:002026-03-04T07:35:16.845901+01:00NLnet Labstag:nlnetlabs.nl,2013-06-17:/news/2013/Jun/17/wanted:-systems-engineer/<p>We are looking for a Junior Systems Engineer to provide support, maintain systems and design and implement Open Source Software used in the heart of the Internet.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/labs/employment/">Employment</a></li>
</ul>
NLnet Labs Annual Report 20122013-05-27T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2013-05-27:/news/2013/May/27/nlnet-labs-annual-report-2012/<p>We are happy to present NLnet Labs Annual report 2012. NLnet Labs is active in those areas where a long-breath can have a profound impact on the Internet societal value and 2012 was an interesting year in all areas on which NLnet Labs is active.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2012.pdf">Annual Report 2012 …</a></li></ul><p>We are happy to present NLnet Labs Annual report 2012. NLnet Labs is active in those areas where a long-breath can have a profound impact on the Internet societal value and 2012 was an interesting year in all areas on which NLnet Labs is active.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2012.pdf">Annual Report 2012 (PDF)</a></li>
</ul>
OpenDNSSEC 1.4.0 released2013-04-22T00:00:00+02:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2013-04-22:/news/2013/Apr/22/opendnssec-1.4.0-released/<p>Version 1.4.0 of OpenDNSSEC has now been released. It includes support for AXFR and IXFR, both input and output; HSM login; and more. Also the Auditor is deprecated.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org/2013/04/22/opendnssec-1-4-0/">More information</a></li>
</ul>
Unbound 1.4.20 released2013-03-21T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2013-03-21:/news/2013/Mar/21/unbound-1.4.20-released/<p>bugfixes, TTL from libunbound</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.20.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-20">Changes</a></li>
</ul>
Making do with what we've got: Using PMTUD for a higher DNS responsiveness2013-02-28T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2013-02-28:/news/2013/Feb/28/making-do-with-what-we've-got:-using-pmtud-for-a-higher-dns-responsiveness/<p>Exploration of improving DNS with IPv6 by responding to ICMPv6 PTB messages</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/report-report-pmtud-bagheri-boteanu.pdf">PDF</a></li>
</ul>
OpenDNSSEC 1.3.13 released2013-02-20T00:00:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2013-02-20:/news/2013/Feb/20/opendnssec-1.3.13-released/<p>Bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Defending against DNS reflection amplification attacks2013-02-18T00:00:00+01:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2013-02-18:/news/2013/Feb/18/defending-against-dns-reflection-amplification-attacks/<p>Measurements and analysis of defense mechanisms against DNS reflection and amplification attacks.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/report-rrl-dekoning-rozekrans.pdf">PDF</a></li>
</ul>
NSD 3.2.15 released2013-02-04T00:00:00+01:002026-03-04T07:35:16.821919+01:00NLnet Labstag:nlnetlabs.nl,2013-02-04:/news/2013/Feb/04/nsd-3.2.15-released/<p>RRL, ILNP RR types, improved TSIG initialization, bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.15.tar.gz">Direct Download</a></li>
</ul>
Net::DNS 0.72 released2012-12-28T00:00:00+01:002026-03-04T07:35:16.816919+01:00NLnet Labstag:nlnetlabs.nl,2012-12-28:/news/2012/Dec/28/net::dns-0.72-released/<p>Minor bugfix release which resolves issues with TSIG introduced in 0.69.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.net-dns.org/blog/2012/12/28/netdns-0-72-released/">Net::DNS 0.72 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.72.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.72/Changes">Changes</a></li>
</ul>
RFC6781: DNSSEC Operational Practices, Version 22012-12-24T00:00:00+01:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2012-12-24:/news/2012/Dec/24/rfc6781:-dnssec-operational-practices,-version-2/<p>An updated set of practices for operating the DNS with security extensions (DNSSEC).</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://tools.ietf.org/html/rfc6781">RFC6781</a></li>
</ul>
Net::DNS 0.71 released2012-12-15T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2012-12-15:/news/2012/Dec/15/net::dns-0.71-released/<p>Critical bugfixes. A temporary workaround to make sa-update tick again.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2012/12/16/netdns-version-0-71-released/">Net::DNS 0.71 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.71.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.71/Changes">Changes</a></li>
</ul>
Unbound 1.4.19 released2012-12-12T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2012-12-12:/news/2012/Dec/12/unbound-1.4.19-released/<p>bugfixes, RSAMD5 deprecated</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.19.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-19">Changes</a></li>
</ul>
Net::DNS 0.70 released2012-12-06T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2012-12-06:/news/2012/Dec/06/net::dns-0.70-released/<p>OrderedDict([('br', None), ('#text', 'Internationalized Domain Names support in owner names and rdata fields.n Everything new in 0.69 + RFC6742 support')])</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2012/12/05/netdns-0-69-released/">Net::DNS 0.69 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.70.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.70/Changes">Changes</a></li>
</ul>
OpenDNSSEC 1.3.12 released2012-12-03T00:00:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2012-12-03:/news/2012/Dec/03/opendnssec-1.3.12-released/<p>Bugfix release. For downloads and more information about future releaseplans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Net::DNS::SEC 0.17 released2012-11-29T00:00:00+01:002026-03-04T07:35:16.817919+01:00NLnet Labstag:nlnetlabs.nl,2012-11-29:/news/2012/Nov/29/net::dns::sec-0.17-released/<p>Bugfixes and validation of wildcard RR sets</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/2013/11/29/netdnssec-0-17-released/">Net::DNS::SEC 0.17 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-SEC-0.17.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns-sec/release/0.17/Changes">Changes</a></li>
</ul>
ldns 1.6.16 released2012-11-13T00:00:00+01:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2012-11-13:/news/2012/Nov/13/ldns-1.6.16-released/<p>OrderedDict([('br', None), ('#text', 'ldns 1.6.14 and ldns 1.6.15 had a bug in creating empty bitmaps for NSEC3 on empty non-terminals; and were unable to build a loadable pyldns module.This release has those two bugs resolved.')])</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.16.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.16/Changelog">Changes</a></li>
</ul>
OpenDNSSEC 1.3.11 released2012-11-13T00:00:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2012-11-13:/news/2012/Nov/13/opendnssec-1.3.11-released/<p>Bugfix release. For downloads and more information about future releaseplans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
NSD 3.2.14 released2012-11-01T00:00:00+01:002026-03-04T07:35:16.821919+01:00NLnet Labstag:nlnetlabs.nl,2012-11-01:/news/2012/Nov/01/nsd-3.2.14-released/<p>Bugfix release and TCP writev support, to improve TCP performance. See link for more information.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=https://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.14.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=https://labs.ripe.net/Members/bwijnen/tcp-udp-dns-soa-rt-ratio">RIPE Labs: Comparing TCP and UDP Response Times of DNS Root Servers</a></li>
</ul>
ldns 1.6.15 released2012-10-25T00:00:00+02:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2012-10-25:/news/2012/Oct/25/ldns-1.6.15-released/<p>OrderedDict([('br', None), ('#text', 'Emergency release restoring binary compatibility with previous releases.ldns 1.6.14 had:n Many bugfixes thanks to code reviews, A big pyldns update and DANE support (RFC 6698), including a new example tool: ldns-dane for verifying and creating TLSA records.')])</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page …</a></li></ul><p>OrderedDict([('br', None), ('#text', 'Emergency release restoring binary compatibility with previous releases.ldns 1.6.14 had:n Many bugfixes thanks to code reviews, A big pyldns update and DANE support (RFC 6698), including a new example tool: ldns-dane for verifying and creating TLSA records.')])</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.15.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.15/Changelog">Changes</a></li>
</ul>
ldns 1.6.14 released2012-10-23T00:00:00+02:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2012-10-23:/news/2012/Oct/23/ldns-1.6.14-released/<p>Many bugfixes thanks to code reviews, A big pyldns update and DANE support (RFC 6698), including a new example tool: ldns-dane for verifying and creating TLSA records.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.14.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.14/Changelog">Changes</a></li>
</ul>
OpenDNSSEC 1.3.10 released2012-10-08T00:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2012-10-08:/news/2012/Oct/08/opendnssec-1.3.10-released/<p>Bugfix release. For downloads and more information about future releaseplans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
We have a Blog2012-09-14T00:00:00+02:002026-03-04T07:35:16.845901+01:00NLnet Labstag:nlnetlabs.nl,2012-09-14:/news/2012/Sep/14/we-have-a-blog/<p>NLnet Labs now maintains a blog. We use it to publish (technical) background informagion about design and the use of our software and other material relevant to the community.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/blog/">Blog Pages</a></li>
</ul>
Resilient OpenDNSSEC (MSc. thesis)2012-08-20T00:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2012-08-20:/news/2012/Aug/20/resilient-opendnssec-(msc.-thesis)/<p>This thesis analyses error situations in securing DNS zones with OpenDNSSEC. Recommendations are presented to increase the resilience level that OpenDNSSEC can offer against such situations.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/Aleksandar-Kasabov-OpenDNSSEC.pdf">PDF</a></li>
</ul>
Unbound 1.4.18 released2012-08-02T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2012-08-02:/news/2012/Aug/02/unbound-1.4.18-released/<p>bugfixes: assertion failures, validator failure</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.18.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-18">Changes</a></li>
</ul>
NSD 3.2.13 released2012-07-27T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2012-07-27:/news/2012/Jul/27/nsd-3.2.13-released/<p>Emergency release fixing another denial of service vulnerability [ VU#517036 CVE-2012-2979 ], a bugfix and a typo.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.13.tar.gz">Direct Download</a></li>
</ul>
Discovering Path MTU black holes on the Internet using RIPE Atlas (MSc. thesis)2012-07-23T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2012-07-23:/news/2012/Jul/23/discovering-path-mtu-black-holes-on-the-internet-using-ripe-atlas-(msc.-thesis)/<p>Measurement and analysis of Path MTU black holes due to ICMP and packet fragment filtering on the Internet.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/pmtu-black-holes-msc-thesis.pdf">PDF</a></li>
</ul>
NSD 3.2.12 released2012-07-19T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2012-07-19:/news/2012/Jul/19/nsd-3.2.12-released/<p>Emergency release fixing a denial of service vulnerability from non-standard DNS packet from any host on the internet. [ VU#624931 CVE-2012-2978 ]</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.12.tar.gz">Direct Download</a></li>
</ul>
NSD 3.2.11 released2012-07-09T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2012-07-09:/news/2012/Jul/09/nsd-3.2.11-released/<p>TLSA/DANE support, ECDSA, per zone statistics and a couple of bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.11.tar.gz">Direct Download</a></li>
</ul>
Credns 0.2.10 released2012-06-22T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-22:/news/2012/Jun/22/credns-0.2.10-released/<p>Software program aimed at fortifying DNSSEC by performing validation in the DNS notify/transfer-chain.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/credns">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/credns/credns-0.2.10.tar.gz">Direct Download</a></li>
</ul>
OpenDNSSEC 1.3.9 released2012-06-18T00:00:00+02:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-18:/news/2012/Jun/18/opendnssec-1.3.9-released/<p>Bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
RFC 6605: ECDSA for DNSSEC2012-06-18T00:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-18:/news/2012/Jun/18/rfc-6605:-ecdsa-for-dnssec/<p>This document describes how to specify Elliptic Curve DigitalSignature Algorithm (DSA) keys and signatures in DNS Security(DNSSEC).</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://tools.ietf.org/html/rfc6605">RFC6605</a></li>
</ul>
RFC6635: RFC Editor Model (2)2012-06-18T00:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-18:/news/2012/Jun/18/rfc6635:-rfc-editor-model-(2)/<p>This document describes the the RFC Series functions: the RFC Series Editor,the RFC Production Center, and the RFC Publisher.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://tools.ietf.org/html/rfc6635">RFC6635</a></li>
</ul>
RFC6672: DNAME redirection in the DNS2012-06-18T00:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-18:/news/2012/Jun/18/rfc6672:-dname-redirection-in-the-dns/<p>The DNAME record provides redirection for a subtree of the domainname tree in the DNS.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://tools.ietf.org/html/rfc6672">RFC6672</a></li>
</ul>
NLnet Labs Annual Report 20112012-06-08T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-08:/news/2012/Jun/08/nlnet-labs-annual-report-2011/<p>We are happy to present NLnet Labs Annual report 2011. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2011.pdf">Annual Report 2011 …</a></li></ul><p>We are happy to present NLnet Labs Annual report 2011. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2011.pdf">Annual Report 2011 (PDF)</a></li>
</ul>
Dnssec-Trigger 0.11 released2012-06-07T00:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-07:/news/2012/Jun/07/dnssec-trigger-0.11-released/<p>experimental package that provides DNSSEC on personal computers. Bug fixes, hotspot detection, software update.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.11.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Roelof Meijer joins NLnet Labs' board2012-06-04T00:00:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2012-06-04:/news/2012/Jun/04/roelof-meijer-joins-nlnet-labs'-board/<p>As of May 31 Roelof Meijer is a member of the NLnet Labs' Board. Roelof is the CEO of SIDN, the Dutch TLD-registry which is one of the major financial contributors of NLnet Labs.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/labs/about/">About NLnet Labs</a></li>
</ul>
Unbound 1.4.17 released2012-05-24T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2012-05-24:/news/2012/May/24/unbound-1.4.17-released/<p>bugfixes, roundrobin, ECDSA</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.17.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-17">Changes</a></li>
</ul>
ldns 1.6.13 released2012-05-21T00:00:00+02:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2012-05-21:/news/2012/May/21/ldns-1.6.13-released/<p>Bugfixes, ECDSA support (RFC 6605) & new commandline options to ldns-verify-zone for specifying keys, whether or not to sigchase, and inception and expiration offsets.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.13.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.13/Changelog">Changes</a></li>
</ul>
OpenDNSSEC 1.3.8 released2012-05-14T00:00:00+02:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2012-05-14:/news/2012/May/14/opendnssec-1.3.8-released/<p>Minor features and two bugfixes. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Flexible and Robust Key Rollover in DNSSEC2012-03-28T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2012-03-28:/news/2012/Mar/28/flexible-and-robust-key-rollover-in-dnssec/<p>Paper describing the OpenDNSSEC Enforcer NG design, presented at SATIN 2012.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/downloads/publications/satin2012-Schaeffer.pdf">PDF</a></li>
</ul>
OpenDNSSEC 1.3.7 released2012-03-13T00:00:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2012-03-13:/news/2012/Mar/13/opendnssec-1.3.7-released/<p>Bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Dnssec-Trigger 0.10 released2012-02-17T00:00:00+01:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2012-02-17:/news/2012/Feb/17/dnssec-trigger-0.10-released/<p>experimental package that provides DNSSEC on personal computers. Bug fixes, easier hotspot, no two popups, installer fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.10.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
OpenDNSSEC 1.3.6 released2012-02-17T00:00:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2012-02-17:/news/2012/Feb/17/opendnssec-1.3.6-released/<p>Bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Unbound/DnssecTrigger workshop at Augsburger Linutage2012-02-17T00:00:00+01:002026-03-04T07:35:16.844919+01:00NLnet Labstag:nlnetlabs.nl,2012-02-17:/news/2012/Feb/17/unbound/<p>Free Unbound/DNSSEC Trigger workshop at Augsburger Linux Infotage by Carsten Strotmann, 24 March.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.luga.de/Aktionen/LIT-2012/Programm/">Programm</a></li>
</ul>
NSD 3.2.10 released2012-02-15T00:00:00+01:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2012-02-15:/news/2012/Feb/15/nsd-3.2.10-released/<p>Bugfix release.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.10.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.4.16 released2012-02-02T00:00:00+01:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2012-02-02:/news/2012/Feb/02/unbound-1.4.16-released/<p>Fixes bug in bugfix from 1.4.15, and other bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.16.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-16">Changes</a></li>
</ul>
Net::DNS 0.68 released2012-01-30T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2012-01-30:/news/2012/Jan/30/net::dns-0.68-released/<p>Bugfixes and Internationalized Domain Names support in queries</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/acrchive/netdns-version-0-68-released/">Net::DNS 0.68 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/download/Net-DNS-0.68.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.68/Changes">Changes</a></li>
</ul>
Unbound 1.4.15 released2012-01-26T00:00:00+01:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2012-01-26:/news/2012/Jan/26/unbound-1.4.15-released/<p>Bugfixes: fix memory leak, hash randomized.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.15.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-15">Changes</a></li>
</ul>
Collaboration between SIDN and NLnet Labs2012-01-23T00:00:00+01:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2012-01-23:/news/2012/Jan/23/collaboration-between-sidn-and-nlnet-labs/<p>SIDN, the company behind .nl, today signed a five-year contract with NLnet Labs. NLnet Labs - the Dutch internet technology expertise centre - has a worldwide reputation for its work in the field of DNS and DNSSEC. Through its financial backing for NLnet Labs, SIDN aims to support not only the continued …</p><p>SIDN, the company behind .nl, today signed a five-year contract with NLnet Labs. NLnet Labs - the Dutch internet technology expertise centre - has a worldwide reputation for its work in the field of DNS and DNSSEC. Through its financial backing for NLnet Labs, SIDN aims to support not only the continued development of DNS applications such as Unbound and NSD, but also NLnet Labs' general internet R&D work, at least for the next five years.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/labs/news/collaboration-sidn.html">Press Announcement</a></li>
</ul>
Authenticated Denial of Existence in the DNS (part 2)2012-01-16T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2012-01-16:/news/2012/Jan/16/authenticated-denial-of-existence-in-the-dns-(part-2)/<p>A new version of the paper on denial of existence in the DNS and how the protocol evolved. Version 2.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=https://www.sidn.nl/fileadmin/docs/PDF-files_UK/wp-2011-0x01-v2.pdf">PDF</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.sidnlabs.nl/laatste-berichten/nieuwsdetail/article/nieuwe-versie-sidn-nsec3-white-paper-beschikbaar/">Blog article at sidnlabs.nl (Dutch)</a></li>
</ul>
ldns 1.6.12 released2012-01-11T00:00:00+01:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2012-01-11:/news/2012/Jan/11/ldns-1.6.12-released/<p>Bugfixes (including the date transposition flaw) and minor new features such as: user definable <tt class="docutils literal">current</tt> time, SOA serial update functions and improvements of the build system.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.12.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.12/Changelog">Changes</a></li>
</ul>
Dnssec-Trigger 0.9 released2011-12-19T00:00:00+01:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2011-12-19:/news/2011/Dec/19/dnssec-trigger-0.9-released/<p>experimental package that provides DNSSEC on personal computers. unbound 1.4.14 in binary packages. minor fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.9.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Unbound 1.4.14 released2011-12-19T00:00:00+01:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2011-12-19:/news/2011/Dec/19/unbound-1.4.14-released/<p>Fix [VU#209659 CVE-2011-4528]. Bugfixes, small features.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.14.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-14">Changes</a></li>
</ul>
Unbound advisory (CVE-2011-4528)2011-12-19T00:00:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2011-12-19:/news/2011/Dec/19/unbound-advisory-(cve-2011-4528)/<p>Denial-of-Service vulnerabilities</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://unbound.net/downloads/CVE-2011-4528.txt">advisory</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.kb.cert.org/vuls/id/209659">US-CERT VU#209659</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2011-4528">MITRE CVE-2011-4528</a></li>
</ul>
Dnssec-Trigger 0.8 released2011-12-13T00:00:00+01:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2011-12-13:/news/2011/Dec/13/dnssec-trigger-0.8-released/<p>experimental package that provides DNSSEC on personal computers. important bugfixes, SSL fallback.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.8.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
NSD 3.2.9 released2011-11-23T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2011-11-23:/news/2011/Nov/23/nsd-3.2.9-released/<p>Two new features: minimize responses to reduce the setting of the TC bit and less NSEC3 prehashing to speed up a reload after a zone transfer. Also, a fair list of bugfixes. See the Release Notes for more information.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.9.tar.gz">Direct Download</a></li>
</ul>
OpenDNSSEC 1.3.3 released2011-11-17T00:00:00+01:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2011-11-17:/news/2011/Nov/17/opendnssec-1.3.3-released/<p>Bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Authenticated Denial of Existence in the DNS2011-11-09T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2011-11-09:/news/2011/Nov/09/authenticated-denial-of-existence-in-the-dns/<p>Paper on denial of existence in the DNS and how the protocol evolved. It answers two simple questions: Why do you need at most two NSEC records in negative responses? And why does NSEC3 requires an extra record?</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.sidnlabs.nl/fileadmin/docs/PDF-files_UK/wp-2011-0x01-v1.pdf">PDF</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.sidnlabs.nl/laatste-berichten/nieuwsdetail/article/nsec3-whitepaper/">Blog article at sidnlabs.nl (Dutch)</a></li>
</ul>
Net::DNS 0.67 released2011-11-07T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2011-11-07:/news/2011/Nov/07/net::dns-0.67-released/<p>Many bug fixes, a modular serial number system, experimetal work on IDN, rework of the build system.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/blog/acrchive/netdns-version-0-67-released/">Net::DNS 0.67 release announcement</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/">Project website</a></li>
<li><a class="reference external" href="proxy.php?url=http://search.cpan.org/CPAN/authors/id/O/OL/OLAF/Net-DNS-0.67.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.net-dns.org/svn/net-dns/release/0.67/Changes">Changes</a></li>
</ul>
Dnssec-Trigger 0.7 released2011-10-28T00:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2011-10-28:/news/2011/Oct/28/dnssec-trigger-0.7-released/<p>experimental new package that provides DNSSEC on personal computers. Mac install dmg, fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.7.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Dnssec-Trigger 0.6 released2011-10-21T00:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2011-10-21:/news/2011/Oct/21/dnssec-trigger-0.6-released/<p>experimental test of new package that provides DNSSEC on personal computers. Fixes, XFCE and Unity support.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.6.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/dnssec-trigger/#changelog">Changes</a></li>
</ul>
Dnssec-Trigger 0.5 released2011-09-29T00:00:00+02:002026-03-04T07:35:16.808919+01:00NLnet Labstag:nlnetlabs.nl,2011-09-29:/news/2011/Sep/29/dnssec-trigger-0.5-released/<p>experimental test of new package. Together with unbound provides DNSSEC on 127.0.0.1 on personal computers.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/dnssec-trigger">Details</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/dnssec-trigger/dnssec-trigger-0.5.tar.gz">Direct Download</a></li>
</ul>
ldns 1.6.11 released2011-09-29T00:00:00+02:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2011-09-29:/news/2011/Sep/29/ldns-1.6.11-released/<p>Bug fixes, small new features (such as more control over formatting to text) and a new contributed python module: LDNSX.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.11.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.11/Changelog">Changes</a></li>
</ul>
Unbound 1.4.13 released2011-09-15T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2011-09-15:/news/2011/Sep/15/unbound-1.4.13-released/<p>bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.13.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-13">Changes</a></li>
</ul>
OpenDNSSEC 1.3.2 released2011-09-13T00:00:00+02:002026-03-04T07:35:16.829919+01:00NLnet Labstag:nlnetlabs.nl,2011-09-13:/news/2011/Sep/13/opendnssec-1.3.2-released/<p>Two bugfixes regarding reading the backup files. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
OpenDNSSEC 1.3.1 released2011-09-06T00:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2011-09-06:/news/2011/Sep/06/opendnssec-1.3.1-released/<p>Threading bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Multi-Path Inter-Domain Routing: The Impact on BGP's Scalability, Stability, and Resilience to Link Failures2011-08-31T00:00:00+02:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2011-08-31:/news/2011/Aug/31/multi-path-inter-domain-routing:-the-impact-on-bgp's-scalability,-stability,-and-resilience-to-link-failures/<p>Multi-path routing protocols are proposed to solve transient disconnectivity during convergence time. As their name implies, these protocols are designed to explore more paths than BGP in the attempt to keep the ASes connected in case of link failures. The impact of the multi-path routing protocols on scalability, stability, and …</p><p>Multi-path routing protocols are proposed to solve transient disconnectivity during convergence time. As their name implies, these protocols are designed to explore more paths than BGP in the attempt to keep the ASes connected in case of link failures. The impact of the multi-path routing protocols on scalability, stability, and resilience to link failures are studied using simulation experiments.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/bgp-multipath-thesis.pdf">MSc. thesis (PDF)</a></li>
</ul>
OpenDNSSEC 1.2.2 released2011-08-11T00:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2011-08-11:/news/2011/Aug/11/opendnssec-1.2.2-released/<p>Bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Unbound 1.4.12 released2011-07-14T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2011-07-14:/news/2011/Jul/14/unbound-1.4.12-released/<p>two serious bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.12.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-12">Changes</a></li>
</ul>
OpenDNSSEC 1.3.0 released2011-07-12T00:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2011-07-12:/news/2011/Jul/12/opendnssec-1.3.0-released/<p>Increased signing performance.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Unbound 1.4.11 released2011-06-30T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2011-06-30:/news/2011/Jun/30/unbound-1.4.11-released/<p>bug fixes, minor usability features.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.11.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-11">Changes</a></li>
</ul>
ldns 1.6.10 released2011-05-31T00:00:00+02:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2011-05-31:/news/2011/May/31/ldns-1.6.10-released/<p>Bug fixes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.10.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.10/Changelog">Changes</a></li>
</ul>
NLnet Labs Annual Report 20102011-05-30T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2011-05-30:/news/2011/May/30/nlnet-labs-annual-report-2010/<p>We are happy to present NLnet Labs Annual report 2010. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2010.pdf">Annual Report 2010 …</a></li></ul><p>We are happy to present NLnet Labs Annual report 2010. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2010.pdf">Annual Report 2010 (PDF)</a></li>
</ul>
Unbound 1.4.10 released2011-05-25T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2011-05-25:/news/2011/May/25/unbound-1.4.10-released/<p>Fixes denial-of-service assertion failure, CVE-2011-1922 VU#531342</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.10.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-10">Changes</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/CVE-2011-1922.txt">CVE-2011-1922</a></li>
</ul>
Unbound advisory (CVE-2011-1922)2011-05-25T00:00:00+02:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2011-05-25:/news/2011/May/25/unbound-advisory-(cve-2011-1922)/<p>Denial-of-service assertion failure</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://unbound.net/downloads/CVE-2011-1922.txt">advisory</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.kb.cert.org/vuls/id/531342">US-CERT VU#531342</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1922">MITRE CVE-2011-1922</a></li>
</ul>
World IPv6 Day event2011-05-12T00:00:00+02:002026-03-04T07:35:16.845901+01:00NLnet Labstag:nlnetlabs.nl,2011-05-12:/news/2011/May/12/world-ipv6-day-event/<p>On Wednesday 8 June 2011, the Dutch World IPv6 Day event will be organised at the Science Park, Amsterdam.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://ipv6day.nl">Programme and registration</a></li>
<li><a class="reference external" href="proxy.php?url=http://ipv6day.nl">_img(http://www.nlnetlabs.nl/gx/ipv6color.png, IPv6 Day logo)</a></li>
</ul>
Outage due to rehousing2011-04-27T00:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2011-04-27:/news/2011/Apr/27/outage-due-to-rehousing/<p>On Thursday 28 April 2011, NLnet Labs will move office and servers to a new location. Thereby all our services will be offline from 09:00am CET till +-12:00am. Our new location is:</p>
<pre class="literal-block">
Science Park 400
1098XH Amsterdam
</pre>
<!-- PELICAN_END_SUMMARY -->
HowTo setup DNSSEC validation2011-04-07T00:00:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2011-04-07:/news/2011/Apr/07/howto-setup-dnssec-validation/<p>describes use of unbound with root trust anchor.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://unbound.net/documentation/howto_anchor.html">HowTo</a></li>
</ul>
Unbound 1.4.9 released2011-03-24T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2011-03-24:/news/2011/Mar/24/unbound-1.4.9-released/<p>bug fixes, not entire packet dropped if private-address is blocked.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.9.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-9">Changes</a></li>
</ul>
NSD 3.2.8 released2011-03-22T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2011-03-22:/news/2011/Mar/22/nsd-3.2.8-released/<p>bugfix release, including #216 fixing memory leak relating zone transfers.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.8.tar.gz">Direct Download</a></li>
</ul>
ldns 1.6.9 released2011-03-18T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2011-03-18:/news/2011/Mar/18/ldns-1.6.9-released/<p>bug fixes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.9.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.9/Changelog">Changes</a></li>
</ul>
OpenDNSSEC 1.2.1 released2011-03-18T00:00:00+01:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2011-03-18:/news/2011/Mar/18/opendnssec-1.2.1-released/<p>Bugfix release. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
Multithreaded signing support for OpenDNSSEC2011-03-14T00:00:00+01:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2011-03-14:/news/2011/Mar/14/multithreaded-signing-support-for-opendnssec/<p>We have changed the design so that RRsets are added to a signing queue, where a pool of signer threads (called drudgers) grab a signing task and perform it. With the SCA6000 HSM we now reach maximum performance, meaning OpenDNSSEC can do a 13.000+ signatures per second. The .se …</p><p>We have changed the design so that RRsets are added to a signing queue, where a pool of signer threads (called drudgers) grab a signing task and perform it. With the SCA6000 HSM we now reach maximum performance, meaning OpenDNSSEC can do a 13.000+ signatures per second. The .se zone can now be signed in 2 minute 50 seconds, of which 1 minute 14 seconds are signing operations.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org/2011/03/11/more-than-13000-signatures-per-second/">Read more on the OpenDNSSEC website</a></li>
</ul>
ldns 1.6.8 released2011-01-24T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2011-01-24:/news/2011/Jan/24/ldns-1.6.8-released/<p>bug fixes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.8.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.8/Changelog">Changes</a></li>
</ul>
NSD 3.2.7 released2011-01-24T00:00:00+01:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2011-01-24:/news/2011/Jan/24/nsd-3.2.7-released/<p>small bugfix release, #347 being the most important fix (NSEC3 related)</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.7.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.4.8 released2011-01-24T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2011-01-24:/news/2011/Jan/24/unbound-1.4.8-released/<p>bug fixes, so-sndbuf, more lenient algorithm rollover supported.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.8.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-8">Changes</a></li>
</ul>
OpenDNSSEC 1.2.0 out now2011-01-14T00:00:00+01:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2011-01-14:/news/2011/Jan/14/opendnssec-1.2.0-out-now/<p>OpenDNSSEC 1.2.0 is released today. Python dependencies are dropped: the whole signer engine is now written in c. Improvements on the enforcer. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
AFNIC offered a yearly Subsidy2010-11-22T00:00:00+01:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2010-11-22:/news/2010/Nov/22/afnic-offered-a-yearly-subsidy/<p>AFNIC has generously offered a yearly subsidy that aids the NLnet Labs Foundation to accomplish its chartered goals. AFNIC's Head of R&D, Mohsen Souissi: "We want to express support for the open source and open standards work that NLnet Labs is pursuing. By producing stable and high quality DNSSEC-enabled …</p><p>AFNIC has generously offered a yearly subsidy that aids the NLnet Labs Foundation to accomplish its chartered goals. AFNIC's Head of R&D, Mohsen Souissi: "We want to express support for the open source and open standards work that NLnet Labs is pursuing. By producing stable and high quality DNSSEC-enabled software they are bringing needed code diversity to the DNS industry and lowering the bar for global DNSSEC deployment. The organization deserves our sustained support</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/labs/contributors/">More information about contributing to NLnet Labs</a></li>
</ul>
ldns 1.6.7 released2010-11-08T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2010-11-08:/news/2010/Nov/08/ldns-1.6.7-released/<p>bug fixes, experimental ecdsa support</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.7.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.7/Changelog">Changes</a></li>
</ul>
Unbound 1.4.7 released2010-11-08T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2010-11-08:/news/2010/Nov/08/unbound-1.4.7-released/<p>Bug fixes, unbound-anchor for automated DNSSEC root key tracking, that works if you have been offline.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.7.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-7">Changes</a></li>
</ul>
Unbound timeout article2010-11-08T00:00:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2010-11-08:/news/2010/Nov/08/unbound-timeout-article/<p>There is an article that describes how unbound manages timeouts from remote servers.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://unbound.net/documentation/info_timeout.html">Unbound documentation</a></li>
</ul>
Unbound requestlist article2010-10-21T00:00:00+02:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2010-10-21:/news/2010/Oct/21/unbound-requestlist-article/<p>Men&Mice has a nice article describing how the unbound requestlist works.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://otrs.menandmice.com/otrs/public.pl?Action=PublicFAQ&CategoryID=21&ItemID=87">Article</a></li>
</ul>
Secure Routing: State-of-the-Art Deployment and Impact on Network Resilience2010-09-28T00:00:00+02:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2010-09-28:/news/2010/Sep/28/secure-routing:-state-of-the-art-deployment-and-impact-on-network-resilience/<p>This ENISA publication reports on a study by NLnet Labs and GNKS Consult, surveying current state-of-the-art secure routing technologies. Network operators, engineers, and researchers are interviewed on the deployment of secure routing technology, its performance expectations and operating experiences, and future perspectives.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.enisa.europa.eu/act/res/technologies/tech/routing/state-of-the-art-deployment-and-impact-on-network-resilience/at_download/fullReport">ENISA Secure Routing Report (PDF)</a></li>
</ul>
Impact of Topology on BGP Convergence2010-08-23T00:00:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2010-08-23:/news/2010/Aug/23/impact-of-topology-on-bgp-convergence/<p>This MSc. thesis in collaboration with VU University Amsterdam, reports on the study to understand how the underlying topology of the Internet influences BGP performance. A highly scalable simulator is used to simulate full-scale AS-level Internet. We found that BGP is sensitive to certain topological characteristics of the Internet, while …</p><p>This MSc. thesis in collaboration with VU University Amsterdam, reports on the study to understand how the underlying topology of the Internet influences BGP performance. A highly scalable simulator is used to simulate full-scale AS-level Internet. We found that BGP is sensitive to certain topological characteristics of the Internet, while remain completely unaffected on variation in some other characteristics.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/bgp-topology-thesis.pdf">MSc. thesis (PDF)</a></li>
</ul>
ldns 1.6.6 released2010-08-09T00:00:00+02:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2010-08-09:/news/2010/Aug/09/ldns-1.6.6-released/<p>bug fixes release</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.6.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.6/Changelog">Changes</a></li>
</ul>
Unbound 1.4.6 released2010-08-03T00:00:00+02:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2010-08-03:/news/2010/Aug/03/unbound-1.4.6-released/<p>Bug fixes, GOST support.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.6.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-6">Changes</a></li>
</ul>
NSD 3.2.6 released2010-08-02T00:00:00+02:002026-03-04T07:35:16.823919+01:00NLnet Labstag:nlnetlabs.nl,2010-08-02:/news/2010/Aug/02/nsd-3.2.6-released/<p>small bugfix release, but also has a new feature and some operational changes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.6.tar.gz">Direct Download</a></li>
</ul>
Flavors of Unbound2010-07-28T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2010-07-28:/news/2010/Jul/28/flavors-of-unbound/<p><a class="reference external" href="proxy.php?url=https://menandmice.com">Men & Mice</a> have published an article on how to select between different
flavors of Unbound compilation. This article explains the technical differences
of the possible flavors of Unbound and gives proposals under which type of DNS
workload a specific flavor will perform best. The article will be kept updated
when …</p><p><a class="reference external" href="proxy.php?url=https://menandmice.com">Men & Mice</a> have published an article on how to select between different
flavors of Unbound compilation. This article explains the technical differences
of the possible flavors of Unbound and gives proposals under which type of DNS
workload a specific flavor will perform best. The article will be kept updated
when new versions of unbound are released.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://tinyurl.com/menandmice-flavorsofunbound">The article can be found here</a></li>
<li><a class="reference external" href="proxy.php?url=https://menandmice.com">Men & Mice website</a></li>
</ul>
DNSSEC Root Key declaration2010-07-14T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2010-07-14:/news/2010/Jul/14/dnssec-root-key-declaration/<p>On 16 June 2010 around 21:20 UTC Olaf Kolkman witnessed a key generation procedure by which a DNSSEC Key Signing Key for signing the DNS root has been created. The key is known with key-ID 19036.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/DS-20100616.txt">PGP Signed Declaration containing the DS hash</a></li>
</ul>
Testing Key States of RFC 5011 in Autotrust2010-07-12T00:00:00+02:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2010-07-12:/news/2010/Jul/12/testing-key-states-of-rfc-5011-in-autotrust/<p>Carsten Rutz of Radboud University investigated the usability of time model-based testing in a case study: Conformance of the implementation Autotrust with RFC 5011. The results are presented in a bachelor thesis.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.cs.ru.nl/~julien/Julien_at_Nijmegen/rutz_bt.html">HTML</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.cs.ru.nl/~julien/Julien_at_Nijmegen/rutz_bt_files/bachelorThesis.pdf">PDF</a></li>
</ul>
ldns 1.6.5 released2010-06-15T00:00:00+02:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2010-06-15:/news/2010/Jun/15/ldns-1.6.5-released/<p>bug fixes, TALINK, GOST (disabled by default).</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.5.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.5/Changelog">Changes</a></li>
</ul>
Unbound 1.4.5 released2010-06-15T00:00:00+02:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2010-06-15:/news/2010/Jun/15/unbound-1.4.5-released/<p>bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.5.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-5">Changes</a></li>
</ul>
NLnet Labs Annual Report 20092010-06-02T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2010-06-02:/news/2010/Jun/02/nlnet-labs-annual-report-2009/<p>We are happy to present NLnet Labs Annual report 2009. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2009.pdf">Annual Report 2009 …</a></li></ul><p>We are happy to present NLnet Labs Annual report 2009. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2009.pdf">Annual Report 2009 (PDF)</a></li>
</ul>
Unbound 1.4.4 released2010-04-22T00:00:00+02:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2010-04-22:/news/2010/Apr/22/unbound-1.4.4-released/<p>bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.4.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-4">Changes</a></li>
</ul>
NSD 3.2.5 released2010-04-14T00:00:00+02:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2010-04-14:/news/2010/Apr/14/nsd-3.2.5-released/<p>Optimized, NSID friendly NSD release</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.5.tar.gz">Direct Download</a></li>
</ul>
NSEC3 Hash Performance2010-03-18T00:00:00+01:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2010-03-18:/news/2010/Mar/18/nsec3-hash-performance/<p>We have measured the effect ofthe number of hash iterations in NSEC3 in terms of maximum query load usingNSD and Unbound. This document presents the results of these measurementsand compares the cost for validating and authoritative name servers and allowsfor an educated choice for these parameters.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/nsec3_hash_performance.pdf">PDF</a></li>
</ul>
Unbound 1.4.3 released2010-03-11T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2010-03-11:/news/2010/Mar/11/unbound-1.4.3-released/<p>crash fix for 64bit platforms.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.3.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-3">Changes</a></li>
</ul>
Unbound 1.4.2 released2010-03-09T00:00:00+01:002026-03-04T07:35:16.840919+01:00NLnet Labstag:nlnetlabs.nl,2010-03-09:/news/2010/Mar/09/unbound-1.4.2-released/<p>bugfix.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-2">Changes</a></li>
</ul>
Stale keys and unbound behaviour2010-02-12T00:00:00+01:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2010-02-12:/news/2010/Feb/12/stale-keys-and-unbound-behaviour/<p>Statement regarding concerns about stale keys and Unbound behavior</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://unbound.net/pipermail/unbound-users/2010-February/001031.html">mail</a></li>
</ul>
OpenDNSSEC 1.0.0 out now2010-02-09T00:00:00+01:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2010-02-09:/news/2010/Feb/09/opendnssec-1.0.0-out-now/<p>The first official OpenDNSSEC release is available right now. For downloads and more information about future release plans, visit the OpenDNSSEC website.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org">OpenDNSSEC website</a></li>
</ul>
ldns 1.6.4 released2010-01-20T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2010-01-20:/news/2010/Jan/20/ldns-1.6.4-released/<p>This new release has the pyldns contribution by Zdenek Vasicek and Karel Slany imported. Plus bug fixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.4.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.4/Changelog">Changes</a></li>
</ul>
NSD 3.2.4 released2010-01-06T00:00:00+01:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2010-01-06:/news/2010/Jan/06/nsd-3.2.4-released/<p>This new NSD release comes with some new configure options, DLV record support and some bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.4.tar.gz">Direct Download</a></li>
</ul>
Unbound 1.4.1 released2009-12-17T00:00:00+01:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2009-12-17:/news/2009/Dec/17/unbound-1.4.1-released/<p>bugfix.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-1">Changes</a></li>
</ul>
ldns 1.6.3 released2009-12-04T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2009-12-04:/news/2009/Dec/04/ldns-1.6.3-released/<p>Small bugfix release.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.3.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.3/Changelog">Changes</a></li>
</ul>
Unbound 1.4.0 released2009-11-26T00:00:00+01:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2009-11-26:/news/2009/Nov/26/unbound-1.4.0-released/<p>RFC5011, RFC5702 features and bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.4.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-4-0">Changes</a></li>
</ul>
ldns 1.6.2 released2009-11-12T00:00:00+01:002026-03-04T07:35:16.814919+01:00NLnet Labstag:nlnetlabs.nl,2009-11-12:/news/2009/Nov/12/ldns-1.6.2-released/<p>Enables SHA2 by default. Fixes lots of bugs for OpenDNSSEC and other. ldns-sign-zone will minimally sign the DNSKEY rrset.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.2/Changelog">Changes</a></li>
</ul>
Securing DNS: Extending DNS Servers with a DNSSEC Validator2009-10-27T00:00:00+01:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2009-10-27:/news/2009/Oct/27/securing-dns:-extending-dns-servers-with-a-dnssec-validator/<p>DNS Security Extensions (DNSSEC) is a proposed standard for securely authenticating information in the Domain Name System. DNSSEC validators check the digital signatures on DNS data. However, designing a validator worth the operational costs is a challenge. _i(Published in IEEE Security & Privacy), _i(Sept/Oct. 2009.)</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://doi.ieeecomputersociety.org/10.1109/MSP.2009.133">Securing …</a></li></ul><p>DNS Security Extensions (DNSSEC) is a proposed standard for securely authenticating information in the Domain Name System. DNSSEC validators check the digital signatures on DNS data. However, designing a validator worth the operational costs is a challenge. _i(Published in IEEE Security & Privacy), _i(Sept/Oct. 2009.)</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://doi.ieeecomputersociety.org/10.1109/MSP.2009.133">Securing DNS (DOI Bookmark)</a></li>
</ul>
Unbound 1.3.4 released2009-10-07T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2009-10-07:/news/2009/Oct/07/unbound-1.3.4-released/<p>DNSSEC downgrade bug fixed.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.3.4.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-3-4">Changes</a></li>
</ul>
autotrust 0.3.1 released2009-09-08T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2009-09-08:/news/2009/Sep/08/autotrust-0.3.1-released/<p>This new autotrust release offers some new features like syslog and resolver reloading, as well as some bug fixes. Also, the configuration file format has changed, to be more in line with Unbound.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/autotrust/autotrust-0.3.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/autotrust/tags/release_0_3_1/doc/ChangeLog">Changelog</a></li>
</ul>
SURFnet deploys DNSSEC and uses Unbound2009-09-08T00:00:00+02:002026-03-04T07:35:16.835919+01:00NLnet Labstag:nlnetlabs.nl,2009-09-08:/news/2009/Sep/08/surfnet-deploys-dnssec-and-uses-unbound/<p>SURFnet announces that all SURFnet DNS (Domain Name System) resolvers now support DNSSEC. SURFnet uses Unbound as its resolver of choice. SURFnet is one of the first networks in the Netherlands to support DNSSEC.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.surfnet.nl/en/nieuws/Pages/DNSSEC.aspx">More information</a></li>
</ul>
Innovation vouchers2009-08-28T00:00:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2009-08-28:/news/2009/Aug/28/innovation-vouchers/<p>For Dutch companies there is, under a program to promote innovation, the possibility to receive a 2.500 Euro subsidy. The NLnet foundation, our mother, has a program that allows furthering of open source software by any Dutch company that is registered with the Chamber of Commerce. It takes 10 …</p><p>For Dutch companies there is, under a program to promote innovation, the possibility to receive a 2.500 Euro subsidy. The NLnet foundation, our mother, has a program that allows furthering of open source software by any Dutch company that is registered with the Chamber of Commerce. It takes 10 minutes to fill in the paperwork and direct those 2.500 Euro toward a good purpose.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnet.nl/innovatievoucher/index.html">NLnet innovation vouchers</a></li>
</ul>
NSD 3.2.3 released2009-08-17T00:00:00+02:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2009-08-17:/news/2009/Aug/17/nsd-3.2.3-released/<p>Bugfixes</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/nsd/nsd-3.2.3.tar.gz">Direct Download</a></li>
</ul>
ldns 1.6.1 released2009-08-14T00:00:00+02:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2009-08-14:/news/2009/Aug/14/ldns-1.6.1-released/<p>Bugfixes, minor features.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.1/Changelog">Changes</a></li>
</ul>
Unbound 1.3.3 released2009-08-04T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2009-08-04:/news/2009/Aug/04/unbound-1.3.3-released/<p>Bugfixes, minor features.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.3.3.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-3-3">Changes</a></li>
</ul>
OpenDNSSEC technology preview2009-07-30T00:00:00+02:002026-03-04T07:35:16.830919+01:00NLnet Labstag:nlnetlabs.nl,2009-07-30:/news/2009/Jul/30/opendnssec-technology-preview/<p>The OpenDNSSEC project announces the development of Open Source software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security. Visit the OpenDNSSEC website for more information and to download the technology …</p><p>The OpenDNSSEC project announces the development of Open Source software that manages the security of domain names on the Internet. The project intends to drive adoption of Domain Name System Security Extensions (DNSSEC) to further enhance Internet security. Visit the OpenDNSSEC website for more information and to download the technology preview.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.opendnssec.org/">OpenDNSSEC website</a></li>
</ul>
NLnet Labs is hiring2009-07-25T00:00:00+02:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2009-07-25:/news/2009/Jul/25/nlnet-labs-is-hiring/<p>We are looking for enthusiastic programmer/developers to complete our 6 persons team. Somebody who will be developing and maintaining open source software and open standards.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/labs/employment/">More information</a></li>
</ul>
Unbound 1.3.2 released2009-07-13T00:00:00+02:002026-03-04T07:35:16.839919+01:00NLnet Labstag:nlnetlabs.nl,2009-07-13:/news/2009/Jul/13/unbound-1.3.2-released/<p>Windows port fixed.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.3.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-3-2">Changes</a></li>
</ul>
ldns 1.6.0 released2009-07-09T00:00:00+02:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2009-07-09:/news/2009/Jul/09/ldns-1.6.0-released/<p>Bugfixes, minor features.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/ldns/ldns-1.6.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/svn/ldns/tags/release-1.6.0/Changelog">Changes</a></li>
</ul>
Unbound 1.3.1 released2009-07-09T00:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2009-07-09:/news/2009/Jul/09/unbound-1.3.1-released/<p>Bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.3.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-3-1">Changes</a></li>
</ul>
BSD Podcast2009-07-08T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2009-07-08:/news/2009/Jul/08/bsd-podcast/<p>The bsdtalk podcast by Will Backman interviews WouterWijngaards about the Unbound resolver.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://bsdtalk.blogspot.com/2009/07/bsdtalk176-unbound-with-wca-wijngaards.html">bsdtalk 176</a></li>
</ul>
DNSSEC HOWTO updated2009-07-04T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2009-07-04:/news/2009/Jul/04/dnssec-howto-updated/<p>The DNSSEC HOWTO received its first public update after 2007. Examples have been updated to use recent versions of the software, Unbound configuration has been added, and some new material has been added.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/publications/dnssec_howto/">DNSSEC HOWTO (HTML)</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/publications/dnssec_howto/dnssec_howto.pdf">DNSSEC HOWTO (PDF preferred)</a></li>
</ul>
Unbound 1.3.0 released2009-06-11T00:00:00+02:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2009-06-11:/news/2009/Jun/11/unbound-1.3.0-released/<p>Windows port. Python contribution. Bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.3.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-3-0">Changes</a></li>
</ul>
NLnet Labs Annual Report 20082009-06-08T00:00:00+02:002026-03-04T07:35:16.818919+01:00NLnet Labstag:nlnetlabs.nl,2009-06-08:/news/2009/Jun/08/nlnet-labs-annual-report-2008/<p>We are happy to present NLnet Labs Annual report 2008. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2008.pdf">Annual Report 2008 …</a></li></ul><p>We are happy to present NLnet Labs Annual report 2008. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/downloads/publications/annualreports/annualreport2008.pdf">Annual Report 2008 (PDF)</a></li>
</ul>
NSD 3.2.2 release [critical]2009-05-18T00:00:00+02:002026-03-04T07:35:16.822919+01:00NLnet Labstag:nlnetlabs.nl,2009-05-18:/news/2009/May/18/nsd-3.2.2-release-[critical]/<p>Critical bugfix release for NSD.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-3.2.2.tar.gz">Direct Download</a></li>
</ul>
NSD Vulnerability Announcement2009-05-18T00:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2009-05-18:/news/2009/May/18/nsd-vulnerability-announcement/<p>A one-byte buffer overflow has been detected in the NSD software. A fix is ready for download.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/publications/NSD_vulnerability_announcement.html">More information</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-3.2.2.tar.gz">Download NSD 3.2.2</a></li>
</ul>
RFI for Unbound Tech Support2009-04-21T00:00:00+02:002026-03-04T07:35:16.831919+01:00NLnet Labstag:nlnetlabs.nl,2009-04-21:/news/2009/Apr/21/rfi-for-unbound-tech-support/<p>NLnet Labs is seeking information about organizations that would be willing and able to provide first and second line support for Unbound and would like to know more about their ideas on organization and cooperation.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.unbound.net/RFI-support.html">RFI-support</a></li>
</ul>
Implementing OpenLISP with LISP+ALT2009-04-14T00:00:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2009-04-14:/news/2009/Apr/14/implementing-openlisp-with-lisp+alt/<p>The LISP protocol has been developed to address the growth of the BGP routing table in the DFZ. OpenLISP is an implementation of this protocol, but does not include a location mapping service. This reports describes how a mapping locations service should interact with OpenLISP, GRE and Quagga to use …</p><p>The LISP protocol has been developed to address the growth of the BGP routing table in the DFZ. OpenLISP is an implementation of this protocol, but does not include a location mapping service. This reports describes how a mapping locations service should interact with OpenLISP, GRE and Quagga to use LISP+ALT as a control plane.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/openlisp-msc-report.pdf">OpenLISP report (PDF)</a></li>
</ul>
ldns 1.5.1 released2009-02-10T00:00:00+01:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2009-02-10:/news/2009/Feb/10/ldns-1.5.1-released/<p>Bugfix release for the zone signer in ldns 1.5</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/ldns/ldns-1.5.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/ldns/tags/release-1.5.1/Changelog">Changelog</a></li>
</ul>
Unbound 1.2.1 released2009-02-10T00:00:00+01:002026-03-04T07:35:16.838919+01:00NLnet Labstag:nlnetlabs.nl,2009-02-10:/news/2009/Feb/10/unbound-1.2.1-released/<p>Bugfix release, features for smoother operations.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.2.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-2-1">Changes</a></li>
</ul>
ldns 1.5.0 released2009-02-09T00:00:00+01:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2009-02-09:/news/2009/Feb/09/ldns-1.5.0-released/<p>New version of ldns</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/ldns/ldns-1.5.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/ldns/tags/release-1.5.0/Changelog">Changelog</a></li>
</ul>
NSD 3.2.1. out now2009-01-19T00:00:00+01:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2009-01-19:/news/2009/Jan/19/nsd-3.2.1.-out-now/<p>Mainly a bugfix release, but also some new features. Fixes AXFR fallback discussion.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-3.2.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/nsd/tags/NSD_3_2_1_REL/doc/ChangeLog">Changelog</a></li>
</ul>
Unbound 1.2.0 released2009-01-14T00:00:00+01:002026-03-04T07:35:16.837919+01:00NLnet Labstag:nlnetlabs.nl,2009-01-14:/news/2009/Jan/14/unbound-1.2.0-released/<p>Minor features and important, security related, bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.2.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-2-0">Changes</a></li>
</ul>
ldns 1.4.1 released2008-12-19T00:00:00+01:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2008-12-19:/news/2008/Dec/19/ldns-1.4.1-released/<p>New version of ldns; A couple of NSEC3 related bugs have fixed, as well some gripes in the build scripts.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/ldns/ldns-1.4.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/ldns/tags/release-1.4.1/Changelog">Changelog</a></li>
</ul>
NLnet Labs joins DNSSEC industry coalition to Increase Adoption of Domain Name Security Extensions (DNSSEC).2008-12-11T00:00:00+01:002026-03-04T07:35:16.819919+01:00NLnet Labstag:nlnetlabs.nl,2008-12-11:/news/2008/Dec/11/nlnet-labs-joins-dnssec-industry-coalition-to-increase-adoption-of-domain-name-security-extensions-(dnssec)./<p>The DNSSEC Industry Coalition is a global group of registries and industry experts whose mission is to work collaboratively to facilitate adoption of Domain Name Security Extensions (DNSSEC) and streamline the implementations across Domain Name Registries. Members work together to establish a consistent set of tools and applications, shared best …</p><p>The DNSSEC Industry Coalition is a global group of registries and industry experts whose mission is to work collaboratively to facilitate adoption of Domain Name Security Extensions (DNSSEC) and streamline the implementations across Domain Name Registries. Members work together to establish a consistent set of tools and applications, shared best practices, specifications and shared nomenclature. DNSSEC Industry Coalition members include both generic Top-Level Domain and country code Top-Level Domain registries along with industry and educational experts of the Domain Name System.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.pir.org/index.php?db=content/News&tbl=Press2008&id=14">Press release</a></li>
<li><a class="reference external" href="proxy.php?url=http://dnsseccoalition.org/website/">DNSSEC Industry Coalition</a></li>
</ul>
Unbound operation explained in book2008-12-08T00:00:00+01:002026-03-04T07:35:16.843919+01:00NLnet Labstag:nlnetlabs.nl,2008-12-08:/news/2008/Dec/08/unbound-operation-explained-in-book/<p>Book "Alternative DNS Servers", also describes Unbound and NSD operation.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://unbound.net/documentation/book_news.html">More</a></li>
</ul>
Unbound 1.1.1 released2008-11-24T00:00:00+01:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2008-11-24:/news/2008/Nov/24/unbound-1.1.1-released/<p>bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.1.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-1-1">Changes</a></li>
</ul>
Unbound 1.1.0 released2008-11-18T00:00:00+01:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2008-11-18:/news/2008/Nov/18/unbound-1.1.0-released/<p>DLV support, statistics and lots of other features that have been requested. Also bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.1.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-1-0">Changes</a></li>
</ul>
NSD 3.2.0 released2008-11-10T00:00:00+01:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2008-11-10:/news/2008/Nov/10/nsd-3.2.0-released/<p>A "feature rich" release. Contains longstanding requests such as SHA support for TSIG and configuration options for setting the outgoing interface. Also AXFR fallback, and IXFR on TCP by default. VERY IMPORTANT: The format of ixfr.db has changed, so be sure to process the old one before updating to …</p><p>A "feature rich" release. Contains longstanding requests such as SHA support for TSIG and configuration options for setting the outgoing interface. Also AXFR fallback, and IXFR on TCP by default. VERY IMPORTANT: The format of ixfr.db has changed, so be sure to process the old one before updating to 3.2.0.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-3.2.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/nsd/tags/NSD_3_2_0_REL/doc/ChangeLog">Changelog</a></li>
</ul>
ldns 1.4.0 released2008-11-07T00:00:00+01:002026-03-04T07:35:16.813919+01:00NLnet Labstag:nlnetlabs.nl,2008-11-07:/news/2008/Nov/07/ldns-1.4.0-released/<p>New version of ldns; some small new and fixed features, and a number of bugs fixed</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/ldns/ldns-1.4.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/ldns/tags/release-1.4.0/Changelog">Changelog</a></li>
</ul>
DNSSEC Key Maintenance Analysis2008-10-23T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2008-10-23:/news/2008/Oct/23/dnssec-key-maintenance-analysis/<p>This document provides recommendations for the generation, storage and use of keys in the context of DNSSEC. It is a followup of NLnet Labs document 2006-SE-01: DNS Threat Analysis, written for .SE.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.internetdagarna.se/arkiv/2008/www.internetdagarna.se/images/stories/doc/13_DNSSEC_Key_maintenance.pdf">pdf</a></li>
</ul>
Enforcing Integrity of Agent Migration Paths by Distribution of Trust2008-09-25T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2008-09-25:/news/2008/Sep/25/enforcing-integrity-of-agent-migration-paths-by-distribution-of-trust/<p>Agent mobility is the ability of an agent to migrate from one location to another across a network. Though conceptually relatively straightforward, in practice security of mobile agents is a challenge. This paper discusses the security issues involved and proposes protocols for secure agent migration. AgentScape, an agent platform for …</p><p>Agent mobility is the ability of an agent to migrate from one location to another across a network. Though conceptually relatively straightforward, in practice security of mobile agents is a challenge. This paper discusses the security issues involved and proposes protocols for secure agent migration. AgentScape, an agent platform for mobile agents, is used to illustrate the feasibility of the implementation of these protocols.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/ijiids08.pdf">Download article (pdf)</a></li>
</ul>
Master Thesis BGP Modeling and Simulation2008-09-08T00:00:00+02:002026-03-04T07:35:16.815919+01:00NLnet Labstag:nlnetlabs.nl,2008-09-08:/news/2008/Sep/08/master-thesis-bgp-modeling-and-simulation/<p>In this thesis we present a new approach to BGP simulation. Instead of focussing on intra-domain communication, network and protocol are highly abstracted in order to allow for large-scale simulation. We describe our model of the BGP protocol along with its implementation. Many tracks of future researc are shown as …</p><p>In this thesis we present a new approach to BGP simulation. Instead of focussing on intra-domain communication, network and protocol are highly abstracted in order to allow for large-scale simulation. We describe our model of the BGP protocol along with its implementation. Many tracks of future researc are shown as well as many possible uses of this kind of approach to BGP simulation.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/thesis_bgpsim.pdf">Download master thesis (pdf)</a></li>
</ul>
Japan Unbound User Group2008-09-04T00:00:00+02:002026-03-04T07:35:16.812649+01:00NLnet Labstag:nlnetlabs.nl,2008-09-04:/news/2008/Sep/04/japan-unbound-user-group/<p>The Japan Unbound Users Group has opened its website today, with unbound documentation, support and forum in Japanese.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://unbound.jp/">http://unbound.jp/</a></li>
</ul>
Annual Report 2007 released2008-08-22T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2008-08-22:/news/2008/Aug/22/annual-report-2007-released/<p>We are happy to present NLnet Labs Annual report 2007. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/annualreports/annualreport2007.pdf">Annual Report 2007 …</a></li></ul><p>We are happy to present NLnet Labs Annual report 2007. It is intended to present an overview of Labs' various activities to those who support NLnet Labs financially, through grants or support contracts, and for those who have shown a general interest in our activities.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.nlnetlabs.nl/downloads/publications/annualreports/annualreport2007.pdf">Annual Report 2007(pdf)</a></li>
</ul>
Unbound 1.0.2 released2008-08-07T00:00:00+02:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2008-08-07:/news/2008/Aug/07/unbound-1.0.2-released/<p>This release contains filtering fixes to prevent certaintypes of exploits. Also bugfixes.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.0.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/unbound/download/#unbound-1-0-2">Changes</a></li>
</ul>
NSD 3.1.1 released2008-07-21T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2008-07-21:/news/2008/Jul/21/nsd-3.1.1-released/<p>This release contains mainly bugfixes. It also allows you to configure the maximum number of allowed interfaces. If you use it, it can have consequences for your memory usage.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-3.1.1.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/nsd/tags/NSD_3_1_1_REL/doc/ChangeLog">Changelog</a></li>
</ul>
DNS Cache Poisoning Vulnerability2008-07-19T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2008-07-19:/news/2008/Jul/19/dns-cache-poisoning-vulnerability/<p>Statement about US-CERT Vulnerability Note VU#800113 and Unbound</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://nlnetlabs.nl/publications/DNS_cache_poisoning_vulnerability.html">Statement of Unbound Development team</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.kb.cert.org/vuls/id/800113">US-CERT Vulnerability Note</a></li>
</ul>
NSD 3.1.0 released2008-06-23T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2008-06-23:/news/2008/Jun/23/nsd-3.1.0-released/<p>New version of NSD. It supports NSEC3 by default, has a "hide-version" configuration setting, to stop NSD answering from CHAOS class version requests, has bind2nsd 0.5.0, has some bugfixes resolved and reports source and zone for denied AXFR attempts. Some operational notes: the default locations of nsd.db …</p><p>New version of NSD. It supports NSEC3 by default, has a "hide-version" configuration setting, to stop NSD answering from CHAOS class version requests, has bind2nsd 0.5.0, has some bugfixes resolved and reports source and zone for denied AXFR attempts. Some operational notes: the default locations of nsd.db, ixfr.db and xfrd.state are changed to the /var/db/nsd/ directory.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-3.1.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/nsd/tags/NSD_3_1_0_REL/doc/ChangeLog">Changelog</a></li>
</ul>
ldns 1.3.0 released2008-06-02T00:00:00+02:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2008-06-02:/news/2008/Jun/02/ldns-1.3.0-released/<p>New version of ldns; If Unbound is to be linked against a separate copy of ldns, this version should be used. There are also some notable features, such as HSM support for DNSSEC signing, and nicer output for signature chasing.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/ldns/ldns-1.3.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/ldns/tags/release-1.3.0/Changelog">Changelog</a></li>
</ul>
Unbound 1.0.0 released2008-05-20T00:00:00+02:002026-03-04T07:35:16.836919+01:00NLnet Labstag:nlnetlabs.nl,2008-05-20:/news/2008/May/20/unbound-1.0.0-released/<p>The public release of Unbound, a fast recursive validating caching DNS server.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/unbound/about/">Unbound project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/unbound/unbound-1.0.0.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/publications/Unbound_Press_Release.pdf">Press release</a></li>
</ul>
HSM Tutorial2008-05-13T00:00:00+02:002026-03-04T07:35:16.810919+01:00NLnet Labstag:nlnetlabs.nl,2008-05-13:/news/2008/May/13/hsm-tutorial/<p>An introduction to the use of HSM.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/downloads/publications/hsm/hsm.pdf">Download</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/publications/hsm/hsm.html">HTML version</a></li>
</ul>
NSD 3.0.8 Release2008-04-18T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2008-04-18:/news/2008/Apr/18/nsd-3.0.8-release/<p>Better logging for nsd-notify, Add chkconfig configuration, nsdc bugfixes, strptime fix, more (bugzilla) fixes and logging features.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/nsd/nsd-3.0.8.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/nsd/tags/NSD_3_0_8_REL/doc/ChangeLog">Changelog</a></li>
</ul>
ldns 1.2.2 Release2007-11-28T00:00:00+01:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2007-11-28:/news/2007/Nov/28/ldns-1.2.2-release/<p>We released a new version of ldns. There are some bugfixes, an added example tool, and hmac-md5 support for keys.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/ldns/ldns-1.2.2.tar.gz">Direct Download</a></li>
<li><a class="reference external" href="proxy.php?url=/svn/ldns/tags/release-1.2.2/Changelog">Changelog</a></li>
</ul>
NSD 3.0.7 Release2007-11-13T00:00:00+01:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2007-11-13:/news/2007/Nov/13/nsd-3.0.7-release/<p>Fixup of error handling for bad data in IXFRs. Manual page syntax improvements.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
</ul>
Design of a Secure and Decentralized Location Service for Agent Platforms2007-09-19T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2007-09-19:/news/2007/Sep/19/design-of-a-secure-and-decentralized-location-service-for-agent-platforms/<p>Publication on designing of a secure and decentralized location service for agent platforms.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/downloads/publications/ap2pc07.pdf">Download</a></li>
</ul>
Formalization and Verification of the Shim6 Protocol2007-07-16T00:00:00+02:002026-03-04T07:35:16.809919+01:00NLnet Labstag:nlnetlabs.nl,2007-07-16:/news/2007/Jul/16/formalization-and-verification-of-the-shim6-protocol/<p>Publication on formalization and verification of the shim6 protocol.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/downloads/publications/ipv6/fvShim6thesis.pdf">Download</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/publications/ipv6/fvShim6abstract.pdf">Abstract</a></li>
</ul>
Annual Report 20062007-05-21T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2007-05-21:/news/2007/May/21/annual-report-2006/<p>We are happy to present NLnet Labs Annual report 2006. In it we present an overview of Labs' various activities and describe their impact.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/downloads/publications/annualreports/annualreport2006.pdf">Download</a></li>
</ul>
DNS Threat Analysis2007-05-03T00:00:00+02:002026-03-04T07:35:16.807919+01:00NLnet Labstag:nlnetlabs.nl,2007-05-03:/news/2007/May/03/dns-threat-analysis/<p>Publication on DNS Threat Analysis.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/downloads/publications/se-consult.pdf">Download</a></li>
</ul>
NSD 2.3.7 Release2007-04-16T00:00:00+02:002026-03-04T07:35:16.821469+01:00NLnet Labstag:nlnetlabs.nl,2007-04-16:/news/2007/Apr/16/nsd-2.3.7-release/<p>This is a bug-fix release on our older maintenance branch of NSD. It includes a fixup of type WKS printing from nsd-xfer, a fixup in a call to getservbyport. There are changes in the getaddrinfo error message and a change to make it fall back to IPv4 if it fails …</p><p>This is a bug-fix release on our older maintenance branch of NSD. It includes a fixup of type WKS printing from nsd-xfer, a fixup in a call to getservbyport. There are changes in the getaddrinfo error message and a change to make it fall back to IPv4 if it fails for IPv6. A typecast is added to satisfy the compiler. Furthermore a cleanup of the text for NOTAUTH error code.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
</ul>
NSD Memory Usage Estimate2007-04-13T00:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2007-04-13:/news/2007/Apr/13/nsd-memory-usage-estimate/<p>Small web tool added to make a memory size indication given zone specification.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/nsd/">NSD project page</a></li>
<li><a class="reference external" href="proxy.php?url=/projects/nsd/nsd-memsize.html">Memory estimate</a></li>
</ul>
ldns 1.2.0 Release2007-04-11T00:00:00+02:002026-03-04T07:35:16.812919+01:00NLnet Labstag:nlnetlabs.nl,2007-04-11:/news/2007/Apr/11/ldns-1.2.0-release/<p>We released a new version of ldns. There are a lot of bugfixes, some more examples, and drill has had significant updates.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/projects/ldns/">ldns project page</a></li>
<li><a class="reference external" href="proxy.php?url=/downloads/ldns/ldns-1.2.0.tar.gz">Direct Download</a></li>
</ul>
NSD Powers Secure64 DNS Solution2007-03-31T00:00:00+02:002026-03-04T07:35:16.828919+01:00NLnet Labstag:nlnetlabs.nl,2007-03-31:/news/2007/Mar/31/nsd-powers-secure64-dns-solution/<p>Secure64 is a company specialized in secure and high-performance applications. They have developed SourceT, a micro operating system geared towards secure network systems on Itanium processors. NSD has been ported to SourceT, and is used as the name server software of their Secure64 DNS product, providing RFC-compliant, DNSSEC-enabled, fast DNS …</p><p>Secure64 is a company specialized in secure and high-performance applications. They have developed SourceT, a micro operating system geared towards secure network systems on Itanium processors. NSD has been ported to SourceT, and is used as the name server software of their Secure64 DNS product, providing RFC-compliant, DNSSEC-enabled, fast DNS services on top of their SourceT operating system. They have performed benchmarks on a Itanium machine with SourceT running NSD, and have been able to handle a query load of over 100,000 queries per second with only 1 CPU. The system was able to sustain DNS service in the face of a variety of common attack profiles until the network link was saturated.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=http://www.secure64.com/library/labresults/secure64_test_lab_results.pdf">The full test results can be found here</a></li>
<li><a class="reference external" href="proxy.php?url=http://www.secure64.com/">Secure64</a></li>
</ul>
Annual Report 20052006-06-18T00:00:00+02:002026-03-04T07:35:16.807410+01:00NLnet Labstag:nlnetlabs.nl,2006-06-18:/news/2006/Jun/18/annual-report-2005/<p>We are happy to present NLnet Labs Annual report 2005. In it we present an overview of Labs' various activities and describe their impact.</p>
<!-- PELICAN_END_SUMMARY -->
<p>Related links:</p>
<ul class="simple">
<li><a class="reference external" href="proxy.php?url=/downloads/publications/annualreports/annualreport2005.pdf">Download</a></li>
</ul>