[getdns-api] getdns 0.3.0 release candidate
Mankin, Allison
amankin at verisign.com
Fri Jul 10 16:01:04 CEST 2015
Some of your typos are very likable, such as hob-by-hob :-)
Could you publish the new API spec on the website? I think that is what we call “burying the lede” to have it not get announced to the getdnsapi list but only mentioned as part of the tarball.
Al
> On Jul 10, 2015, at 9:40 AM, Willem Toorop <willem at nlnetlabs.nl> wrote:
>
> Thank you :) Lots of typos in the release text though. I'll fix that
> for the actual release..
>
> Op 10-07-15 om 15:06 schreef Mankin, Allison:
>> Fantastic
>>
>>
>>
>>> On Jul 10, 2015, at 06:06, Willem Toorop <willem at nlnetlabs.nl> wrote:
>>>
>> Dear All,
>>
>> I am pleased to announce the special IETF93 edition release candidate
>> for version 0.3.0 of our getdns API implementation.
>>
>> Besides bugfixes and DNS parameter updates, this release follows the
>> (yes to be published, but within the tarball) updated version of the
>> API, which has a new function to set a list of transports:
>> getdns_context_set_dns_transport_list().
>>
>> If only one transport value is specified, it will be the only
>> transport used. Should it not be available, basic resolution will
>> fail. Fallback transport options are specified by including multiple
>> values in the list. The values are GETDNS_TRANSPORT_UDP,
>> GETDNS_TRANSPORT_TCP, GETDNS_TRANSPORT_TLS, or
>> GETDNS_TRANSPORT_STARTTLS. The default is a list containing
>> GETDNS_TRANSPORT_UDP then GETDNS_TRANSPORT_TCP.
>>
>> Also, for transport options TCP, TLS and STARTTLS, the connection will
>> now always be tried to be kept open and multiple queries will be
>> pipelined over it. When there are no pending queries, the connection
>> is not closed for a period of time that can be specified with the new
>> API function: getdns_context_set_idle_timeout().
>>
>> Besides these new transport options, the release has improved DNSSEC
>> support. Before, when using stub resolution mode, libunbound was
>> still used (in forwarding mode) when one of the DNSSEC extensions was
>> set. This release has native stub DNSSEC validation on board, so all
>> DNSSEC extensions can now be combined with all the other hob-by-hob
>> communication features available with stub resolution mode, such as
>> the new transport options, cookies and fine grained control over EDNS0
>> options.
>>
>> To realise native stub validation, both the
>> dnssec_return_validation_chain extension and the
>> getdns_validate_dnssec() function have been thoroughly improved.
>>
>> Before the dnssec_return_validation_chain extension only returned the
>> chain of DS/DNSKEY's starting at the signers name of the signatures in
>> the answer and authority section of the request. Now, the extension
>> will also return the support records needed to asses the DNSSEC status
>> of replies without signatures, and even for replies without any RR's
>> at all. Note that even an empty packet may be BOGUS or INSECURE
>> depending on the proof of non-existence of the DS of the zone for the
>> request of one of its parents.
>>
>> Also, the dnssec_return_validation_chain extension will try to return
>> a single RRSIG RR per RRset. The one that it has used itself to asses
>> the DNSSEC status of the RRset. This to alleviate the eventual
>> validation effort that will be done with the chain.
>>
>> Note that the improved behaviour can be viewed live on the "Do a
>> query" page of our website: https://getdnsapi.net/query.html
>>
>> Complementary to this improvement, the getdns_validate_dnssec()
>> function can now also asses DNSSEC status for RRsets without
>> signatures and even empty replies when given such "validation_chain"
>> as the support_records. As the record_to_validate parameter, complete
>> replies may now be given. It will deal with everything needed to
>> correctly asses DNSSEC status for a reply, such as (but not limited
>> to) NSEC3 opt-out evaluation and handling of by DNAME synthesized CNAMEs.
>>
>> Note that this is a release candidate. It is distributed for you to
>> review before we do an actual release. Please review this candidate
>> carefully. If no issues arise the actual 0.3.0 release will follow
>> over one week on the seventeenth of July 2015.
>>
>>
>> link : https://getdnsapi.net/dist/getdns-0.3.0rc1.tar.gz
>> md5 : 27a1100d5d5d70c087b79109d1109ef3
>> sha1 : d79db12590109c826f627417da1b480f67c3839c
>> pgp sig: https://getdnsapi.net/dist/getdns-0.3.0rc1.tar.gz.asc
>>
>>
>> ChangeLog
>> =========
>> * 2015-07-??: Version 0.3.0
>> * Unit test for spurious execute bits. Thanks Paul Wouters.
>> * Added new transport list options in API. The option is now an
>> ordered list of GETDNS_TRANSPORT_UDP, GETDNS_TRANSPORT_TCP,
>> GETDNS_TRANSPORT_TLS, GETDNS_TRANSPORT_STARTTLS.
>> * Added new context setting for idle_timeout
>> * CSYNC RR type
>> * EDNS0 COOKIE option code set to 10
>> * dnssec_return_validation_chain for negative and insecure responses.
>> * dnssec_return_validation_chain return a single RRSIG on each RRSET
>> (whenever possible)
>> * getdns_validate_dnssec() accept replies from the replies_tree
>> * getdns_validate_dnssec() asses negative and insecure responses.
>> * Native stub dnssec validation
>> * Implemented getdns_context_set_dnssec_trust_anchors()
>> * Switch freely between stub and recursive mode
>> * getdns_query -k shows default trust anchors
>> * functions and defines to get library and API versions in string and
>> numeric values: getdns_get_version(), getdns_get_version_number(),
>> getdns_get_api_version() and getdns_get_api_version_number()
>>> _______________________________________________
>>> getdns-api mailing list
>>> getdns-api at vpnc.org
>>>
>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4718 bytes
Desc: not available
URL: <http://getdnsapi.net/pipermail/spec/attachments/20150710/6dd2d738/attachment.bin>
More information about the spec
mailing list