The biggest projects for the past year have been continuing the implementation of the new, refactored network interface using libuv, and the addition of support for the new DoT and DoH encrypted transports, including updating dig to send DoH queries. Back in January of this year, we announced a change in our release model, moving from 12-month branches to 24-month branches to give us more time on a new feature branch to complete large refactoring projects like the network manager, because we anticipate more similar projects in the future. We have made several adjustments to our Serve-Stale feature based on user feedback, and we have continued making improvements to the Key and Signing Policy (KASP) tool first published in 9.16. We have also updated our DNS Cookie support, tightening policy as deployment of DNS Cookies improves across the Internet. DNS Cookies are a useful and lightweight defense against the whole category of spoofing attacks on the DNS, such as the recently published SADDNS cache poisoning vulnerability.
With the June release of 9.16 we will have completed the transition to the new libuv-based network manager infrastructure. Our internal testing shows that recent changes to the network manager have fixed some resolver performance problems that have been plaguing 9.16 since we introduced the network manager. With these changes BIND 9.16 consistently performs as well or better than 9.11. Now we can finally end the refactoring work in this branch and declare 9.16 an Extended-Support version (ESV) in July, putting it into a more stable maintenance-only mode. At that time, we will advise more conservative users to start migrating from 9.11.
In order to minimize ongoing churn in the 9.16 branch for ESV status, we have decided to retract our earlier pledge to backport DNS-over-HTTPS (DoH) and DNS-over-TLS (DoT) to 9.16. Backporting that to 9.16 at this point (we have almost no operator feedback on it yet) could mean months of further changes in 9.16. The next stable version, BIND 9.18, is now only six months away (expected release January 2022) and that is a better target for production deployment of DoH and DoT. If you are using either DoH or DoT in BIND, we would love to hear from you (use the bind-users list to share your experience).
We are currently projecting our new stable branch in January, early in Q1. We have a long list of pending customer-requested minor enhancements, many associated with troubleshooting or monitoring. We will try to do as many of these as possible before we create the new 9.18 branch. We have some work on-going on zone transfers and are planning additional RPZ logging. We have more work to do to make our DoH implementation more scalable. (This is a background activity based on the very low level of interest we have seen from the BIND user community.) We are also working on documentation improvements, including migrating some content from the ISC knowledgebase to the BIND ARM.
The resources that would be required for us to support new Windows and Visual Studio versions would be better spent elsewhere. The June release of the development branch (9.17.14) will be the last release with Windows support included. We have removed the Windows support code from our main branch. The next stable branch, BIND 9.18 will not come with Windows as supported platform. We will try to create a separate dig.exe and post that as a separate download, so people can still use dig on Windows. If we are able to do this, it will not be an officially maintained product.
ISC has sponsored significant improvements to the OpenSC engine_pkcs11, and the next OpenSC version (libp11 0.4.12) will include those improvements. The new version has better performance and is maintained by people with specific expertise in PKCS#11. Therefore, we intend to drop the native PKCS#11 interface from BIND 9.18 and recommend the OpenSC implementation instead.
Before this dilemma I used plain networkmanager to connect to WiFi but after this happened, I tried installing iwd by chrooting into the system with the live iso. After that I added this to /etc/iwd/main.conf
Which repeats at a particular time interval along with other services that fail due to the internet connection.
I wonder what the issue is even stemming from, I would appreciate people more knowledgable than me to help me see the bigger picture here.
If there are other information you would like to see, I'll deliver.
I'm new to arch forums so sorry if the formatting might be wrong in some way.
I made a mistake at first, and put '-' instead of '_' so I didn't find wpa supplicant at first.
I'll try to remove it and see what happens
Scratch that, removing wpa_supplicant obviously breaks networkmanager dependancy. I'm probably sleep deprived!
I'll see what I can do tomorrow.
You now have NM and iwd enabled what's not going to work.
Disable iwd, reboot, check the output of "ip a", try to "ping -c1 8.8.8.8" and post a complete system journal ("sudo journalctl -b", redirect that into a file or pipe it into "curl -F 'file=@-' 0x0.st" if you've an internet connection by other means. Don't copy and paste out of the terminal)
Based on archwiki, networkmanager uses systemd-resolved automatically, all I did is remove resolv.conf and restart networkmanager. Was I mistaken in thinking systemd-resolved is the default resolver? Is there something else that has to be done? I've checked with ls -l and resolv.conf does not point to any directory.
I didn't even know we had eduroam until now. It makes sense since it's less strict than any other internet service inside Iran in regards to blocking VPN services but I'm still just assuming. There is no useful information about the service readily available. I'll have to ask around.
172.16.0.0 - 172.31.255.255 and 192.168.0.0 - 192.168.255.255 are both private network segments, they're not part of the internet and unless the gateway on 172.18.164.1 routes you into 192.168.20.0/24 (what is possible but not very likely) you cannot reach that host from the current segment (hence the timeout)
rndc has been updated to use the new BIND network manager API. Asthe network manager currently has no support for UNIX-domain sockets,those cannot now be used with rndc. This will be addressed in afuture release, either by restoring UNIX-domain socket support or byformally declaring them to be obsolete in the control channel.[GL #1759]
Key files were updated every time the dnssec-policy key managerran, whether the metadata had changed or not. named nowchecks whether changes were applied before writing out the key files.[GL #3302]
Is there any trick to getting 11.1.5 to work? I've discovered that i had to change out the windows iso otherwise if i installed 11.1.5 in the guest when the guest rebooted vmware would automatically uninstall and upgrade to 11.3.5. So eventually got 11.1.5 running but the same problem persists. This is with a win10 guest. Is there any other options that may make this work other than using the tech preview below? I do notice that in device manager in the guest that the VMware SVGA 3D driver remains version 9.17.1.2 no matter what....Im assuming it should not be that. I'll test that theory by installing a blank win10 machine and see what happens i guess.
Thank you Greamsy, that helped a big step further.
I did as you said up to the Point where you had the 2 Options 10.18.13.5362 and 9.18.13.4052. At this Point I got the Options GTX 460 Driver and Microsoft Basic Display Driver (compatible devices button checked). Both of These Options did not work. I browsed the Internet for the 9.18.13.4052 Driver and installed it. And it worked! Awesome!
The flaw, tracked as CVE-2023-38035, affects Ivanti Sentry (formerly MobileIron Sentry) versions 9.18 and below and received a critical CVSS score of 9.8 out of 10. Ivanti Sentry, a component of the Unified Endpoint Management Solutions platform, is used to secure data between mobile devices and corporate systems. The software vendor credited cybersecurity company Mnemonic for reporting the vulnerability that was discovered in the MobileIron Configuration Service administrative portal, also known as port 8443.
If exploited, this vulnerability enables an unauthenticated actor to access some sensitive APIs that are used to configure Ivanti Sentry on the administrator portal (commonly, MICS). While the issue has a high CVSS score, there is low risk of exploitation for customers who do not expose 8443 to the internet.
According to Ivanti, CVE-2023-38035 impacts versions 9.18 and prior of Ivanti Sentry (including both supported versions and older versions). The flaw could enable an unauthenticated attacker to bypass authentication controls on the administrative interface, allowing them to change configurations, write files onto the system and execute OS commands on the appliance as root.
dd2b598166