Skip to content

Commit e64b3a8

Browse files
committed
[#4031] release changes
1 parent e933b13 commit e64b3a8

File tree

70 files changed

+379
-173
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

70 files changed

+379
-173
lines changed

ChangeLog

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,27 @@
1+
Kea 3.1.0 (development) released on July 30, 2025
2+
3+
2381. [build]* fdupont
4+
Moved Botan crypto backend support to version 3.
5+
(Gitlab #3553)
6+
7+
2380. [bug] tmark
8+
kea-dhcp4 now correctly supports option class-tags
9+
(i.e."client-classes") in host and config back ends
10+
for both MySQL and PosgreSQL.
11+
(Gitlab #3770)
12+
13+
2379. [func] razvan
14+
Added SSL/TLS support for PostgreSQL database connection in
15+
the Kea configuration. Available parameters are:
16+
"trust-anchor", "cert-file", "key-file" and "ssl-mode".
17+
(Gitlab #3927)
18+
19+
2378. [sec]* tmark
20+
Additional runtime security checks were added
21+
to kea-dhcp4,kea-dhcp6,kea-dhcp-ddns, and
22+
kea-ctrl-agent
23+
(Gitlab #3848)
24+
125
2377. [build] razvan
226
The library version numbers have been bumped up for the Kea 3.1.0
327
development release.

changelog_unreleased/3553-botan-3

Lines changed: 0 additions & 3 deletions
This file was deleted.

changelog_unreleased/3770-examine-cb-command-behavior-for-mulitple-options-with-the-same-code-in-a-given-scope

Lines changed: 0 additions & 5 deletions
This file was deleted.

changelog_unreleased/3848-security-policy-security-strict-relaxed

Lines changed: 0 additions & 5 deletions
This file was deleted.

changelog_unreleased/3927-add-tls-settings-to-pqconnectdb

Lines changed: 0 additions & 5 deletions
This file was deleted.

doc/sphinx/grammar/grammar-dhcp4-parser.rst

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -343,6 +343,7 @@ This grammar is generated from ``dhcp4_parser.yy``. See :ref:`dhcp4` for more de
343343
| trust_anchor
344344
| cert_file
345345
| key_file
346+
| ssl_mode
346347
| cipher_list
347348
| unknown_map_entry
348349
@@ -392,6 +393,13 @@ This grammar is generated from ``dhcp4_parser.yy``. See :ref:`dhcp4` for more de
392393
393394
key_file ::= "key-file" ":" STRING
394395
396+
ssl_mode ::= "ssl-mode" ":" ssl_mode
397+
| "disable"
398+
| "prefer"
399+
| "require"
400+
| "verify-ca"
401+
| "verify-full"
402+
395403
cipher_list ::= "cipher-list" ":" STRING
396404
397405
host_reservation_identifiers ::= "host-reservation-identifiers" ":" "[" host_reservation_identifiers_list "]"

doc/sphinx/grammar/grammar-dhcp6-parser.rst

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -320,6 +320,7 @@ This grammar is generated from ``dhcp6_parser.yy``. See :ref:`dhcp6` for more de
320320
| trust_anchor
321321
| cert_file
322322
| key_file
323+
| ssl_mode
323324
| cipher_list
324325
| unknown_map_entry
325326
@@ -369,6 +370,13 @@ This grammar is generated from ``dhcp6_parser.yy``. See :ref:`dhcp6` for more de
369370
370371
key_file ::= "key-file" ":" STRING
371372
373+
ssl_mode ::= "ssl-mode" ":" ssl_mode
374+
| "disable"
375+
| "prefer"
376+
| "require"
377+
| "verify-ca"
378+
| "verify-full"
379+
372380
cipher_list ::= "cipher-list" ":" STRING
373381
374382
sanity_checks ::= "sanity-checks" ":" "{" sanity_checks_params "}"

doc/sphinx/kea-messages.rst

Lines changed: 184 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2691,6 +2691,18 @@ Logged at debug log level 10.
26912691
This debug messages is issued when the Command HTTP listener, listening
26922692
at the given address and port, has begun to shutdown.
26932693

2694+
COMMAND_HTTP_SOCKET_SECURITY_WARNING
2695+
====================================
2696+
2697+
.. code-block:: text
2698+
2699+
command socket configuration is NOT SECURE: %1
2700+
2701+
This warning message is issued when security enforcement is disabled
2702+
and command socket configuration does not use HTTPS/TLS or baseic HTTP
2703+
authentication. The server will still use the socket as configured but
2704+
is warning that doing so may pose a security risk.
2705+
26942706
COMMAND_PROCESS_ERROR1
26952707
======================
26962708

@@ -2880,6 +2892,30 @@ COMMAND_SOCKET_WRITE_FAIL
28802892
This error message indicates that an error was encountered while
28812893
attempting to send a response to the command socket.
28822894

2895+
COMMAND_UNIX_SOCKET_PATH_SECURITY_WARNING
2896+
=========================================
2897+
2898+
.. code-block:: text
2899+
2900+
unix socket path is NOT SECURE: %1
2901+
2902+
This warning message is issued when security enforcement is disabled
2903+
and the path specified for a control channel unix socket-name does
2904+
not comply with the supported path. The server will still use the
2905+
specified path but is warning that doing so may pose a security risk.
2906+
2907+
COMMAND_UNIX_SOCKET_PERMISSIONS_SECURITY_WARNING
2908+
================================================
2909+
2910+
.. code-block:: text
2911+
2912+
unix socket permissions are NOT SECURE: %1
2913+
2914+
This warning message is issued when security enforcement is disabled
2915+
and the path specified for a control channel unix socket-name does
2916+
not have the required socket permissions. The server will still use the
2917+
specified path but is warning that doing so may pose a security risk.
2918+
28832919
COMMAND_WATCH_SOCKET_CLEAR_ERROR
28842920
================================
28852921

@@ -3508,6 +3544,19 @@ DCTL_INIT_PROCESS_FAIL
35083544
This error message is issued if the controller could not initialize the
35093545
application and will exit.
35103546

3547+
DCTL_LOG_PATH_SECURITY_WARNING
3548+
==============================
3549+
3550+
.. code-block:: text
3551+
3552+
Log output path specified is NOT SECURE: %1
3553+
3554+
This warning message is issued when security enforcement is
3555+
disabled and the output path specified for a given logger does
3556+
not comply with the supported path. The server will still
3557+
use the specified path but is warning that doing so may pose a
3558+
security risk.
3559+
35113560
DCTL_NOT_RUNNING
35123561
================
35133562

@@ -3567,6 +3616,18 @@ The controller has encountered a fatal error while running the
35673616
application and is terminating. The reason for the failure is
35683617
included in the message.
35693618

3619+
DCTL_ROOT_USER_SECURITY_WARNING
3620+
===============================
3621+
3622+
.. code-block:: text
3623+
3624+
%1 running as root user!
3625+
3626+
This warning is emitted when the server is running as a root user.
3627+
While the server will function fully, this mode of operation may
3628+
expose your environment to security vulnerabilities and should
3629+
only be used after careful consideration.
3630+
35703631
DCTL_RUN_PROCESS
35713632
================
35723633

@@ -5829,6 +5890,18 @@ supplied its hostname. The first argument includes the client and the
58295890
transaction identification information. The second argument holds the
58305891
generated hostname.
58315892

5893+
DHCP4_ROOT_USER_SECURITY_WARNING
5894+
================================
5895+
5896+
.. code-block:: text
5897+
5898+
kea-dhcp4 running as root user!
5899+
5900+
This warning is emitted when kea-dhcp4 is running as a root user.
5901+
While the server will function fully, this mode of operation may
5902+
expose your environment to security vulnerabilities and should
5903+
only be used after careful consideration.
5904+
58325905
DHCP4_SECURITY_CHECKS_DISABLED
58335906
==============================
58345907

@@ -8187,6 +8260,18 @@ identification information. The second and third argument contains the
81878260
packet name and type respectively. The fourth argument contains detailed
81888261
packet information.
81898262

8263+
DHCP6_ROOT_USER_SECURITY_WARNING
8264+
================================
8265+
8266+
.. code-block:: text
8267+
8268+
kea-dhcp6 running as root user!
8269+
8270+
This warning is emitted when kea-dhcp6 is running as a root user.
8271+
While the server will function fully, this mode of operation may
8272+
expose your environment to security vulnerabilities and should
8273+
only be used after careful consideration
8274+
81908275
DHCP6_SECURITY_CHECKS_DISABLED
81918276
==============================
81928277

@@ -9964,6 +10049,18 @@ testing but should not be enabled in normal circumstances. Non-persistence
996410049
mode is enabled when 'persist4=no persist6=no' parameters are specified
996510050
in the database access string.
996610051

10052+
DHCPSRV_MEMFILE_PATH_SECURITY_WARNING
10053+
=====================================
10054+
10055+
.. code-block:: text
10056+
10057+
Lease file path specified is NOT SECURE: %1
10058+
10059+
This warning message is issued when security enforcement is
10060+
disabled and the lease file path specified for does not comply
10061+
with the supported path. The server will still use the specified
10062+
path but is warning that doing so may pose a security risk.
10063+
996710064
DHCPSRV_MEMFILE_READ_HWADDR_FAIL
996810065
================================
996910066

@@ -11454,6 +11551,18 @@ message but the attempt to send it suffered an unexpected error. This is most
1145411551
likely a programmatic error, rather than a communications issue. Some or all
1145511552
of the DNS updates requested as part of this request did not succeed.
1145611553

11554+
DHCP_DDNS_TSIG_SECRET_SECURITY_WARNING
11555+
======================================
11556+
11557+
.. code-block:: text
11558+
11559+
use of clear text TSIG 'secret' is NOT SECURE: %1
11560+
11561+
This warning message is issued when security enforcement is disabled
11562+
and TSIG key configuration uses clear text 'secret' rather
11563+
than 'secret-file'. The server will still use the key as configured
11564+
but is warning that doing so may pose a security risk.
11565+
1145711566
DHCP_DDNS_UDP_SENDER_WATCH_SOCKET_CLOSE_ERROR
1145811567
=============================================
1145911568

@@ -14489,6 +14598,19 @@ This is most likely due to the installation of a new version of Kea
1448914598
without rebuilding the hook library. A rebuild and re-install of the
1449014599
library should fix the problem in most cases.
1449114600

14601+
HOOKS_LIBPATH_SECURITY_WARNING
14602+
==============================
14603+
14604+
.. code-block:: text
14605+
14606+
Library path specified is NOT SECURE: %1
14607+
14608+
This warning message is issued when security enforcement is
14609+
disabled and the library path specified for a given hook library
14610+
does not comply with the supported path. The server will still load
14611+
the hook library but is warning that doing so may pose a security
14612+
risk.
14613+
1449214614
HOOKS_LIBRARY_CLOSED
1449314615
====================
1449414616

@@ -15975,6 +16097,18 @@ HOST_CACHE_INIT_OK
1597516097
This info message indicates that the Host Cache hooks library has been
1597616098
loaded successfully. Enjoy!
1597716099

16100+
HOST_CACHE_PATH_SECURITY_WARNING
16101+
================================
16102+
16103+
.. code-block:: text
16104+
16105+
Cache file path specified is NOT SECURE: %1
16106+
16107+
This warning message is issued when security enforcement is
16108+
disabled and the host cache file path specified does not comply
16109+
with the supported path. The server will still use the specified
16110+
path but is warning that doing so may pose a security risk.
16111+
1597816112
HOST_CMDS_DEINIT_OK
1597916113
===================
1598016114

@@ -16344,6 +16478,18 @@ Logged at debug log level 40.
1634416478
This debug message is issued when a multi-threaded HTTP client instance has
1634516479
been created. The argument specifies the maximum number of threads.
1634616480

16481+
HTTP_CLIENT_PASSWORD_SECURITY_WARNING
16482+
=====================================
16483+
16484+
.. code-block:: text
16485+
16486+
use of clear text 'password' is NOT SECURE: %1
16487+
16488+
This warning message is issued when security enforcement is disabled
16489+
and command socket configuration uses clear text 'password' rather
16490+
than 'password-file'. The server will still use the socket as configured
16491+
but is warning that doing so may pose a security risk.
16492+
1634716493
HTTP_CLIENT_QUEUE_SIZE_GROWING
1634816494
==============================
1634916495

@@ -16465,6 +16611,18 @@ This debug message is issued when the HTTP request timeout has occurred and
1646516611
the server is going to send a response with Http Request timeout status
1646616612
code.
1646716613

16614+
HTTP_CLIENT_USER_SECURITY_WARNING
16615+
=================================
16616+
16617+
.. code-block:: text
16618+
16619+
use of clear text 'user' is NOT SECURE: %1
16620+
16621+
This warning message is issued when security enforcement is disabled
16622+
and command socket configuration uses clear text 'user' rather
16623+
than 'user-file'. The server will still use the socket as configured
16624+
but is warning that doing so may pose a security risk.
16625+
1646816626
HTTP_COMMAND_MGR_HTTPS_SERVICE_REUSE_FAILED
1646916627
===========================================
1647016628

@@ -17039,6 +17197,19 @@ This error message indicates an error loading the Lease Commands
1703917197
hooks library. The details of the error are provided as argument of
1704017198
the log message.
1704117199

17200+
LEASE_CMDS_PATH_SECURITY_WARNING
17201+
================================
17202+
17203+
.. code-block:: text
17204+
17205+
lease file path specified is NOT SECURE: %1
17206+
17207+
This warning message is issued when security enforcement is disabled
17208+
and the path portion of the `filename` parameter of the lease4-write
17209+
or lease6-write command does not comply with the supported path. The
17210+
server will still use the specified path but is warning that doing so
17211+
may pose a security risk.
17212+
1704217213
LEASE_CMDS_RESEND_DDNS4
1704317214
=======================
1704417215

@@ -17442,6 +17613,19 @@ Logged at debug log level 50.
1744217613
A debug message issued when a new MySQL connected is created with TLS.
1744317614
The TLS cipher name is logged.
1744417615

17616+
LEGAL_LOG_PATH_SECURITY_WARNING
17617+
===============================
17618+
17619+
.. code-block:: text
17620+
17621+
Forensic log path specified is NOT SECURE: %1
17622+
17623+
This warning message is issued when security enforcement is
17624+
disabled and the path specified for forensic logging output
17625+
does not comply with the supported path. The server will
17626+
still use the specified path but is warning that doing so may
17627+
pose a security risk.
17628+
1744517629
LEGAL_LOG_PGSQL_COMMIT
1744617630
======================
1744717631

0 commit comments

Comments
 (0)