1
0
mirror of https://github.com/mail-in-a-box/mailinabox.git synced 2025-04-04 00:17:06 +00:00
Commit Graph

173 Commits

Author SHA1 Message Date
KiekerJan
9dfd83b3f9 keep existing dkim selector 2023-04-28 23:05:42 +02:00
KiekerJan
1c5eeac1d5 do not validate records that are requested to be removed 2023-04-12 21:08:47 +02:00
KiekerJan
547a75c25d fix issue where sshkeyscan fails when ipv6 is disabled for sshd 2023-03-27 21:19:09 +02:00
KiekerJan
2d9aa20b36 softfail SPF 2023-03-10 21:29:05 +01:00
KiekerJan
95ac1387a3 commit upstream 2023-01-29 13:41:41 +01:00
Hugh Secker-Walker
820a39b865
chore(python open): Refactor open and gzip.open to use context manager (#2203)
Co-authored-by: Hugh Secker-Walker <hsw+miac@hodain.net>
2023-01-15 08:28:43 -05:00
KiekerJan
0fc5105da5
Fixes to DNS lookups during status checks when there are timeouts, enforce timeouts better (#2191)
* add dns query handling changes

* replace exception pass with error message

* simplify dns exception catching

* Add not set case to blacklist lookup result handling
2023-01-15 08:20:08 -05:00
KiekerJan
210d9f08dc simplify utils.py#shell method used by unbound-control call 2022-11-05 21:04:05 +01:00
KiekerJan
ebc5f06d61 merge upstream 60.1 2022-10-30 23:01:19 +01:00
alento-group
32c68874c5
Fix NSD not restarting (#2182)
A previous commit (0a970f4bb2) broke nsd restarting. This fixes that change by reverting it.

Josh added: Use nsd-control with reconfig and reload if they succeed and only fall back to restarting nsd if they fail

Co-authored-by: Joshua Tauberer <jt@occams.info>
2022-10-30 08:16:03 -04:00
KiekerJan
fe52334288 merge upstream 2022-10-15 16:38:47 +02:00
Joshua Tauberer
ddf8e857fd
Support Ubuntu 22.04 Jammy Jellyfish (#2083) 2022-10-11 21:18:34 -04:00
Joshua Tauberer
0a970f4bb2 Use nsd-control to refresh nsd after zone files are rewritten rather than 'service nsd restart'
I am not sure if this was the problem but nsd didn't serve updated zonefiles on my box and 'service nsd restart' must have been used, so maybe it doesn't reload zones.
2022-10-08 07:24:57 -04:00
Sudheesh Singanamalla
d7244ed920
Fixes #2149 Append ; in policy strings for DMARC settings (#2151)
Signed-off-by: Sudheesh Singanamalla <sudheesh@cloudflare.com>
2022-08-19 13:23:42 -04:00
Rauno Moisto
78569e9a88 Fix DeprecationWarning in dnspython query vs resolve method
The resolve method disables resolving relative names by default. This change probably makes a7710e90 unnecessary. @JoshData added some additional changes from query to resolve.
2022-07-28 14:02:46 -04:00
KiekerJan
a1851a413b use actual unbound command to flush cache 2022-04-18 21:52:33 +02:00
github@kiekerjan.isdronken.nl
aaa7702d9d make dns resolver retrying explicit 2022-04-18 21:40:20 +02:00
KiekerJan
d35b068a73 add dns exception handling 2022-04-17 22:56:30 +02:00
KiekerJan
9b252e0209 retrying dns timeouts 2022-04-04 22:31:54 +02:00
KiekerJan
7ac4b412b0 attempts to reduce unnecessary dns update messages 2022-04-03 16:37:51 +02:00
KiekerJan
640751b606 initial changes to use unbound as local dns resolver instead of bind 2022-03-20 20:57:19 +01:00
github@kiekerjan.isdronken.nl
2e23e44582 merge prelim 22.04 changes from upstream 2022-02-16 23:32:30 +01:00
github@kiekerjan.isdronken.nl
686e878af5 merge master 2022-02-02 12:15:22 +01:00
KiekerJan
72b08d6b9a fix installer bugs 2022-02-01 23:14:26 +01:00
Joshua Tauberer
cb564a130a Fix DNS secondary nameserver refesh failure retry period
Fixes #1979
2022-01-08 09:38:41 -05:00
github@kiekerjan.isdronken.nl
73833e9e76 merge master 2021-12-28 23:33:22 +01:00
github@kiekerjan.isdronken.nl
ded1b55ebd First steps in migrating to dkimpy-milter 2021-12-11 00:54:56 +01:00
github@kiekerjan.isdronken.nl
eeada2b9b5 merge changes from V55 upstream 2021-10-19 23:07:02 +02:00
drpixie
df46e1311b
Include NSD config files from /etc/nsd/nsd.conf.d/*.conf (#2035)
And write MIAB dns zone config into /etc/nsd/nsd.conf.d/zones.conf. Delete lingering old zones.conf file.

Co-authored-by: Joshua Tauberer <jt@occams.info>
2021-09-24 08:07:40 -04:00
KiekerJan
db612e91e5 do not generate dns zonefiles for www only websites with external DNS records 2021-06-25 00:36:12 +02:00
github@kiekerjan.isdronken.nl
ca5fb3c2e0 Merge changes from upstream v0.54 2021-06-20 23:36:54 +02:00
github@kiekerjan.isdronken.nl
d88d7d0371 Merge branch 'develop-dns-mods' of https://github.com/kiekerjan/mailinabox into develop-dns-mods 2021-05-24 14:24:18 +02:00
github@kiekerjan.isdronken.nl
ee87feb571 modify dns TTLs according to recommendations from zonemaster.iis.se 2021-05-24 14:24:09 +02:00
KiekerJan
e928b915f4 clean strings before comparing 2021-05-23 21:47:37 +02:00
KiekerJan
6be8ae1e4b correct use of Pyhton Booleans 2021-05-22 18:47:37 +02:00
github@kiekerjan.isdronken.nl
544f06b100 document DNS mods and make DNS options configurable per domain 2021-05-19 22:48:21 +02:00
github@kiekerjan.isdronken.nl
14394ef05b add missing . in nameserver definition 2021-05-19 22:01:25 +02:00
github@kiekerjan.isdronken.nl
856d94b74f use shorthand for ttl periods, more correct secondary ns list handling 2021-05-19 21:17:55 +02:00
github@kiekerjan.isdronken.nl
b9e7175d9f add principal functionality to act as hidden master 2021-05-18 22:51:29 +02:00
github@kiekerjan.isdronken.nl
8b13a3b177 short TTL for DNS entries if config file set 2021-05-18 13:28:09 +02:00
Joshua Tauberer
e283a12047 Add null SPF, DMARC, and MX records for automatically generated autoconfig, autodiscover, and mta-sts subdomains; add null MX records for custom A-record subdomains
All A/AAAA-resolvable domains that don't send or receive mail should have these null records.

This simplifies the handling of domains a bit by handling automatically generated subdomains more like other domains.
2021-05-15 16:42:14 -04:00
Joshua Tauberer
e421addf1c Pre-load domain purpopses when building DNS zonefiles rather than querying mail domains at each subdomain 2021-05-09 08:16:07 -04:00
Joshua Tauberer
354a774989 Remove a debug line added in 8cda58fb 2021-05-09 07:34:44 -04:00
github@kiekerjan.isdronken.nl
c24ca5abd4 include changes from v0.53. Remove some POWER modifications to closer follow original mialinabox 2021-04-13 09:50:23 +02:00
Joshua Tauberer
8cda58fb22 Speed up status checks a bit by removing a redundant check if the PRIMARY_HOSTNAME certificate is signed and valid 2021-04-12 19:42:12 -04:00
Joshua Tauberer
178c587654 Migrate to the ECDSAP256SHA256 (13) DNSSEC algorithm
* Stop generating RSASHA1-NSEC3-SHA1 keys on new installs since it is no longer recommended, but preserve the key on existing installs so that we continue to sign zones with existing keys to retain the chain of trust with existing DS records.
* Start generating ECDSAP256SHA256 keys during setup, the current best practice (in addition to RSASHA256 which is also ok). See https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml#dns-sec-alg-numbers-1 and https://www.cloudflare.com/dns/dnssec/ecdsa-and-dnssec/.
* Sign zones using all available keys rather than choosing just one based on the TLD to enable rotation/migration to the new key and to give the user some options since not every registrar/TLD supports every algorithm.
* Allow a user to drop a key from signing specific domains using DOMAINS= in our key configuration file. Signing the zones with extraneous keys may increase the size of DNS responses, which isn't ideal, although I don't know if this is a problem in practice. (Although a user can delete the RSASHA1-NSEC3-SHA1 key file, the other keys will be re-generated on upgrade.)
* When generating zonefiles, add a hash of all of the DNSSEC signing keys so that when the keys change the zone is definitely regenerated and re-signed.
* In status checks, if DNSSEC is not active (or not valid), offer to use all of the keys that have been generated (for RSASHA1-NSEC3-SHA1 on existing installs, RSASHA256, and now ECDSAP256SHA256) with all digest types, since not all registers support everything, but list them in an order that guides users to the best practice.
* In status checks, if the deployed DS record doesn't use a ECDSAP256SHA256 key, prompt the user to update their DS record.
* In status checks, if multiple DS records are set, only fail if none are valid. If some use ECDSAP256SHA256 and some don't, remind the user to delete the DS records that don't.
* Don't fail if the DS record uses the SHA384 digest (by pre-generating a DS record with that digest type) but don't recommend it because it is not in the IANA mandatory list yet (https://www.iana.org/assignments/ds-rr-types/ds-rr-types.xhtml).

See #1953
2021-04-12 19:42:12 -04:00
Joshua Tauberer
6653dbb2e2 Sort the Custom DNS by zone and qname, and add an option to go back to the old sort order (creation order)
Update the zone grouping style on the users and aliases page to match.

Fixes #1927
2021-02-28 09:40:32 -05:00
David Duque
4829e687ff
Merge changes from master 2021-01-31 16:20:15 +00:00
Nicolas North
8025c41ee4
Bump TTL for NS records to 1800 (30 min) to 86400 (1 day) as some registries require this (#1892)
Co-authored-by: Nicolas North [norðurljósahviða] <nz@tillverka.xyz>
2021-01-03 17:57:54 -05:00
Victor
b85b86e6de
Add download zonefile button to external DNS page (#1853)
Co-authored-by: Joshua Tauberer <jt@occams.info>
2020-11-16 06:03:41 -05:00