Unbound service routinely stopping/crashing following 20.7.7 update

Started by deejacker, December 18, 2020, 09:22:56 AM

Previous topic - Next topic
I also noticed that unbound wasn't restarted after the upgrade 20.7.6 -> 20.7.7, I had to do that manually. Is this intentional?
In theory there is no difference between theory and practice. In practice there is.

Quote from: miruoy on December 18, 2020, 04:24:05 PM
Setting the interfaces manually appears to have stabilized the issue. Will report back if the situation changes.

Spoke too soon :( It just crashed again.

Reverted to unbound 20.7.6 as suggested by Franco

I can confirm I have the same behaviour. This however only seems to happen when I reboot the firewall, not throughout the day.

Starting Unbound manually solves it for now.
Hope that a fix is available soon.

Changing and then reverting the interfaces didn't resolve anything for me, experienced another Unbound service stop shortly afterwards.

It would be better to pull this update as it completely breaks the system and makes it unusable since DNS crashes over and over.

Quote from: Animosity022 on December 19, 2020, 11:19:05 PM
It would be better to pull this update as it completely breaks the system and makes it unusable since DNS crashes over and over.

opnsense-revert -r 20.7.6 unbound

I think @Animosity022 meant stop offering the broken unbound 1.13.0 package in System > Firmware > Updates, or releasing 20.7.7_2 with unbound pinned at 1.12.0, or withdrawing 20.7.7_1 altogether (I get there are security issues resolved in this release so that might not be the best option).

Is it possible to at least add a note in the release notes warning people about this issue if they are using unbound in their configuration? So they can then make a more informed decision about whether to upgrade or not.

My backup firewall hasn't been upgraded yet, and 20.7.7_1 with unbound 1.13.0 is still being offered when I check for upgrades. So even if I read the release notes carefully, if I hit upgrade on that firewall, it would be guaranteed to break until unbound is manually reverted (after figuring out unbound had crashed and then finding this thread).

Quote from: Fright on December 18, 2020, 03:53:19 PM
related?
https://github.com/NLnetLabs/unbound/issues/376

Meanwhile, I reverted to Unbound 1.12.0 using the command that was posted here.
However, it looks like a patch is now included in FreeBSD-ports, based on the latest reply on GitHub.
@franco any chance to include this in a hotfix release, before you guys start to enjoy your much deserved Christmas break? :-) (otherwise indeed a good idea to update the release notes post. Could save some frustration).

Quote from: mimugmail on December 20, 2020, 07:20:04 AM
Quote from: Animosity022 on December 19, 2020, 11:19:05 PM
It would be better to pull this update as it completely breaks the system and makes it unusable since DNS crashes over and over.

opnsense-revert -r 20.7.6 unbound

I was saying to stop pushing a patch that bricks your router.

Same here.
I updated my opnsense instance to v 20.7.7_1  yesterday.
Today my unbound 1.13.0 crashed, and I can't start it back.
Rollback to unbound 1.12.0 with opnsense-revert -r 20.7.6 unbound command didn't help.
I had no choice but completely disable unbound.
ְAny suggestions for alternative stable local DNS?

Quote from: Animosity022 on December 20, 2020, 02:24:42 PM
I was saying to stop pushing a patch that bricks your router.

That's not a reasonable way to describe a choice to update or revert. If Unbound wants 1.13.0 out being the only way to deal with a CVE it should make sure it works. Users need to accept the possibility that this is mostly the case, but not always.


Cheers,
Franco

Quote from: franco on December 20, 2020, 08:48:02 PM
Quote from: Animosity022 on December 20, 2020, 02:24:42 PM
I was saying to stop pushing a patch that bricks your router.

That's not a reasonable way to describe a choice to update or revert. If Unbound wants 1.13.0 out being the only way to deal with a CVE it should make sure it works. Users need to accept the possibility that this is mostly the case, but not always.


Cheers,
Franco

If an update breaks a device and makes it not functional and the vendor understands the problem being caused (3rd party or not), they usually remove the broken update so it stops creating more havoc for people since it was not intended to break the device.



Quote from: Animosity022 on December 20, 2020, 08:56:33 PM
If an update breaks a device and makes it not functional and the vendor understands the problem being caused (3rd party or not), they usually remove the broken update so it stops creating more havoc for people since it was not intended to break the device.

There is a distinction I think is being missed here: "affects all people" vs. "affects some people".

Also, "break a device" is used opportunistically here. The device isn't bricked. The admin can still do something (if actually necessary, see first point).

Also maybe this is a bit unexpected: there is no clean rollback of published repositories with FreeBSD package manager. It can break your dependency chain worst case, deinstalling the core package leaving the device really really dead in the water. It's not a risk to take vs. first point.

There are more points, but I fear they are not relevant to the desires of the perfect consumer of the perfect project.


Cheers,
Franco

Affected our firewalls too, from 12 of 10. So its pretty much affect almost everyone, not just a few people.
Disabled unbound and using dnsmasq solve the issue.

Quote from: alexroz on December 20, 2020, 08:10:50 PM
ְAny suggestions for alternative stable local DNS?

I would say DNSCrypt-proxy. That is what I use since I have (other) problems with Unbound (mainly DNSBL and network port going up/down with complete restart of Unbound and as a result DNS outage). However it is not as integrated with OPNsense...