- Dec 10, 2015
-
-
Marek Vavruša authored
fixes #20
-
Marek Vavruša authored
fixes #19
-
Marek Vavruša authored
fixes #18
-
Marek Vavruša authored
-
Marek Vavruša authored
this should help packaging the project to other platforms thanks @darix!
-
Marek Vavruša authored
-
Marek Vavruša authored
* PIE,RELRO+NOW and other security features enabled * support for both static/dynamic builds with BUILDMODE * dynamic library is ABI-versioned, starting at 1 * pkg-config file is installed
-
- Dec 09, 2015
-
-
Marek Vavruša authored
this is needed to make sure it always compiles with PIC
-
Marek Vavruša authored
-
Marek Vavruša authored
rdata may be <=64k + 8B on stack which may be source of various mystery errors later, for example in bindings or stackspace-constricted env
-
Marek Vavruša authored
-
- Dec 08, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
- Dec 07, 2015
-
-
Marek Vavruša authored
-
- Dec 06, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
this allows to override any dstdir variable without patching config.mk
-
- Dec 05, 2015
-
-
Marek Vavruša authored
if the root key file doesn’t exist, it will be populated from root DNSKEY query, which will be validated against root trust anchors retrieved over HTTPS with IANA cert verification against built-in current IANA cert CA. it requires luasocket and luasec for it to work. trust anchors XML file signature is not checked, as there’s no facility for PKCS7 checking yet.
-
- Dec 04, 2015
-
-
Marek Vavruša authored
-
- Dec 03, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
worker can track outbound requests and if N resolutions want the same subrequest, only one will lead it and others will be notified when it finishes this massively reduces number of outbound requests for slow/unresponsive/low ttl requests
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
any answer that is considered as malformed/servfail/otherwise bad penalizes the NS for the next time like timeout, this doesn't apply for DNSSEC validation failures as it still may be okay for insecure resolution. EDNS failures are okay because the server is requeried in the most simple RFC1035 mode before flagging it as failed this avoids instant requeries for SERVFAILing resolutions
-
Marek Vavruša authored
when a delegation is provably insecure, it is flagged as INSECURE in cache (this is different from "unchecked"), when the next query finds the same zone cut, this information is retrieved and if it was proved to be insecure before, this status is reused this prevents refetching of NS/DNSKEY in some situations
-
Marek Vavruša authored
-
Marek Vavruša authored
-
- Dec 02, 2015
-
-
Marek Vavruša authored
daemon/io: remove redundant libknot/internal/utils.h include See merge request !16
-
Daniel Salzman authored
-
- Nov 29, 2015
-
-
Marek Vavruša authored
notably key id doesn’t have to be recalculated every time, cheaper checks should come first, name equality check is cheaper as well
-
Marek Vavruša authored
-
- Nov 28, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-