- Apr 14, 2016
-
-
- Mar 10, 2016
-
-
Marek Vavrusa authored
-
Marek Vavrusa authored
-
- Feb 24, 2016
-
-
Grigorii Demidov authored
-
- Feb 23, 2016
-
-
- Feb 22, 2016
-
-
Grigorii Demidov authored
-
- Feb 17, 2016
-
-
Ondřej Surý authored
-
- Feb 12, 2016
-
-
Grigorii Demidov authored
-
Grigorii Demidov authored
-
- Feb 11, 2016
-
-
Grigorii Demidov authored
-
- Feb 08, 2016
-
-
Marek Vavrusa authored
the validator module should ignore any data that will be scrubbed, that includes non-authoritative data outside current bailiwick. previously, validator attempted to ignore these records only for answer section and had a special case for NS records. cache: non-authoritative NS records are always unchecked and must be treated as insecure affected: www.iana.org trying to provide delegation information for CNAME target, which is moot with CNAME target explicit-fetch policy unless the the resolver already knows DNSKEY with which is could verify the records
-
- Jan 30, 2016
-
-
Marek Vavrusa authored
breathe failed to process the typedef thinking the macro expansion was a function pointer
-
- Jan 29, 2016
-
-
Marek Vavrusa authored
-
Marek Vavrusa authored
updated tests
-
- Jan 22, 2016
-
-
Marek Vavrusa authored
when raised, a response zone cut will be recovered even if the response came from cache. this is normally not needed (and incurs additional cache lookups), but it may be useful for inspection
-
- Jan 20, 2016
-
-
there are broken resolution chains where a zone cut is advertised, but it doesn't exist and the final NS answers from its parent's zone cut, which is an attempt to escape bailiwick example: resolving A ab.cd.ef NS ef responds: - ab.cd.ef NS X ; adverises ab.cd.ef zone cut X responds: - A ab.cd.ef A 1.2.3.4 - cd.ef NS X ; escapes previously advertised cut on the other hand, it is important to fail early for referrals as it signifies a lame answer
-
- Jan 19, 2016
-
-
Marek Vavrusa authored
there are broken resolution chains where a zone cut is advertised, but it doesn't exist and the final NS answers from its parent's zone cut, which is an attempt to escape bailiwick example: resolving A ab.cd.ef NS ef responds: - ab.cd.ef NS X ; adverises ab.cd.ef zone cut X responds: - A ab.cd.ef A 1.2.3.4 - cd.ef NS X ; escapes previously advertised cut on the other hand, it is important to fail early for referrals as it signifies a lame answer
-
- Jan 18, 2016
-
-
Grigorii Demidov authored
-
- Jan 15, 2016
-
-
Grigorii Demidov authored
-
- Jan 11, 2016
-
-
Marek Vavrusa authored
the field length is platform-dependent
-
lib: answer finalization was changed
-
- Dec 23, 2015
-
-
Marek Vavruša authored
-
- Dec 17, 2015
-
-
Marek Vavruša authored
this is not going to be backwards compatible change, but it will be the first tagged libknot release sufficient for resolver
-
- Dec 11, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
- Dec 10, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
thanks @darix! fixes #21,#22
-
Marek Vavruša authored
* PIE,RELRO+NOW and other security features enabled * support for both static/dynamic builds with BUILDMODE * dynamic library is ABI-versioned, starting at 1 * pkg-config file is installed
-
- Dec 09, 2015
-
-
Marek Vavruša authored
this is needed to make sure it always compiles with PIC
-
Marek Vavruša authored
-
Marek Vavruša authored
rdata may be <=64k + 8B on stack which may be source of various mystery errors later, for example in bindings or stackspace-constricted env
-
- Dec 08, 2015
-
-
Marek Vavruša authored
-
- Dec 07, 2015
-
-
Marek Vavruša authored
-
- Dec 06, 2015
-
-
Marek Vavruša authored
this allows to override any dstdir variable without patching config.mk
-
- Dec 03, 2015
-
-
Marek Vavruša authored
worker can track outbound requests and if N resolutions want the same subrequest, only one will lead it and others will be notified when it finishes this massively reduces number of outbound requests for slow/unresponsive/low ttl requests
-
Marek Vavruša authored
-
Marek Vavruša authored
any answer that is considered as malformed/servfail/otherwise bad penalizes the NS for the next time like timeout, this doesn't apply for DNSSEC validation failures as it still may be okay for insecure resolution. EDNS failures are okay because the server is requeried in the most simple RFC1035 mode before flagging it as failed this avoids instant requeries for SERVFAILing resolutions
-
Marek Vavruša authored
when a delegation is provably insecure, it is flagged as INSECURE in cache (this is different from "unchecked"), when the next query finds the same zone cut, this information is retrieved and if it was proved to be insecure before, this status is reused this prevents refetching of NS/DNSKEY in some situations
-
Marek Vavruša authored
-