- Oct 07, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
effectively enables/disables usage of given IP protocol for subrequests (the server can still listen on these)
-
Marek Vavruša authored
-
- Oct 06, 2015
-
-
Marek Vavruša authored
-
- Oct 05, 2015
-
-
Marek Vavruša authored
the key is now stored in a format friendly to prefix search, the values also contain one more 16bit field to store rank of the data (to be utilised later)
-
Marek Vavruša authored
-
- Oct 02, 2015
-
-
Marek Vavruša authored
-
- Oct 01, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
- Sep 30, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
- Sep 29, 2015
-
-
Marek Vavruša authored
the selected address is now an array with selection, caller can then send the same query to multiple offered targets refs #35
-
- Sep 28, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
-
Marek Vavruša authored
example: local rr = pkt:section(kres.section.ANSWER)[1] print(kres.rr2str(rr))
-
Marek Vavruša authored
example: local rr = pkt:section(kres.section.ANSWER) for i = 1, #rr do if rr[i].type == kres.type.A then print(kres.dname2str(rr[i].owner)) print(‘rdlen:’, #rr[i].rdata) end end
-
- Sep 27, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
sets maximum UDP/EDNS payload within <1220, 65535> the default is max unfragmented UDP packet, but it’s possible to set it higher if the network supports it to avoid TCP retransmits
-
- Sep 25, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
todo: active refresh
-
Marek Vavruša authored
-
Marek Vavruša authored
DS keys are injected into current set (unmanaged) DNSKEY keys are in the managed set and their RFC5011 state is tracked todo: - implement timers and this AddTime/RemTime - active refresh - move to a separate module
-
Marek Vavruša authored
-
- Sep 24, 2015
-
-
Marek Vavruša authored
example: $ kdig @a.root-servers.net +short +tcp DNSKEY . > root.key $ kresd -k root.key
-
Marek Vavruša authored
before the cache was disabled by default, but this has led to many user errors (mine as well). this enables it by default (which is what most people want anyway)
-
- Sep 23, 2015
-
-
Marek Vavruša authored
-
Marek Vavruša authored
example: worker.resolve('cz', kres.type.NS, kres.class.IN, 0, function (pkt) local answer = kres.pkt_t(pkt) print (answer:rcode()) end)
-
- Sep 22, 2015
-
-
Marek Vavruša authored
config: trust_anchors.negative = { ‘bad.cz’, ‘here.com’ } all names below these NTA will not be validated (unless there is an island of trust below these anchors)
-
- Sep 21, 2015
-
-
Marek Vavruša authored
preparations for TA rotation and management in config: trust_anchors.file = ‘root.key’ trust_anchors.auto = true // NOTIMPL trust_anchors.add(‘. IN DS …’) // Manual addition
-
- Sep 17, 2015
-
-
Marek Vavruša authored
`kresd -a 127.0.0.1 -a ::1` binds to both addresses
-
Marek Vavruša authored
the reason is that it's not actively used since we moved to binary testing, and it depends on libknot internal api that has changed also removed several unused libknot internal headers
-
- Sep 15, 2015
-
-
Marek Vavruša authored
previously, debug messages were optional with -DWITH_DEBUG now the debug messages are built in (unless compiled with -DNDEBUG), but disabled by default verbose output can be enabled by '-v' or '--verbose' CLI option or interactively by 'verbose(true|false)' (or in config)
-