- Dec 24, 2017
-
-
Jonathan Foote authored
Implements initial support for continuous fuzzing with [google/oss-fuzz](http://github.com/google/oss-fuzz). Changes: - Removes `--with-santize-coverage` config flag: the clang6 `-fsanitize=fuzzer-no-link` replaces this - Adds `--with-oss-fuzz` config flag: links `-lFuzzingEngine` into fuzz targets - Adds logic to `make check` that runs the fuzz targets with a single seed input to ensure they exit successfully
-
- Dec 22, 2017
-
-
Daniel Salzman authored
No resign nsec3 See merge request !866
-
-
Daniel Salzman authored
keymgr: handling CSK See merge request !863
-
-
Libor Peltan authored
This reverts commit 31c75de2.
-
- Dec 21, 2017
-
-
-
Daniel Salzman authored
Doxygen improvements Closes #544 See merge request !841
-
-
Mark Karpilovskij authored
-
- Dec 20, 2017
-
-
-
Daniel Salzman authored
-
- Dec 19, 2017
-
-
Daniel Salzman authored
DNS cookies Closes #505 See merge request !851
-
-
-
-
-
- Dec 15, 2017
-
-
Daniel Salzman authored
-
- Dec 14, 2017
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
-
- Dec 12, 2017
-
-
Daniel Salzman authored
Linux capabilities rewrite See merge request !864
-
Daniel Salzman authored
-
- Dec 08, 2017
-
-
Robert Edmonds authored
Capabilities should already have been dropped prior to threads being spawned.
-
Robert Edmonds authored
This commit removes the conditional import of <cap-ng.h> in tcp-handler, because there are no dependencies on the libcap-ng API in tcp-handler.c.
-
Robert Edmonds authored
Capabilities should have already been dropped prior to threads being spawned.
-
Robert Edmonds authored
This commit renames knotd's setup_capabilities() to drop_capabilities(), and makes this function simply drop all capabilities. The call to this function from main() was previously very early, prior to sockets being bound. Since we most likely need to retain some capabilities in order to bind to privileged sockets, this commit moves the dropping of capabilities to be just after the dropping of privileges, since we also need capabilities in order to change uid/gid. Capabilities dropping is still performed prior to any daemonization or spawning of threads, so the interaction of capabilities with threads and child processes should be straight forward to analyze. We also call drop_capabilities() prior to activating any global query modules, so any threads spawned by those modules should see the same, minimal set of privileges and capabilities that the main thread and worker threads will see during runtime.
-
Robert Edmonds authored
This commit moves the call to conf_activate_modules() out of the set_config() function and into main() so that global query modules are activated after privilege dropping has occurred. This makes the global query modules match the zone query modules a little better. The zone query modules are activated later, after privilege dropping has occurred. This ensures that if a global query module launches its own threads at startup, those threads are spawned from a main thread that has already performed privilege dropping.
-
Libor Peltan authored
-
- Dec 06, 2017
-
-
Daniel Salzman authored
fixes #560
-
- Dec 05, 2017
-
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
Daniel Salzman authored
-
- Dec 04, 2017
-
-
Daniel Salzman authored
-