Skip to content
Snippets Groups Projects
  1. Dec 24, 2017
    • Jonathan Foote's avatar
      Initial integration with google/oss-fuzz · 60729287
      Jonathan Foote authored
      Implements initial support for continuous fuzzing with [google/oss-fuzz](http://github.com/google/oss-fuzz). Changes:
      
      - Removes `--with-santize-coverage` config flag: the clang6 `-fsanitize=fuzzer-no-link` replaces this
      - Adds `--with-oss-fuzz` config flag: links `-lFuzzingEngine` into fuzz targets
      - Adds logic to `make check` that runs the fuzz targets with a single seed input to ensure they exit successfully
      60729287
  2. Dec 22, 2017
  3. Dec 21, 2017
  4. Dec 20, 2017
  5. Dec 19, 2017
  6. Dec 15, 2017
  7. Dec 14, 2017
  8. Dec 12, 2017
  9. Dec 08, 2017
    • Robert Edmonds's avatar
      udp-handler: Remove capability dropping code · c0c3f972
      Robert Edmonds authored
      Capabilities should already have been dropped prior to threads being
      spawned.
      c0c3f972
    • Robert Edmonds's avatar
      tcp-handler: Remove #include <cap-ng.h> · fa7de88e
      Robert Edmonds authored
      This commit removes the conditional import of <cap-ng.h> in tcp-handler,
      because there are no dependencies on the libcap-ng API in tcp-handler.c.
      fa7de88e
    • Robert Edmonds's avatar
      dthreads: Remove capability dropping code · fd7f3f39
      Robert Edmonds authored
      Capabilities should have already been dropped prior to threads being
      spawned.
      fd7f3f39
    • Robert Edmonds's avatar
      knotd: Simplify POSIX capabilities setup to drop all capabilities · 16c12f1b
      Robert Edmonds authored
      This commit renames knotd's setup_capabilities() to drop_capabilities(),
      and makes this function simply drop all capabilities.
      
      The call to this function from main() was previously very early, prior
      to sockets being bound. Since we most likely need to retain some
      capabilities in order to bind to privileged sockets, this commit moves
      the dropping of capabilities to be just after the dropping of
      privileges, since we also need capabilities in order to change uid/gid.
      
      Capabilities dropping is still performed prior to any daemonization or
      spawning of threads, so the interaction of capabilities with threads and
      child processes should be straight forward to analyze.
      
      We also call drop_capabilities() prior to activating any global query
      modules, so any threads spawned by those modules should see the same,
      minimal set of privileges and capabilities that the main thread and
      worker threads will see during runtime.
      16c12f1b
    • Robert Edmonds's avatar
      knotd: Make global query module activation occur later · 8d53d75a
      Robert Edmonds authored
      This commit moves the call to conf_activate_modules() out of the
      set_config() function and into main() so that global query modules are
      activated after privilege dropping has occurred.
      
      This makes the global query modules match the zone query modules a
      little better. The zone query modules are activated later, after
      privilege dropping has occurred.
      
      This ensures that if a global query module launches its own threads at
      startup, those threads are spawned from a main thread that has already
      performed privilege dropping.
      8d53d75a
    • Libor Peltan's avatar
      doc: described key rollover schemes · 99e9ce87
      Libor Peltan authored
      99e9ce87
  10. Dec 06, 2017
  11. Dec 05, 2017
  12. Dec 04, 2017
Loading